Archives
- August 2020 (1)
- October 2019 (2)
- September 2018 (1)
- June 2018 (1)
- April 2018 (3)
- January 2018 (2)
- December 2017 (3)
- August 2017 (2)
- July 2017 (1)
- February 2017 (1)
- January 2017 (5)
- September 2016 (2)
- January 2016 (1)
- November 2015 (1)
- September 2015 (2)
- October 2014 (1)
- April 2014 (1)
- March 2014 (2)
- December 2013 (1)
- November 2013 (1)
- October 2013 (3)
- September 2013 (2)
- July 2013 (3)
- May 2013 (2)
- March 2013 (2)
- February 2013 (2)
- January 2013 (1)
- December 2012 (5)
- November 2012 (5)
- October 2012 (4)
- September 2012 (3)
- August 2012 (7)
- July 2012 (8)
- June 2012 (2)
- May 2012 (2)
- April 2012 (4)
- March 2012 (1)
- January 2012 (1)
- December 2011 (1)
- November 2011 (1)
- October 2011 (2)
- September 2011 (1)
- August 2011 (3)
- July 2011 (4)
Monthly Archives: September 2012
Moving a Subnet to a Different VLAN
There are a few different rare cases where you may need to move a subnet to a completely new or different VLAN. Making a layer 2 connection between two different networks with overlapping VLAN space or moving off of VLAN 1 for best practice reasons would be two examples. I will be focusing on the latter in this discussion but the steps will be applicable in other instances as well. To make this more practical lets keep the idea of very little to no downtime in mind. Continue reading
Google Voice at Home without Asterisk
Looking to use Google voice at home as your traditional home phone service without using some crazy Asterisk hack? You may even be fed up with the complexity of Asterisk anyhow, particularly if a simple voice gateway is all you have been using it for. There is an answer to this and it comes in the form of an inexpensive device called the Obi. Continue reading
Traffic Rate Limiting with Monowall
Recently I was called to implement a system to limit the bandwidth used by our guest network. There was no firewall in place for this network aside from the device provided by the ISP. Needless to say, it was junk and supported none of the more advanced features we needed. I implemented a Monowall with a fairly typical setup and jumped into configuring the traffic shaper. In this article I will only be limiting traffic Continue reading