Posts

Showing posts from 2009

EIGRP, backup and default gateway

Image
EIGRP configuration go to cyb n png, type this command on both router Cyb(config)#router eigrp 1 Cyb(config-router)#network 10.0.0.0 Cyb(config-router)#no auto-summary # router eigrp 1 : You can choose any number for eigrp from 1-65535, router with the same eigrp AS number will exchange routing information each others. # network 10.0.0.0 : all the interface with this address will be advertised to all router with eigrp 1 #no auto-summary : if you are using classless IP address in your network, this command should be apply, if not, router gonna summarize all the network and only advertise it as a single network. It may cause looping problem. Classfull network not gonna effected After eigrp is set on the 2 nd router, you’ll notice there’s a message as picture above, this mean that both router are learning each other, they both advertise the network 10.x.x.x as defined in the command. Type #show ip eigrp interface to know which interface is advertise, in this case, ...

set proxy for terminal ubuntu

Image
1.Open terminal, type " sudo gedit /etc/bash.bashrc " 2.At the end of the line, type " export "http_proxy=http:proxy_ip:port_number" "

IPsec, and IPsec over GRE Tunnel

Image
Intro Most of enterprise today move to IPsec over GRE tunnel to save cost, but I'm not saying that this technology already rule out MPLS, lease line, etc. It depend on that site, how critical it is, how stable the internet connection is. Usually small office like sales that only have few workers use this to connect to corporate LAN. IPsec and GRE Tunnel is 2 different thing, we'll go with IPsec first, then brief about GRE then I'll give you an example of IPsec over GRE tunnel IPsec The three main point of IPsec is Authentication Data Integrity Confidentiality Authentication to make sure you communicating or talking to the right person Data Integrity to make sure what you sending is received at the destination with the same shape, mean no modification happen along the way confidentiality to make sure what send not able to be seen by third party What build an IPsec ? Basically, IPsec is a combo of a few protocol Negotiation : IKE Security : AH, ES...

First Post

I work for a giant microprocessor company as a network engineer. Our network infrastructure are very complex, but the problem is my knowledge and experience are not that complex (I'm a fresh grad). so i must do something about this, and i decided to start blogging about network technologies and set a target; to become a CCIE certified !! well, this is where i coming from, and see you on next post ;-)