Author Archives: Adam

802.1Q Tunneling AKA QinQ

You are probably familiar with VLAN tagging on switch trunks and how it can be used to separate physical infrastructures into multiple logical networks. With the explosive growth of Metro Ethernet connections the ability of site to site layer two connections has now become common. It’s easy for organizations to implement as network admins are already familiar with Ethernet as a LAN protocol. The setup is simple for the customer but a bit more configuration is needed on the service provider’s side if the customer desires VLAN tagged traffic to flow over the site to site link. Lets take a look! Continue reading

Posted in Networking | Tagged , , , , | Leave a comment

Native Grep and Cat Alternatives in Windows (sort of…)

If you use a Linux operating system for much you are probably familiar with the “grep” and “cat” commands and their usage.   Grep is probably one of the most powerful utilities in Linux because it allows for text and regular expression searching a number of different ways.  Grep is so popular that it has even been ported to Windows by many.  So how do you get grep functionality in Windows?  Well, you can download many of the installable versions out there and you’re set.  Unfortunately, in a pristine server environment with change control or limited privileges this is not an … Continue reading

Posted in Networking | Tagged , , , , | 1 Comment

Archive Cisco Configuration Changes on the Cheap

I enjoy solving problems on a shoe string budget with next to no resources. Well… not really. But, because I work with small businesses from time to time that often is the main design requirement. Another design requirement that often doesn’t fall in line with “cheap” is disaster recovery. Fortunately I was able to talk the clients into Cisco gear at one point in the past. I’m about to show you why. Continue reading

Posted in Networking | Tagged , , , , , | Leave a comment

Cisco Identity Services Engine

I recently had the opportunity to attend a Cisco Gold lab focused on Cisco’s Identity Services Engine (ISE). I was particularly interested in the capabilities of the ISE that would help us deal with the “Bring Your Own Device” (BYOD) mess we are starting to get into. I found ISE to be very robust and powerful. Continue reading

Posted in Networking, Reviews, Security | Tagged , , | Leave a comment