Tag Archives: networking

Mitel Phone DHCP Configuration with Multiple VLANs

Typically it is always recommended to segregate VoIP traffic from your typical data traffic. Recently, however, I was part of a Mitel 3300 phone system installation that was taking a different course. The techs with the local phone company doing the installation were not familiar with this concept and wanted to actually statically address the phones as well. Not cool, scalable or best practice particularly as the network grows and changes. Continue reading

Posted in Networking, Telephony | Tagged , , | Leave a comment

TACACS+, Linux, and Cisco Command Accounting

I recently finished configuring our medium sized corporate network devices to authenticate via Radius against windows Network Policy Server. Never being satisfied I wanted to take it a step further and account for administrative actions taken on our routers and switches. Basically, I want a record of every command typed into the network devices. Its like a key logger of sorts for your Cisco devices… I know Cisco and other vendors offer some commercial TACACS+ servers but all were outside of the budget for this project. Continue reading

Posted in Linux | Tagged , , , , | 5 Comments

Configure Hurricane Electric IPv6 over IPv4 Tunnel with Monowall

We have been holding on to IPv4 for a long time. We are well past the initial “run out of addresses” date thanks to VLSM, NAT and some other addressing tricks. The facts are, however, that IPv4 is running to its end and will eventually become obsolete. Fortunately, however, there are ways to ease into IPv6. One that I found, since my ISP does not yet offer IPv6 service, was to create a tunnel to someone who does. Tunnelbroker.net powered by Hurricane Electric was one of the options. Another tunnel broker you might consider is Core Transit who will tunnel … Continue reading

Posted in Networking | Tagged , , | Leave a comment

Capturing Traffic with the Cisco ASA

I have written quite a few things lately about capturing traffic so why not write another? This time we will be taking a look at capturing data from another key place in the network; the firewall. Continue reading

Posted in Networking, Security | Tagged , , , , , , | Leave a comment