Thursday, December 25, 2008

Visualizing mpeg4 motion compensation vectors using mplayer

Visualizing mpeg4 motion compensation vectors using mplayer
The MPEG4 video encoding process makes use of block motion compensation to achieve compression. The motion compensation process serves to produce the intra frames which are the frames between keyframes. I’ve always been fascinated by this process and was delighted to find out that my favorite video player, mplayer, allows one to visualize this process.

mplayer -lavdopts vismv=1 -vo x11 motion_vector_video.avi

Wednesday, December 24, 2008

Set Up a Web-Based Desktop with EyeOS

While there are several web desktops available these days, the free and open source EyeOS application is the most accessible, useful, and promising one out there. Follow along to see what a web-based desktop looks like, and how it can help you get things done when you're locked down or out of pocket.

read more | digg story

Ken Block - Subaru STI Gymkhana Practice

Wednesday, October 15, 2008

First benchmarks of the ext4 file system

Even though the ext4 file system is still in the early stages of development, it's already showing better performance under some workloads. ReiserFS 4 is also a nice surprise. And both are running stable for development file systems.

read more | digg story

Monday, September 15, 2008

Erfunden im Krieg (Moderne Wunder)

Erfunden im Krieg
Haben Sie heute Morgen, als Sie sich fertig gemacht haben, um zur Arbeit zu gehen, einen Moment innegehalten und nachgedacht, wie stark Ihr Leben bisher von Krieg beeinflusst wurde Aller Wahrscheinlichkeit nach nicht. Die USA waren seit über 50 Jahren nicht mehr in einen Weltkrieg verwickelt. Dennoch haben unzählige Dinge des täglichen Gebrauchs ihren Ursprung in Erfindungen, die ursprünglich für kriegerische Einsätze vorgesehen waren - von Haarbürsten bis hin zur Mikrowelle. Auf der einen Seite bringt Krieg schreckliche Massaker, Krankheiten und Leiden. Auf der anderen Seite hat er einige der größten Erfindungen ermöglicht, die die Welt je gesehen hat. Forschungs- und Entwicklungsarbeit für Rüstungszwecke hat nicht nur das Kommunikations- und Transportwesen, sondern auch die Medizin revolutioniert. Sie hat Erfindungen hervorgebracht, die der Menschheit zugute kommen und sich für den alltäglichen Gebrauch eignen. In Kriegszeiten ziehen alle an einem Strang und arbeiten auf ein gemeinsames Ziel hin, wissenschaftliche Ziele stehen über Konkurrenzdenken, und finanzielle Mittel und Personal stehen in Hülle und Fülle zur Verfügung. Einige Erfindungen werden aus der Not geboren, wie beispielweise Margerine aufgrund der Nahrungsmittelknappheit an der Heimatfront. Einige stammen direkt von zerstörenden Waffensystemen ab (Atomkraft), andere wiederum von Verteidigungstechnik (Mikrowelle). Die Ironie des Krieges ist, dass die gleiche Wissenschaft, die zum Töten Abertausender von Menschen erfunden wurde, heute eingesetzt wird, um Leben zu retten. Vom Handy bis zum Haarspray - der Bezug zum Krieg ist in unserem täglichen Leben allgegenwärtig. ‘Erfunden im Krieg’ verfolgt einen Tag im Leben einer ganz normalen Frau und untersucht, inwieweit ihr Leben von Kriegserfindungen beeinflusst wird.


Erfunden im Krieg

Encrypt your web browsing session (with an SSH SOCKS proxy)

Using a simple SSH command, you can encrypt all your web browsing traffic and redirect it through a trusted computer when you're on someone else's network. Today we'll set up a local proxy server that encrypts your online activity from your Mac, PC or Linux desktop.

read more | digg story

Monday, September 8, 2008

23+ Tools for Faster Javascript/Ajax Development

A wide range of tools and applications that could really help you build, test and debug Javascript and Ajax applications.

read more | digg story

51+ Best of jQuery Tutorials and Examples

There’s stuff all over the Web about jQuery, but finding the best tutorials to get you started can be tough. Here are Examples and tutorials from jQuery masters to keep you on the right track.

read more | digg story

Thursday, August 28, 2008

Javascript online massive social password cracking ?

What about a javascript online massive social password cracking ?

read more | digg story

Tuesday, August 19, 2008

Creating accessible charts using canvas and jQuery

Data visualization in HTML has long been tricky to achieve. Past solutions have involved non-standard plugins, proprietary behavior, and static images. But this has changed with the recent growth...

read more | digg story

Wednesday, August 13, 2008

Creating accessible charts using canvas and jQuery

Data visualization in HTML has long been tricky to achieve. Past solutions have involved non-standard plugins, proprietary behavior, and static images. But this has changed with the recent growth...

read more | digg story

Monday, August 4, 2008

Creating accessible charts using canvas and jQuery

Data visualization in HTML has long been tricky to achieve. Past solutions have involved non-standard plugins, proprietary behavior, and static images. But this has changed with the recent growth...

read more | digg story

Sunday, August 3, 2008

Ext3, ReiserFS & XFS in Windows thanks to coLinux

If you ever: needed to access your ext3, reiserfs or XFS partitions from Windows, wanted to use one of your favorite file systems via FUSE, or had an idea to mount an image of your hard drive, then this article is for you. This is a how-to, describing what to do, if you want Windows to handle file systems in a similar way as Linux does.

read more | digg story

College Teacher Shows Students How To Be Hackers

In a windowless underground computer lab in California, young men are busy cooking up viruses, spam and other plagues of the computer age. Grant Joy runs a program that surreptitiously records every keystroke on his machine, including user names, passwords, and credit-card numbers.

read more | digg story

Biggest Military Hack of All Time Was Done With a 56k Modem

Gary McKinnon, a British computer expert, claims he's just fascinated with UFOs. Using his home computer and a modem — how WarGames! — he infiltrated military networks and accessed thousands of computers trying to find evidence of alien contact

read more | digg story

Saturday, August 2, 2008

New 3.2Gbps FireWire spec approved, not as fast as USB 3.0

The IEEE 1394 working group has formally approved FireWire's next-generation standard. The new version defines transfer speeds of 1.6Gbps and 3.2Gbps, is backwards compatible with FireWire 800 and 400, and uses the same cable standard as FireWire 800.

read more | digg story

Wednesday, July 30, 2008

Ex-Google engineers debut 'Cuil' way to search

Anna Patterson's last Internet search engine was so impressive that industry leader Google Inc. bought the technology in 2004 to upgrade its own system. She believes her latest invention is even more valuable - only this time it's not for sale.

read more | digg story

Monday, July 28, 2008

Five Best Alternative File Managers

If you're any sort of power user, you've bumped up against the limitations of your operating system's default file manager on countless occasions.

read more | digg story

10 Revolutionary Computers

Despite appearances, today's online world did not spring to life fully formed. Before they were made a major part of our lives, some pioneering computers either had to capture the public's imagination, establish what could be done by computers, or both. Here, we'll look at some computers that played, and sometimes continue to play, a major role.

read more | digg story

Sunday, July 6, 2008

Protect Your Privacy While Downloading

Earlier this week, a Lifehacker reader caught downloading copyrighted material using BitTorrent told us about the scary warning letter she received from her ISP about a big media company who filed a complaint.

read more | digg story

Wednesday, July 2, 2008

Turn Your $60 Router into a Super-Router with Tomato

Since last year there's been a lot of development of open source firmwares, and today we're taking a look at my new favorite, a firmware called Tomato. It does almost everything you expect, from Wi-Fi signal boosting to Quality of Service bandwidth allocation, in addition to offering a simplified interface chock full of fancy charts and graphs

read more | digg story

Friday, June 20, 2008

Display BGP routes originated in the local AS

The easiest way to display BGP routes originating in the local autonomous system is to use the regular expression ^$ (empty AS-path) in the show ip bgp regexp command, for example:

PE-A#show ip bgp regexp ^$
BGP table version is 10, local
router ID is 10.0.1.1
Status codes: s suppressed, d damped, h history,
* valid, > best, i - internal,
r RIB-failure, S
Stale
Origin codes: i - IGP, e - EGP, ? - incomplete

Network
Next Hop Metric LocPrf Weight Path
*> 10.0.1.1/32
0.0.0.0 0 32768 i
r>i10.0.1.2/32
10.0.1.2 0 100 0 i

If you want to apply a show filter to the printout of this command, you have to use the quote-regexp variant; otherwise the rest of the line is interpreted as regular expression. To skip the header explaining the BGP status code (we know them by heart by now, don’t we?), use …

PE-A#show ip bgp
quote-re
gexp "^$" begin Network

Network Next Hop Metric LocPrf Weight Path
*>
10.0.1.1/32 0.0.0.0 0 32768
i
r>i10.0.1.2/32 10.0.1.2 0 100 0
i

… and end with the eye candy – define this command as an alias: alias exec localbgp show ip bgp quote-regexp "^$" begin Network.

