Network technologies and trends


December 30, 2009  6:20 AM

Solar wind is offering a free Net flow configurator

Yasir Irfan Yasir Irfan Profile: Yasir Irfan

 

Netflow is an important tool and it has become an important factor especially when it comes to managing the network and vigilantly watching the bandwidth utilization.  Solar Winds designed a free NetFlow confrigurator which is the easiest tool I have seen, the Solar winds NetFlow confrigurator is capable of configuring the NetFlow v5 via SNMP on supported Cisco® devices. The free NetFlow Confrigurator also facilitates setting up collectors for Cisco NetFlow data, specifying the ports on which the collectors are listening, and enabling monitoring of inbound and outbound (ingress/egress) traffic data per interface.

 

Here is a cool video from Solar Winds which demonstrates how to configure NetFlow in Cisco Devices.

 [kml_flashembed movie="http://www.youtube.com/v/rP_PvRbeQIM" width="425" height="350" wmode="transparent" /]

 

December 29, 2009  6:43 AM

Avaya Completes Acquisition of Nortel !

Yasir Irfan Yasir Irfan Profile: Yasir Irfan

According to the press release on 18th of December, Avaya says it has finally completed the acquisition of Nortel after getting as approval for the deal from the Investment Canada Act during mid December 2009.

 

Avaya claims the complete acquisition will result in it gaining an expanded partner ecosystem, a broader portfolio, an enhanced customer base, and a greater ability to compete globally. It will also give the IP telephony company an opportunity to extend relationships with system integrators and service providers in the enterprise market.

 

Avaya has to confirm about its plan for Nortel’s distribution channel. However Avaya is expected to come out with the new product portfolio by end of Jan 2010.

 

“Avaya and Nortel Enterprise Solutions share a common vision for the future of business communications,” stated Kevin Kennedy, president and CEO at Avaya.

“By combining our complementary technology portfolios, deep industry specific domain expertise, sales channels and customer bases, the new Avaya will redefine business communications and help customers to reduce costs, simplify operations and increase their business agility,” said Kennedy.

 

Approximately 6,000 Nortel employees have joined Avaya, including what the vendor calls “25 top managers”. 


December 28, 2009  5:28 AM

Cisco Security alerts on your phone.

Yasir Irfan Yasir Irfan Profile: Yasir Irfan

                                                                                                                                                                 

Cisco Systems is now offering security alerts by SMS, get connected to Cisco security advisories, responses, bulletins, updates, and more. Get a text message as soon as new content is posted. Just register yourself to get all these updates on your phone and by doing so you can stay updated at no cost.

 

 

 


December 27, 2009  11:15 AM

How to repair a corrupted IOS in Cisco 1250 access point Series 3?

Yasir Irfan Yasir Irfan Profile: Yasir Irfan

 

In my last post we looked at how to fix the corrupted IOS in a Cisco 1250 Wireless Access Point, the other way of recovering the corrupted IOS is by again by using a solar winds TFTP server, but in this procedure the access point loads itself the image file from the TFTP server. In order do so follow the below mentioned steps.

Step 1

Configure the PC with Solar Winds TFTP server with a class A Static IP Address range of 10.0.0.2 to 10.0.0.30.

Step 2

Make sure that the PC with the solar winds TFTF server contains the Cisco 1250 Wireless Access Point IOS image file (such as c1250-k9w7-tar.124-21a.JA1 in the Solar Winds TFTP server folder) and the TFTP server is activated.

Step 3

Rename the Cisco 1250 Wireless Access Point IOS image file in the solar winds TFTP server folder to the default image name –c1250-k9w7-tar.default for a Cisco 1250 Wireless Access Point.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Step 4

Connect the PC with solar winds TFTF server to the Cisco 1250 Access point with a  Category 6or Cat5 Ethernet cable (straight cable).

 

 

Step 5

Disconnect power from the Cisco 1250 Access point.

Step 6

Press and hold the MODE button while you reconnect power to the Cisco 1250 Access point.

