Are you over 18 and want to see adult content?
More Annotations
![A complete backup of https://minvws.nl](https://www.archivebay.com/archive6/images/3a96ba9b-334f-45d6-ae14-01b745738482.png)
A complete backup of https://minvws.nl
Are you over 18 and want to see adult content?
![A complete backup of https://dsbn.org](https://www.archivebay.com/archive6/images/1239dbac-1b75-4fb8-8941-795354374f44.png)
A complete backup of https://dsbn.org
Are you over 18 and want to see adult content?
![A complete backup of https://mcdonaldgardencenter.com](https://www.archivebay.com/archive6/images/c472c408-c2ba-4298-b112-4361fd993be2.png)
A complete backup of https://mcdonaldgardencenter.com
Are you over 18 and want to see adult content?
![A complete backup of https://arsc-audio.org](https://www.archivebay.com/archive6/images/82632688-433b-4dff-9664-413e28adb383.png)
A complete backup of https://arsc-audio.org
Are you over 18 and want to see adult content?
![A complete backup of https://stegforhalsa.se](https://www.archivebay.com/archive6/images/4e00f125-cdf2-42cf-94e2-f43f28565390.png)
A complete backup of https://stegforhalsa.se
Are you over 18 and want to see adult content?
![A complete backup of https://brandpoint.com](https://www.archivebay.com/archive6/images/ffa0a838-cb8e-4d6a-8ed0-ff48ac0fe2c1.png)
A complete backup of https://brandpoint.com
Are you over 18 and want to see adult content?
![A complete backup of https://surfsafely.com](https://www.archivebay.com/archive6/images/ca6a6440-7a45-4bc4-bcef-e0dea14569f3.png)
A complete backup of https://surfsafely.com
Are you over 18 and want to see adult content?
![A complete backup of https://aeronews.ro](https://www.archivebay.com/archive6/images/247ac64a-3451-4dcb-b33e-629fbb29319e.png)
A complete backup of https://aeronews.ro
Are you over 18 and want to see adult content?
![A complete backup of https://thinkmate.com](https://www.archivebay.com/archive6/images/0f4ebb13-8830-4638-b128-c342a2b0e90d.png)
A complete backup of https://thinkmate.com
Are you over 18 and want to see adult content?
![A complete backup of https://dragon-money.net](https://www.archivebay.com/archive6/images/24b137e1-d9ce-43a4-8eb9-4b524fe3c930.png)
A complete backup of https://dragon-money.net
Are you over 18 and want to see adult content?
![A complete backup of https://bmcargo.com](https://www.archivebay.com/archive6/images/52663512-00cc-401f-be8d-f8da95985e21.png)
A complete backup of https://bmcargo.com
Are you over 18 and want to see adult content?
![A complete backup of https://jagannath.ru](https://www.archivebay.com/archive6/images/e0884a51-023d-412d-8c45-982688362b04.png)
A complete backup of https://jagannath.ru
Are you over 18 and want to see adult content?
Favourite Annotations
![A complete backup of winemakermag.com](https://www.archivebay.com/archive2/004c4e61-ade9-4c25-8f1f-adf6b4811e95.png)
A complete backup of winemakermag.com
Are you over 18 and want to see adult content?
![A complete backup of scribecopywriting.com.au](https://www.archivebay.com/archive2/76a971c9-e6e1-4542-a4bb-d881f1f28012.png)
A complete backup of scribecopywriting.com.au
Are you over 18 and want to see adult content?
![A complete backup of tatteredcover.com](https://www.archivebay.com/archive2/c458b938-59c7-41e9-b803-ae9a3ab458ce.png)
A complete backup of tatteredcover.com
Are you over 18 and want to see adult content?
![A complete backup of rhaizquadradatreinamentos.com](https://www.archivebay.com/archive2/203039c8-36b7-4451-a1d9-7988cd2f3280.png)
A complete backup of rhaizquadradatreinamentos.com
Are you over 18 and want to see adult content?
![A complete backup of superfriendlydesign.systems](https://www.archivebay.com/archive2/4e7b1991-2fca-46cf-8d69-3bb798660103.png)
A complete backup of superfriendlydesign.systems
Are you over 18 and want to see adult content?
![A complete backup of iwantwallpaper.co.uk](https://www.archivebay.com/archive2/d2b66bc7-1348-43ff-bce8-adcbcbd26a24.png)
A complete backup of iwantwallpaper.co.uk
Are you over 18 and want to see adult content?
Text
NETCRAFTSMEN
NetCraftsmen works tirelessly to ensure network security while keeping impact on functionality to a minimum. Speed, performance and expense are the variables in optimal data center implementation. We manage change, facilitate communication, and help your 5 KEY TRAITS OF HIGHLY EFFECTIVE ACCOUNT EXECUTIVES They Always Strive to Be Better. Internal drive is essential for successful account executives. In order to demonstrate the qualities mentioned above — to be collaborative, honest, and responsive — account execs must have the desire to succeed in their roles. But it doesn’t stop at having an inner drive. CISCO VSS DUAL-ACTIVE DETECTION Cisco VSS Dual-Active Detection – In my last blog, I explained how to configure VSS.In this article I’ll explain how to configure Dual-Active Detection. This is an important function of VSS because it prevents both supervisors from becoming active in event of a VSL linkfailure.
CREATING A SELF-SIGNED SSL CERTIFICATE FOR MICROSOFT IIS The steps for creating the SSL certificate are listed below. Download and install the IIS resource kit. Open a cmd prompt and type: cd “c:Program FilesIIS ResourcesSelfSSL”. Create the self-signed SSL certificate by just typing: selfssl.exe. There are a number of command line parameters you can enter to FIXING FCIP AND SRDF Conclusions re Fixing FCIP. Make sure the tuning parameters are set correctly. Use jumbos on the WAN or MAN path if possible. Use QoS to reserve at least the configured min bandwidth for FCIP. Set the max bandwidth to the worst case bandwidth available to FCIP, i.e. link speed minus other traffic on the link. UC TOOLKIT: USING AUDACITY TO CREATE AND EDIT CISCO UCCX There are essentially two methods one can use to create UCCX prompts. One method is to use a custom CRS script to create prompts using the telephone user interface (TUI). The second method is to record the prompts off line and upload them. I have used Audacity to record prompts, edit prompts, and convert prompts for both methods. OTV AND DCI REQUIRE STP DEFENSES TROUBLESHOOTING TRUNKS IN A NX-OS ENVIRONMENT (TO TRUNK OR This closely matched the old 6500 configuration: The differences make sense. The NX-OS default for the channel-group 3 interface command is mode on. The default trunk encapsulation for NX-OS is 802.1q. We noticed that the two links were up, we were forming neighbors, and were up in a port-channel: We reconnected the link back to the 6500,and
VCLOUD VS. VSPHERE: WHAT’S THE DIFFERENCE ANYWAY In a nutshell, vCloud Suite is a complete automation system for public and private clouds that relies on vSphere as its infrastructure. Many components comprise vCloud Suite; most notably, vCloud Director. To help visualize all of these parts, Alan Renouf (a VMware employee who writes the most amazing scripts) unveiled a great vCloud Suite poster. ETHERNET AUTONEGOTIATION BEST PRACTICES 4 Ethernet Autonegotiation Best Practices • July 2004 The IEEE 802.3 standard states that you must support and test autonegotiation enabled to certify a product IEEE 802.3 compliant, and for multivendorNETCRAFTSMEN
NetCraftsmen works tirelessly to ensure network security while keeping impact on functionality to a minimum. Speed, performance and expense are the variables in optimal data center implementation. We manage change, facilitate communication, and help your 5 KEY TRAITS OF HIGHLY EFFECTIVE ACCOUNT EXECUTIVES They Always Strive to Be Better. Internal drive is essential for successful account executives. In order to demonstrate the qualities mentioned above — to be collaborative, honest, and responsive — account execs must have the desire to succeed in their roles. But it doesn’t stop at having an inner drive. CISCO VSS DUAL-ACTIVE DETECTION Cisco VSS Dual-Active Detection – In my last blog, I explained how to configure VSS.In this article I’ll explain how to configure Dual-Active Detection. This is an important function of VSS because it prevents both supervisors from becoming active in event of a VSL linkfailure.