Use the explicit "address-family ipv4" in BGP configurations

If you use multiprotocol BGP (MP-BGP) in your network to support MPLS VPN, IPv6 or IP Multicast over BGP, it's best if you go all the way and configure an explicit ipv4 address family; the resulting BGP configuration is significantly easier to read and understand as the session-specific parameters are clearly separated from the routing-specific parameters and the IPv4 settings are nicely grouped in an explicit section.
To change the format of the BGP configuration, configure the IPv4 address family with the address-family ipv4 unicast router configuration command (the neighbor statements and other configuration settings pertinent to IPv4 configuration are automatically moved into the new address family) or manually activate a BGP neighbor for IPv4 route exchange with the neighbor activate router configuration command.To illustrate the differences between the traditional BGP configuration and the per-address-family configuration, consider a simple MPLS VPN+Internet setup. First the traditional approach:

router bgp 65000
template peer-policy Internal

send-community both
exit-peer-policy
!
template peer-session
Internal
remote-as 65000
update-source Loopback0

exit-peer-session
!
no synchronization
bgp
log-neighbor-changes
network 10.0.1.1 mask 255.255.255.255

neighbor 10.0.1.5 inherit peer-session Internal
neighbor 10.0.1.5
description PE-C(RR)
neighbor 10.0.1.5 inherit peer-policy
Internal
no auto-summary
!
address-family vpnv4
neighbor
10.0.1.5 activate
neighbor 10.0.1.5 send-community extended

exit-address-family

... and the changed configuration after the address-family ipv4 command has been entered:

router bgp
65000
template peer-policy Internal
send-community both

exit-peer-policy
!
template peer-policy InternalV6

send-label
inherit peer-policy Internal 1
exit-peer-policy

!
template peer-session Internal
remote-as 65000

update-source Loopback0
exit-peer-session
!
bgp
log-neighbor-changes
neighbor 10.0.1.5 inherit peer-session
Internal
neighbor 10.0.1.5 description PE-C(RR)
!

address-family ipv4
no synchronization
network 10.0.1.1 mask
255.255.255.255
neighbor 10.0.1.5 activate
neighbor 10.0.1.5
inherit peer-policy Internal
no auto-summary

exit-address-family
!
address-family vpnv4
neighbor 10.0.1.5
activate
neighbor 10.0.1.5 send-community extended

exit-address-family

Monday, June 2, 2008

Simple CSS vertical menu Digg-like

This tutorial explains how to implement a simple vertical menu digg-like using CSS and javascript to show/hide sub-menu.

read more digg story

Thursday, May 22, 2008

Javascript Wolfenstein 3D

Yet an excellent demo of what can be done with canvas in javascript.

read more digg story

Saturday, May 17, 2008

PartnerBar: Google's feed aggregating magic javascript widget thingy

I was browsing the Google AJAX Search API blog recently when I discovered they were using an interesting widget at the bottom of the page, it turned out to be PartnerBar. PartnerBar was created as an example for the Google AJAX Feed API. I have been very busy with family stuff recently so I managed to completely miss this when news of it first broke in December (Ajax Feed Partner Bar and The PartnerBar - Contextual Cross Linking). In my defence this is easy to miss, it is called "PartnerBar", which means nothing to anybody on this side of the pond and the launch article talks about "contextual cross linking" (meaningless technobabble!). Essentially, PartnerBar is a feed aggregating magic javascript widget thingy, if it had been launched as such I would have spotted it sooner.

AnywayI have been playing with it recently and have made some minor tweaks to improve it for my own usage, I'm very happy with the results. I can't decide whether to install the resulting widget permanently on my blog because I think people would find it annoying if I were to place it somewhere prominent.

My tweaks and modifications
Feed titles and links.

In the instance of PartnerBar on their blog, Google store an array of their blogs in a JavaScript file: http://www.google.com/uds/solutions/partnerbar/google-blogs.js.

Incidentally, notice how it supports tags so that you can use the same array for multiple widgets with distinct content.

My first modification was to tweak the code so that I did not have to supply the feed name and link, this information is stored in the feed (why store it twice?). To achieve this I overrode the loadPartner method - I think the trick with overriding methods in JavaScript is to make sure the method you override is a small one!

My array of blogs looks like this: blogs.js

Alternating row colours

Secondly, I wanted the feed entries to display in alternating colours. Again, I found a small JavaScript method in PartnerBar (resetClassOnPartnerDom) and overrode it (AFAIK there is no "super" keyword in JavaScript, which is a shame). In order to do this I made use of a getElementsByClassName method that I found on the web.

Final result

You should be able to see the widget in action at the top of this blog entry. However, you can link out to see the final result in standalone glory here.

Hereis my final JavaScript which my customised widget uses: partnerBar.js.

Design

Although I suffer with CSS, I am not a graphic designer and so I tend to steal gather inspiration from elsewhere. I based my widget on the Infected table theme from the CSS table gallery.

Monday, April 28, 2008

Die Pornografinnen - DVD-Forum.at - Das Entertainment Magazin

Die Pornografinnen - DVD-Forum.at - Das Entertainment Magazin

Die Pornografinnen
ARTE, Donnerstag, 27. März 2008 um 23.15 Uhr
VPS : 23.15
Wiederholungen : 30.03.2008 um 01:55 05.04.2008 um 03:50
Die Pornografinnen (Dänemark, 2005, 50mn)
ZDF
Regie: Marita Neher

Pornografie galt lange Zeit als Domäne der Männer. Frauen waren in diesem Genre nur als Objekte männlicher Begierden anzutreffen. Doch heute werden pornografische Filme, Bilder, Texte, Comics und Performances immer häufiger auch von Frauen produziert. Die Dokumentation spürt dem wachsenden Selbstverständnis nach, mit dem Frauen ihre sexuellen Fantasien und Bedürfnisse in erotischen Werken umsetzen.Nach einer weit verbreiteten Meinung werden Pornos vor allem von Männern konsumiert, nicht nur weil sie speziell für die männlichen Fantasien zugeschnitten sind, sondern weil Frauen angeblich keine entsprechenden Bedürfnisse haben. Folglich war der Pornomarkt lange Zeit ein von Männern dominierter Markt und Pornografie für viele ein Synonym für Frauenfeindlichkeit.Heute werden pornografische und erotische Werke - Filme, Texte, Fotografien, Bilder, Comics und Performances - in zunehmendem Maße auch von Frauen produziert. Es scheint, als ob Frauen nicht nur zu einem selbstverständlicheren Umgang mit Pornografie finden, sondern dabei sind, sich dieses Genre anzueignen, um ihre eigenen sexuellen Fantasien darzustellen. Welche Bilder brauchen Frauen, wenn sie sich von Pornografie erregen lassen wollen, und inwieweit unterscheiden sich von Frauen kreierte Bilder und Texte von denen männlicher Produzenten?Pornodarstellerin und -produzentin Ovidie, Fotografin Natascha Merritt, Verlegerin Claudia Gehrke, Pornoregisseurin Petra Joy sowie Elke Kuhlen und Nicole Rüdiger, Herausgeberinnen von "Glück", einem Pornoheft für Mädchen, ließen sich bei ihrer aktuellen Arbeit von der Kamera begleiten. Sie erklären, nach welchen Regeln ihrer Meinung nach Erotik und Pornografie für Frauen funktionieren. Mit Humor und Selbstironie beschreiben sie ihre sexuellen Fantasien, ihre immer noch schwierige Rolle in der Gesellschaft und die kleinen Tricks, mit denen Sexualität auf der Leinwand "echt" aussieht.Senderinfo

Erfolgsgeschichte Mobiltelefon

Erfolgsgeschichte Mobiltelefon
Schon auf der Weltausstellung 1939 in New York wurde das Konzept des Mobiltelefons im Futurama Pavillon vorgestellt. Im Zweiten Weltkrieg kommunizierten amerikanische Soldaten mobil mit Motorola Walkie Talkies. Doch es dauerte noch über 30 Jahre bis es 1973 zum legendären ersten mobilen Telefongespräch zwischen Managern von Motorola und AT&T kam. Wie sah die Entwicklung des Mobiltelefons zur Marktreife aus? Welche technischen und politischen Hürden mussten genommen werden? Die DISCOVERY CHANNEL-Dokumentation ‘Erfolgsgeschichte Mobiltelefon’ erzählt die Produktgeschichte des Mobiltelefons spannend wie ein Krimi, berichtet von Höhen und Tiefen einer technischen Revolution, die die Welt verändert hat. Bis heute wurden 2 Milliarden Mobiltelefone weltweit verkauft.

Charts And Graphs: Modern Solutions

This article presents an overview of tools, applications and techniques for visualizing data in charts and graphs. Among other things both free and commercial chart tools, services, desktop-applications and web-based solutions (Flash, JavaScript, CSS) — you can use them on your server are presented.

read more digg story

Monday, April 21, 2008

Quick Vista Hack to Get You Browsing at High-Speed Again

Maybe a way to improve vista browsing speeds online.

read more digg story

Friday, April 18, 2008

BGP

BGP

Friday, April 11, 2008

IEEE 802.1X for Wired Networks and IPSec with Microsoft Windows XP / 2003 (Microsoft Whitepaper)

IEEE 802.1X for Wired Networks and Internet Protocol Security with Microsoft Windows (Microsoft Whitepaper)


This white paper examines and compared 802.1X for wired networks and IPsec.