Step 7

 Hold the MODE button until the status LED turns red (approximately 20 to 30 seconds), and release the MODE button until the console indicates

Button is pressed; wait for button to be released

Once you release the button you will see the Cisco 1250 Access Point starts downloading the default IOS image from Solar wind TFTP sever as shown below

 

Step 8

Wait until the Cisco 1250 access point reboots as indicated by all LEDs turning green followed by the Status LED blinking green.

Step 9

After the Cisco 1250 access point reboots, reconfigure the access point using the Command Line Interface (CLI) or GUI.

Also check demonstrated video to recover the IOS in Cisco 1250 Access Point.

 [kml_flashembed movie="http://www.youtube.com/v/ixv_Gmzpvwk" width="425" height="350" wmode="transparent" /]


December 26, 2009  9:16 AM

How to repair a corrupted IOS in Cisco 1250 access point Series 2?

Yasir Irfan Yasir Irfan Profile: Yasir Irfan

In my previous post  I was talking about how to fix the corrupted IOS in Cisco 1250 Series Wireless Access Point. Now in this series let’s see how to fix the solution to fix the corrupted IOS in Cisco 1250 Series Wireless Access Point.

 

In the previous post we know that whenever an IOS is missing in the Cisco Wireless Access Point you will get the following error

 

The system is unable to boot automatically because there are no bootable files.

 

Followed by the promt

ap:

There are two ways to fix this problem, in this post I will show you how to fix the problem   by transferring the IOS file to the Cisco Access Point using a TFTP server.

 

 

Whenever you boot you IOS corrupted Cisco Access Point and when you get following error at the command prompt

 

ap:

 

Connect the corrupted access point to any Cisco Catalyst Switch and also connect your PC with a solar winds TFTP server installed to the same switch with the same subnet. In the following example we are configuring the IP address for the PC with Solar winds TFTP server and corrupted access point as follows

 

 

Follow the below mentioned steps

 

Step 1:

Assign the ip address, netmask and default gateway to the IOS corrupted access point by using set command as shown below.

 

ap:set IP_ADDR 10.0.0.10

 

ap:set NETMASK 255.255.248.0

 

ap:set DEFAULT_ROUTER 10.0.0.10

 

Step 2:

Initialized the TFTP server in the Cisco Access point by entering “tftp_init” command

 

ap: tftp_init

 

 Step 3:

Download the IOS image file for Cisco 1250 Series Access Point from Cisco Web Site (CCO id is required) and remove the file extension (.tar) as shown and copy the file to solar winds TFTP server directory.

 

Step 4:

Make sure that the solar winds TFTF server is started and the downloaded the IOS image file is placed in the TFTP server directory.

 

Step 5:

Extract the IOS file downloaded into the Cisco Access Point by using “tar -xtract” command to inflate the image file from your TFTP Server.

 

ap:  tar –xtract  tftp://10.0.0.8/c1250-k9w7-tar.124-10b.JDA3 flash:

 

 

 

Step 6:

Once the whole IOS file is extracted the set the boot path in your IOS corrupted Cisco Access Point as shown below

ap:  set BOOT flash: c1250-k9w7-mx.124-10b.JDA3/ c1250-k9w7-mx.124-10b.JDA3

 

Step 7:

Then you boot your Cisco Wireless Access Point by using a “boot’ command.

 

ap:  boot

 

 

Once the Cisco Wireless Access Point is booted you will see no errors and its working fine. I have also uploaded the video as well which might help you to recover the IOS in a Cisco 1250 Access Point. Same procedure can be applied on other Cisco Access Points as well with proper IOS files. 

 [kml_flashembed movie="http://www.youtube.com/v/NfSZeq4idHM" width="425" height="350" wmode="transparent" /]


December 22, 2009  5:15 AM

How to repair a corrupted IOS in Cisco 1250 access point Series 1?

Yasir Irfan Yasir Irfan Profile: Yasir Irfan

These days we are upgrading the IOS for all Cisco 1250 Series Wireless Access Points. So far we don’t have any wireless management software or control cards. We are force to upgrade an IOS of each and every individual access point.

 

One of our aspiring, vibrant colleagues deleted the flash contents of the Cisco 1250 Series Access Point accidentally. He tried to repair but he had no clue what to do. He tried to find out a way but it was fruitless. After the IOS was deleted in the Cisco 1250 Series Access Point it was not booting and he was getting the following error.