CREATING A SELF-SIGNED SSL CERTIFICATE FOR MICROSOFT IIS The steps for creating the SSL certificate are listed below. Download and install the IIS resource kit. Open a cmd prompt and type: cd “c:Program FilesIIS ResourcesSelfSSL”. Create the self-signed SSL certificate by just typing: selfssl.exe. There are a number of command line parameters you can enter to FIXING FCIP AND SRDF Conclusions re Fixing FCIP. Make sure the tuning parameters are set correctly. Use jumbos on the WAN or MAN path if possible. Use QoS to reserve at least the configured min bandwidth for FCIP. Set the max bandwidth to the worst case bandwidth available to FCIP, i.e. link speed minus other traffic on the link. UC TOOLKIT: USING AUDACITY TO CREATE AND EDIT CISCO UCCX There are essentially two methods one can use to create UCCX prompts. One method is to use a custom CRS script to create prompts using the telephone user interface (TUI). The second method is to record the prompts off line and upload them. I have used Audacity to record prompts, edit prompts, and convert prompts for both methods. OTV AND DCI REQUIRE STP DEFENSES TROUBLESHOOTING TRUNKS IN A NX-OS ENVIRONMENT (TO TRUNK OR This closely matched the old 6500 configuration: The differences make sense. The NX-OS default for the channel-group 3 interface command is mode on. The default trunk encapsulation for NX-OS is 802.1q. We noticed that the two links were up, we were forming neighbors, and were up in a port-channel: We reconnected the link back to the 6500,and
VCLOUD VS. VSPHERE: WHAT’S THE DIFFERENCE ANYWAY In a nutshell, vCloud Suite is a complete automation system for public and private clouds that relies on vSphere as its infrastructure. Many components comprise vCloud Suite; most notably, vCloud Director. To help visualize all of these parts, Alan Renouf (a VMware employee who writes the most amazing scripts) unveiled a great vCloud Suite poster. ETHERNET AUTONEGOTIATION BEST PRACTICES 4 Ethernet Autonegotiation Best Practices • July 2004 The IEEE 802.3 standard states that you must support and test autonegotiation enabled to certify a product IEEE 802.3 compliant, and for multivendor INTERNET EDGE: DOUBLE DON’T DO THIS This is the sixth blog in an Internet Edge series. Links to prior blogs in the series: Internet Edge:Simple Sites Internet Edge:Fitting in SD-WAN Internet Edge:Things to Not Do (Part 1) Internet Edge: Things to Not Do (Part 2) Internet Edge: Double Data Centers There is one more situation I’ve run across in the real world that I would recommend not doing. BEST PRACTICES FOR ROOT BRIDGE ON NX-OS I found that the 6500s use the same vlan root convention as the NX-OS devices: 65K (config)#span vlan 101 root primary 65K (config)#do sh span vlan 101 VLAN0101 Spanning tree enabled protocol ieee Root ID Priority 24677 Address 0017.0fae.0140 This bridge is the root Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Bridge ID Priority24677
THE FUTURE OF NETWORK MANAGEMENT After writing the Seven Deadly Sins of Network Management blog post, a post with a more positive focus seems appropriate. So let’s look at how network management vendors might improve the state of the art. I’ve been thinking a lot about this subject lately in light of a large proposal we submitted recently to help troubleshoot a company with poor application performance. UCS DISJOINTED LAYER 2 NETWORK CONFIGURATION If the blade runs as an ESXi host, some VMs will lose network connectivity. The procedure to properly configure a disjointed Layer 2 is listed below: Login to UCS. Click on the LAN tab. Click LAN cloud. Click on LAN uplink manager. Click the VLAN tab. Click the VLAN manager subtab. Click on the uplink (Eth1/13) on the left pane andhold down
IOS TO NX-OS CONVERTER TOOL FROM CISCO This website uses cookies and other tracking technologies (also known as pixels or beacons) to aid your experience (such as viewing videos), as well as “performance cookies” to analyze your use of this website and to assist with marketing efforts. QUICK NETWORK REDUNDANCY TEST If you take care of all the interfaces, the analysis of up/down interfaces can be the quick test for whether your redundant network is really redundant, because the most common source of redundancy failures is not noticing the first failure. Don’t rely on identifying up/down interfaces alone. VCLOUD VS. VSPHERE: WHAT’S THE DIFFERENCE ANYWAY In a nutshell, vCloud Suite is a complete automation system for public and private clouds that relies on vSphere as its infrastructure. Many components comprise vCloud Suite; most notably, vCloud Director. To help visualize all of these parts, Alan Renouf (a VMware employee who writes the most amazing scripts) unveiled a great vCloud Suite poster. SPANNING LAYER 2 BETWEEN DATA CENTERS After my posting about the dangers of spanning Layer 2 between data centers in my blog titled Spanning Tree Protocol and Failure Domains, Shivlu Jain (www.mplsvpn.info) asked about handling requests to span Layer 2 between data centers. One of his concerns was how to handle HA (High Availability) server configurations that require network connectivity within the same broadcast domain (subnet). WHY VPC UCS TO NEXUS? So the design evolved to dual-homing the 2 UCS and the 2 NetApp chassis via two links to each Nexus switch. Small detail: the design was a collapsed core, and Nexus 7K was playing the role of the Nexus 5K’s in the standard FlexPod design. The UCS devices and the NetApp boxes will be in different VLANs (hardly necessary, but planned). WHICH WINDOWS SFTP SERVER SHOULD I USE FOR MY CISCO UC For Domain user accounts, you will need to use the convention to add the user. When a user is activated, they can connect to your “SFTP” server user their local Windows or AD Domain credentials. One thing you need to keep in mind is the directory structure. If you install copSSH in the “c:/program files/copssh/ICW” directory,then the
NETCRAFTSMEN
NetCraftsmen works tirelessly to ensure network security while keeping impact on functionality to a minimum. Speed, performance and expense are the variables in optimal data center implementation. We manage change, facilitate communication, and help your CISCO VSS DUAL-ACTIVE DETECTION Cisco VSS Dual-Active Detection – In my last blog, I explained how to configure VSS.In this article I’ll explain how to configure Dual-Active Detection. This is an important function of VSS because it prevents both supervisors from becoming active in event of a VSL linkfailure.
