|
For those of you who have taken a cisco netacademy class before and missed the 640-801 deadline, you should still be eligible to still take the old exam. I was checking out the prepcenter to try and see some of the new test questions when I stumbled back into the netacademy site. I decided to log back in and check out the site. I found access to packet tracer and the coupon voucher for the old exam. I took this class at least 1.5 years ago. Thrilled, I tried to schedule an exam by phone in the upcoming week and it worked. If you have the code and a netacademy id, you should be good to go. I won't mind looking over the new material after I pass the exam. cheers
|
# ¿ Dec 28, 2007 18:41 |
|
|
# ¿ Apr 28, 2024 19:05 |
|
Harry Totterbottom posted:
Ever use object groups? Does your ASA use object groups? This would be a good time to learn or use them for this type of stuff.
|
# ¿ Feb 14, 2011 21:54 |
|
tortilla_chip posted:
If any of you goons really want to go the networking route(like CCIE), are hard-working and bright, and a quick learner, I strongly suggest you try and jump on this. You will learn a whole lot from the service provider side.
|
# ¿ Feb 20, 2011 20:21 |
|
Zuhzuhzombie!! posted:
I havent worked much off our policy maps for rate limiting but on our end the bc matches the be values. According to the cisco press book, "the cir and bc keywords define the first token bucket. be defines the second token bucket. So I guess when we keep bc and be values the same, we keep a single token bucket since it's a single rate policier? CIR is in bits and bursts are in bytes cause that's just Cisco being Cisco.
|
# ¿ Mar 17, 2011 20:05 |
|
FatCow posted:Or just don't apply to jobs that need clearance? I don't see why having clearance locks you into working for the government. I think he means fed jobs typically require clearance for working with them and not much else outside public office require them. Having clearance pretty much guarantees you finding a job, whether it's contracting or a job with an agency. Getting clearance is another issue on its own.
|
# ¿ Mar 23, 2011 18:33 |
|
Bob Morales posted:There are only something like 25,000 CCIE's in the world (I'm probably off one way or the other). You need thousands of dollars in lab equipment, thousands in books and tests, and even more in time and travel to actually take the test. http://www.ccie4you.info/wordpress/ http://ccie-in-3-months.blogspot.com/ As long as you have the passion, you can get it. ragzilla posted:What's the largest environment you've been involved in to make that comment?. Layer <= 3 networking in a small/mid enterprise environment is no fun- however that changes significantly once you enter the realm of SP networking, or large enterprise, and you start getting to use things like BGP and MPLS. I just finished the Skillport CCIP video for MPLS/VPN architectures. I have a good grasp overall on how MPLS works from the PE end. As soon as I get my GNS server working again, I cant wait to build some labs I've seen online so I can see more into the core side. I'm going to watch them one more time for notes and move on to BGP. It's pretty awesome how things come together and make sense.
|
# ¿ Apr 13, 2011 02:20 |
|
Tony Montana posted:
I'd say bout at least two or four years before I get there. I had gotten my CCNA in Jan 2008 with a three year break. It took my CCNA almost expiring to get my rear end back on the horse because I'll be damned if I stay at the status quo or let that work go to waste. I want to move forward. So it really depends on how much time and practice I can get in per day to keep this timeline. I plan on my CCIP/ CCNP this year. I already have ROUTE and I'm working on MPLS + BGP by late May or early June. Then finish QOS by the summer and switch and tshoot over the fall and winter. Working for a SP is a huge advantage since everything is built. I get real world examples to observe and piece together stuff in my lab for the picky details. The drawback is, I dont have much exposure to switches and IGPs such as EIGRP/ OSPF. I will have to revisit ROUTE again before I do TSHOOT.
|
# ¿ Apr 13, 2011 16:58 |
|
jbusbysack posted:I prefer SecureCRT solely because it will log all outputs. Also multiple devices connected via tabs is nice, but mainly it's the logging that won my heart. ^^^ Securcrt has the multiple sessions in one window feature which by itself does not see much but it goes a long way once you need 3+ windows open. Putty is a good lightweight program to get the job done.
