Library items tagged: configuration

Anonymous
A1. CISCO IP-SLA Monitoring Probe Configuration Example Cisco® IP-SLA Probe Command Line Configuration used on JANET Monitoring probes at sites are configured with the Cisco® IOS command: ! tr responder ! This enables the IP-SLA process, allowing the router to receive, process, and return probes back to the CMP. For IOS version 12.4 this command became ‘ip sla monitor responder’ and the related commands changed also.
Anonymous
Background There is a great deal of literature about the operation of authoritative nameservers, but not so much about the resolver function.This note is for system and network managers or administrators in Janet organisations (particularly smaller organisations with relatively simple networks) and is intended to give them confidence that they have correctly configured this straighforward but critical part of the DNS in their own networks.
Anonymous
Albitz P. and Liu C., DNS and BIND 4th edition (O'Reilly 2001) ISBN 0-596-00158-4. Larson M. and Liu C. DNS on Windows 2000 2nd edition (O'Reilly 2001) ISBN 0-596-00230-0. RFC 1034 Domain Names - Concepts and Facilities
Anonymous
A lot of attention has been paid to the implementation of remote working environments for the home and providing connectivity solutions to remote locations. Consumer Linksys routers make an ideal platform to extend your organisational network to a remote location, even providing a central wireless SSID for users. This set of instructions will demonstrate the configuration of the Linksys router (Linksys WRT54G) with OpenWRT as a hardware IPSec endpoint.
Anonymous
The Cisco® ASA family of devices are based on the Cisco® PIX platform (Figure 19); however they have been re-engineered and improved with feature rich functions. Included in the ASA Platform is IPSec VPN, SSL VPN, Web Portal and Secure Desktop facilities. The IPSec VPN functions are included for no extra charge; the remainder are chargeable options after version 7.0 of the ASA.
Anonymous
The following pages describe the steps necessary for the configuration of:
Anonymous
General-purpose computer systems as supplied are not designed to be connected to hostile networks. The Internet outside the organisation should certainly be regarded as hostile and for some purposes parts of the internal organisation should also be viewed in this light. This means that many of the computers in the organisation need additional configuration and maintenance to reduce the likelihood of them falling victim to an attack across the network.
Anonymous
802.1X Deployment Tool Case Study at Swansea University GARETH AYRES
Anonymous
Configuring Windows supplicant software is not technically a difficult task, even with the additional complication of including details about an institutional RADIUS server certificate or certificate distribution. However users are generally students and staff who don’t have much knowledge about or interest in wireless networks or login mechanisms. For such users, configuring devices properly for use on 802.1X networks can be difficult.
Anonymous
Phil Mayers, Imperial College London NPS doesn't offer any conditional/branching features, or a way to bind a client/group to a set of policies, therefore you have to be careful to make sure your policies match appropriately. RADIUS clients Home service providers: you should create client entries for each NRPS under the "RADIUS Clients" section; be sure to set their "Friendly Name" to NRPS1, NRPS2, NRPS3 etc. so you can match them below.