CREATING A SELF-SIGNED SSL CERTIFICATE FOR MICROSOFT IIS The steps for creating the SSL certificate are listed below. Download and install the IIS resource kit. Open a cmd prompt and type: cd “c:Program FilesIIS ResourcesSelfSSL”. Create the self-signed SSL certificate by just typing: selfssl.exe. There are a number of command line parameters you can enter to 5 KEY TRAITS OF HIGHLY EFFECTIVE ACCOUNT EXECUTIVES They Always Strive to Be Better. Internal drive is essential for successful account executives. In order to demonstrate the qualities mentioned above — to be collaborative, honest, and responsive — account execs must have the desire to succeed in their roles. But it doesn’t stop at having an inner drive. UC TOOLKIT: USING AUDACITY TO CREATE AND EDIT CISCO UCCX There are essentially two methods one can use to create UCCX prompts. One method is to use a custom CRS script to create prompts using the telephone user interface (TUI). The second method is to record the prompts off line and upload them. I have used Audacity to record prompts, edit prompts, and convert prompts for both methods. AUDIT LOGS ON CISCO UNIFIED COMMUNICATIONS MANAGER (CUCM 1. Load RTMT on your admin workstation. 2. Connect to your CUCM cluster using a user ID that has the “Standard Audit Log Administration” role (or equivalent) assigned. 3. Go to System>Tools>Trace>Trace and Logs Central. 4. Under “Trace and Logs Central”, you will see an “Audit Logs” folder. Double click the folder to start the log 95TH PERCENTILE CALCULATION Therefore, the link was running for 72 minutes at, or above, the 95th percentile utilization value. If your sampling interval is longer, say 15 minutes, then you only have 96 samples. Doing the calculations, 96 * .05 = 4.75, which rounds up to 5. So you discard the top 5 CONFIGURING BACK-TO-BACK VPCS ON CISCO NEXUS SWITCHES Cisco mentions back-to-back vPCs in the Cisco Data Center Interconnect Design and Implementation Guide. under the “2 Sites vPC-vPC Case Study”, and also calls them multi-layer vPCs in their recent configuration guides. I decided put together a set of configurationson paper to
CISCO CUCM BLOCKING CALLS BY CALLING PARTY NUMBER (ID Assign the CL_PSTN-In_CSS to the voice gateway. Add the “Route Next Hop” translation “!” to CL_PSTN-In_PT. Select the CL_PSTN-Screen_CSS, enable call routing, and enable “Route Next Hop by Calling Party Number”. NOTE: You can also apply calling or called party transformations at this step, as needed. ETHERNET AUTONEGOTIATION BEST PRACTICES 4 Ethernet Autonegotiation Best Practices • July 2004 The IEEE 802.3 standard states that you must support and test autonegotiation enabled to certify a product IEEE 802.3 compliant, and for multivendorNETCRAFTSMEN
NetCraftsmen works tirelessly to ensure network security while keeping impact on functionality to a minimum. Speed, performance and expense are the variables in optimal data center implementation. We manage change, facilitate communication, and help your CISCO VSS DUAL-ACTIVE DETECTION Cisco VSS Dual-Active Detection – In my last blog, I explained how to configure VSS.In this article I’ll explain how to configure Dual-Active Detection. This is an important function of VSS because it prevents both supervisors from becoming active in event of a VSL linkfailure.
CREATING A SELF-SIGNED SSL CERTIFICATE FOR MICROSOFT IIS The steps for creating the SSL certificate are listed below. Download and install the IIS resource kit. Open a cmd prompt and type: cd “c:Program FilesIIS ResourcesSelfSSL”. Create the self-signed SSL certificate by just typing: selfssl.exe. There are a number of command line parameters you can enter to 5 KEY TRAITS OF HIGHLY EFFECTIVE ACCOUNT EXECUTIVES They Always Strive to Be Better. Internal drive is essential for successful account executives. In order to demonstrate the qualities mentioned above — to be collaborative, honest, and responsive — account execs must have the desire to succeed in their roles. But it doesn’t stop at having an inner drive. UC TOOLKIT: USING AUDACITY TO CREATE AND EDIT CISCO UCCX There are essentially two methods one can use to create UCCX prompts. One method is to use a custom CRS script to create prompts using the telephone user interface (TUI). The second method is to record the prompts off line and upload them. I have used Audacity to record prompts, edit prompts, and convert prompts for both methods. AUDIT LOGS ON CISCO UNIFIED COMMUNICATIONS MANAGER (CUCM 1. Load RTMT on your admin workstation. 2. Connect to your CUCM cluster using a user ID that has the “Standard Audit Log Administration” role (or equivalent) assigned. 3. Go to System>Tools>Trace>Trace and Logs Central. 4. Under “Trace and Logs Central”, you will see an “Audit Logs” folder. Double click the folder to start the log 95TH PERCENTILE CALCULATION Therefore, the link was running for 72 minutes at, or above, the 95th percentile utilization value. If your sampling interval is longer, say 15 minutes, then you only have 96 samples. Doing the calculations, 96 * .05 = 4.75, which rounds up to 5. So you discard the top 5 CONFIGURING BACK-TO-BACK VPCS ON CISCO NEXUS SWITCHES Cisco mentions back-to-back vPCs in the Cisco Data Center Interconnect Design and Implementation Guide. under the “2 Sites vPC-vPC Case Study”, and also calls them multi-layer vPCs in their recent configuration guides. I decided put together a set of configurationson paper to
CISCO CUCM BLOCKING CALLS BY CALLING PARTY NUMBER (ID Assign the CL_PSTN-In_CSS to the voice gateway. Add the “Route Next Hop” translation “!” to CL_PSTN-In_PT. Select the CL_PSTN-Screen_CSS, enable call routing, and enable “Route Next Hop by Calling Party Number”. NOTE: You can also apply calling or called party transformations at this step, as needed. ETHERNET AUTONEGOTIATION BEST PRACTICES 4 Ethernet Autonegotiation Best Practices • July 2004 The IEEE 802.3 standard states that you must support and test autonegotiation enabled to certify a product IEEE 802.3 compliant, and for multivendor INTERNET EDGE: DOUBLE DON’T DO THIS This is the sixth blog in an Internet Edge series. Links to prior blogs in the series: Internet Edge:Simple Sites Internet Edge:Fitting in SD-WAN Internet Edge:Things to Not Do (Part 1) Internet Edge: Things to Not Do (Part 2) Internet Edge: Double Data Centers There is one more situation I’ve run across in the real world that I would recommend not doing. EXPOSING HIDDEN COSTS IN NETWORK OPERATIONS Many IT shops are facing budgetary challenges: Support more technology with the same (or smaller) budget. What happens? This is where you enter the Twilight Zone (cue eerie theme music) of hidden costs in network operations. Let’s take a look at some common things we at FIXING FCIP AND SRDF Conclusions re Fixing FCIP. Make sure the tuning parameters are set correctly. Use jumbos on the WAN or MAN path if possible. Use QoS to reserve at least the configured min bandwidth for FCIP. Set the max bandwidth to the worst case bandwidth available to FCIP, i.e. link speed minus other traffic on the link.OTV BEST PRACTICES
For those who somehow missed all the Cisco press and my prior blogs: OTV is a way to transport Layer 2 between data centers over any (sufficiently high speed) Layer 3 IP network. I consider it the best of the Data Center Interconnect (DCI) approaches Cisco provides. OTV includes technology to reduce WAN ARP broadcast traffic, isolate STP TCP/IP PERFORMANCE FACTORS Most routers run an MTU of 1500, but you have to subtract off IP and TCP header sizes to get the data transfer rate. (1460 / 0.225) * (1 / sqrt (0.001)) = 6489 * 31.6 = 205,052 bps. Note how much that 1 in 1000 packet loss rate lowered that throughput, UNDERSTANDING INTERFACE ERRORS AND TCP PERFORMANCE So the maximum rate for a single file transfer would be. 64,000 * 8 / .002 =256,000,000 bps or 256 Mbps. Conclusion: If the RTT is 2ms, a maximum rate of about 256Mbps is possible in the campus across a Gigabit Ethernet link. Expected TCP/IP Performance With Errors. A third question to consider is “What is the impact of errors onTCP/IP