Download:


8021X_IPsec.doc, 2/6/2008, version 1.1




Overview:


Microsoft Windows Server 2003 and Windows XP support both the IEEE 802.1X standard for wired networks and the Internet Protocol security (IPsec) Internet standard. The IEEE 802.1X standard for wired networks provides authentication and authorization protection at the network edge where a host attaches to the network. IPsec provides peer authentication and cryptographic protection of IP traffic from end-to-end. This white paper describes the security and capabilities of 802.1X for wired networks and IPsec based on industry standards and their support in Windows Server 2003 and Windows XP, and provides comparison information when evaluating deployment of these security technologies.




related resources @ Microsoft


IPsec Web site


Network Access Protection Web site


Extensible Authentication Protocol Web site


Deployment of IEEE 802.1X for Wired Networks Using Microsoft Windows




see also:


Step-by-Step Guide: Demonstrate NAP IPsec Enforcement in a Test Lab

Stateful Failover for IPSec (Cisco Systems)

Stateful Failover for IPSec (Cisco Systems)


Stateful failover for IP Security (IPSec) enables a router to continue processing and forwarding IPSec packets after a planned or unplanned outage occurs. Customers employ a backup (secondary) router that automatically takes over the tasks of the active (primary) router if the active router loses connectivity for any reason. This process is transparent to the user and does not require adjustment or reconfiguration of any remote peer.


Stateful failover for IPSec is designed to work in conjunction with stateful switchover (SSO) and Hot Standby Routing Protocol (HSRP). HSRP provides network redundancy for IP networks, ensuring that user traffic immediately and transparently recovers from failures in network edge devices or access circuits. That is, HSRP monitors both the inside and outside interfaces so that if either interface goes down, the whole router is deemed to be down and ownership of Internet Key Exchange (IKE) and IPSec security associations (SAs) is passed to the standby router (which transitions to the HSRP active state). SSO allows the active and standby routers to share IKE and IPSec state information so that each router has enough information to become the active router at any time. To configure stateful failover for IPSec, a network administrator should enable HSRP, assign a virtual IP address, and enable the SSO protocol.




Downloads:


Stateful Failover for IPSec (pdf)

Thursday, April 10, 2008

Super Mario in 14kb Javascript

FTA "Here's an experiment in keepings things small and confined to one Javascript file."gotta love it.

read more digg story

Tuesday, April 8, 2008

Anyterm - A Terminal Emulator in your browser

Anyterm is a AJAX implementation of a terminal emulator, using the ROTE terminal emulator library. It works through an Apache module and a javascript display library, and is configurable by way of an htaccess file.

read more digg story

Wednesday, April 2, 2008

Cisco Press - ebooks

Cisco Press
11.Cisco.Press.Securing.Your.Business.with.Cisco.ASA.and.PIX.Firewalls.May.2005.eBook-DDU
18.Cisco.Press.Business.Case.for.Network.Security.Dec.2004.eBook-LiB
24.Cisco.Press.End.to.End.QoS.Network.Design.Quality.of.Service.in.LANs.WANs.and.VPNs.Nov.2004.eBook
Charles.River.Media,.Cisco.IP.Routing.Protocols.Troubleshooting.Techniques.(2004).LiB
Cisco.Press,.CCNA.Portable.Command.Guide.(2005).BBL.LotB
Cisco.Press,.CCNP.Self-Study.CCNP.Practical.Studies.Switching.(2003).(INTERNAL).BBL.LotB
Cisco.Press,.Cisco.Field.Manual.Catalyst.Switch.Configuration.(2002).(INTERNAL).BBL.LotB
Cisco.Press,.Cisco.Router.Firewall.Security.(2004).DDU
Cisco.Press,.Cisco.Wireless.LAN.Security.(2004).DDU
Cisco.Press,.Computer.Networking.First.Step.(2004).(INTERNAL).BBL.LotB
Cisco.Press,.Deploying.IPv6.Networks.(2006).BBL
Cisco.Press,.Designing.Network.Security.(2003),.2Ed.BBL.(INTERNAL)
Cisco.Press,.Home.Network.Security.Simplified.(2006)
Cisco.Press,.Home.Networking.A.Visual.Do.It.Yourself.Guide.(2004).DDU
Cisco.Press,.Integrated.Cisco.and.UNIX.Network.Architectures.(2004).DDU
Cisco.Press,.Network.Administrators.Survival.Guide.(2005).DDU.LotB
Cisco.Press,.Next-Generation.Network.Services.(2005).BBL.LotB
Cisco.Press,.Optical.Network.Design.and.Implementation.(2004).DDU
Cisco.Press,.Routing.First-Step.(2004).DDU
Cisco.Press.802.11.Wireless.LAN.Fundamentals.eBook-LiB
Cisco.Press.Authorized.Self.Study.Guide.Cisco.Voice.over.IP.CVoice.2nd.Edition.Sep.2006
Cisco.Press.Build.the.Best.Data.Center.Facility.for.Your.Business.Jun.2005.eBook-DDU
Cisco.Press.CCIE.Practical.Studies.Volume.I
Cisco.Press.CCIE.Professional.Development.Cisco.LAN.Switching
Cisco.Press.CCIE.Security.Exam.Certification.Guide.CCIE.Self.Study.2nd.Edition.May.2005.eBook-LiB(1)
Cisco.Press.CCIE.Security.Exam.Certification.Guide.CCIE.Self.Study.2nd.Edition.May.2005.eBook-LiB
Cisco.Press.CCNP.BSCI.Exam.Certification.Guide.Third.Edition.Nov.2003.eBook-DDU
Cisco.Press.Cisco.802.11.Wireless.Networking.Quick.Reference.Oct.2005
Cisco.Press.Cisco.CallManager.Fundamentals.A.Cisco.AVVID.Solution.2nd.Edition.Sep.2005.eBook-DDU
Cisco.Press.Cisco.Field.Manual.Router.Configuration
Cisco.Press.Cisco.Frame.Relay.Solutions.Guide.spy(1)
Cisco.Press.Cisco.Frame.Relay.Solutions.Guide.spy
Cisco.Press.Cisco.LAN.Switching.Fundamentals.Jul.2004.eBook-DDU
Cisco.Press.Cisco.Voice.Gateways.and.Gatekeepers.Aug.2006
Cisco.Press.Comparing.Designing.and.Deploying.VPNs.Apr.2006
Cisco.Press.Configuring.CallManager.and.Unity.A.Step.by.Step.Guide.Jun.2005.eBook-BBL
Cisco.Press.Content.Networking.Fundamentals.Mar.2006
Cisco.Press.End.to.End.QoS.Network.Design.Quality.of.Service.in.LANs.WANs.and.VPNs.Nov.2004.eBook
Cisco.Press.Firewall.Fundamentals.Jun.2006
Cisco.Press.IPSec.VPN.Design.Apr.2005.ISBN1587051117
Cisco.Press.Intrusion.Prevention.Fundamentals.Jan.2006
Cisco.Press.LAN.Switching.First-Step.Jul.2004.eBook-DDU
Cisco.Press.MPLS.and.Next.Generation.Networks.Nov.2006
Cisco.Press.Optimal.Routing.Design.Jun.2005.eBook-DDU
Cisco.Press.QoS.for.IP.MPLS.Networks.Jun.2006
Cisco.Press.Routing.TCP.IP.Volume.1.2nd.Edition.Oct.2005(1)
Cisco.Press.Routing.TCP.IP.Volume.1.2nd.Edition.Oct.2005
Cisco.Press.Securing.Your.Business.with.Cisco.ASA.and.PIX.Firewalls.May.2005.eBook
Cisco.Press.Self.Defending.Networks.The.Next.Generation.of.Network.Security.Aug.2006
Cisco.Press.Storage.Networking.Fundamentals
Cisco.Press.TCP.IP.First.Step.Dec.2004.eBook-LiB
Cisco.Press.Taking.Charge.of.Your.VoIP.Project
Cisco.Press.The.Business.Case.for.Storage.Networks.Oct.2004.eBook-LiB
Cisco.Press.Troubleshooting.Remote.Access.Networks.Nov.2002.INTERNAL
Cisco.Press.Voice.over.IP.First.Step.Dec.2005
MH,.Cisco.A.Beginners.Guide.(2006),.4Ed.BBL.[0072263830]
Mobile IP Technology and Applications (2005) Cisco
O'Reilly,.Cisco.Cookbook.(2003)
OReilly,.Cisco.IOS.in.a.Nutshell.(2005),.2Ed.BBL.LotB
ReallyUsefulEbooks.com_0596527225_OReilly.Cisco.IOS.Cookbook.2nd.Edition.Dec.2006.eBook-BBL
Securing Your Business With Cisco Asa And Pix Firewalls (2005) Cisco
Syngress.Cisco.Security.Professionals.Guide.To.Secure.Intrusion.Detection.Systems.eBook-LiB
cisco.press.cisco.callmanager.best.practices.a.cisco.avvid.solution.jun.2004.ebook-ddu

Tuesday, April 1, 2008

Cisco Press eBooks list

Cisco Press eBooks

CCIE Routing and Switching

Certifies expert-level knowledge of networking across various LAN and WAN interfaces, and a variety of routers and switches.

CCIE Security

Certifies expertise with specific security protocols and components, as well as IP and IP routing.

