Archives
- August 2020 (1)
- October 2019 (2)
- September 2018 (1)
- June 2018 (1)
- April 2018 (3)
- January 2018 (2)
- December 2017 (3)
- August 2017 (2)
- July 2017 (1)
- February 2017 (1)
- January 2017 (5)
- September 2016 (2)
- January 2016 (1)
- November 2015 (1)
- September 2015 (2)
- October 2014 (1)
- April 2014 (1)
- March 2014 (2)
- December 2013 (1)
- November 2013 (1)
- October 2013 (3)
- September 2013 (2)
- July 2013 (3)
- May 2013 (2)
- March 2013 (2)
- February 2013 (2)
- January 2013 (1)
- December 2012 (5)
- November 2012 (5)
- October 2012 (4)
- September 2012 (3)
- August 2012 (7)
- July 2012 (8)
- June 2012 (2)
- May 2012 (2)
- April 2012 (4)
- March 2012 (1)
- January 2012 (1)
- December 2011 (1)
- November 2011 (1)
- October 2011 (2)
- September 2011 (1)
- August 2011 (3)
- July 2011 (4)
Category Archives: Networking
Prevent IP Access by Routing to Null
The goal of a router is to send network traffic to its destination based on its routing table. Some times its necessary to prevent traffic form flowing through a router. This can typically be achieved with access control lists, but a cost. ACLs, particularly long and complicated ones, come with the cost of performance. When preventing access to an entire subnet it is possible to simply route traffic into a “black hole” where it will be discarded. This is achieved without using an ACL. Continue reading
Posted in Networking Tagged cisco, configuration, IOS, logging, networking, security Leave a comment
Introduction to Virtual Routing and Forwarding (VRFs)
If you have listened to anything IT in the past five plus years you have probably heard of and experienced the “virtualization” buzz word. Typically, it’s referencing host or server virtualization as this is the most common and well known. There are, however, other instances where virtualization of sorts can be used to break hardware into isolated network building blocks. Virtual Routing and Forwarding instances (VRFs) on Cisco routing devices are one such example. Continue reading
Moving a Subnet to a Different VLAN
There are a few different rare cases where you may need to move a subnet to a completely new or different VLAN. Making a layer 2 connection between two different networks with overlapping VLAN space or moving off of VLAN 1 for best practice reasons would be two examples. I will be focusing on the latter in this discussion but the steps will be applicable in other instances as well. To make this more practical lets keep the idea of very little to no downtime in mind. Continue reading
Traffic Rate Limiting with Monowall
Recently I was called to implement a system to limit the bandwidth used by our guest network. There was no firewall in place for this network aside from the device provided by the ISP. Needless to say, it was junk and supported none of the more advanced features we needed. I implemented a Monowall with a fairly typical setup and jumped into configuring the traffic shaper. In this article I will only be limiting traffic Continue reading