In this post let’s talk about cabling, especially ethernet cabling to meet speeds of 1 gig. 4 elements are discussed : operation as described in the standard, awg metric, pinout and twist. Alter...
HSRP is one of the most know FHRP (First Hop Routing) protocols proposed by Cisco to help secure (in terms of redundancy) the gateway (for hosts or servers) in a LAN. The objective is simple: configur...
The idea of this lab is to craft an IPv6 packet from scratch using Python and Scapy library. The IDE I use is JetBrains PyCharm Community Edition 2018.3.1 x64 which is available for free at : https://...
In this post we’ll deep into the operation of BGP that is a Border Gateway protocol aimed at connecting (routing information exchange) autonomous system in contrast with IGP (Interior Gateway Pr...
By definition, the BGP synchronization rule requires that when a BGP router receives information about a network from an I-BGP neighbor, it does not use this information until a matching route : stati...
In this lab we implement a basic security architecture to demonstrate the operation of a firewall cluster to protect our network. Our “security domain” is segmented into four zones: Our se...
802.11 (4) application (2) architecture (4) asm (4) automatisation (2) cagd (3) chd (2) cisco (6) command (5) controller (1) cost (6) coverage (5) debug (10) distance (6) dtls (2) dynamic rrm (5) firewall (2) fortinet (2) ieee (4) igmp (5) igp (8) interference (2) internet (3) ip (2) logique (2) loop (5) mac (3) machine learning (3) meraki (1) model (2) mpls (3) mroute (4) multicast (5) nat (2) ndp (2) network (3) next-hop (5) nurbs (3) osi (6) pat (2) pim (4) poisoning (6) projet (2) qos (2) radio (5) rib (5) rip (5) route (6) router (6) routing (15) rpf (4) rrm (10) security (3) show (5) simulation (2) sla (2) snr (2) solution (2) split-horizon (5) sql (1) ssl (2) ssm (4) static (6) stp (2) summarization (5) tcp (2) translation (1) travail (2) udp (2) vpn (3) vrf (3) wifi (11) wireshark (2) wlan (7) wlc (5)
- Protected: An example network from scratch: Internet accessThis content is password protected.
- Protected: An example network from scratch: Build the Wifi NetworkThis content is password protected.
- Protected: An example network from scratch: On-premise Network Automation with AnsibleThis content is password protected.
- Protected: An example network from scratch: Build your security networkThis content is password protected.
- Travailler son CVle CV est une étape importante de toute recherche d’emploi, au moins pour initier le processus (répondre à une offre, candidature spontanée, etc.)… plus encore, c’est une occasion de se poser, de réfléchir son développement, son expérience et de se projeter dans une nouvelle opportunité! une approche classique du CV pour nombre de “demandeurs d’emploi”,
M | T | W | T | F | S | S |
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | ||
6 | 7 | 8 | 9 | 10 | 11 | 12 |
13 | 14 | 15 | 16 | 17 | 18 | 19 |
20 | 21 | 22 | 23 | 24 | 25 | 26 |
27 | 28 | 29 | 30 | 31 |