Friday, March 28, 2008

Create Your Own BitTorrent Blog With Diferior

Diferior makes it easy for everyone to start a BitTorrent or filesharing community, and more. It is easy to customize and can be used as a blog, a forum, a simple http downloads system, a public or private BitTorrent tracker, or all of these features at once.

read more digg story

HOWTO: Set up a Windows SSH server for VNC tunneling

This will walk you through the steps to set up an SSH server so you can securely use VNC to remotely log into your computer.

read more digg story

Set up a personal, home SSH server

It's simple to set up an SSH server right on your Windows PC with Cygwin (and even simpler on your Mac). Once your personal SSH server is up and running, you can connect to your home computer securely from anywhere on the internet, up and download files and perform all the command line tasks your heart desires. Here's how.

read more digg story

Encrypt your web browsing session (with an SSH SOCKS proxy)

Using a simple SSH command, you can encrypt all your web browsing traffic and redirect it through a trusted computer when you're on someone else's network. Today we'll set up a local proxy server that encrypts your online activity from your Mac, PC or Linux desktop.

read more digg story

Protect Your Privacy While Downloading

Earlier this week, a Lifehacker reader caught downloading copyrighted material using BitTorrent told us about the scary warning letter she received from her ISP about a big media company who filed a complaint.

read more digg story

Thursday, March 27, 2008

Google Chart GUI : Chart Generator

This is a GUI for the recently released Google Chart API

read more digg story

Friday, March 21, 2008

Filtered Index Design Guidelines (MSDN, SQL Server 2008)

Filtered Index Design Guidelines (SQL Server 2008, MSDN)

A filtered index is an optimized nonclustered index, especially suited to cover queries that select from a well-defined subset of data. It uses a filter predicate to index a portion of rows in the table. A well-designed filtered index can improve query performance, reduce index maintenance costs, and reduce index storage costs compared with full-table indexes.

Filtered indexes can provide the following advantages over full-table indexes:

  • Improved query performance and plan quality
    A well-designed filtered index improves query performance and execution plan quality because it is smaller than a full-table nonclustered index and has filtered statistics. The filtered statistics are more accurate than full-table statistics because they cover only the rows in the filtered index.
  • Reduced index maintenance costs
    An index is maintained only when data manipulation language (DML) statements affect the data in the index. A filtered index reduces index maintenance costs compared with a full-table nonclustered index because it is smaller and is only maintained when the data in the index is affected. It is possible to have a large number of filtered indexes, especially when they contain data that is affected infrequently. Similarly, if a filtered index contains only the frequently affected data, the smaller size of the index reduces the cost of updating the statistics.
  • Reduced index storage costs
    Creating a filtered index can reduce disk storage for nonclustered indexes when a full-table index is not necessary. You can replace a full-table nonclustered index with multiple filtered indexes without significantly increasing the storage requirements.

Das Gute, das der Mensch in dieser Welt schafft, ist sein wirklicher Reichtum.

Das Gute, das der Mensch in dieser Welt schafft, ist sein wirklicher Reichtum.
- Sprichwort

In der Krise beweist sich der Charakter.

In der Krise beweist sich der Charakter.
- Helmut Schmidt

Schweigen ist ein Argument, das kaum zu widerlegen ist.

Schweigen ist ein Argument, das kaum zu widerlegen ist.
- Heinrich Böll

Zukunftsangst haben ist, wie wenn man kratzt bevor es juckt!

Zukunftsangst haben ist, wie wenn man kratzt bevor es juckt!
- Sprichwort

Willst du den Charakter eines Menschen erkennen, so gib ihm Macht.

Willst du den Charakter eines Menschen erkennen, so gib ihm Macht.
- Abraham Lincoln

Auf zweierlei sollte man sich nie verlassen: Wenn man Böses tut, dass es verborgen bleibt; wenn man Gutes tut, dass es bemerkt wird.

Auf zweierlei sollte man sich nie verlassen: Wenn man Böses tut, dass es verborgen bleibt; wenn man Gutes tut, dass es bemerkt wird.
- Ludwig Fulda

Wer zur Quelle will, muss gegen den Strom schwimmen.

Wer zur Quelle will, muss gegen den Strom schwimmen.
- Hermann Hesse

Irrtümer gibt es hier und da.Nicht jeder, der nach Indien fährt, entdeckt Amerika.

Irrtümer gibt es hier und da.Nicht jeder, der nach Indien fährt, entdeckt Amerika.
- Joachim Ringelnatz

Wer glaubt, etwas zu sein, hat aufgehört, etwas zu werden.

Wer glaubt, etwas zu sein, hat aufgehört, etwas zu werden.
- Philip Rosenthal

Was man mit Gewalt gewinnt, kann man nur mit Gewalt behalten.

Was man mit Gewalt gewinnt, kann man nur mit Gewalt behalten.
- Mahatma Gandhi

Der beste Weg einen schlechten Vorschlag vom Tisch zu wischen besteht darin einen Besseren zu machen.

Der beste Weg einen schlechten Vorschlag vom Tisch zu wischen besteht darin einen Besseren zu machen.
- Sprichwort

Wer glaubt, ein Christ zu sein, weil er die Kirche besucht, irrt sich. Man wird ja auch kein Auto, wenn man in eine Garage geht.

Wer glaubt, ein Christ zu sein, weil er die Kirche besucht, irrt sich. Man wird ja auch kein Auto, wenn man in eine Garage geht.
- Albert Schweitzer

Wer kämpft, kann verlieren. Wer nicht kämpft, hat schon verloren.

Wer kämpft, kann verlieren. Wer nicht kämpft, hat schon verloren.
- Bertolt Brecht

Ein goldener Sattel macht einen Esel noch lange nicht zum Pferd.

Ein goldener Sattel macht einen Esel noch lange nicht zum Pferd.
- Arabisches Sprichwort

Hoffnung ist ein gutes Frühstück - aber ein schlechtes Abendessen.

Hoffnung ist ein gutes Frühstück - aber ein schlechtes Abendessen.
- Francis Bacon

Statt zu klagen, dass wir nicht alles haben, was wir wollen, sollten wir lieber dankbar sein, dass wir nicht alles bekommen, was wir verdienen.

Statt zu klagen, dass wir nicht alles haben, was wir wollen, sollten wir lieber dankbar sein, dass wir nicht alles bekommen, was wir verdienen.
- Dieter Hildebrandt

Man muss das Unmögliche versuchen, um das Mögliche zu erreichen.

Man muss das Unmögliche versuchen, um das Mögliche zu erreichen.
- Herman Hesse

Es ist nicht wenig Zeit, die wir haben, sondern viel Zeit, die wir nicht nutzen.

Es ist nicht wenig Zeit, die wir haben, sondern viel Zeit, die wir nicht nutzen.
- Lucius Annaeus Seneca

Vergib deinen Feinden, aber vergiss niemals ihre Namen.

Vergib deinen Feinden, aber vergiss niemals ihre Namen.
- John F. Kennedy

Jeder Fehler erscheint unglaublich dumm, wenn andere ihn begehen.

Jeder Fehler erscheint unglaublich dumm, wenn andere ihn begehen.
- Georg Christoph Lichtenberg

Der erste Trunk aus dem Becher der Naturwissenschaften macht atheistisch, aber auf dem Grund des Bechers wartet Gott.

Der erste Trunk aus dem Becher der Naturwissenschaften macht atheistisch, aber auf dem Grund des Bechers wartet Gott.
- Werner Heisenberg

Mitleid bekommt man geschenkt, Neid muss man sich verdienen.

Mitleid bekommt man geschenkt, Neid muss man sich verdienen.
- Robert Lembke

Trinke nie zuviel, denn die letzte Flasche, die umfällt, könntest du selber sein.

Trinke nie zuviel, denn die letzte Flasche, die umfällt, könntest du selber sein.
- Heinz Schenk

Ein wahrhaft großer Mann wird weder einen Wurm zertreten, noch vor dem Kaiser kriechen.

Ein wahrhaft großer Mann wird weder einen Wurm zertreten, noch vor dem Kaiser kriechen.
- Benjamin Franklin

Man muss das Unmögliche versuchen, um das Mögliche zu erreichen.

Man muss das Unmögliche versuchen, um das Mögliche zu erreichen.
- Herman Hesse

Statt zu klagen, dass wir nicht alles haben, was wir wollen, sollten wir lieber dankbar sein, dass wir nicht alles bekommen, was wir verdienen.

Statt zu klagen, dass wir nicht alles haben, was wir wollen, sollten wir lieber dankbar sein, dass wir nicht alles bekommen, was wir verdienen.
- Dieter Hildebrandt

Es gehört mehr Mut dazu seine Meinung zu ...

„Es gehört mehr Mut dazu seine Meinung zu ändern, als ihr treu zu bleiben.“
Friedrich Hebbel

Sage nicht immer, was Du weißt, aber wisse immer, was Du sagst.

Sage nicht immer, was Du weißt, aber wisse immer, was Du sagst.
- Matthias Claudius

Wednesday, March 12, 2008

How to Save and Monitor Bandwidth when using Firefox

These days, though internet connection speeds have advanced, there are people out there who are using limited connection that come with a monthly bandwidth cap. In such cases when the user goes over the limit for that time period, he is usually surprised with a hefty bill at the end of the month.

read more | digg story

Saturday, March 8, 2008

Google Chart GUI : Chart Generator

This is a GUI for the recently released Google Chart API

read more | digg story

Sunday, February 24, 2008

Configuring Sinkholes (Cisco Systems)

Worm Mitigation Technical Details - Cisco Systems

Sinkholes
A sinkhole is a multifaceted security tool-essentially, a portion of the network that is designed to accept and analyze attack traffic. Sinkholes were originally used by ISPs to engulf attack traffic, in many cases drawing attacks away from a customer or other target. In more recent times, sinkholes have been used in enterprise environments to monitor attacks, detect scanning activity from infected machines, and generally monitor for other malicious activity.
This document illustrates how a sinkhole can be used in diverting attack traffic, monitoring for worm propagation, and monitoring other potentially malicious traffic.
Traditional Sinkhole - Diverting Attack Traffic
In the first sinkhole application, a publicly accessible Web server is the target of either a DoS or DDoS attack. Figure 1 illustrates how server WWW1 is unavailable due to the attack. Additionally, the extremely high traffic volume has saturated links and routers, making server WWW2 unavailable as well.


