configuration

14 April 2014 at 3:43pm
eduroam (education roaming) is the secure, world-wide roaming access service developed for the international research and education community. eduroam provides an infrastructure that allows users to authenticate onto a visited network (wireless and/or wired) using their home site credentials, without any local administrative burden or complexities on the user or the local IT staff. This course provides and overview of the service, its configuration & deployment and overall monitoring & troubleshooting of the service.
All of the Moonshot documentation has been moved to the new Moonshot wiki at http://wiki.moonshot.ja.net/ The new version of this page can be found at https://wiki.moonshot.ja.net/x/qAMp
All of the Moonshot documentation has been moved to the new Moonshot wiki at http://wiki.moonshot.ja.net/ The new version of this page can be found at https://wiki.moonshot.ja.net/x/qwIp
Anonymous
A1. CISCO IP-SLA Monitoring Probe Configuration Example Cisco® IP-SLA Probe Command Line Configuration used on JANET Monitoring probes at sites are configured with the Cisco® IOS command: ! tr responder ! This enables the IP-SLA process, allowing the router to receive, process, and return probes back to the CMP. For IOS version 12.4 this command became ‘ip sla monitor responder’ and the related commands changed also.
Anonymous
Background There is a great deal of literature about the operation of authoritative nameservers, but not so much about the resolver function.This note is for system and network managers or administrators in Janet organisations (particularly smaller organisations with relatively simple networks) and is intended to give them confidence that they have correctly configured this straighforward but critical part of the DNS in their own networks.
Anonymous
Albitz P. and Liu C., DNS and BIND 4th edition (O'Reilly 2001) ISBN 0-596-00158-4. Larson M. and Liu C. DNS on Windows 2000 2nd edition (O'Reilly 2001) ISBN 0-596-00230-0. RFC 1034 Domain Names - Concepts and Facilities
Anonymous
A lot of attention has been paid to the implementation of remote working environments for the home and providing connectivity solutions to remote locations. Consumer Linksys routers make an ideal platform to extend your organisational network to a remote location, even providing a central wireless SSID for users. This set of instructions will demonstrate the configuration of the Linksys router (Linksys WRT54G) with OpenWRT as a hardware IPSec endpoint.
Anonymous
The Cisco® ASA family of devices are based on the Cisco® PIX platform (Figure 19); however they have been re-engineered and improved with feature rich functions. Included in the ASA Platform is IPSec VPN, SSL VPN, Web Portal and Secure Desktop facilities. The IPSec VPN functions are included for no extra charge; the remainder are chargeable options after version 7.0 of the ASA.
Anonymous
The following pages describe the steps necessary for the configuration of:
Anonymous
General-purpose computer systems as supplied are not designed to be connected to hostile networks. The Internet outside the organisation should certainly be regarded as hostile and for some purposes parts of the internal organisation should also be viewed in this light. This means that many of the computers in the organisation need additional configuration and maintenance to reduce the likelihood of them falling victim to an attack across the network.
Subscribe to configuration