Tuesday, January 31, 2012

Cisco ICND1 Flashcard: DHCP

The starting point for understanding DHCP for the CCNA Exam or ICND1 and ICND2, is that DHCP is based on a client-server model.

There are three types of IP address allocation by DHCP
  1. Automatic - assigns a permanently binding IP address to the client
  2. Dynamic - assigns an IP address to the client for a limited time, until lease expires and the IP address is returned to the pool for reuse
  3. Manual - a network administrator assigns the IP address to the client, DHCP conveys it (not completely sure I understand this to be a kind of DHCP).

The Client requests an IP address allocation and initialization parameters from the DHCP Server through the following exchange of messages.

DHCPDISCOVER
When a client boots up for the first time, it sends a DHCPDISCOVER message broadcast to 255.255.255.255 all destinations with a source IP address of 0.0.0.0 (because it doesn't have one)

DHCPOFFER
The DHCP server receives the message and replies with a DHCPOFFER unicast, and contains fields to specify a subnet mask or the default gateway (router), and other values including the IP address lease time, renewal time, DNS, and NetBIOS name. The message is sent on Layer 2 to the client MAC address. The destination IP address is the address being offered by the server.

DHCPREQUEST
Client responds to the offer with this message, showing intent to accept the parameters, sent to broadcast address (Layer 2 and Layer 3), uncertain if address is safe to use or if another DHCP client will grab it.

DHCPACK
The DHCP Server receives the request message, acknowledges the request with this unicast message

Setting DHCP Pool Parameters using a Wizard
The DHCP pool may be configured from the Cisco SDM page, according to the parameters below
DHCP Pool Name - Name that clearly identifies the DHCP pool
DHCP Pool Network and Subnet Mask- the assigned IP address is drawn from the pool, specifying a starting and ending IP address in the range.

Hints: The IP address range should be within the private address range
10.1.1.1 to 10..255.255.255
172.16.1.1 to 172.31.255.255
192.168.0.0 to 192.168.255.255

Must not use the reserved address in this range specified
The network or subnetwork IP address
The broadcast address on the network

Starting IP
Ending IP
Lease Length - integer number in days
DHCP options
DNS Server 1
DNS Server 2
Domain Name
WINS Server 1
WINS Server 2
Default Router - IP address of router to use as the default gateway
Import all DHCP options into the DHCP Server database

CLI Cisco IOS DCHP server on a router
ip dhcp pool mydhcppool
network 10.10.10.0 /8
domain-name mydhcpdomain.com
dns-server 10.10.10.98 10.10.10.99
default-router 10.10.10.1
lease 7
exit
ip dhcp excluded-address 10.10.10.0 10.10.10.99

Monday, January 30, 2012

Cisco ICND1 Flashcard: Copper Cable Pinouts for RJ-45

There are three types of copper cabling most concerning to Ethernet for the RJ-45 jacks: straight-through, cross-over, and roll-over. You can do a simple visual inspection to determine the pairing and type of cable it is. If you're constructing the cables to a custom length, you could use a special board with the input pins and output pins labelled 1 to 8 and they light up as you decide which order you want them in as you clip on the head. Click!

RJ-45 jacks for Ethernet, also used for ISDN BRI
(Deconflict DB-60 used for connecting synchronous serial interfaces and Cisco routers, configuring WAN links and T1, E1 high speed lines)

RJ-11 jacks for telephone

RJ-48 connectors on CSU/DSU WAN interface EIA-TIA 232 at the customer end.

Cabling

An insulating material covers each individual copper wire in the UTP cable; the wires wrap around each other (twisted pair). They are subject to electromagnetic interference.