The Attack

The Diversion

Monitoring for Worm Propagation

Backscatter Traffic



First Sinkhole Design Option

Second Sinkhole Design Option

Routing Techniques

Again using an attack scenario as an example, there are many cases where it will not be desirable or feasible to shift the attack stream to a sinkhole. In these cases, it might be preferable to simply drop the stream as close to ingress as possible.

As such, a technique called remote-triggered black hole routing (also known as remote-triggered black hole filtering) can be used. Although the technique was originally developed for dealing with attacks in ISP environments, it can also be used effectively in an enterprise network for preventing worm spread. Additionally, this technique can be used for "black holing" any internal hosts participating in outbound DoS attacks, in the event that a host (such as a roaming laptop) has been compromised in this way.

This technique performs multiple functions:

  • Black hole traffic at the line rate
  • Provide remote trigger capability to multiple routers
  • Process a large number of addresses if required
  • Drop traffic based on both destination and source address, if required

To explain the technique, we will initially illustrate how it is used to mitigate an Internet-based DoS or DDoS attack. We will then explain how it can be adapted in an enterprise network.

Black Hole Routing

Remote-Triggered Black Hole Routing

Configuration for Announcing Prefixes to Send to Black Hole

router bgp 999
...
redistribute static route-map STATIC-TO-BGP
...
!
route-map STATIC-TO-BGP permit 10
match tag 66
set ip next-hop 192.0.2.1
set local-preference 50
set community no-export 999:000
set origin igp
!
Route-map STATIC-TO-BGP permit 20
!
...
ip route 171.xxx.xxx.1 255.255.255.255 Null0 Tag 66
!



Mapping of a Prefix to Null0


Internal Routing Operation of Remote-Triggered Black Hole Routing (Filtering)


Dropping on Source Address
One of the criteria for remote-triggered black hole routing to be effective as a security tool is the ability to drop traffic based on both destination address and source addresses. For example, if a host is infected with a worm, it will be identified by its source address. To prevent the spread of the worm, it is necessary to have the capability to drop any traffic originating from that source address.

A second scenario requiring a mitigation technique is one in which spoofed source addresses are used. With recent worms, such as SQL Slammer and Blaster, the host’s real IP address is used to propagate the worm. This is not to say that other worms might not use spoofed addresses. As such, the scenario needs to be accommodated. There is no reason that any host should ever send out a packet with an address other than what was assigned to it. Any packets being sent out with illegitimate source addresses should be dropped at the first router hop.

The feature that enables both of these requirements is Unicast Reverse Path Forwarding (Unicast RPF). Information about Unicast RPF is available at:
http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122cgcr/fsecur_c/fothersf/scfrpf.htm

Unicast RPF in the traditional strict mode. If a packet is received on an interface, a route to that packet’s source address must be available back through the same interface on which the packet was received. If this route does not exist, the packet fails the RPF check and is dropped. It is recommended that this technique be deployed on all user-facing interfaces. This technique is an effective way to drop any spoofed packets from hosts on the local network at the first router hop.


Unicast RPF in Strict Mode

!
interface FastEthernet2/0
ip address 192.xxx.xxx.50 255.255.255.0
ip verify unicast reverse-path
...
speed 100
full-duplex
!


Unicast RPF in Loose Check Mode

!
interface FastEthernet2/0
ip address 192.xxx.xxx.50 255.255.255.0
ip verify unicast source reachable-via any
...
speed 100
full-duplex
!

Selective Remote Traffic Dropping

Friday, February 22, 2008

How to Quickly Analyze your Windows Performance Monitor Logs

Monitoring your server for performance issues and finding performance bottlenecks is one of the administrative tasks I like the least and I suspect you feel the same way. Luckily for us, a new tool called PAL (Performance Analysis of Logs) reads a performance monitor counter log and analyzes it using known thresholds. Check it out!

read more | digg story

Thursday, February 21, 2008

Wuala: Combining the Best of P2P Storage & Sharing

Wua.la is offering a free online storage and sharing service that combines the best of Pando and Grouper. It is elegant, clever, and easy to use, and its sharing features alone are worthy of giving it a whirl. (...) You can drag and drop files - images, videos, music, document - onto the client. (...) If you would like to try the service, visit...

read more | digg story

Wednesday, February 20, 2008

How to Quickly Analyze your Windows Performance Monitor Logs

Monitoring your server for performance issues and finding performance bottlenecks is one of the administrative tasks I like the least and I suspect you feel the same way. Luckily for us, a new tool called PAL (Performance Analysis of Logs) reads a performance monitor counter log and analyzes it using known thresholds. Check it out!

read more | digg story

Saturday, February 16, 2008

GUI based firewall configuration tool

Firewall Builder is multi-platform firewall configuration and management tool. It consists of a GUI and set of policy compilers for various firewall platforms.

read more | digg story

mencoder encoding samples

mencoder source.avi -vf crop=576:432::0,scale -zoom -xy 464 -sws 2 -ovc x264 -x264encopts subq=4:bframes=2:b_pyramid:weight_b:bitrate=650:threads=2 -ffourcc h264 -oac mp3lame -lameopts preset=128 -o result.avi


mencoder source.avi -vf crop=576:432::0,scale -zoom -xy 368 -sws 2 -ovc x264 -x264encopts subq=4:bframes=2:b_pyramid:weight_b:bitrate=650:threads=2:pass=1:turbo -ffourcc h264 -oac mp3lame -lameopts preset=128 -o "/nul"
mencoder.exe" source.avi -vf crop=576:432::0,scale -zoom -xy 368 -sws 2 -ovc x264 -x264encopts subq=4:bframes=2:b_pyramid:weight_b:bitrate=650:threads=2:pass=1:turbo -ffourcc h264 -oac mp3lame -lameopts preset=128 -o result.avi


mencoder source.avi -o result.avi -oac mp3lame -lameopts vbr=3:br=128:vol=0 -ovc xvid -ffourcc DX50 -vf crop=576:432::0,pp=lb,scale -zoom -xy 368 -sws 2 -info artist="created by ..." -xvidencopts turbo:vhq=0:bitrate=700:threads=2

mencoder source.avi -o result.avi -oac mp3lame -lameopts vbr=3:br=128:vol=0 -ovc xvid -vf crop=576:432::0,pp=lb,scale -zoom -xy 368 -sws 2 -info artist="created by ..." -xvidencopts turbo:vhq=2:bvhq=1:chroma_opt:quant_type=mpeg:bitrate=700:threads=2

Thursday, February 14, 2008

Question Regarding Backbone Router Access in the CCIE Lab

 

Brian,
Ihave a question regarding the R&S Lab exam. Can I telnet to the back bone routers
totest routing?

For our rack rentals we allow access to the backbone routers but in the real CCIE lab you will not have access to them. You will have to understand how to verify your solutions without access to the backbone routers.

ShareThis

How To Use A Cisco Access Server

 

Hi Brian,

Howdo I switch between devices when using a Cisco access server?

Thereare two ways to connect to devices attached to an access server, you can terminate your exec session on the access server itself (one terminal window for all sessions), or you can terminate your exec session on the device connected to the access server (one terminal window for each session). In the CCIE Lab Exam you will have the option to do either, so pick whichever method works best for you and stick with it during your preparation.

Whenyou terminate your exec session on the access server you then “reverse telnet” to the individual devices connected to the access server. Normally to do this you first login to the access server and then issue the “show hosts” command to see the host mappings. Next, reverse telnet to them by typing the hostname and pressing enter. To get back to the access server issue the escape sequence CTRL-SHIFT-6-X. To do so hold ctrl and shift, hit 6, release all keys, then hit X. From the access server you can then open new connections or resume connections that you already have open.

Whenyou terminate your exec session on the device connected to the access server, i.e. by telnetting to the access server at port 2001, you cannot issue the escape sequence to reconnect to the access server. In this situation you would open multiple terminal windows if you wanted to connect to multiple devices.

Formore information watch this class-on-demand video on using an access server.

ShareThis

How do I compute complex wildcard masks for access-lists?

 

Access-list address and wildcard pair calculations are based
aroundthe AND and XOR logic gates.

AND: The output is high only when both inputs A and B are high.

A AND B 
______________|A | B | out |
| 0 | 0 | 0 ||0 | 1 | 0 |
| 1 | 0 | 0 ||1 | 1 | 1 |
--------------

XOR: The output is high when either of inputs A or B is high, but not if
bothA and B are high.

AXOR B 
______________|A | B | out |
| 0 | 0 | 0 ||0 | 1 | 1 |
| 1 | 0 | 1 ||1 | 1 | 0 |
--------------

To find the most specific address and wildcard pair that will
match two addresses, A and B, we use the gates AND and XOR. The address
wewill check in the access-list is A AND B. The wildcard used to check
in this list will be A XOR B.

access-list 1 permit [address_to_check] [wildcard_used_to_check] 

Takethe following example:

We have two IP addresses, 10.20.30.40, and 40.30.20.10. How do we
createan access-list that is the most specific match for these two
addresses? First, write both addresses out in binary:

10.20.30.40 = 00001010.00010100.00011110.00101000 
40.30.20.10 = 00101000.00011110.00010100.00001010

To find the address_to_check, take the logical AND of these addresses.

   00001010.00010100.00011110.00101000 
&& 00101000.00011110.00010100.00001010-------------------------------------- 00001000.00010100.00010100.00001000

Thisis our address_to_check: 8.20.20.8

To find the matching wildcard_used_to_check, we take the logical XOR of
theseaddresses.

