Hi,
I am trying the understand what is the use of the command "mls qos vlan-based". Let's say I have the following configured:
interface Gi7/4
switchport
switchport access vlan 156
switchport mode access
no shut
!
interface Gi7/5
switchport
switchport access vlan 157
switchport mode...
Hi,
I wanted to know if there was any difference in using either logging event-link status command vs the snmp trap link-status command?
Thank you,
Victor
I having been trying to establish an ipsec tunnel between the two router below but I have been unsuccessful. Below are the configurations for both routers. What am I missing?
Thank you
R1 Config
crypto isakmp policy 5
encr aes
authentication pre-share
group 5
crypto isakmp key grace...
Well I am looking for is to be able to export a terminal window from the linux into windows using something like putty. Does anyone have any recommendations?
Thanks
Hi,
I am bit confused on the terminology and the design of AIX. What is the difference between AIX and the kernel? Are they both the same entity or are they both looked upon as two OS? Such as the kernel not being a full-blown version of UNIX.
Thank you,
Victor
How can I setup via the Finder window a default program that will open a specific file always. From example all .txt file should always open with the application "Textedit".
Thank You
Hi,
I was practing the following configs on the lab below. However, I am not sure how the ip nat outside source static x.x.x.x x.x.x.x works. I know that the ip nat inside source list 20 pool NAT-Pool overload command is used to nat the sources which matched against ACL 20.
ip nat...
I have a PIX firewall which has three interfaces. Of the DMZ interface there is a workstation with an IP address of 143.104.182.37 which is trying to access a server located on the inside interface with an IP address of 143.104.183.198. I checked the firewall log and I get the follow output...
I have a site -to- site VPN setup with a remote site, using the real address of the each others network. The problem is that now I have to nat the users out the outside interface of the ASA for the ASA site to the PIX side. Also, there are four devices located behind the PIX using private...
Yes a lot of things are working on the ASA. The router is not doing NAT the ASA is doing NAT. It might look confusing because I removed a few things that I could not post. I got the VPN tunnel up however I still have an issue. If a host located on the PIX side(10.1.1.0) try to telnet into a...
...no ip address
!
interface GigabitEthernet1/3
shutdown
no nameif
no security-level
no ip address
!
passwd xxxxxxxx encrypted
banner motd *************************************************************************
banner motd * AUTHORIZED USE ONLY...
I have a VPN Concentrator, and I have a large amount of users defined on the vpn concentrator database. I wanted to know how I can limit an individual user from only reach a server that they need access too.
I am trying to setup a site to site VPN between an ASA and a PIX firewall. I need help with the entire config? Also I am a little confused on what IP address should I be using on PIX side for the peer address. Should it be the G0/0 ip address on the W_Net_1 Router or should it be ip address of...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.