Straight Through, UTP (unshielded twisted pair)
Pins 1,2,3 and 6 used
Pin 1 to 1, 2 to 2, 3 to 3, 6 to 6
Best to have the other unused pairs match up too.
Hubs or switches provide the "twist" to match TX to RX
Connects devices at the different layers of the OSI model, ie. Server to Switch

Cross Over
Pins 1,2,3 and 6 used
Pin 1 to 3, 3 to 1
Pin 2 to 6, 6 to 2
Connects devices at the same layer of the OSI model, ie. Router to Router

Roll Over
Used for connecting the console port on router to computer.
Cable is rolled, simply reverse the pins
Pin 1 to 8, 2 to 7, 3 to 6, 4 to 5, 5 to 4, 6 to 3, 7 to 2, 8 to 1
The console port is used for local access to the router, when physical access is required, like for password recovery.


Another way of looking at the pinouts.
Straight Through
sender     receiver
1               1
2               2
receiver   sender
3              3
6              6

Cross Over
sender      receiver
1               3
2               6
receiver   sender
3              1
6              2

HOW TO Setup TFTP Server on Linux to Transfer IOS

To backup a Cisco IOS or to do the Remote Red Hat Linux install, you need a TFTP server.

1. The first step on the Linux computer is to create the file using the command example, touch 2514-config
2. Change the permissions, chmod 777 2514-config
3. The tftp server directory is off root in /tftpboot
4. The files will be sent there

To back up the Cisco IOS, type the command
copy flash tftp
* Not completely sure why it was necessary to create the fake file in the /tftpboot directory first. There doesn't seem to be an issue in Windows when you just navigate to the directory you want to be in.  TFTP runs from the command window in Windows 7.

To back up the configuration, type the command
copy run tftp

To upgrade a newer copy of an IOS to the router, use the command
show flash
(make sure you have enough memory first. Otherwise you will be prompted to erase the flash. Eeeeeeeeerase!)
copy tftp flash
Follow the prompts for the IP address of the TFTP server.

If you have created a configuration file on an external editor, you can load or copy this running configuration into the router.
copy tftp running-configuration

Very easy. Once the file is loaded, be sure to save it by copying the running-configuration to the startup-config in NVRAM
copy run start

I'm not sure what would be the point of issuing a command to erase startup config other than to cause trouble, so use this command with caution if ever invoked, especially followed by a reload command.
erase startup-config





Cisco CCNA Exam and ICND Study Notes
Cisco CCNA Exam and ICND Study Notes by hot barbie geek girls who like lululemon, high heels and ulzzang makeup tips.

Cisco Troubleshoot: Password Recovery

If you have encountered the unfortunate tragedy of losing the password for your Cisco router, do the following steps in order. This post also sounds very similar to the other situation requiring the tftpnld command.

  1. Read the entire list of directions first.
  2. Boot the router but send a break signal using the Break key. In this mode halfway between heaven and hell, set the configuration register to 0x2142
  3. Reload the router
  4. The router comes up into the initial setup dialog. Hit Ctrl C, type enable
  5. Copy the startup config into the running config, copy start run (tricky!)
  6. Change the passwords and save the config file. The letters 'wr' is a legacy command that mean write configuration and is the same as copy run start.
  7. Reset the configuration register to the default value, which should be 0x2102
  8. Reload the router.

Cisco Router Configuration: Cheat Sheet for Router IOS Modes and CLI

Here are some basic commands so frequently used they're second nature and you'll only find them in your Study Notes for the CCNA Exam.

Cisco Command Line interface (CLI). I am most familiar with the CLI, however I was warned that with the newer exams it was important to be somewhat familiar with SDM.

Cisco SDM - Security Device Manager, web based management system to do router configuration. How do you know if SDM is already loaded on a router, show flash.

Several modes in the various stages of IOS
setup mode: when no valid configuration file is found in NVRAM
user mode: to view statistics and basic information. The prompt Router>
Privileged mode: type enable to view and modify the configuration. The prompt Router#
Global configuration mode: to make global changes; to access this mode from the privileged mode, type enable. The prompt Router(config)#
Interface configuration mode: to make changes to a specific interface, type conf t The prompt Router(config-if)#


If both the enable secret and the enable password commands are configured on your router, how do you get to the # prompt?
Enter the enable secret command.


If you try to make the enable and enable secret password the same despite the warning messages, neither will work and then you have to do Password Recovery. This happened to me!

