Hey guys, I'm slowly starting my studies up again, and put together a blog post a not-so-exciting topic, but figured I'd throw it out there as I value your feedback and hopefully some of you may find it helpful. Let me know if there's any glaring errors if you get bored enough to read it. ;)
http://aspiringnetworker.blogspot.com/2015/09/how-rapid-spanning-tree-protocol-rstp.html (http://aspiringnetworker.blogspot.com/2015/09/how-rapid-spanning-tree-protocol-rstp.html)
QuoteThe Ubuntu server can be ignored for the purposes of this blog entry.
Except by me. How do I know it's not going to try to do some kind of hack to become the root switch?
Quote from: deanwebb on September 21, 2015, 08:31:28 PM
QuoteThe Ubuntu server can be ignored for the purposes of this blog entry.
Except by me. How do I know it's not going to try to do some kind of hack to become the root switch?
Haha... I knew I should have just removed it from the topology... but I was doing some research on Edge port behavior and was too lazy to remove it.. ;P
"Too lazy to remove it..." <-- HOW WE GET BREACHES!!!!!
:ivan:
"Dude! It's the way we've been doing it for the past 6 years so it can't be wrong!"
Quote from: AspiringNetworker on September 22, 2015, 09:25:27 AM
"Dude! It's the way we've been doing it for the past 6 years so it can't be wrong!"
:vendors:
Great post dude!! Nice use of visuals as well.
Quote from: that1guy15 on September 22, 2015, 12:30:35 PM
Great post dude!! Nice use of visuals as well.
Thanks man.. much appreciate it from a veteran blogger himself. ;)
@dean
make everything a firewall. actually make the cables firewalls too. Only allow use on pins 3 and 6.
thanks.
Quote from: LynK on September 22, 2015, 03:56:11 PM
@dean
make everything a firewall. actually make the cables firewalls too. Only allow use on pins 3 and 6.
thanks.
:applause:
Consider it done, my friend.
As a network engineer the more you can remove from my network the better. Servers, PCs and mobile devices just cause issues and stupid shit. Get em all off!!
Network, UCS, VMware and monitoring servers is the perfect network. Rest can burn in hell and die!!
No, every network needs desktop clients.
Just two of them, so as to generate test ping traffic.
Every host in it's own vlan, on its own network, behind it's own firewall, in it's own access layer block, and in its' own VRF.
That should lock the security down. :partay:
You forgot the host IPS, DNS security, and redirecting all Internet traffic to a locally-cached copy of the Internet that has been scanned for malware.
That last one is what I call "the fog". It's the cloud, but right there on top of you.
Quote from: deanwebb on September 23, 2015, 09:28:26 AM
You forgot the host IPS, DNS security, and redirecting all Internet traffic to a locally-cached copy of the Internet that has been scanned for malware.
That last one is what I call "the fog". It's the cloud, but right there on top of you.
Funny "Fog Computing" is being termed now for Hybrid cloud deployments that dont quite sit on-prem nor 100% cloud.
Quote from: deanwebb on September 22, 2015, 07:07:04 AM
"Too lazy to remove it..." <-- HOW WE GET BREACHES!!!!!
:ivan:
Ivan Vasilevic men'aet profesiu :-)))
One of my favorite movies