BEST PRACTICES FOR ROOT BRIDGE ON NX-OS I found that the 6500s use the same vlan root convention as the NX-OS devices: 65K (config)#span vlan 101 root primary 65K (config)#do sh span vlan 101 VLAN0101 Spanning tree enabled protocol ieee Root ID Priority 24677 Address 0017.0fae.0140 This bridge is the root Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Bridge ID Priority24677
95TH PERCENTILE CALCULATION Therefore, the link was running for 72 minutes at, or above, the 95th percentile utilization value. If your sampling interval is longer, say 15 minutes, then you only have 96 samples. Doing the calculations, 96 * .05 = 4.75, which rounds up to 5. So you discard the top 5 ARUBA WIRELESS CONTROLLERS: ARCHITECTURE & CONFIGURATIONS Aruba offers wireless controllers in the 7000 series and 7200 series models. The 7000 series controllers scale for small to large branch offices from 16 to 64 maximum AP capacity with an option of up to 24 switchports for unified wired and wireless access. The 7200 series controllers are suitable for campus networks and support from 256 APsto
SETTING THE CLOCK ON A NEXUS 5K I noticed that you may not initially be able to set the clock time and date on Nexus 5Ks. For example: SWITCH-5K2# sh clock 18:16:56.460 UTC Fri Jun 12 2009 SWITCH-5K2# clock set 13:21:00 13 feb 2014 Setting clock from CLI is not allowed in this VDC. SWITCH-5K2# However, the clock set command worked fine on my Nexus 7Ks. After a bit of digging, I found that this is a known big in NXNETCRAFTSMEN
NetCraftsmen works tirelessly to ensure network security while keeping impact on functionality to a minimum. Speed, performance and expense are the variables in optimal data center implementation. We manage change, facilitate communication, and help your CISCO VSS DUAL-ACTIVE DETECTION Cisco VSS Dual-Active Detection – In my last blog, I explained how to configure VSS.In this article I’ll explain how to configure Dual-Active Detection. This is an important function of VSS because it prevents both supervisors from becoming active in event of a VSL linkfailure.
TCP/IP PERFORMANCE FACTORS Most routers run an MTU of 1500, but you have to subtract off IP and TCP header sizes to get the data transfer rate. (1460 / 0.225) * (1 / sqrt (0.001)) = 6489 * 31.6 = 205,052 bps. Note how much that 1 in 1000 packet loss rate lowered that throughput, CREATING A SELF-SIGNED SSL CERTIFICATE FOR MICROSOFT IIS The steps for creating the SSL certificate are listed below. Download and install the IIS resource kit. Open a cmd prompt and type: cd “c:Program FilesIIS ResourcesSelfSSL”. Create the self-signed SSL certificate by just typing: selfssl.exe. There are a number of command line parameters you can enter to UC TOOLKIT: USING AUDACITY TO CREATE AND EDIT CISCO UCCX There are essentially two methods one can use to create UCCX prompts. One method is to use a custom CRS script to create prompts using the telephone user interface (TUI). The second method is to record the prompts off line and upload them. I have used Audacity to record prompts, edit prompts, and convert prompts for both methods. 95TH PERCENTILE CALCULATION Therefore, the link was running for 72 minutes at, or above, the 95th percentile utilization value. If your sampling interval is longer, say 15 minutes, then you only have 96 samples. Doing the calculations, 96 * .05 = 4.75, which rounds up to 5. So you discard the top 5 ARUBA WIRELESS CONTROLLERS: ARCHITECTURE & CONFIGURATIONS Aruba offers wireless controllers in the 7000 series and 7200 series models. The 7000 series controllers scale for small to large branch offices from 16 to 64 maximum AP capacity with an option of up to 24 switchports for unified wired and wireless access. The 7200 series controllers are suitable for campus networks and support from 256 APsto
OTV AND DCI REQUIRE STP DEFENSES CISCO CUCM BLOCKING CALLS BY CALLING PARTY NUMBER (ID Assign the CL_PSTN-In_CSS to the voice gateway. Add the “Route Next Hop” translation “!” to CL_PSTN-In_PT. Select the CL_PSTN-Screen_CSS, enable call routing, and enable “Route Next Hop by Calling Party Number”. NOTE: You can also apply calling or called party transformations at this step, as needed. ETHERNET AUTONEGOTIATION BEST PRACTICES 4 Ethernet Autonegotiation Best Practices • July 2004 The IEEE 802.3 standard states that you must support and test autonegotiation enabled to certify a product IEEE 802.3 compliant, and for multivendorNETCRAFTSMEN
NetCraftsmen works tirelessly to ensure network security while keeping impact on functionality to a minimum. Speed, performance and expense are the variables in optimal data center implementation. We manage change, facilitate communication, and help your CISCO VSS DUAL-ACTIVE DETECTION Cisco VSS Dual-Active Detection – In my last blog, I explained how to configure VSS.In this article I’ll explain how to configure Dual-Active Detection. This is an important function of VSS because it prevents both supervisors from becoming active in event of a VSL linkfailure.
TCP/IP PERFORMANCE FACTORS Most routers run an MTU of 1500, but you have to subtract off IP and TCP header sizes to get the data transfer rate. (1460 / 0.225) * (1 / sqrt (0.001)) = 6489 * 31.6 = 205,052 bps. Note how much that 1 in 1000 packet loss rate lowered that throughput, CREATING A SELF-SIGNED SSL CERTIFICATE FOR MICROSOFT IIS The steps for creating the SSL certificate are listed below. Download and install the IIS resource kit. Open a cmd prompt and type: cd “c:Program FilesIIS ResourcesSelfSSL”. Create the self-signed SSL certificate by just typing: selfssl.exe. There are a number of command line parameters you can enter to UC TOOLKIT: USING AUDACITY TO CREATE AND EDIT CISCO UCCX There are essentially two methods one can use to create UCCX prompts. One method is to use a custom CRS script to create prompts using the telephone user interface (TUI). The second method is to record the prompts off line and upload them. I have used Audacity to record prompts, edit prompts, and convert prompts for both methods. 95TH PERCENTILE CALCULATION Therefore, the link was running for 72 minutes at, or above, the 95th percentile utilization value. If your sampling interval is longer, say 15 minutes, then you only have 96 samples. Doing the calculations, 96 * .05 = 4.75, which rounds up to 5. So you discard the top 5 ARUBA WIRELESS CONTROLLERS: ARCHITECTURE & CONFIGURATIONS Aruba offers wireless controllers in the 7000 series and 7200 series models. The 7000 series controllers scale for small to large branch offices from 16 to 64 maximum AP capacity with an option of up to 24 switchports for unified wired and wireless access. The 7200 series controllers are suitable for campus networks and support from 256 APsto
