Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations SkipVought on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Search results for query: *

  1. ChicagoJim

    Free CCNA study book

    Below is an alternate link to the book in MS Word format: (www.spcollege.edu/star/cisco/Matt/list_of_current_papers_and_brief.htm) I ran across the story and the link at The Register (www.theregister.co.uk). I only took a brief look at the book. So, I can't testify to it's quality. But from...
  2. ChicagoJim

    SonicWALL and internal DHCP

    Good to know. Thanks for the follow-up :)
  3. ChicagoJim

    SonicWALL and internal DHCP

    I'm assuming your DHCP clients are on a different subnet than the DHCP server, or you wouldn't have this problem. That being the case, simple firewall rules will not work because they examine packets at layer 3 (the network layer) and above. DHCP requires knowledge of the clients MAC...
  4. ChicagoJim

    1st firewall

    Of the three, I would go with the SonicWall. I'd personally rule out the Netgear. In the low end models, VPN connections are software based and SLOW. And, I've had to pull an FVS318 out of service because it was buggy. I've never used a LinkSys in a production environment. But, I use one...
  5. ChicagoJim

    T1 Firewall Comparison

    I can tell you that the PIX is a nice piece of equipment, and is always my first choice. However, they're not really geared towards the uninitiated. If you have a complex networking environment you'll appreciate the products flexibility. Unfortunately, I've never used Watchguard. So, I can't...
  6. ChicagoJim

    Looking for Hardware based Firewall

    PIX firewalls are always my first choice, but with their high price tag they may not be an available option. I've set up and maintained a few SonicWall products. I like them for their simplicity, but if you anticipate complex firewall rules or have a complex routing environment, they're not...
  7. ChicagoJim

    Software Security Program

    The firewall\router you're using most likely has logging capabilities built into it. However, if you're looking for something more, eEye has a product called Iris Network Traffic Analyzer that has some nice features for tracking user activity on the network...
  8. ChicagoJim

    Cisco 3000 Router for CCNA practice

    Congrats :) I agree. Playing around with a real router, even if it's an old IOS version, beats the heck out of any simulator. It's to bad that Cisco doesn't offer an educational discount on upgrading the IOS, but it will still give you a feel for what Cisco IOS is all about. If you find it's...
  9. ChicagoJim

    Cisco 3000 Router for CCNA practice

    The messages your seeing when set at 9600,8,N,1 are a good sign if you haven't connected the token ring interfaces to a MAU yet. They're just log messages indicating that token ring interface 0 is trying to start up. If it's not plugged into a multi-station access unit, it can't initialize...
  10. ChicagoJim

    Cisco 3000 Router for CCNA practice

    Hmmm, I think you may have a Catalyst switch, not a router. Both the 3600 and 3700 routers have an RJ-45 console port on the back, whereas the Catalyst 3000 series switch has a DB9 console connector. If this is the case, the switch doesn't run IOS. It looks like it's one of the menu driven...
  11. ChicagoJim

    Cisco 3000 Router for CCNA practice

    Here's a link to a recent forum thread that discusses how to connect to the console port on Cisco devices. It also contains information on some of the telnet options you have available: www.tek-tips.com/viewthread.cfm?SQID=660861&SPID=558&newpid=558&page=1
  12. ChicagoJim

    SSL Implementation Vulnerabilities

    For anyone who hasn't seen it yet, Cisco has announced a DoS vulnerability in the SSL implementaion of certain devices. Be sure to check if your hardware is effected: http://www.cisco.com/warp/public/707/cisco-sa-20030930-ssl.shtml
  13. ChicagoJim

    Deleted files magically appear

    The files you listed are critical Windows system files. Even if you could delete them, you shouldn't. The operating system depends on them. It looks to me like your running either Windows 2000 or XP. Both have a feature called Windows File Protection (WFP), which does exactly what you...
  14. ChicagoJim

    2503 ISDN

    Here's a forum link that explains how to connect to a Cisco router/switch through the console port: www.tek-tips.com/viewthread.cfm?SQID=660861&SPID=558&newpid=558&page=1 To reset the password, you send a break sequence during the router's boot up to put it into ROMMON mode. This will allow...
  15. ChicagoJim

    Good Firewall Option for Small Office

    I've set up a Netgear FVS318 VPN Firewall at a client’s site. I can't say I'm thrilled with it. It will block unwanted incoming traffic, provide some BASIC logging, and has some nice DHCP/DNS features. However, the software based VPN is slow, the HTTP interface seems a little buggy, and the...
  16. ChicagoJim

    Connecting to Console

    If you have a cable tester that shows a wire map, be sure to test the rollover cable, and check your port settings as wybnormal suggests. If you don't have a cable tester to verify your cable with, try remaking it. I know I've made my share of mis-wired cables. Also, how long is this cable...
  17. ChicagoJim

    Connecting to Console

    Hilgraeve's Hyper Terminal is a terminal emulation program that is included with Windows. It's usually somewhere under the "Accessories" section of the "Programs" menu. For example, on Windows 2000, it's under Start/Programs/Accessories/Communications. When you launch it...
  18. ChicagoJim

    Security Clearance

    I don't have any direct knowledge of the subject myself. But, I know someone who works in government security. The explanation I got is that it doesn't cost anything to get a security clearance. You have to either work for the government or be working on a government contract to get one. If...
  19. ChicagoJim

    Echo Request and more!

    With the recent vulnerabilities disclosed (RPC DCOM primarily) and the resulting viruses and exploits, the Internet has become "noisier" than it typically is. I'm a sys admin, and I can tell you my Internet facing logs are filling MUCH faster than usual as a consequence. I wouldn't...
  20. ChicagoJim

    Port security

    I use port security with the shutdown action on my network. It works great, but it does add a bit of extra work when you move or add workstations; and when some #$@! user tries to plug his home computer into the LAN. I also have a port (in our conference room) connected to a small 4 port hub...

Part and Inventory Search

Back
Top