    00001010.00010100.00011110.00101000 
XOR 00101000.00011110.00010100.00001010--------------------------------------- 00100010.00001010.00001010.00100010

Thisis our wildcard_used_to_check: 34.10.10.34

Therefore, the most specific match for both 10.20.30.40 and 40.30.20.10
wouldbe:

access-list 1 permit 8.20.20.8 34.10.10.34

Here’sone more:

A = 1.2.3.4
B= 5.6.7.8

1.2.3.4= 00000001.00000010.00000011.00000100 
5.6.7.8 = 00000101.00000110.00000111.00001000A && B = 00000001.00000010.00000011.00000000
A XOR B = 00000100.00000100.00000100.00001100

Therefore the access-list would read:

access-list 1 permit 1.2.3.0 4.4.4.12

ShareThis

How do prefix-lists work?

 

Prefix-lists are used to match on prefix and prefix-length pairs. Normal prefix-list syntax is as follows:

ip prefix-list LIST permit w.x.y.z/len 

Wherew.x.y.z is your exact prefix
And where len is your exact prefix-length

“ipprefix-list LIST permit 1.2.3.0/24″ would be an exact match for the prefix 1.2.3.0 with a subnet mask of 255.255.255.0. This does not match 1.2.0.0/24, nor does it match 1.2.3.4/32, nor anything in between.

Whenyou add the keywords “GE” and “LE” to the prefix-list, the “len” value changes its meaning. When using GE and LE, the len value specifies how many bits of the prefix you are checking, starting with the most significant bit.

ip prefix-list LIST permit 1.2.3.0/24 le 32 

Thismeans:
Check the first 24 bits of the prefix 1.2.3.0
Thesubnet mask must be less than or equal to 32

This equates to the access-list syntax:

access-list1 permit 1.2.3.0 0.0.0.255
ip prefix-list LIST permit 0.0.0.0/0 le 32

Thismeans:
Check the first 0 bits of the prefix 0.0.0.0
Thesubnet mask must be less than or equal to 32
This equates to anything

ipprefix-list LIST permit 0.0.0.0/0

This means:
Theexact prefix 0.0.0.0, with the exact prefix-length 0.
This is matching a default route.

ipprefix-list LIST permit 10.0.0.0/8 ge 21 le 29

This means:
Checkthe first 8 bits of the prefix 10.0.0.0
The subnet mask must be greater than or equal to 21, and less than or
equalto 29.

ip prefix-list CLASS_A permit 0.0.0.0/1 ge 8 le 8

Thismatches all class A addresses with classful masks. It means:
Check the first bit of the prefix, it must be a 0.
Thesubnet mask must be greater than or equal to 8, and less than or equal to 8. ( It is exactly 8 )

Whenusing the GE and LE values, you must satisfy the condition:

Len < GE <= LE

Therefore“ip prefix-list LIST permit 1.2.3.0/24 ge 8″ is not a valid list.

What you can not do with the prefix-list is match on arbitrary bits like you can in an access-list. Prefix-lists cannot be used to check if a number is even or odd, nor check if a number is divisible by 15, etc… Bit checking in a prefix-list is sequential, starting with the most significant (leftmost) bit.

ShareThis

How does the “ppp chap password” command work?

 

Unlike PAP, CHAP does not actually send a password over the line. Instead, a hash value made up of the password and magic number is sent. Unless the hash matches from both authenticating parties, authentication is not successful.

By default, the router sends it’s hostname for authentication when using chap. The router on the other side does a lookup in its local database, radius server, or tacacs server, and finds the password that is paired with that username. If there is no matching username in the database, the password specified with the interface level command ‘ppp chap password’ is used as the default password.
Suppose you have a central office that has many remote clients dialing into it. If you don’t want to create an entry in the user database for each remote client, you can just specify a default password with ‘ppp chap password’. As long as the remote clients have an entry for the central site in their user database, authentication will be successful.

ShareThis

How do I control which interfaces run EIGRP vs. RIP?

 

Hi Brian,

Ihave a router with two interfaces running both RIP and EIGRP as follows:

Interface  IP-Address      OK? Method Status  Prot 
Serial0 172.16.5.5 YES manual up upSerial1172.16.1.5 YES manual up up

router rip network 172.16.0.0
!
router eigrp 2001 network 172.16.0.0

S0 should be RIP only, and S1 should be EIGRP only. RIP should not listen to broadcasts on S1
andEIGRP should not listen to multicasts on S0. How do I do that?


SinceEIGRP uses periodic hellos to establish adjacency, passive-interface is sufficient in this case. Since passive-interface in EIGRP suppresses the generation of hellos out an interface, adjacency cannot be established, and therefore there can be no exchange of routes.

Aneven easier method of choosing which specific interfaces are running EIGRP is to use a wildcard mask when you use the network statement. The ‘network’ statement in IGP does not actually mean what networks you are advertising, it means what interfaces you are running the protocol on. If you only want to run EIGRP on your Serial 1 interface with an address of 172.16.1.5, use the following syntax:

router eigrp 2001 
network 172.16.1.5 0.0.0.0

This means that only the interface 172.16.1.5 is running EIGRP. The opposite of this most specific syntax would be:

router eigrp 2001 
network 0.0.0.0 255.255.255.255

This means that all interfaces are running EIGRP.

With RIP, the case is different than EIGRP. Since RIP does not use periodic hellos like EIGRP, OSPF, or IS-IS, passive-interface simply means that you will not send any routing updates out an interface. This does not mean that you will not receive routing updates in that interface. To prevent learning routes in an interface using RIP, you could use a distribute-list that denies everything (which would also work for EIGRP), or use an access-list that denies RIP altogether. Take the following examples:

access-list 1 deny any 
!
router rip network 172.16.0.0
distribute-list 1 in serial 1

or

access-list 100 deny udp any eq rip any eq rip 
access-list 100 permit ip any any!interface serial 1
ip access-group 100 in

Both would accomplish the same goal.

ShareThis

What’s the difference between a dialer profile and a rotary group?

 

HiBrian,

I am using dialer profiles for ISDN and I want protocol broadcasts such as RIP to be sent out accross the ISDN link. I tried to find the command that allows me to configure broadcast but the dialer interfaces do not accept the dialer map command. How do I accomplish this?

When using dialer profiles, dialer interfaces are point-to-point, therefore there is no need for protocol mappings. IP broadcasts should not have any trouble being sent across the interface as long as you have an IP address configured on the interface. Dialer maps are only used on dialer interfaces when using rotary groups. Dialer profiles are for when you have a single physical interface, but multiple destinations to dial. Rotary groups are for when you have multiple physical interfaces, but one destination to dial.

ShareThis

Understanding the OSPF Point-to-Multipoint Non-broadcast Network Type

 

OSPF point-to-multipoint non-broadcast was designed to allow for the assignment of the cost on a per neighbor basis as opposed to using the interface’s cost. This
isuseful on a multipoint Frame Relay interface where there are two neighbors advertising the same route but the CIRs for the DLCIs to reach each neighbor is different or these two neighbors that are advertising the same route have different port speeds to the Frame Relay network. Remember that the cost is based on your “incoming” interface’s bandwidth and not the bandwidth of the neighbor’s interface that connects to you.

Asan example say we have two remote routers over Frame Relay and the remote routers are both connected to and advertising the same Ethernet segment. Our router is connected to these two routers via Frame Relay. One of the remote routers has a T1 Frame Relay connection and the other has a 64k Frame Relay connection. Since our cost to the Ethernet segment advertised by these two routers will be calculated based on the cost of the Ethernet segment plus the cost of our incoming interface, both routes appear to be equal cost. Obviously this is not what we would want. We would want to prefer the route from the router with the T1 connection over the 64k connection.

Hereis an example with two remote routers advertising the same network (loopback interfaces):

Rack2R4#showip ospf interface s0/0 | include Cost 
Process ID 1, Router ID 150.1.4.4, Network Type POINT_TO_MULTIPOINT,
Cost: 64Rack1R4#sho run int s0/0
interface Serial0/0 ip address 154.1.0.4 255.255.255.0
encapsulation frame-relay ip ospf network point-to-multipoint
frame-relay map ip 154.1.0.3 403 broadcast frame-relay map ip 154.1.0.5 405 broadcast
no frame-relay inverse-arpendRack2R4#sho ip route 150.1.0.0 255.255.255.0
Routing entry for 150.1.0.0/24 Known via "ospf 1", distance 110, metric 65, type intra area
Last update from 154.1.0.3 on Serial0/0, 00:00:30 ago Routing Descriptor Blocks:
* 154.1.0.3, from 150.1.3.3, 00:00:30 ago, via Serial0/0 Route metric is 65, traffic share count is 1
154.1.0.5, from 150.1.5.5, 00:00:30 ago, via Serial0/0 Route metric is 65, traffic share count is 1

As you can see both 154.1.0.3 (router-ID 150.1.3.3) and 154.1.0.5 (router-ID 150.1.5.5) are advertising the 150.1.0.0/24 network with an OSPF cost of 1 (total cost minus our interface’s cost, 65-64=1). If both of these routers have the same port speed to the Frame Relay network then this is what we would want to see, two equal cost paths. But if they have different port speeds, then we would want to prefer the route from the router with the higher port speed, theoretically. The problem is that OSPF does not take into account the cost of the remote router’s interface to us. We only take into account the cost of the loopback and our interface’s cost to reach the remote neighbor.