OTV AND DCI REQUIRE STP DEFENSES CISCO CUCM BLOCKING CALLS BY CALLING PARTY NUMBER (ID Assign the CL_PSTN-In_CSS to the voice gateway. Add the “Route Next Hop” translation “!” to CL_PSTN-In_PT. Select the CL_PSTN-Screen_CSS, enable call routing, and enable “Route Next Hop by Calling Party Number”. NOTE: You can also apply calling or called party transformations at this step, as needed. ETHERNET AUTONEGOTIATION BEST PRACTICES 4 Ethernet Autonegotiation Best Practices • July 2004 The IEEE 802.3 standard states that you must support and test autonegotiation enabled to certify a product IEEE 802.3 compliant, and for multivendor INTERNET EDGE: DOUBLE DON’T DO THIS This is the sixth blog in an Internet Edge series. Links to prior blogs in the series: Internet Edge:Simple Sites Internet Edge:Fitting in SD-WAN Internet Edge:Things to Not Do (Part 1) Internet Edge: Things to Not Do (Part 2) Internet Edge: Double Data Centers There is one more situation I’ve run across in the real world that I would recommend not doing. EXPOSING HIDDEN COSTS IN NETWORK OPERATIONS Many IT shops are facing budgetary challenges: Support more technology with the same (or smaller) budget. What happens? This is where you enter the Twilight Zone (cue eerie theme music) of hidden costs in network operations. Let’s take a look at some common things we at FIXING FCIP AND SRDF Conclusions re Fixing FCIP. Make sure the tuning parameters are set correctly. Use jumbos on the WAN or MAN path if possible. Use QoS to reserve at least the configured min bandwidth for FCIP. Set the max bandwidth to the worst case bandwidth available to FCIP, i.e. link speed minus other traffic on the link.OTV BEST PRACTICES
For those who somehow missed all the Cisco press and my prior blogs: OTV is a way to transport Layer 2 between data centers over any (sufficiently high speed) Layer 3 IP network. I consider it the best of the Data Center Interconnect (DCI) approaches Cisco provides. OTV includes technology to reduce WAN ARP broadcast traffic, isolate STP TCP/IP PERFORMANCE FACTORS Most routers run an MTU of 1500, but you have to subtract off IP and TCP header sizes to get the data transfer rate. (1460 / 0.225) * (1 / sqrt (0.001)) = 6489 * 31.6 = 205,052 bps. Note how much that 1 in 1000 packet loss rate lowered that throughput, UNDERSTANDING INTERFACE ERRORS AND TCP PERFORMANCE So the maximum rate for a single file transfer would be. 64,000 * 8 / .002 =256,000,000 bps or 256 Mbps. Conclusion: If the RTT is 2ms, a maximum rate of about 256Mbps is possible in the campus across a Gigabit Ethernet link. Expected TCP/IP Performance With Errors. A third question to consider is “What is the impact of errors onTCP/IP
BEST PRACTICES FOR ROOT BRIDGE ON NX-OS I found that the 6500s use the same vlan root convention as the NX-OS devices: 65K (config)#span vlan 101 root primary 65K (config)#do sh span vlan 101 VLAN0101 Spanning tree enabled protocol ieee Root ID Priority 24677 Address 0017.0fae.0140 This bridge is the root Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Bridge ID Priority24677
ARUBA WIRELESS CONTROLLERS: ARCHITECTURE & CONFIGURATIONS Aruba offers wireless controllers in the 7000 series and 7200 series models. The 7000 series controllers scale for small to large branch offices from 16 to 64 maximum AP capacity with an option of up to 24 switchports for unified wired and wireless access. The 7200 series controllers are suitable for campus networks and support from 256 APsto
SETTING THE CLOCK ON A NEXUS 5K I noticed that you may not initially be able to set the clock time and date on Nexus 5Ks. For example: SWITCH-5K2# sh clock 18:16:56.460 UTC Fri Jun 12 2009 SWITCH-5K2# clock set 13:21:00 13 feb 2014 Setting clock from CLI is not allowed in this VDC. SWITCH-5K2# However, the clock set command worked fine on my Nexus 7Ks. After a bit of digging, I found that this is a known big in NX ISSUE WITH REDIRECTING CALLERS TO UNITY CONNECTION CALL Since we use bogus lines on a bogus CTI Route Point to hit our call handlers, we know to look at redirection (aka forwarding) rules in Unity Connection. We check configurations and everything appears to be what one would expect. We monitor calls coming into Unity Connection and at first glance everything appears normal.NETCRAFTSMEN
NetCraftsmen works tirelessly to ensure network security while keeping impact on functionality to a minimum. Speed, performance and expense are the variables in optimal data center implementation. We manage change, facilitate communication, and help your 5 KEY TRAITS OF HIGHLY EFFECTIVE ACCOUNT EXECUTIVES They Always Strive to Be Better. Internal drive is essential for successful account executives. In order to demonstrate the qualities mentioned above — to be collaborative, honest, and responsive — account execs must have the desire to succeed in their roles. But it doesn’t stop at having an inner drive. CISCO VSS DUAL-ACTIVE DETECTION Cisco VSS Dual-Active Detection – In my last blog, I explained how to configure VSS.In this article I’ll explain how to configure Dual-Active Detection. This is an important function of VSS because it prevents both supervisors from becoming active in event of a VSL linkfailure.
FIXING FCIP AND SRDF Conclusions re Fixing FCIP. Make sure the tuning parameters are set correctly. Use jumbos on the WAN or MAN path if possible. Use QoS to reserve at least the configured min bandwidth for FCIP. Set the max bandwidth to the worst case bandwidth available to FCIP, i.e. link speed minus other traffic on the link. CREATING A SELF-SIGNED SSL CERTIFICATE FOR MICROSOFT IIS The steps for creating the SSL certificate are listed below. Download and install the IIS resource kit. Open a cmd prompt and type: cd “c:Program FilesIIS ResourcesSelfSSL”. Create the self-signed SSL certificate by just typing: selfssl.exe. There are a number of command line parameters you can enter to VCLOUD VS. VSPHERE: WHAT’S THE DIFFERENCE ANYWAY In a nutshell, vCloud Suite is a complete automation system for public and private clouds that relies on vSphere as its infrastructure. Many components comprise vCloud Suite; most notably, vCloud Director. To help visualize all of these parts, Alan Renouf (a VMware employee who writes the most amazing scripts) unveiled a great vCloud Suite poster. SPANNING LAYER 2 BETWEEN DATA CENTERS After my posting about the dangers of spanning Layer 2 between data centers in my blog titled Spanning Tree Protocol and Failure Domains, Shivlu Jain (www.mplsvpn.info) asked about handling requests to span Layer 2 between data centers. One of his concerns was how to handle HA (High Availability) server configurations that require network connectivity within the same broadcast domain (subnet). OTV AND DCI REQUIRE STP DEFENSES TROUBLESHOOTING TRUNKS IN A NX-OS ENVIRONMENT (TO TRUNK OR This closely matched the old 6500 configuration: The differences make sense. The NX-OS default for the channel-group 3 interface command is mode on. The default trunk encapsulation for NX-OS is 802.1q. We noticed that the two links were up, we were forming neighbors, and were up in a port-channel: We reconnected the link back to the 6500,and
ETHERNET AUTONEGOTIATION BEST PRACTICES 4 Ethernet Autonegotiation Best Practices • July 2004 The IEEE 802.3 standard states that you must support and test autonegotiation enabled to certify a product IEEE 802.3 compliant, and for multivendorNETCRAFTSMEN
NetCraftsmen works tirelessly to ensure network security while keeping impact on functionality to a minimum. Speed, performance and expense are the variables in optimal data center implementation. We manage change, facilitate communication, and help your 5 KEY TRAITS OF HIGHLY EFFECTIVE ACCOUNT EXECUTIVES They Always Strive to Be Better. Internal drive is essential for successful account executives. In order to demonstrate the qualities mentioned above — to be collaborative, honest, and responsive — account execs must have the desire to succeed in their roles. But it doesn’t stop at having an inner drive. CISCO VSS DUAL-ACTIVE DETECTION Cisco VSS Dual-Active Detection – In my last blog, I explained how to configure VSS.In this article I’ll explain how to configure Dual-Active Detection. This is an important function of VSS because it prevents both supervisors from becoming active in event of a VSL linkfailure.
