Home

Web Authentication is normally used by customers who want to install a guest-access Cisco Controller WCL 526 logonetwork. In a guest-access network, there is initial user name and password authentication, but security is not required for the subsequent traffic. Typical deployments can include "hot spot" locations such as Starbucks or campus atmosphere where the only concern is the connectivity.

Web authentication provides simple authentication without a supplicant or client. Also, it doesn't provide any data encryption. Cisco WLC 526 is simple built-in Web authentication function that can be enable just like that.

Below instruction will provide how to setup web authentication page for Cisco unified system with Cisco WLC 526 and Cisco Wireless Express Access Point 521.

Last Updated (Tuesday, 19 May 2009 17:15)

Read more...

 

If you are looking for reliable and powerful wireless network for your company? How to configure Cisco wireless controller WLC526 logoBudget is kinds of tight? If you are willing to spend about $3500(U.S), this solution would be fit for your company needs. Cisco 500 Series Wireless Express Mobility System is the one that made us so impressed.

Cisco Wireless Controller WLC526 = $2500 (x1)
Cisco Wireless Access Point AP521 = $250 (x4)

You can check Cisco website to see more details what coverage of 4 x APs would be, performance and reliability. Here is brief scale of actual site that is running by Cisco Wireless Express Mobility System.

• About 2 Acre (40000Sq, 2nd floor building)
20~50 concurrent wireless users
VLANs - Regular user traffic must be separated from guest traffic
Many security features and options such as strong Encyption and controlling traffic by layers.

 

Last Updated (Sunday, 26 July 2009 23:43)

Read more...

 

Let's quickly look what kinds of Security Attacks on OSI 7 Layer.

Layer 7. Application /6. Presentation/5. Session Layer - Virus, Warms, Tro-hourse, Buffer overfolw, APP/OS weakness.

Layer 4. Transport Layer - TCP sync flooding, UDP flooding, Scanning and so on.

Layer 3. Network Layer - IP modification, DHCP attack, ICMP attack and so on.

Layer 2. Data Link Layer - MAC modification, MAC attack, MAC flooding and so on.

Layer 1. Physical Layer - Cable disconnected

How to prevent above threats? see below helps

Last Updated (Friday, 22 May 2009 18:27)

Read more...

 

QoS(Qaulity of Service), it is definetly one of hot topic in IT fields. Economically, most companes are suffering in thesedays. IT budget got cut seriousely and nothing bright in near future. Owners don't want to spend a dollar to IT property. Internet traffic is continuousely growing, demanding more bandwidth as big time. Because I am working on ISP industry, I can tell how many customer's Internet pipe is bursted, and it results latency and low performance in daily basis. No more investment and bling bling, so customers are looking around to see any alternative solution to get better circumstance and escape from the hell. If your job is computer related or have to stick with Internet, slow connection will kill you in a minute and make you upset easily. No doubt! QoS is way to go, but it is not easy to deploy if you are not familiar with QoS technology or lack of knowledge.
It would be a good time for me to refesh my brain.


1. Easy QoS 101 - What is QoS(Quality of Service)
2. Easy QoS 101 - QoS protocols
3. Easy QoS 101 - Queuing Techniques
4. Easy QoS 101 - Shaping & Policying
5. Easy QoS 101 - Queuing family
6. Easy QoS 101 - Congestion Avoidance
7. Easy QoS 101 - Applying QoS and examples

 

 

Last Updated (Monday, 25 May 2009 11:52)

Read more...

 

QoS(Qaulity of Service) protocols were developed since data network demands efficiency of data delivery. Well known QoS protocols are RSVP, IntServ, DiffServ, MPLS, SBM and so on. In my opinion, just read thru and understand what those are. That would be enough unless you are crazy on QoS thoeory. There are a lot of information when you googling out there.
In practical world, most of time we will use DiffServ protocols and good to know about MPLS CoS as well.


1. Easy QoS 101 - What is QoS(Quality of Service)
2. Easy QoS 101 - QoS protocols
3. Easy QoS 101 - Queuing Techniques
4. Easy QoS 101 - Shaping & Policying
5. Easy QoS 101 - Queuing family
6. Easy QoS 101 - Congestion Avoidance
7. Easy QoS 101 - Applying QoS and examples
 

 

Last Updated (Monday, 25 May 2009 11:53)

Read more...

 


Once in a while, I see "IP helper-address" command for broadcast applications suchIP-helper address to remote DHCP server as DHCP client(BOOTP), NetBIOS and so on. As you know IP helper-address is required a network is connected certain application at remote. For example, communicating between old computers that is using NetBIOS protocols, connecting remote DHCP server. In this article, we will mainly discuss about how to use IP helper-address to connect a remote DHCP server. The below example might not be realistic, b/c I just made up a case to better understand this technology.

 

Last Updated (Sunday, 07 March 2010 18:14)

Read more...

 
Smart Link
Search
Statistics
Content View Hits : 2200515
Polls
Highly recommended firewall vendor?
 
Google Translation
English Arabic Chinese (Simplified) Czech Dutch French German Italian Korean Portuguese Russian Spanish Filipino Vietnamese Thai Turkish
BGP routing issue?
Banner
World Route Servers
Banner
Who's Online
We have 38 guests online