i see...so this would mean that this line is redundant given that the first line stated that should the RADIUS server be uncontactable, the cisco device will authenticate user with the local database.
Am i correct?
The default/basic configuration of RADIUS/aaa auth goes something like this:
aaa authentication login default group radius local
aaa authentication login localauth local
What does the 2nd line do?
Hehe, at least I am correct to say that this question is indeed tough to answer. Maybe if i were to have these constraints:
1) 3 transmit packets per workstation for one application, size is 100KB each, meaning 3*100KB = 300KB = 1600Kb.
2) Internally network is 10BaseT Ethernet
3) 1 receive...
er.....getting a T1, E1 in my part of the world is tough enough...let alone E3 or T3...
where can i find the hardcore stuff that calculates right down to the bits of traffic, how much traffic generated by multiple PCs thro the switch and router out via a single WAN link...etc.etc..
I always have problem determining the DRAM and flash of the myriad of IOS and this 2950 running a 12.1(9)EA1 is giving me a headache.
Show version:
------------------------------------------------------------
Cisco Internetwork Operating System Software
IOS (tm) C2950 Software...
er...i am still kenna confused. Does this means that for my ACL i will be just permitting that single source address to access the tftp server even though i can multiple different network nodes accessing the tftp server? My explanation does not make any sense...so it has to be wrong...anyone...
Ugh, what does the abovementioned line do?
Cisco explanation is:
"Allows a user to select the interface whose address will be used as the source address for TFTP connections"
What in the world does it mean? How is this gonna affect my switch, which is not the interface mentioned...
Tried to mrtg a 7206 running MPLS but was unable to. Since MPLS was applied only to the E1 lines, the MRTG was unable to graph these interfaces.
Error messages were:
"
WARNING: Could not match host:'snmpread@174.0.1.2:' ref:'Name' key:'Se4/4\:4'
ERROR: Target[174.0.1.2_se4_0_0][_IN_] '...
Does anyone have an idea why does this mean?
12:14:42 %PAGP-5-PORTTOSTP:PORT 2/28 joined bridge port 2/28
12:14:25 %PAGP-5-PORTFROMSTP:PORT 2/28 left bridge port 2/28
Does this mean that the port is "flapping"? Or changing from forwarding->blocking->forwarding?
Oops, juz to add on...are there any features in the switch that will increase the security? As far as i have read, there is no security builtin for syslogging... SAFE blueprint suggest using either out of band management, or VPN...is there a simpler way?
The kiwisyslogd 7.0.3 does not seem to be able to log or display the syslogs from my 2900XL even though a sniff shows that the NMS is receiving the syslogs...is there any hidden issues?
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.