FIXING FCIP AND SRDF Conclusions re Fixing FCIP. Make sure the tuning parameters are set correctly. Use jumbos on the WAN or MAN path if possible. Use QoS to reserve at least the configured min bandwidth for FCIP. Set the max bandwidth to the worst case bandwidth available to FCIP, i.e. link speed minus other traffic on the link. CREATING A SELF-SIGNED SSL CERTIFICATE FOR MICROSOFT IIS The steps for creating the SSL certificate are listed below. Download and install the IIS resource kit. Open a cmd prompt and type: cd “c:Program FilesIIS ResourcesSelfSSL”. Create the self-signed SSL certificate by just typing: selfssl.exe. There are a number of command line parameters you can enter to VCLOUD VS. VSPHERE: WHAT’S THE DIFFERENCE ANYWAY In a nutshell, vCloud Suite is a complete automation system for public and private clouds that relies on vSphere as its infrastructure. Many components comprise vCloud Suite; most notably, vCloud Director. To help visualize all of these parts, Alan Renouf (a VMware employee who writes the most amazing scripts) unveiled a great vCloud Suite poster. SPANNING LAYER 2 BETWEEN DATA CENTERS After my posting about the dangers of spanning Layer 2 between data centers in my blog titled Spanning Tree Protocol and Failure Domains, Shivlu Jain (www.mplsvpn.info) asked about handling requests to span Layer 2 between data centers. One of his concerns was how to handle HA (High Availability) server configurations that require network connectivity within the same broadcast domain (subnet). OTV AND DCI REQUIRE STP DEFENSES TROUBLESHOOTING TRUNKS IN A NX-OS ENVIRONMENT (TO TRUNK OR This closely matched the old 6500 configuration: The differences make sense. The NX-OS default for the channel-group 3 interface command is mode on. The default trunk encapsulation for NX-OS is 802.1q. We noticed that the two links were up, we were forming neighbors, and were up in a port-channel: We reconnected the link back to the 6500,and
ETHERNET AUTONEGOTIATION BEST PRACTICES 4 Ethernet Autonegotiation Best Practices • July 2004 The IEEE 802.3 standard states that you must support and test autonegotiation enabled to certify a product IEEE 802.3 compliant, and for multivendor FIXING FCIP AND SRDF Conclusions re Fixing FCIP. Make sure the tuning parameters are set correctly. Use jumbos on the WAN or MAN path if possible. Use QoS to reserve at least the configured min bandwidth for FCIP. Set the max bandwidth to the worst case bandwidth available to FCIP, i.e. link speed minus other traffic on the link. TCP/IP PERFORMANCE FACTORS Most routers run an MTU of 1500, but you have to subtract off IP and TCP header sizes to get the data transfer rate. (1460 / 0.225) * (1 / sqrt (0.001)) = 6489 * 31.6 = 205,052 bps. Note how much that 1 in 1000 packet loss rate lowered that throughput, IOS TO NX-OS CONVERTER TOOL FROM CISCO This website uses cookies and other tracking technologies (also known as pixels or beacons) to aid your experience (such as viewing videos), as well as “performance cookies” to analyze your use of this website and to assist with marketing efforts. QUICK NETWORK REDUNDANCY TEST If you take care of all the interfaces, the analysis of up/down interfaces can be the quick test for whether your redundant network is really redundant, because the most common source of redundancy failures is not noticing the first failure. Don’t rely on identifying up/down interfaces alone. WHY VPC UCS TO NEXUS? So the design evolved to dual-homing the 2 UCS and the 2 NetApp chassis via two links to each Nexus switch. Small detail: the design was a collapsed core, and Nexus 7K was playing the role of the Nexus 5K’s in the standard FlexPod design. The UCS devices and the NetApp boxes will be in different VLANs (hardly necessary, but planned). ADDING TOMCAT CERTIFICATES ON A CUCM WEB PAGE To generate a CSR, follow these steps: Go to the OS Administration page on your Publisher and navigate to Security > Certificate Management. Click the “Generate CSR” button. In the new window, make sure the “Certificate Name” is “tomcat”; that the Distribution is “Multi UCS DISJOINTED LAYER 2 NETWORK CONFIGURATION If the blade runs as an ESXi host, some VMs will lose network connectivity. The procedure to properly configure a disjointed Layer 2 is listed below: Login to UCS. Click on the LAN tab. Click LAN cloud. Click on LAN uplink manager. Click the VLAN tab. Click the VLAN manager subtab. Click on the uplink (Eth1/13) on the left pane andhold down
PETER WELCHER
Peter Welcher. “Dr. Pete” has extensive experience, ranging from having had a hand in coding the Cisco CLI, teaching various Cisco and other classes, and consulting at numerous large and small companies, from the financial, medical, insurance, university, government, and utility sectors. His focus has been on enterprise campus and data MATT HAHN - NETCRAFTSMEN Matt is an experienced Senior Engineer with more than 19 years of professional experience who has focused on designing, implementing, and supporting enterprise security solutions. He has strong experience in firewall security policy, security assessments, cybersecurity programs, security incident response, and security hardware/softwaremigrations.
JOHN CAVANAUGH
John Cavanaugh. Vice President, Chief Technology Officer. John is our CTO and leads a talented team of consultants focused on designing and delivering scalable and secure infrastructure solutions to customers across multiple industry verticals and technologies. Previously he has held several positions including Executive Director/ChiefNETCRAFTSMEN
NetCraftsmen works tirelessly to ensure network security while keeping impact on functionality to a minimum. Speed, performance and expense are the variables in optimal data center implementation. We manage change, facilitate communication, and help your CISCO VSS DUAL-ACTIVE DETECTION Cisco VSS Dual-Active Detection – In my last blog, I explained how to configure VSS.In this article I’ll explain how to configure Dual-Active Detection. This is an important function of VSS because it prevents both supervisors from becoming active in event of a VSL linkfailure.