 

The system is unable to boot automatically because there are no bootable files.

 

 

In upcoming post I will post a solution to how to upload an IOS in the corrupted Cisco 1250 Access Point.

[kml_flashembed movie="http://www.youtube.com/v/EMG8UosnSU0" width="425" height="350" wmode="transparent" /]


December 14, 2009  5:40 AM

Cisco Networkers to be held in Bahrain

Yasir Irfan Yasir Irfan Profile: Yasir Irfan

Cisco Systems has announced that for the first time the prestigious Cisco Networkers will be held in Middle East, yes the event will be held at the Bahrain International Circuit (BIC), home to the Gulf Air Bahrain Grand Prix, from 28 – 31 March, 2010 with the support of the Government of Bahrain and His Highness Sheikh Salman bin Hamad Al-Khalifa, Crown Prince of the Kingdom of Bahrain.

[kml_flashembed movie="http://www.youtube.com/v/fwZFun06KEc" width="425" height="350" wmode="transparent" /]

Please mark your calendar now for this memorable event in Bahrain.

The theme for Cisco Networkers Bahrain, 2010 is ‘Knowledge is Power’.

The event will comprise five separate sections: the Networkers Technical Conference, focused on Cisco technology and architectures; a CIO and IT Executive Symposium, an IT Insight Conference; dedicated press and analyst event and Innovation Awards to recognize outstanding achievements in business and technology.

This conference provides a unique platform for attendees to build on their knowledge and skills, making this a great investment for any company or individual attending long after the conference ends.

This event is target at technical or business stakeholders don’t miss this unique opportunity to meet with the companies that count in today’s fast changing world.

Register today to receive the Early Bird discount.

Hopefully I may attend the event if I am going to India as Bahrain is just an hour dirve from my place.


December 13, 2009  5:51 AM

Cisco brings “Journey to the Virtualized Data Center: From Vision to Reality” on 15 & 16th of December

Yasir Irfan Yasir Irfan Profile: Yasir Irfan

 

This December 15 and 16th Cisco Systems is Conducting a live Virtual TradeshowJourney to the Virtualized Data Center: From Vision to Reality” in sponsorship with it world class rusted partner like  APC, BMC Software, EMC2, Emerson, Intel, Microsoft, NetApp, Oracle and Panduit.  

Pic Courtesy: Cisco Systems.

Do register to attend this virtual event to learn the future of data center; you might get the chance to look the future of Data Center from the perspectives of networking, storage, applications, and physical infrastructure technology partners. You may also get a chance to look at how Cisco along with partners helping IT to deliver more value to their business.

 

 Whether you’re just starting out on the journey – looking for cost effective ways to get more out of your current data center – or whether you’re already well down the virtualization track and thinking about how to deploy a Private Cloud or IT as a Service, there is valuable information for all.

 

Attend one or both days and earn a chance to win an Apple iPod nano 16GB!! See

Register now and join other IT and data center decision makers in this unique virtualized trade show environment.

 

Event Type: Live Virtual Trade Show

Date: December 15, 2009: 07:30 – 14:30 PST

December 16, 2009: 07:30 – 13:30 PST


December 12, 2009  7:12 AM

How to configure a minimum password length in a Cisco Router?

Yasir Irfan Yasir Irfan Profile: Yasir Irfan

 

As we all know by default there are no limitations on the size of password length in a Cisco router. Sometimes this may leads to a security risk. You can also configure a password with a single character in a Cisco Router.

 

  

Cisco Systems introduced a command to force the minimum length of password starting with an IOS version 12.3 (1). By default the length should be 6 characters, but you can change the default length.

 

To configure the minimum password length in your Cisco Router, use the following commands.


ITKERouter01#configure terminal
ITKERouter01 (config)#security passwords min-length 8

 

After entering the above command if you try to configure the enable secret to itke as shown the below, following error message will be displayed in your Cisco Router

 


 ITKERouter01 (config)#enable secret itke

 % Password too short – must be at least 8 characters. Password configuration failed
 ITKERouter01 (config)#

Even if you try to configure the local username and password you find the same error.


