MystaJoneS

If you're not making mistakes, then you're not doing anything.

Author: mystajones

  • The most sure-fire way to do this is to start a command-line session with the router, erase the startup-config and reload the router. The command syntax for that would be: router>en router#write erase router#reload *If you don’t have the login credentials for the router to get in, do this: -Start…

    +
  • Download PuTTY PuTTY is an SSH and telnet client, developed originally by Simon Tatham for the Windows platform. PuTTY is open source software that is available with source code and is developed and supported by a group of volunteers. You can download PuTTY here. Bitvise Tunnelier Tunnelier is an SSH…

    +
  • Network Time Protocol (NTP) is used for network devices, servers and workstations to periodically correct deviations in the system time reported by operating systems through a synchronisation process. The protocol is designed to compensate for variable latencies in the network. Accurate time on network devices, servers and workstations ensures that…

    + ,
  • https://toolbox3.iinet.net.au/login/lostpassword BOOM!

    +
  • While reviewing the ASA logs in relation to a large wireless metering project in WA, i came across a number of log entries that were just there (hundreds of thousands of them), so here’s how to disable them: %ASA-6-302013: Built inbound TCP connection…… %ASA-6-302013: Built inbound TCP connection….. %ASA-6-302015: Built…

    +
  • I thought i better just make a link to this guys website, to help with any future upgrades given I’ll need to. http://www.duppeditten.com/blog/qnap-ts-870-ultimate-nas-on-steroids

    +
  • http://www.cisco.com/c/en/us/support/docs/wireless/5500-series-wireless-controllers/115756-avc-guide-00.html AVC provides application-aware control on a wireless network and enhances manageability and productivity. AVC is already supported on ASR and ISR G2 platforms. The support of AVC embedded within the WLAN infrastructure extends as this as an end-to-end solution, which gives a complete visibility of applications in the network…

    +
  • A useful read around Cisco APs and Rouge Management. Wireless networks extend wired networks and increase worker productivity and access to information. However, an unauthorized wireless network presents an additional layer of security concern. Less thought is put into port security on wired networks, and wireless networks are an easy…

    +
  • User Guide http://www.cisco.com/c/en/us/td/docs/net_mgmt/prime/infrastructure/2-0/user/guide/prime_infra_ug.html Admin Guide http://www.cisco.com/c/en/us/td/docs/net_mgmt/prime/infrastructure/2-0/administrator/guide/PIAdminBook.html

    +
  • In a CAPWAP environment, a lightweight access point discovers a controller by using CAPWAP discovery mechanisms and then sends it a CAPWAP join request. The controller sends the access point a CAPWAP join response allowing the access point to join the controller. When the access point joins the controller, the…

    +