• The biggest challenge in any phone system is having your customers reach your key employees, despite the employee’s location or telephony device(s) they are using. If you take a quick inventory, you’ll note that most of your employees have an average of three phone numbers by which they can be reached. At one point I …   Read More

  • In our last blog series we discussed multiple access commands that can be configured on a router or a switch. These commands included cosmetic commands such as logging synchronous and exec-timeout that can be configured on the console port. We also discussed configuring security features such as banners that can be used for legal purposes. …   Read More

  • In my last blog I started to explain the exam development process at Microsoft Learning.  I began by asking if you had ever wondered how a Microsoft certification exam comes into being?  Following are steps...

  • Telepresence is a set of technologies that allow video conferencing in such a way that the user feels as if they are actually at the remote site. Cisco sells a variety of platforms in the...

  • Now that we know the basics of standard IP access lists from previous posts, let’s learn some more about them. As our first example, we’ll write an ACL 6 that permits packets sourced by the host with IP address 192.168.100.123, thus: Router(config)#access-list 6 permit 192.168.100.123 We could also do this using a wildcard mask: Router(config)#access-list …   Read More

  • In my last post we discussed basic terminal access. The commands that I reviewed were for accessing the console port or vty lines of a Cisco router or switch. Network administrators should configure banners for legal and liability purposes. Now, we will see how to configure the different types of banners that you can display when a user …   Read More

  • Cisco Switches and Routers running the Internet Operating System (IOS) have many things in common. Configuring these devices of course, is a skill that is sharpened the more you touch the device. During this post,...

  • Found this interesting article from the fine folks at: http://borntolearn.mslearn.net.  Have you ever wondered how a Microsoft certification exam comes into being?  Well, here is part of the exam development process – enough to ignite...

  • Hello fellow techno-thrill-seekers. In my last blog post I discussed the wild ride that technology usually gives us when we try to keep up with the inevitable changes. At this point you have likely already...

  • In ACLs – Part 1 we learned the basics of access lists, including the facts that ACLs: Are created in global config mode End with an implicit “deny any” (which can be overridden) Must be placed into service somewhere to have any effect Thus, the commands: Router#conf t Router(config)#access-list 3 deny 172.16.1.1 Router(config)#access-list 3 deny …   Read More