|
# ¿ Apr 19, 2011 16:07 |
|
lol internet. posted:Quick question, for Cisco ASA. Does anyone use the CLI to configure\manage access rules? Or is everyone using the ASDM? I prefer CLI because notepad is my best friend. Also prefer the show commands for the troubleshooting.
|
# ¿ Jul 18, 2012 21:51 |
|
GOOCHY posted:static (inside, outside) <public host> <private host> netmask 255.255.255.255 That's what I would do for inbound requests. The DNS option sounds like it might be required as well depending on how their DNS servers are setup. static (inside, outside) <public host> <private host> netmask 255.255.255.255 dns code:
|
# ¿ Nov 15, 2012 21:35 |
|
Mierdaan posted:Yeah, what GOOCHY wrote is exactly what we're doing for all our public-facing services. This is the first time I've wanted to modify our setup for outbound traffic, though. Yeah, Nat 0 would bypass the the NAT translation. It's looks like there's a lot more you have going on on your ASA that we can see. I'm guessing the nat0_ACL is being applied on some other interface. To me, it doesnt seem like that is the ACL you need to place your outbound ACL rule at because they dont make sense to me in an outbound direction. I should see something similar to below where there is a something going to any as a destination unless your traffic is going to here <ip any (internal IP range)> and then going out to the internet there which is weird and redundant. access-list outbound_ACL extended permit ip 10.10.0.0 255.255.0.0 any NAT STATEMENTS access-group outbound_ACL in interface inside
|
# ¿ Nov 16, 2012 00:42 |
|
squidflakes posted:I've got several branch offices with two outside network connections. One is from an MPLS provider that is only supposed to handle traffic for internal inter-office addresses, we'll say anything on the 10.x.x.x/16 network. The other is for anything else, is sitting on a regular internet connection and goes to a firewall. Technically, once the EIGRP MPLS router rebuilds the table, your routes should go that way since the more specific route is there and not go via the the default route but also metrics could come into play. What does the traceroutes look like when you do this? It could be that the way you are bouncing the router, it doesnt have those routes as stable so maybe the routing table isnt converged? I'm dont work with EIGRP much but that's my routing guess. Sounds like some details are missing as well. If the MPLS connection is down with the default in place, it'll route towards the internet circuit and die unless you build a VPN tunnel to that destined site?
|
# ¿ Mar 26, 2013 17:22 |
|
routenull0 posted:
I'm dont think there is a timer expiration in an upgrade path scenario unless a certain test is retiring. I had taken ROUTE back in Jan 2011 and took BGP+MPLS and QoS July and Aug in 2012 for my CCIP. I plan on taking SWITCH AND TSHOOT later this year once I settle in to my job.
|
# ¿ Apr 25, 2013 05:43 |
|
madsushi posted:One of the issues I've heard of with using the same AS for multiple sites is that if your sites aren't truly connected on the back-end (via direct or VPN or something), some peers won't advertise your other site's prefixes to you. iBGP requires a full mesh for peers ideally for full route exchanges but there was ways to get past this via RR or confeds. Routes wont pass beyond one peer or accept routes from an AS it traversed (loop avoidance). Here's a great easy read on this. If you're using a provider for MPLS VPNs on layer 3, they can bypass this with AS override. The different ASes you see in that mess is to get routes around.
|
# ¿ Jun 21, 2013 06:02 |
|
|
# ¿ Apr 28, 2024 19:05 |
|
jwh posted:
Yeah, I'm a month late to this but I would like to have seen what the path looked like from cogent's looking glass a month ago compared to now. Oh well. Little strange to see internap prepending now then I suppose what you had before. BGP routing table entry for 64.95.69.0/24, version 1764577848 Paths: (1 available, best #1, table Default-IP-Routing-Table) 2828 14742 14742 19592 154.54.9.6 (metric 10102021) from 154.54.66.76 (154.54.66.76) Origin IGP, metric 4294967294, localpref 100, valid, internal, best Community: 174:10031 174:20666 174:21000 174:22013 Originator: 66.28.1.9, Cluster list: 154.54.66.76, 66.28.1.69, 66.28.1.89 CheeseSpawn fucked around with this message at 09:16 on Sep 27, 2013 |
# ¿ Sep 27, 2013 08:05 |