Basic configuration steps of Active/Passive High Availability (NSRP)

The basic configuration steps for the following topology are documented in this solution. Minimum software and hardware requirements for configuring Active/ Passive NSRP: Firewall’s with identical ScreenOS versions and license keys Firewall’s with identical hardware At least one interface on each firewall to be configured in the HA zone, which will be used for carrying […]

Facebook: Supercharging your Apps

Feast your eyes upon our very own infographic, created by our in-house designer extraordinaire James Hollingworth. Here, you’ll discover how Facebook has helped apps grow and develop, and the effect that being on the world’s biggest social platform can have on your own app.

Facebook Vs. Twitter

An example of a statistic type infographic. You may be wondering how one creates infographics. Personally, I don’t have the skills to create nice looking infographics. Thankfully there are many companies and designers that you can outsource it to. In other words, if you can’t do it yourself, get others to do it! Good infographics […]

Why use link aggregation?

Link aggregation protocols overcome spanning tree protocol’s (STP) inherent design to block loops between switches by bundling of ports to appear as one logical connection to STP. With one logical connection, STP will not block the link but forward traffic.  Further the bundling can increase overall bandwidth between the switches. So how do link aggregation […]

Heartbleed – OpenSSL Bug leaves Millions of Devices Vulnerable

But the fight for your privacy isn’t over just yet: you might have to Update your Routers,Firewalls,Servers too. Cisco Systems and other networking product manufacture companies have announced that the Heartbleed bug — a flaw in OpenSSL that lets attackers bypass common security protocols — has been found in their networking products. It is advised to […]

Traffic Sharing and Policing

Crash course in QoS What is traffic shaping/policing? In a nutshell, policing is dropping packets when the traffic exceeds a certain speed threshold, while shaping is queuing the incoming traffic in order to send it at a lower rate. Naturally, shaping is applied to outbound traffic, while policing can be applied on both directions, although […]

Why switch trunk/ tagged ports are used?

Prior to 802.1q, switch vendors used proprietary methods to manage the transfer of VLAN tagged ethernet frames between switches.  These methods added the vlan to the frame  creating a proprietary frame.  Otherwise the other switch would put the frame in the vlan it’s port was configured for. Each switch has the following VLANs configured In the example […]

How to Configure IRF ON HP 5800

This is a quick primer on running IRF on a couple of HP 5800. IRFv2 systems are connected using any 10GbE interface: CX4 SFP+ XFP XENPAK A best practice of connecting IRF members is connecting them in a ring-like fashion. This guarantees that one link failure will not disrupt the stack. For example, if you have […]

What is DHCP Relay/ IP-Helper-Address?

Dynamic Host Configuration Protocol (DHCP) relay is used to forward DHCP client’s broadcast request,DHCP Discover, from one VLAN to the DHCP server’s VLAN.  This request forwarding is done by the local router gateway of the DHCP client. The broadcast is not forwarded by routers, but configured with DHCP relay, the DHCP Discover message is repackaged as unicast to the DHCP […]