MystaJoneS

If you're not making mistakes, then you're not doing anything.

Category: Uncategorized

  • +
  • https://toolbox3.iinet.net.au/login/lostpassword BOOM!

    +
  • While reviewing the ASA logs in relation to a large wireless metering project in WA, i came across a number of log entries that were just there (hundreds of thousands of them), so here’s how to disable them: %ASA-6-302013: Built inbound TCP connection…… %ASA-6-302013: Built inbound TCP connection….. %ASA-6-302015: Built…

    +
  • I thought i better just make a link to this guys website, to help with any future upgrades given I’ll need to. http://www.duppeditten.com/blog/qnap-ts-870-ultimate-nas-on-steroids

    +
  • http://www.cisco.com/c/en/us/support/docs/wireless/5500-series-wireless-controllers/115756-avc-guide-00.html AVC provides application-aware control on a wireless network and enhances manageability and productivity. AVC is already supported on ASR and ISR G2 platforms. The support of AVC embedded within the WLAN infrastructure extends as this as an end-to-end solution, which gives a complete visibility of applications in the network…

    +
  • A useful read around Cisco APs and Rouge Management. Wireless networks extend wired networks and increase worker productivity and access to information. However, an unauthorized wireless network presents an additional layer of security concern. Less thought is put into port security on wired networks, and wireless networks are an easy…

    +
  • User Guide http://www.cisco.com/c/en/us/td/docs/net_mgmt/prime/infrastructure/2-0/user/guide/prime_infra_ug.html Admin Guide http://www.cisco.com/c/en/us/td/docs/net_mgmt/prime/infrastructure/2-0/administrator/guide/PIAdminBook.html

    +
  • In a CAPWAP environment, a lightweight access point discovers a controller by using CAPWAP discovery mechanisms and then sends it a CAPWAP join request. The controller sends the access point a CAPWAP join response allowing the access point to join the controller. When the access point joins the controller, the…

    +
  • I recently worked at a client site and found it difficult to explain the various configuations for iSCSI so i have detialed them here: Dedicated hardware for the Storage and Server connected devices keeping normal Network traffic separate from Storage network traffic due to their differing characteristics. Segmentation – iSCSI…

    +