Jump to content

SOUTHwarrior

Member
  • Posts

    594
  • Joined

  • Last visited

Awards

This user doesn't have any awards

Contact Methods

  • Steam
    mR_SOUTHwarrior

Profile Information

  • Gender
    Male
  • Location
    In the network
  • Occupation
    Full time student

System

  • CPU
    AMD FX 8320
  • Motherboard
    Gigabyte 990fxa-ud3
  • RAM
    16gb Mushkin silverline
  • GPU
    Gigabyte Windforce R9 280x 3gb rev2.0
  • Case
    Corsair c70
  • Storage
    120gb ssd boot, 1tb and 500gb storage
  • PSU
    Corsiar hx750m
  • Display(s)
    Dual Acer 23in 1920x1080p
  • Cooling
    Air cooled
  • Keyboard
    Razer Nostromo
  • Mouse
    Steel Series Diablo III\Steel series Sensei
  • Sound
    Logitech 5.1 Surround

Recent Profile Visitors

1,283 profile views
  1. Good luck. They definitely made it a bit more difficult with the new revamps. Working on my CCNP now, switch completed, Route and troubleshoot still left to take. You are right on that, My mistake. When I first got into cisco I was always told that was the case with standard ACL's, after that never bothered to mess with them besides redistributing static routes back into a dynamic protocol so never had the need to modify the sequence order, so I didnt bother with them ever again just went straight to extended and never looked back.
  2. Bow to my Internets! Perks of working for a company that lets the network engineers have rack space and a full 1g connection to the core. Sadly though my 3845 will only handle this much throughput. I had an ASAv appliance running I sent my traffic out temporarily and it handled the gigabit connection. Only using it now as a vpn concentrator. I graphed my usage and I never even hit 100mbps like Ever. Usually average around 20 up constant though.
  3. 1-99 are standard acl's. 100-199 are extended. Please for the love of God do not use numbered ACL's. Named are alot easier to manage as well as being able to insert lines in between statements incase you need to modify them in the future. General rule of thumb I go by is set increment the statements by 5. This way if you need to permit something almost identical but with different IP's you can do that and have similar statements in the same general area so its not a nightmare trying to find out which part of the ACL is doing what. With the numbered ones you need to remove the ACL completely if you wish to change one line. Oh dont forget to remove it from the interface before you modify any ACL. You can get locked out very easily if you do not.
  4. I believe the term you are looking for is vlan. VTP is a cisco protocol meant to propagate all your switches with vlan information. so you just need to modify your vtp server switch with the new vlan information and it will distribute to the rest of the switches in the same vtp domain.
  5. I believe the issue you are having is the VPN you are using is a full tunnel VPN. Meaning all your traffic goes through the VPN peer. I doubt any free vpn on the web will give you what you are wanting. Corporate VPN's typicaly have whats called a split tunnel that will make a virtual network adapter on the VPN client side and will have routes for the specific networks you are wanting access to and everything else goes across your local internet connection. I have never had this problem of needing a VPN to the internet, besides some equipment I have in a server rack in a data center which my home firewall handles that traffic, so another forum member might know of some software to where you can specify which network adapter to send which traffic you want.
  6. I hate videos like this. DNS Server has little to no impact on speed. The response time to the dns will only speed up how quick the domain name resolves which isnt very much data to begin with. The only time it might is if the isp's dns servers are being overloaded but if your isp cant handle dns queries for their customers I'd be getting a new ISP. You can only go as fast as the slowest link. If your internet connection is only a few mbps you will only get a few mbps. Back in the day you could get in the firmware of your cable modem and change the rate limit they put on it but im pretty sure they have blocked that finally. That is about the only chance youd have of not having to pay to get a faster connection but its highly illegal and you could get in serious trouble if caught. Option 2 is basically a qos implementation that only allows you to send as fast as your connection is. That is why you set it to your speed you are getting from your provider. You can overload your circuit and slow it down so this one has more credit than just changing the dns.
  7. Topic... Best Wireless router for security.... posts reply. Dont worry I know all about secure things. Sorry I had to, but everybody that has mentioned about disabling wps and using wpa2-aes256 and using a strong password is your best bet for home wireless. You can disable broadcast to keep nosy neighbors from seeing your wireless but anybody that knows about wireless a sniffer will pick up the ssid's still. Personally I use a asus ac56r and it has great range at a decent price. I wish I would have went with the next model up with the 3 antennas but I dont have anything that can connect from that far away so it would have been pointless. On a side note it also has ddns/vpn support so you can have it update a domain name automatically incase your public ip changes and still be able to reach your vpn anytime you need. https://www.asus.com/us/Networking/RTAC56R/
  8. Well for me personally and practices that my company does. I keep a backup of every device that our company manages. IE running configs, system inventory, vlan information. and a visio diagram of every device and what ports/speed they are connected at. You can also have snmp that will send reports about what you set up for it to report back to a central server that will send email alerts based on the severity level of what you want to monitor. We do this in case a device were to fail we can get them back up and running next day as well as having early alerts for potential device failures.
  9. To signup (more for IT professionals and people involved with network operations for companies) https://puck.nether.net/mailman/listinfo/outages Great find. Nice to have being in the field.
  10. Best thing to figure out if you are truly getting ddos'd is to run a packet capture. Run it see what type of requests youre getting on your external network. Theres many many types of ddos attacks that could range from dns to icmp. All of which kill bandwidth just keep a look out for traffic thats all the same that you know isnt yours. Theres really no way to prevent it because itd take forever to track down each IP and block them and by the time you do theres already other new ips that are being used. Id tell your brother to quit being an idiot on the internet and you shouldnt have to worry much more about getting ddos'd. Just my .02
  11. As long as you arent maxing out your bandwidth you shouldnt be running into latency. If you are maxing your bandwidth with Qos something will still have to suffer regardless in terms of latency. Biggest thing you could do is just purchase a faster connection. The reason I say that is the router builds a que with the data you are sending and you classify which type of traffic you want to have higher priority in the que so if you are using that 30 down it wont help any. But as most people have already said you really need to buy a good quality router to help solve your lack of Qos settings, but me personally id buy a bigger pipe before investing in a better router.
  12. I love dream spark. got server 2012 datacenter edition and windows 8.1 for free.
  13. Lol vpn then dos attack. and no anonymous would not bother to ddos some random person. Now you want to talk about DDos attack at work we host some stuff for the state and its been getting ddos'd for three weeks now averaging about 500Mbps up. no way to block it other than increasing bandwidth so it doesnt get starved from legit traffic.
  14. You can build a pfsense box for much, much less. It doesnt need a 300-500$ build to run. The most I would do is a dual core 2 gigs ram and a 250gb hdd. Nothing fancy really it just runs linux as the backend and pfsense is just the interface for it.
×