Become The Solution Chicago Logo

Become The Solution Chicago Logo

Search Become The Solution:

Cisco Device Troubleshooting Commands

Cisco Device Troubleshooting Commands
CISCO VPN TROUBLESHOOTING:   sh crypto session : shows active VPN sessions sh crypto session detail : shows details of VPN sessions sh crypto ipsec sa : show ipsec saís between peers sh crypto isakmp sa : show internet security association management protocol security associations between peers. sh crypto engine connection active : show traffic sent....
Continue reading

Wireless WiFi Agreement End User Acceptance Agreement Form EULA

Wireless WiFi Agreement End User Acceptance Agreement Form EULA
Wi-Fi End User Acceptance Agreement Business XXXXX offers free wireless high-speed Internet access (“Wi-Fi System”).  This Wi-Fi End User Acceptance Agreement (“Agreement”) governs each party’s rights and responsibilities relating to the use of the Wi-Fi System at the. BY LOGGING ON TO THE WI-FI SYSTEM, YOU REPRESENT THAT YOU HAVE READ, UNDERSTOOD AND AGREED TO THE TERMS...
Continue reading
Tags:

Palo Alto Firewalls - Basic Command Line Parameters

Palo Alto Firewalls - Basic Command Line Parameters
The following are command line parameters that can be run on most Palo Alto firewalls today.  Interfaces and Routes Show full route table show routing route Display logical interfaces and configured zones show interface logical Show routers applied to interfaces show routing interface     Sessions List all sessions in the device show session...
Continue reading
Tags:

Circuit ID - How Labeling Works

Circuit ID - How Labeling Works
Reference: http://en.wikipedia.org/wiki/Circuit_ID Telecom Circuit ID formats The  LEC  circuit IDs are based on  Telcordia Technologies ' Common Language Coding. At one time, the abbreviations were meaningful (for example, HC for high capacity) but the complexity of the business no longer allows for it. Carrier Facility format: AAAAA/BBBBBB/CCCCCCCCCCC/DDDDDDDDDDD [1] A Prefix: 3-5 Alphanumeric characters. Required. B Facility Type:...
Continue reading

Letter Of Authorization (LOA) Examples Providers

Letter Of Authorization (LOA) Examples Providers
A letter of authorization may aid a person who requires help to perform critical duties in a formal setting. Legally, a letter of authority is sufficient to delegate sensitive legal, health or financial obligation to another person or entity. ISP Providers are required to send a letter of authorization to an organization for access to install...
Continue reading

Standard Cisco Router Configuration

Standard Cisco Router Configuration
Router Configuration Standards   Physical Security The most basic and most important aspect of protecting a router from unauthorized access is physical security.  Anyone with physical access to the router can gain control over it, whether through an unprotected port or by more disruptive methods (performing a password recovery).  Therefore, it is vitally important to prevent...
Continue reading
Tags:




Sign-Up to Recieve E-Mail Updates!