Toprefer the route from the router with the higher port speed, we are going to use OSPF point-to-multipoint non-broadcast to specify the cost on a per neighbor basis. In this example we are going to add a cost of 25 to the routes from 154.1.0.5 and 50 to the routes from 154.1.0.3.

Rack1R4#shorun | be router ospf 
router ospf 1 network 154.1.0.0 0.0.255.255 area 0
neighbor 154.1.0.5 cost 25 neighbor 154.1.0.3 cost 50

Rack1R4#sho run int s0/0interfaceSerial0/0
ip address 154.1.0.4 255.255.255.0 encapsulation frame-relay
ip ospf network point-to-multipoint non-broadcast frame-relay map ip 154.1.0.3 403 broadcast
frame-relay map ip 154.1.0.5 405 broadcast no frame-relay inverse-arp
endRack1R4#sho ip route 150.1.0.0 255.255.255.0
Routing entry for 150.1.0.0/24 Known via "ospf 1", distance 110, metric 26, type intra area
Last update from 154.1.0.5 on Serial0/0, 00:06:13 ago Routing Descriptor Blocks:
* 154.1.0.5, from 150.1.5.5, 00:06:13 ago, via Serial0/0 Route metric is 26, traffic share count is 1
^^^^^^^^^^^^^^^^^^^

Nowwe can see that we prefer the route from 154.1.0.5 (router-ID 150.1.5.5).

ShareThis

Troubleshooting Multicast RPF Failure

 

Hi Brian,

Ienjoy the new blog feature. Lots of valuable information condensed in a small space. Could you explain in a nutshell how to troubleshoot multicast RPF failures? I understand the concept, just figuring out what shows and/or debugs to use always seems to take me 30 minutes rather than 5 minutes.

Firstlet’s talk briefly about what the RPF check, or Reverse Path Forwarding check, is for multicast. PIM is known as Protocol Independent Multicast routing because it does not exchange its own information about the network topology. Instead it relies on the accuracy of an underlying unicast routing protocol like OSPF or EIGRP to maintain a loop free topology. When a multicast packet is received by a router running PIM the device first looks at what the source IP is of the packet. Next the router does a unicast lookup on the source, as in the “show ip route w.x.y.z”, where “w.x.y.z” is the source. Next the outgoing interface in the unicast routing table is compared with the interface in which the multicast packet was received on. If the incoming interface of the packet and the outgoing interface for the route are the same, it is assumed that the packet is not looping, and the packet is candidate for forwarding. If the incoming interface and the outgoing interface are *not* the same, a loop-free path can not be guaranteed, and the RPF check fails. All packets for which the RPF check fails are dropped.

Nowas for troubleshooting the RPF check goes there are a couple of useful show and debug commands that are available to you on the IOS. Suppose the following topology:

multicast.rpf.failure.gif

Wewill be running EIGRP on all interfaces, and PIM dense mode on R2, R3, R4, and SW1. Note that PIM will not be enabled on R1. R4 is a multicast source that is attempting to send a feed to the client, SW1. On SW1 we will be generating an IGMP join message to R3 by issuing the “ip igmp join” command on SW1’s interface Fa0/3. On R4 we will be generating multicast traffic with an extended ping. First let’s look at the topology with a successful transmission:

SW1#conf t 
Enter configuration commands, one per line. End with CNTL/Z.SW1(config)#intfa0/3
SW1(config-if)#ip igmp join 224.1.1.1SW1(config-if)#endSW1#R4#pingProtocol [ip]:
Target IP address: 224.1.1.1Repeatcount [1]: 5
Datagram size [100]:Timeoutin seconds [2]:
Extended commands [n]: yInterface[All]: Ethernet0/0
Time to live [255]:Sourceaddress: 150.1.124.4
Type of service [0]:SetDF bit in IP header? [no]:
Validate reply data? [no]:Datapattern [0xABCD]:
Loose, Strict, Record, Timestamp, Verbose[none]:Sweeprange of sizes [n]:
Type escape sequence to abort.Sending5, 100-byte ICMP Echos to 224.1.1.1, timeout is 2 seconds:
Packet sent with a source address of 150.1.124.4Reply to request 0 from 150.1.37.7, 32 ms
Reply to request 1 from 150.1.37.7, 28 msReplyto request 2 from 150.1.37.7, 28 ms
Reply to request 3 from 150.1.37.7, 28 msReplyto request 4 from 150.1.37.7, 28 ms

Now let’s trace the traffic flow starting at the destination and working our way back up the reverse path.

SW1#show ip mroute 224.1.1.1 
IP Multicast Routing TableFlags:D - Dense, S - Sparse, B - Bidir Group, s - SSM Group, C - Connected,
L - Local, P - Pruned, R - RP-bit set, F - Register flag,T - SPT-bit set, J - Join SPT, M - MSDP created entry,
X - Proxy Join Timer Running, A - Candidate for MSDP Advertisement,U - URD, I - Received Source Specific Host Report, Z - Multicast Tunnel
Y - Joined MDT-data group, y - Sending to MDT-data groupOutgoinginterface flags: H - Hardware switched, A - Assert winner
Timers: Uptime/ExpiresInterfacestate: Interface, Next-Hop or VCD, State/Mode

(*, 224.1.1.1), 00:03:05/stopped, RP 0.0.0.0, flags: DCLIncominginterface: Null, RPF nbr 0.0.0.0
Outgoing interface list:FastEthernet0/3,Forward/Dense, 00:03:05/00:00:00

(150.1.124.4, 224.1.1.1), 00:02:26/00:02:02, flags: PLTXIncominginterface: FastEthernet0/3, RPF nbr 150.1.37.3
Outgoing interface list: Null

SW1’sRPF neighbor for (150.1.124.4,224.1.1.1) is 150.1.37.3, which means that SW1 received the packet from R3.

R3#show ip mroute 224.1.1.1 
IP Multicast Routing TableFlags:D - Dense, S - Sparse, B - Bidir Group, s - SSM Group, C - Connected,
L - Local, P - Pruned, R - RP-bit set, F - Register flag,T - SPT-bit set, J - Join SPT, M - MSDP created entry,
X - Proxy Join Timer Running, A - Candidate for MSDP Advertisement,U - URD, I - Received Source Specific Host Report,
Z - Multicast Tunnel, z - MDT-data group sender,Y - Joined MDT-data group, y - Sending to MDT-data group
Outgoing interface flags: H - Hardware switched, A - Assert winnerTimers:Uptime/Expires
Interface state: Interface, Next-Hop or VCD, State/Mode(*, 224.1.1.1), 00:03:12/stopped, RP 0.0.0.0, flags: DC
Incoming interface: Null, RPF nbr 0.0.0.0Outgoinginterface list:
Serial1/3, Forward/Dense, 00:03:12/00:00:00Serial1/2,Forward/Dense, 00:03:12/00:00:00
Ethernet0/0, Forward/Dense, 00:03:12/00:00:00(150.1.124.4, 224.1.1.1), 00:02:33/00:01:46, flags: T
Incoming interface: Serial1/3, RPF nbr 150.1.23.2Outgoinginterface list:
Ethernet0/0, Forward/Dense, 00:02:34/00:00:00Serial1/2,Prune/Dense, 00:02:34/00:00:28

R3’s RPF neighbor is 150.1.23.2, which means the packet came from R2.

R2#show ip mroute 224.1.1.1 
IP Multicast Routing TableFlags:D - Dense, S - Sparse, B - Bidir Group, s - SSM Group, C - Connected,
L - Local, P - Pruned, R - RP-bit set, F - Register flag,T - SPT-bit set, J - Join SPT, M - MSDP created entry,
X - Proxy Join Timer Running, A - Candidate for MSDP Advertisement,U - URD, I - Received Source Specific Host Report,
Z - Multicast Tunnel, z - MDT-data group sender,Y - Joined MDT-data group, y - Sending to MDT-data group
Outgoing interface flags: H - Hardware switched, A - Assert winnerTimers:Uptime/Expires
Interface state: Interface, Next-Hop or VCD, State/Mode(*, 224.1.1.1), 00:02:44/stopped, RP 0.0.0.0, flags: D
Incoming interface: Null, RPF nbr 0.0.0.0Outgoinginterface list:
FastEthernet0/0, Forward/Dense, 00:02:44/00:00:00Serial0/1,Forward/Dense, 00:02:44/00:00:00

(150.1.124.4, 224.1.1.1), 00:02:44/00:01:35, flags: TIncominginterface: FastEthernet0/0, RPF nbr 0.0.0.0
Outgoing interface list:Serial0/1,Forward/Dense, 00:02:45/00:00:00

R2 has no RPF neighbor, meaning the source is directly connected. Now let’s compare the unicast routing table from the client back to the source.