ITKERouter01 (config)#username yasir secret cisco

 % Password too short – must be at least 8 characters. Password configuration failed
 ITKERouter01 (config)#

 

I would recommed you to enable this feautre in your Cisco Router for better security.


December 9, 2009  9:19 AM

How to detect a rouge DHCP server in your network?

Yasir Irfan Yasir Irfan Profile: Yasir Irfan

 

Today morning I was late to arrive at my office due to some problems, when I came I saw my colleagues were trying hard to figure out the rouge DHCP server detected in our helpdesk VLAN. All our users in the help desk and call center were getting an IP address from the Rouge DHCP server and they were not able to access our Network. I tried to figure out the physical location of the rouge DHCP server but I failed to find.

Immediately I thought let me figure out the Mac address of the rouge DHCP server so that I can block its network access.

I went one of the affected systems and from the command prompt; I used the “arp –a followed by the rouge DHCP server as show below

C:\>arp -a 192.168.142.2

Interface: 192.168.142.96 — 0xb

  Internet Address      Physical Address      Type

  192.168.142.2           00-16-35-c1-7f-cc     dynamic

Once I got the Mac address, immediately I logged into a Cisco 3560 Switch connected in that area. From the privilege mode I used “show mac-address table” command to figure out the interface in which the rouge DHCP is connected.

RRBM-ITD-3560-AS01#sho mac address-table

          Mac Address Table

——————————————-

 

Vlan    Mac Address       Type        Ports

—-    ———–       ——–    —–

 All    0100.0ccc.cccc    STATIC      CPU

 All    0100.0ccc.cccd    STATIC      CPU

All    ffff.ffff.ffff    STATIC      CPU

 129    0000.0c07.ac3a    DYNAMIC     Gi0/52

 129    0002.e356.9cfa    DYNAMIC     Gi0/52

 129    0002.e356.a78f    DYNAMIC     Gi0/39

 129    000e.7fd8.6cff    DYNAMIC     Gi0/7

 129    000f.fe0a.1ff7    DYNAMIC     Gi0/22

 129    0016.35c1.7fcc  DYNAMIC     Gi0/36

 129    000f.fe6f.5d5c    DYNAMIC     Gi0/52

 129    000f.fe6f.5e46    DYNAMIC     Gi0/52

 129    000f.fe93.d890    DYNAMIC     Gi0/8

 129    000f.fe93.fcb0    DYNAMIC     Gi0/7

 129    000f.fe93.fcb8    DYNAMIC     Gi0/52

 129    000f.fe96.0920    DYNAMIC     Gi0/38

 129    000f.fe96.5478    DYNAMIC     Gi0/52

RRBM-ITD-3560-AS01#

 

Once I detected the interface to which the rouge DHCP sever connected, I disabled the interface in the Cisco 3560 Switch.

 

RRBM-ITD-3560-AS01# configure t

Enter configuration commands, one per line.  End with CNTL/Z.

RRBM-ITD-3560-AS01(config)#interface gigabitEthernet 0/36

RRBM-ITD-3560-AS01(config-if)#shutdown

RRBM-ITD-3560-AS01(config-if)#description ROUGE DHCP

RRBM-ITD-3560-AS01(config-if)#exit

RRBM-ITD-3560-AS01#

To prevent this from happening I configured the DHCP snooping in the Cisco 3560 Switch.

After careful inspection we figured out the rouge DHCP sever was running in a Virtual Machine, one of our aspiring professional was testing Active directory and DHCP services in a Virtual Windows 2003 Server.

Whenever you come across this kind of situation doesn’t panic just try to troubleshoot the problem in a systematic way. Just by following few simple steps you can eliminate this problem.

 

The keys steps

Step 1 – Figure out the MAC address using the “arp –a” followed by ip address of the rouge DHCP server from the affected PC.

Step 2- Log into your Switch and figure out the interface to which the rouge DHCP server is connected “Show mac-address table” (Cisco IOS Switches).

Step 3- Disable the interface connected to the rouge DHCP server in your Switch “shutdown” (Cisco IOS Switches).

Step 4 – Take precaution by configuring DHCP snooping in your Network.

 


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: