Dear Friends what a gift from Cisco Systems to its lovers for the New Year 09. Cisco will unveil new consumer products and initiatives during a news conference at the 2009 International Consumer Electronics Show (CES) in Las Vegas Convention Center on January 7, 2009.
Banner Courtesy: Cisco SystemsThe key personalities who are expected to join the stage with the Cisco Chairman and CEO John Chambers are his team of team of senior executives. They are expected to discuss how Cisco is enabling the connected life through a new class of compelling communication and entertainment experiences that are more visual, more social and more personal. The press conference will be webcast live for those unable to attend in person.
Register to Receive Cisco at CES 2009 Text Messages
[kml_flashembed movie="http://www.youtube.com/v/7AtOEsnPhMY" width="425" height="350" wmode="transparent" /]
Stay current with what Cisco is doing at CES 2009. Receive video messages and speaker updates both preshow and onsite. Get a text message as soon as new content is posted.Register from your personal computer by going to www.cisco.com/alerts and clicking the text messing registration and manager link. You can register directly from your cell phone by texting to our number 24726 (spells Cisco on your phone keypad) with the word CES in the body of the message.
Dear Friends, hope everyone is having great holidays, have fun. In my previous post I was focusing on some of the limitations of Etherchannel. Now let’s proceed a step ahead and figure out about the Etherchannel negotiation protocols. Etherchannels can be negotiated between two Cisco Catalyst Switches to provide some dynamic link configuration.
In upcomming post I will try to concentrate on automating the creation of an Etherchannel . Have fun and happy new year 2009.
According to the Cisco Annual Security Report 2008, Spam accounts nearly 200 billion messages per day or approximately 90% of all email worldwide.
The report highlights the security threats and trends; the most disturbing fact is more online criminals are using real email accounts with legitimate web mail providers to bombard the emails with spam. This method, known as ‘reputation hijacking’, makes spam harder to detect and block.
According to Cisco estimates, spam resulting from email reputation hijacking of the top three web mail providers accounted for less than 1% of all spam worldwide, but made up 7.6% of the providers’ mail traffic.
Additionally, researchers have seen a 90% growth in threats originating from legitimate domains, doubling 2007 figures. For rest of the story please check the article published by ITP Middle East.
· An Etherchannel Group Number must be in the range of 1 to 256.
· All ports in the target Etherchannel group MUST be in the same VLAN.
· If one physical link in the Etherchannel group is a TRUNK, then all other ports must be configured as trunks carrying the same VLAN information.
· Any defined broadcast limits must be the same across all ports in an Etherchannel.
· An LACP Etherchannel group cannot support any physical links in half duplex mode.
· No port in the Etherchannel group can be defined as a SPAN port.
Dear Friends users of Microsoft’s Internet Explorer are being advised by experts to switch to a rival until a serious security flaw has been fixed.
The flaw in Microsoft’s Internet Explorer could allow criminals to take control of people’s computers and steal their passwords, internet experts say.
The risk is believed to be widespread, given that IE 7 is the latest version of Microsoft’s browser and is bundled with XP service pack 3 and also Vista, said Dave Marcus, director of security research and communications for McAfee’s Avert Labs.
The AZN Trojan, which has been making the rounds since the first week of December, has the potential of infecting users’ system with a Trojan horse, or “downloaders” that can download other forms of malware onto a user’s system.
Dear Friends in this upcoming series of posts I would like to concentrate on Etherchannel , what is Etherchannel? , what rules and restrictions are applied to an Etherchannel and finally I will show you how to configure an Etherchannel in Cisco Switches both layer 2 as well as layer 3.
An Etherchannel combines multiple physical links into a single logical link that provides aggregate bandwidth of 800 MBPS (fast Etherchannel, full duplex) , 8 GBPS (Giga Etherchannel) or 80 Gbps (10 Giga Ethernet) . Ideal for load sharing or link redundancy – can be used by both layer 2 and Layer 3 subsystems and Etherchannel can provide network managers with a reliable, high-speed solution for the campus network backbone. EtherChannel technology was invented by Kalpana in the early 1990s. They were later acquired by Cisco Systems in 1994. In 2000 the IEEE passed 802.3ad which is an open standard version of EtherChannel.
I would like to explain some key points about Etherchannel using graphical diagrams so that it’s easy understand and to remember.
Etherchannel can be configured defined on Ethernet, Fast Ethernet, Giga Ethernet or 10 Giga Ethernet ports.
Dear Friends Cisco Systems has announced the availably of CCIE Wireless Certification and it’s confirmed. So what are waiting for, you can start planning for the prestigious CCIE Wireless Certification, again Cisco proves they are concerned about the latest technological developments in the field of networking. Please do check a great article about CCIE Wireless Certification from Search Networking.Beta candidate registration should begin this fall, along with a blueprint release. Beginning early 2009 the Wireless CCIE beta testing will begin! As of now, topics of the test are expected to cover all aspects of wireless from design through implementation including the implications of security, routing and switching and voice technologies. Check back often for any additional information!Cisco CCIE Wireless Certification
The Cisco CCIE Wireless certification assesses and validates wireless expertise. Candidates who pass the CCIE Wireless certification exams demonstrate broad theoretical knowledge of wireless networking and a solid understanding of wireless local area networking (WLAN) technologies from Cisco, the market leader in WLAN technology.Benefits of CCIE Certified Wireless Certification
- Greater opportunity for salary increase and job advancement in wireless networking industry
- Validates expertise in major aspects of WLAN technology
- Provides next step for individuals interested in a career in managing or working with Cisco wireless technologies
The written exam for CCIE Wireless will be made available through Pearson VUE on February 17th, 2009. The lab exam for CCIE Wireless will be made available in April 2009. To find out more about the CCIE Wireless Certification and access the latest blueprints and study materials, visit the Cisco Learning Network.
This is a cool command to erase just the configuration for a particular interface in a Cisco Switch or a Cisco Router.
In the following example we will configure the interface fast Ethernet 0/9 to default configuration
Current Configuration for fast Ethernet 0/9
ITKE-Cisco#sho running-config interface fastEthernet 0/9
Current configuration : 85 bytes
switchport access vlan 100
switchport mode access
Now we will configure the fast Ethernet 0/9 to default configuration using the following command
“default interface fastEthernet 0/9”
Enter configuration commands, one per line. End with CNTL/Z.
ITKE-Cisco(config)#default interface fastEthernet 0/9
Interface FastEthernet0/6 set to default configuration
Running configuration for fast Ethernet 0/9 after configuring to default settings
ITKE-Cisco#sho running-config interface fastEthernet 0/9
Current configuration : 68 bytes
switchport mode dynamic desirable
Dear Friends here is one more opportunity from Cisco Systems TechWise TV which reveals how to use the techniques, tools and innovations you might already have to effectively support rich communication and full service video without adding bandwidth.
Mid Size / Enterprise Business
|Who Should Attend|
|Technology decision makers.|
Switching Secrets for Multimedia
Thursday, December 18, 2008, 10–11 a.m. Pacific Time, 1–2 p.m. Eastern Time
As networks become vital for connecting people and processes, full-service video and other rich media communications are quickly gaining adoption. In this environment, your network foundation becomes more important than ever. This TechWiseTV episode will show you how to make the most of the switching technologies you might already have to achieve the performance you need.
Carl Solder, Cisco Distinguished Marketing Engineer and one of only four Distinguished Switch Engineers in the world, joins TechWiseTV to reveal the valuable techniques, tools, and innovations that can help you make the most of your switching investments.
Discover how rich multimedia is affecting switch and network design. Find out how to architect a real-time network to support rich communication and full-service video through extensive whiteboarding sessions. Learn the most overlooked and underpublicized secrets for effective core security as well as: How to use Generic Online Diagnostics (GOLD), NetFlow, and other built-in tools to identify and eliminate the sources of jitter What makes a switch truly “stackable” and why the distinction is vitally important How to use the Programmable Intelligent Services Accelerator (PISA) to achieve effective Layer 4–7 security How to take advantage of the Cisco Virtual Switching System (VSS) to maximize availability, scalability, management, and ease of maintenance
Our expert guests will be available to answer your switching questions during the broadcast.
|Segment 1: “A Switch Is Just a Switch, Right?”
Segment 2: Enhancing Core Security
Segment 3: Maximizing Redundancy
Segment 4: Switch and Network Design for Rich Media
It’s quite important for Network Engineers and an essential network troubleshooting technique to utilize the ability of Cisco Catalyst Switches to mirror the traffic and send it to a sniffer for analysis. All Cisco Catalyst Switches support the Switched Port Analyzer (SPAN) feature. The SPAN copies traffic from the specified interface or VLANs and mirrors this traffic to a specified destination interface (SPAN interface). Then you can connect the PC with a sniffing tool (Wireshark) installed on the destination SPAN interface to capture all the mirrored traffic.Let’s see how to configure the SPAN in Cisco Catalyst Switches. To enable the switch SPAN mirroring feature configure the following on the catalyst switch: Configuration Example – Monitoring traffic from a specific interfaceITKEAS01#configure tITKEAS01(config) monitor session 1 source interface gigabitEthernet 0/5
ITKEAS01(config)#monitor session 1 destination interface gigabitEthernet 0/10
The above configuration will capture all traffic from interface gigabitEthernet 0/5 and send it to SPAN port interface gigabitEthernet 0/10
Configuration Example – Monitoring an entire VLAN traffic
ITKEAS01(config)#monitor session 1 source vlan 100
ITKEAS01(config) monitor session 1 destination interface gigabitEthernet 0/10 The above configuration will capture all traffic of VLAN 100 and send it to SPAN port interface gigabitEthernet 0/10
Use show monitor session 1 to verify your configuration.