FIXING FCIP AND SRDF Conclusions re Fixing FCIP. Make sure the tuning parameters are set correctly. Use jumbos on the WAN or MAN path if possible. Use QoS to reserve at least the configured min bandwidth for FCIP. Set the max bandwidth to the worst case bandwidth available to FCIP, i.e. link speed minus other traffic on the link. SPANNING LAYER 2 BETWEEN DATA CENTERS After my posting about the dangers of spanning Layer 2 between data centers in my blog titled Spanning Tree Protocol and Failure Domains, Shivlu Jain (www.mplsvpn.info) asked about handling requests to span Layer 2 between data centers. One of his concerns was how to handle HA (High Availability) server configurations that require network connectivity within the same broadcast domain (subnet). 5 KEY TRAITS OF HIGHLY EFFECTIVE ACCOUNT EXECUTIVESWHAT IS AN OUTSIDE ACCOUNT EXECUTIVEWHAT IS AN OUTSIDE ACCOUNT EXECUTIVEWHAT MAKES AN EFFECTIVE EXECUTIVEWHAT MAKES AN EFFECTIVE EXECUTIVE They Always Strive to Be Better. Internal drive is essential for successful account executives. In order to demonstrate the qualities mentioned above — to be collaborative, honest, and responsive — account execs must have the desire to succeed in their roles. But it doesn’t stop at having an inner drive. ADDING TOMCAT CERTIFICATES ON A CUCM WEB PAGE To generate a CSR, follow these steps: Go to the OS Administration page on your Publisher and navigate to Security > Certificate Management. Click the “Generate CSR” button. In the new window, make sure the “Certificate Name” is “tomcat”; that the Distribution is “Multi JUST SAY NO TO JUMBO FRAMES OTV AND DCI REQUIRE STP DEFENSES TROUBLESHOOTING TRUNKS IN A NX-OS ENVIRONMENT (TO TRUNK OR This closely matched the old 6500 configuration: The differences make sense. The NX-OS default for the channel-group 3 interface command is mode on. The default trunk encapsulation for NX-OS is 802.1q. We noticed that the two links were up, we were forming neighbors, and were up in a port-channel: We reconnected the link back to the 6500,and
JOHN CAVANAUGH
John Cavanaugh. Vice President, Chief Technology Officer. John is our CTO and leads a talented team of consultants focused on designing and delivering scalable and secure infrastructure solutions to customers across multiple industry verticals and technologies. Previously he has held several positions including Executive Director/ChiefNETCRAFTSMEN
NetCraftsmen works tirelessly to ensure network security while keeping impact on functionality to a minimum. Speed, performance and expense are the variables in optimal data center implementation. We manage change, facilitate communication, and help your CISCO VSS DUAL-ACTIVE DETECTION Cisco VSS Dual-Active Detection – In my last blog, I explained how to configure VSS.In this article I’ll explain how to configure Dual-Active Detection. This is an important function of VSS because it prevents both supervisors from becoming active in event of a VSL linkfailure.
FIXING FCIP AND SRDF Conclusions re Fixing FCIP. Make sure the tuning parameters are set correctly. Use jumbos on the WAN or MAN path if possible. Use QoS to reserve at least the configured min bandwidth for FCIP. Set the max bandwidth to the worst case bandwidth available to FCIP, i.e. link speed minus other traffic on the link. SPANNING LAYER 2 BETWEEN DATA CENTERS After my posting about the dangers of spanning Layer 2 between data centers in my blog titled Spanning Tree Protocol and Failure Domains, Shivlu Jain (www.mplsvpn.info) asked about handling requests to span Layer 2 between data centers. One of his concerns was how to handle HA (High Availability) server configurations that require network connectivity within the same broadcast domain (subnet). 5 KEY TRAITS OF HIGHLY EFFECTIVE ACCOUNT EXECUTIVESWHAT IS AN OUTSIDE ACCOUNT EXECUTIVEWHAT IS AN OUTSIDE ACCOUNT EXECUTIVEWHAT MAKES AN EFFECTIVE EXECUTIVEWHAT MAKES AN EFFECTIVE EXECUTIVE They Always Strive to Be Better. Internal drive is essential for successful account executives. In order to demonstrate the qualities mentioned above — to be collaborative, honest, and responsive — account execs must have the desire to succeed in their roles. But it doesn’t stop at having an inner drive. ADDING TOMCAT CERTIFICATES ON A CUCM WEB PAGE To generate a CSR, follow these steps: Go to the OS Administration page on your Publisher and navigate to Security > Certificate Management. Click the “Generate CSR” button. In the new window, make sure the “Certificate Name” is “tomcat”; that the Distribution is “Multi JUST SAY NO TO JUMBO FRAMES OTV AND DCI REQUIRE STP DEFENSES TROUBLESHOOTING TRUNKS IN A NX-OS ENVIRONMENT (TO TRUNK OR This closely matched the old 6500 configuration: The differences make sense. The NX-OS default for the channel-group 3 interface command is mode on. The default trunk encapsulation for NX-OS is 802.1q. We noticed that the two links were up, we were forming neighbors, and were up in a port-channel: We reconnected the link back to the 6500,and
JOHN CAVANAUGH
John Cavanaugh. Vice President, Chief Technology Officer. John is our CTO and leads a talented team of consultants focused on designing and delivering scalable and secure infrastructure solutions to customers across multiple industry verticals and technologies. Previously he has held several positions including Executive Director/Chief SD-ACCESS FLOWS: MULTI-SITE WITH IP TRANSIT SD-Access: SD-Access Flows: Registration and Same Fabric Forwarding. The previous blog covered the registration, LISP, and traffic flows for the same fabric site forwarding. This blog covers multi-site, where you are using IP Transit. As a special case, we discuss how routing between VNs works in an IP Transit setting (depending on yourdesign
JUST SAY NO TO JUMBO FRAMES TL;DR: jumbo can cause major operational pain for network administrators. But first, let’s define jumbo MTU. This usually refers to jumbo frames on Ethernet media. I’m making that distinction because other transports can have different MTU sizes. Ethernet MTU stands for Maximum Transmission Unit, the largest data payload in an Ethernet frame. 5 KEY TRAITS OF HIGHLY EFFECTIVE ACCOUNT EXECUTIVES They Always Strive to Be Better. Internal drive is essential for successful account executives. In order to demonstrate the qualities mentioned above — to be collaborative, honest, and responsive — account execs must have the desire to succeed in their roles. But it doesn’t stop at having an inner drive. TCP/IP PERFORMANCE FACTORS Most routers run an MTU of 1500, but you have to subtract off IP and TCP header sizes to get the data transfer rate. (1460 / 0.225) * (1 / sqrt (0.001)) = 6489 * 31.6 = 205,052 bps. Note how much that 1 in 1000 packet loss rate lowered that throughput, USING VRFS IN NX-OS COMPARED TO IOS Both IOS and NX-OS use the same syntax for reviwing the VRF routing table. (This is the ONLY command that has the same syntax to provide the same information!) IOS-RTR01# sh ip ro vrf RED. Routing Table: RED. Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP. WHY VPC UCS TO NEXUS? So the design evolved to dual-homing the 2 UCS and the 2 NetApp chassis via two links to each Nexus switch. Small detail: the design was a collapsed core, and Nexus 7K was playing the role of the Nexus 5K’s in the standard FlexPod design. The UCS devices and the NetApp boxes will be in different VLANs (hardly necessary, but planned).JOHN CAVANAUGH
John Cavanaugh. Vice President, Chief Technology Officer. John is our CTO and leads a talented team of consultants focused on designing and delivering scalable and secure infrastructure solutions to customers across multiple industry verticals and technologies. Previously he has held several positions including Executive Director/Chief LIKEYESUS (LIKE) GEBREMESKEL Likeyesus (Like) Gebremeskel. Likeyesus is a Network Engineer with years of experience in implementing and supporting highly available, scalable, secure and redundant networks that integrate voice, video and data. He currently holds a Master’s degree from Ghent University, CCNP Enterprise and IOS TO NX-OS CONVERTER TOOL FROM CISCO This website uses cookies and other tracking technologies (also known as pixels or beacons) to aid your experience (such as viewing videos), as well as “performance cookies” to analyze your use of this website and to assist with marketing efforts.PETER WELCHER
Peter Welcher. “Dr. Pete” has extensive experience, ranging from having had a hand in coding the Cisco CLI, teaching various Cisco and other classes, and consulting at numerous large and small companies, from the financial, medical, insurance, university, government, and utility sectors. His focus has been on enterprise campus and data Toggle navigation __NETCRAFTSMEN
* Company
* About Us
* Team
* Partners
* Careers
* News & Events
* Services
* Consulting Projects* Managed Services
* Outsourced IT Services* Technologies
* Cloud
* Security
* Network
* Collaboration
* Data Center
* Innovative Technologies* Industries
* Healthcare
* Finance
* Energy
* Government
* Resources
* Blog – Business
* Blog – Technology* Success Stories
* Library
* Contact
__
YOUR PARTNER FOR IT CONSULTINGAND SOLUTIONS
GET HEALTHY. STAY HEALTHY. REST ASSURED.™Learn More
Latest Blog
05 // 19 // 2021
EXPECTING MORE FROM YOUR MSP William Bell, VP of Solutions and Products, outlines the value you should be realizing from your managed services provider.Read More
ABOUT
We ensure your IT infrastructure gets healthy and stays healthy by resolving current challenges, reducing risk and proactively preparing for the future. Our clients have access to the entire NetCraftsmen® team of best-in-class professionals. You’ll never get traded-down. We empower our team of experts to do what’s right, every time. We specialize in serving complex, highly regulated industries such as healthcare, energy, finance and government. Our solutions include network, collaboration, data center, cloud, security, and other innovative technologies.Learn More
SERVICES
01 Consulting Projects 02 Craftsmen Assurance® Managed Services 03 Outsourced IT Services*
OUTSOURCED IT SERVICES Finding, hiring, and keeping quality IT staff can be a challenge, whether you’re filling a skill gap or have an increased staffing need. While adding a few contract workers can provide quick help, it doesn’t compare to embedding full-time professionals with deep technical expertise who are dedicated to your organization’s mission. NetCraftsmen Outsourced IT Services stand apart because every expert we place has been trained and tested to our standards ofcraftsmanship.