SW1#show ip route 150.1.124.4 
Routing entry for 150.1.124.0/24Knownvia "eigrp 1", distance 90, metric 20540160, type internal
Redistributing via eigrp 1Lastupdate from 150.1.37.3 on FastEthernet0/3, 00:11:23 ago
Routing Descriptor Blocks:*150.1.37.3, from 150.1.37.3, 00:11:23 ago, via FastEthernet0/3
Route metric is 20540160, traffic share count is 1Totaldelay is 21100 microseconds, minimum bandwidth is 128 Kbit
Reliability 255/255, minimum MTU 1500 bytesLoading1/255, Hops 2

R3#show ip route 150.1.124.4Routingentry for 150.1.124.0/24
Known via "eigrp 1", distance 90, metric 20514560, type internalRedistributingvia eigrp 1
Last update from 150.1.13.1 on Serial1/2, 00:11:47 agoRoutingDescriptor Blocks:
* 150.1.23.2, from 150.1.23.2, 00:11:47 ago, via Serial1/3Routemetric is 20514560, traffic share count is 1
Total delay is 20100 microseconds, minimum bandwidth is 128 KbitReliability255/255, minimum MTU 1500 bytes
Loading 1/255, Hops 1150.1.13.1,from 150.1.13.1, 00:11:47 ago, via Serial1/2
Route metric is 20514560, traffic share count is 1Totaldelay is 20100 microseconds, minimum bandwidth is 128 Kbit
Reliability 255/255, minimum MTU 1500 bytesLoading1/255, Hops 1

R2#show ip route 150.1.124.4Routingentry for 150.1.124.0/24
Known via "connected", distance 0, metric 0 (connected, via
interface)Redistributingvia eigrp 1
Routing Descriptor Blocks:*directly connected, via FastEthernet0/0
Route metric is 0, traffic share count is 1

Basedon this output we can see that SW1 sees the source reachable via R3, which was the neighbor the multicast packet came from. R3 sees the source reachable via R1 and R2 due to equal cost load-balancing, with R2 as the neighbor that the multicast packet came from. Finally R2 sees the source as directly connected, which is where the multicast packet came from. This means that the RPF check is successful as traffic is transiting the network, hence we had a successful transmission.

Nowlet’s modify the routing table on R3 so that the route to R4 points to R1. Since the multicast packet on R3 comes from R2 and the unicast route will going back towards R1 there will be an RPF failure, and the packet transmission will not be successful. Again note that R1 is not routing multicast in this topology.

R3#conf t 
Enter configuration commands, one per line. End with CNTL/Z.R3(config)#iproute 150.1.124.4 255.255.255.255 serial1/2
R3(config)#endR3#R4#pingProtocol [ip]:
Target IP address: 224.1.1.1Repeatcount [1]: 5
Datagram size [100]:Timeoutin seconds [2]:
Extended commands [n]: yInterface[All]: Ethernet0/0
Time to live [255]:Sourceaddress: 150.1.124.4
Type of service [0]:SetDF bit in IP header? [no]:
Validate reply data? [no]:Datapattern [0xABCD]:
Loose, Strict, Record, Timestamp, Verbose[none]:Sweeprange of sizes [n]:
Type escape sequence to abort.Sending5, 100-byte ICMP Echos to 224.1.1.1, timeout is 2 seconds:
Packet sent with a source address of 150.1.124.4.....R4#

We can now see that on R4 we do not receive a response back from the final destination… so where do we start troubleshooting? First we want to look at the first hop away from the source, which in this case is R2. On R2 we want to look in the multicast routing table to see if the incoming interface list and the outgoing interface list is correctly populated. Ideally we will see the incoming interface as FastEthernet0/0, which is directly connected to the source, and the outgoing interface as Serial0/1, which is the interface downstream facing towards R3.

R2#show ip mroute 224.1.1.1 
IP Multicast Routing TableFlags:D - Dense, S - Sparse, B - Bidir Group, s - SSM Group, C - Connected,
L - Local, P - Pruned, R - RP-bit set, F - Register flag,T - SPT-bit set, J - Join SPT, M - MSDP created entry,
X - Proxy Join Timer Running, A - Candidate for MSDP Advertisement,U - URD, I - Received Source Specific Host Report, Z - Multicast Tunnel
Y - Joined MDT-data group, y - Sending to MDT-data groupOutgoinginterface flags: H - Hardware switched
Timers: Uptime/ExpiresInterfacestate: Interface, Next-Hop or VCD, State/Mode

(*, 224.1.1.1), 00:07:27/stopped, RP 0.0.0.0, flags: DIncominginterface: Null, RPF nbr 0.0.0.0
Outgoing interface list:Serial0/1,Forward/Dense, 00:07:27/00:00:00
FastEthernet0/0, Forward/Dense, 00:07:27/00:00:00(150.1.124.4, 224.1.1.1), 00:07:27/00:01:51, flags: T
Incoming interface: FastEthernet0/0, RPF nbr 0.0.0.0Outgoinginterface list:
Serial0/1, Forward/Dense, 00:04:46/00:00:00

Thisis the correct output we should see on R2. Two more verifications we can do are with the “show ip mroute count” command and the “debug ip mpacket” command. “show ip mroute count” will show all currently active multicast feeds, and whether packets are getting dropped:

R2#show ip mroute count 
IP Multicast Statistics3routes using 1864 bytes of memory
2 groups, 0.50 average sources per groupForwardingCounts: Pkt Count/Pkts per second/Avg Pkt Size/Kilobits per second
Other counts: Total/RPF failed/Other drops(OIF-null, rate-limit etc)Group: 224.1.1.1, Source count: 1, Packets forwarded: 4, Packets received:
4
Source: 150.1.124.4/32, Forwarding: 4/1/100/0, Other: 4/0/0Group: 224.0.1.40, Source count: 0, Packets forwarded: 0, Packets
received: 0

“debugip mpacket” will show the packet trace in real time, similar to the “debug ip packet” command for unicast packets. One caveat of using this verification is that only process switched traffic can be debugged. This means that we need to disable fast or CEF switching of multicast traffic by issuing the “no ip mroute-cache” command on the interfaces running PIM. Once this debug is enabled we’ll generate traffic from R4 again and we should see the packets correctly routed through R2.

R4#ping 224.1.1.1 repeat 100 

Type escape sequence to abort.Sending100, 100-byte ICMP Echos to 224.1.1.1, timeout is 2 seconds:


R2(config)#int f0/0R2(config-if)#noip mroute-cache
R2(config-if)#int s0/1R2(config-if)#noip mroute-cache
R2(config-if)#endR2#debugip mpacket
IP multicast packets debugging is onR2#IP(0): s=150.1.124.4 (FastEthernet0/0) d=224.1.1.1 (Serial0/1) id=231,
prot=1, len=100(100), mforwardIP(0):s=150.1.124.4 (FastEthernet0/0) d=224.1.1.1 (Serial0/1) id=232, prot=1,
len=100(100), mforwardIP(0):s=150.1.124.4 (FastEthernet0/0) d=224.1.1.1 (Serial0/1) id=233, prot=1,
len=100(100), mforwardIP(0):s=150.1.124.4 (FastEthernet0/0) d=224.1.1.1 (Serial0/1) id=234, prot=1,
len=100(100), mforwardIP(0):s=150.1.124.4 (FastEthernet0/0) d=224.1.1.1 (Serial0/1) id=235, prot=1,
len=100(100), mforwardR2#undebugall

Now that we see that R2 is correctly routing the packets let’s look at all three of these verifications on R3.

R3#show ip mroute 224.1.1.1 
IP Multicast Routing TableFlags:D - Dense, S - Sparse, B - Bidir Group, s - SSM Group, C - Connected,
L - Local, P - Pruned, R - RP-bit set, F - Register flag,T - SPT-bit set, J - Join SPT, M - MSDP created entry,
X - Proxy Join Timer Running, A - Candidate for MSDP Advertisement,U - URD, I - Received Source Specific Host Report,
Z - Multicast Tunnel, z - MDT-data group sender,Y - Joined MDT-data group, y - Sending to MDT-data group
Outgoing interface flags: H - Hardware switched, A - Assert winnerTimers:Uptime/Expires
Interface state: Interface, Next-Hop or VCD, State/Mode(*, 224.1.1.1), 00:00:01/stopped, RP 0.0.0.0, flags: DC
Incoming interface: Null, RPF nbr 0.0.0.0Outgoinginterface list:
Serial1/3, Forward/Dense, 00:00:01/00:00:00Ethernet0/0,Forward/Dense, 00:00:01/00:00:00

(150.1.124.4, 224.1.1.1), 00:00:01/00:02:58, flags:Incominginterface: Null, RPF nbr 0.0.0.0
Outgoing interface list:Ethernet0/0,Forward/Dense, 00:00:02/00:00:00
Serial1/3, Forward/Dense, 00:00:02/00:00:00

FromR3’s show ip mroute output we can see that the incoming interface is listed as Null. This is an indication that for some reason R3 is not correctly routing the packets, and is instead dropping them as they are received. For more information let’s look at the “show ip mroute count” output.

R3#show ip mroute count 
IP Multicast Statistics3routes using 2174 bytes of memory
2 groups, 0.50 average sources per groupForwardingCounts: Pkt Count/Pkts(neg(-) = Drops) per second/Avg Pkt Size/Kilobits
per secondOthercounts: Total/RPF failed/Other drops(OIF-null, rate-limit etc)

Group: 224.1.1.1, Source count: 1, Packets forwarded: 0, Packets received:
15Source:150.1.124.4/32, Forwarding: 0/0/0/0, Other: 15/15/0

Group: 224.0.1.40, Source count: 0, Packets forwarded: 0, Packets
received: 0

Fromthis output we can see that packets for (150.1.124.4,224.1.1.1) are getting dropped, and specifically the reason they are getting dropped is because of RPF failure. This is seen from the “Other: 15/15/0” output, where the second field is RPF failed drops. For more detail let’s look at the packet trace.

R3#conf t 
Enter configuration commands, one per line. End with CNTL/Z.R3(config)#inte0/0
R3(config-if)#no ip mroute-cacheR3(config-if)#ints1/3
R3(config-if)#no ip mroute-cacheR3(