Learn More
*
CONSULTING PROJECTS
Our team of NetCraftsmen experts offers a broad array of services to identify and resolve current IT infrastructure challenges, reduce risk, and proactively prepare you for the future. Leveraging proven methodologies, every engagement can be customized to fit your specific needs and can include Lifecycle Services, Technology Initiatives, and Enterprise Strategic Planning.Learn More
*
CRAFTSMEN ASSURANCE® MANAGED SERVICES NetCraftsmen’s managed services offering, Craftsmen Assurance, provides ongoing, fixed-fee engagements for all of your IT infrastructure needs which can include proactive, strategic consulting services. Unlike some managed services offerings that only include IT infrastructure monitoring and management, all of our services are available within a Craftsmen Assurance Managed Services engagement for a predictable level of spend.Learn More
*
OUTSOURCED IT SERVICES Finding, hiring, and keeping quality IT staff can be a challenge, whether you’re filling a skill gap or have an increased staffing need. While adding a few contract workers can provide quick help, it doesn’t compare to embedding full-time professionals with deep technical expertise who are dedicated to your organization’s mission. NetCraftsmen Outsourced IT Services stand apart because every expert we place has been trained and tested to our standards ofcraftsmanship.
Learn More
*
CONSULTING PROJECTS
Our team of NetCraftsmen experts offers a broad array of services to identify and resolve current IT infrastructure challenges, reduce risk, and proactively prepare you for the future. Leveraging proven methodologies, every engagement can be customized to fit your specific needs and can include Lifecycle Services, Technology Initiatives, and Enterprise Strategic Planning.Learn More
*
CRAFTSMEN ASSURANCE® MANAGED SERVICES NetCraftsmen’s managed services offering, Craftsmen Assurance, provides ongoing, fixed-fee engagements for all of your IT infrastructure needs which can include proactive, strategic consulting services. Unlike some managed services offerings that only include IT infrastructure monitoring and management, all of our services are available within a Craftsmen Assurance Managed Services engagement for a predictable level of spend.Learn More
*
OUTSOURCED IT SERVICES Finding, hiring, and keeping quality IT staff can be a challenge, whether you’re filling a skill gap or have an increased staffing need. While adding a few contract workers can provide quick help, it doesn’t compare to embedding full-time professionals with deep technical expertise who are dedicated to your organization’s mission. NetCraftsmen Outsourced IT Services stand apart because every expert we place has been trained and tested to our standards ofcraftsmanship.
Learn More
TECHNOLOGIES
Cloud
NetCraftsmen experts work with our clients to determine the viability of any cloud-based implementation, providing guidance and expertise that can save expense and frustration without overlooking securitydemands.
Learn More
Cloud
Security
An ironclad network means optimized organizational processes. NetCraftsmen works tirelessly to ensure network security while keeping impact on functionality to a minimum.Learn More
Security
Data Center
Speed, performance and expense are the variables in optimal data center implementation. We manage change, facilitate communication, and help your organization gain efficiencies that impact your bottom line.Learn More
Data Center
Network
Evolving technology, consumption models, and technical debt make it difficult to maintain a healthy infrastructure that’s prepared to react to anything. Let NetCraftsmen address these challenges.Learn More
Network
Collaboration
Connect, communicate, and collaborate, regardless of platform. NetCraftsmen can craft solutions offering flexibility and functionality that reduce costs and boost productivity throughout yourorganization.
Learn More
Collaboration
Innovative Technologies NetCraftsmen prides itself on being at the forefront of innovative and emerging technologies. Bring us your difficult challenges and let us put our experts to work.Learn More
Innovative TechnologiesNEWS
News 02 // 09 // 21
NETCRAFTSMEN 2020 YEAR IN REVIEW Clients, Partners, and Friends of NetCraftsmen, Now that we have closed the books on 2020, we wanted to share with you a look back at some of the highlights ofRead More
News 01 // 12 // 21
NETCRAFTSMEN® AND GLUWARE LAUNCH STRATEGIC PARTNERSHIP TO ACCELERATE ADOPTION OF INTELLIGENT NETWORK AUTOMATION NetCraftsmen, LLC today announced that it has launched a strategic partnership with Gluware, Inc., the leading provider of Intelligent Network Automation for global enterprises. As the preferred implementation partner toRead
More
News 12 // 16 // 20
PAUL H. MAURITZ, PRESIDENT AND CEO OF NETCRAFTSMEN, NAMED AMONG THE TOP 25 CYBERSECURITY IT EXECUTIVES OF 2020 NetCraftsmen, LLC, a leading IT consulting and solutions provider, announced today that that the IT Services Report has named Paul H. Mauritz, President and CEO of NetCraftsmen, among the topRead
More
This website uses cookies and other tracking technologies (also known as pixels or beacons) to aid your experience (such as viewing videos), as well as “performance cookies” to analyze your use of this website and to assist with marketing efforts. If you click the "Accept All Cookies" button or continue navigating the website, you agree to having those first and third-party cookies set on your device. If you do not wish to accept cookies from this website, you can choose to not allow cookies from this website by updating your browser preferences. For more information on how we use Cookies, please read our PrivacyPolicy .
ACCEPT COOKIES
Contact Us 888.804.1717 info@NetCraftsmen.com 7134 Columbia Gateway Drive Suite 100 Columbia, MD 21046 Subscribe to ourNewsletter
Company
* About Us
* Team
* Partners
* Careers
* News & Events
Services
* Consulting Projects* Managed Services
* Outsourced IT ServicesTechnologies
* Cloud
* Security
* Network
* Collaboration
* Data Center
* Innovative TechnologiesIndustries
* Healthcare
* Finance
* Energy
* Government
Resources
* Blog – Business
* Blog – Technology* Success Stories
* Library
2021 NetCraftsmen
Privacy Policy
* Linked In
Details
Copyright © 2024 ArchiveBay.com. All rights reserved. Terms of Use | Privacy Policy | DMCA | 2021 | Feedback | Advertising | RSS 2.0