The basic Cisco commands:
enable: puts you in Privileged mode
disable: takes you back to User mode
logout: completely exits the router
exit: exits the current configuration mode
conf t: shortcut for configure terminal, moves you to global configuration mode
int #: you're in the configuration mode of the specific interface by number, example int fast-ethernet 0/15
line console 0: a subcommand from global configuration mode, modifications to console access, passwords line vty 0 4: a subcommand, from global configuration mode, modifications to vty (telnet) access, passwords
line aux 0: a subcommand, from global configuration mode to modify auxilary (telnet) access, passwords
Ctrl Z, end: like logout, disable

The quick reference guide for more Cisco commands
router protocol: in global configuration mode, configure that protocol eg. router RIP
show running-config: in privileged mode, show the running configuration in RAM
show startup-config: in privileged mode, show the startup config in NVRAM
show compress
show post command when the system runs, in order to see if any port had failed a POST test
show controllers: view the hardware related info on the router/ switch interfaces. Does not show operational status of the switchport
show interface: shows detailed information regarding interfaces or specify the interface, eg. show int fa 0/15
more precisely, show interfaces fa 0/15 switchport
show history: shows the last ten commands
show version: displays hardware and software versions
show user: see who has telnet sessions to the router
clock set: clock set hh:mm:ss mmm yyyy
banner [motd | incoming | login | exec]: sets the Message of the Day banner. Incoming for users using reverse telnet, login on all terminals, exec banner used on line activation like vty.
clock rate rate: in interface configuration mode, setting the device as a DCE. The DCE end of cable must be connected and detected to use the command.
bandwidth rate: not for setting the bandwidth rate all, but used for routing protocols to choose the best path
hostname: in global configuration mode, sets the hostname of the system eg. Router1
username: Example username admin priv 15 password cisco username bob priv 7 password cisco
enable password: in global configuration mode, sets the enable password for the router
enable secret: in global configuration mode, sets the secret password. It's encrypted and overrides the enable password. Cannot be the same as the enable password or it's bad!
no ip domain-lookup: this is a handy command to include so that when you make a typo or incomplete command, the router won't assume you are trying to telnet to a hostname and try to resolve it
ip name-server name-of-DNS-server: the router will use this server for DNS
ip domin-name name: this will append the fully qualified domain name to the hostname

show ip route: will show the contents of the routing table
show ip interface: shows the IP information on interfaces (including access-lists)
encapsulation (hdlc | ppp | frame-relay): choose the encapsulation on  serial interface
ppp encapsulation (pap| chap): set the password for ppp authentication
show frame-relay pvc: shows permanent virtual circuit information including the status
show frame-relay map: shows layer 3 (IP) to layer 3 (DLCI) mapping of PVC



Shortcut commands may pop up in the CCNA Exam Questions
Ctrl+ A: move cursor to beginning of line
Ctrl+ E: end
Ctrl+ Z: move back to the EXEC prompt in privileged mode
Tab: complete a partially entered command, autofill
Esc+ F: move forward one word
Esc+ B: move back one word
Ctrl+ F: move forward one character
Ctrl+ B: back
Ctrl+ D: delete a character
Backspace: delete a character
Ctrl+ U: delete everything on a line before the cursor
Ctrl+ W: delete a word
Ctrl+ P: recall the last line
Up and Down arrows: Recall previous older commands or recall more recent commands

Commands related to debug
Before running the debug command, turn on the synchronous logging first.
conf t
line con 0
logging synchronous

Use the debug command sparingly and be very specific for which item you are debugging. Never debug EVERYTHING (debug all) becuase the output buffer to the screen will fill up very quickly and you will be unable to stop it and the router will certainly crash. Privileged EXEC mode -
Add a timestamp to debug or log message
usage: service timestamps debug datetime msec
Display CPU usage
usage: show processes
Disable all debug commands
usage: undebug all (shortcut u all)
Display debug output to current vty session
usage: terminal monitor


Fancy stuff to be used only by a super geek:
conf t: configure from terminal (user input command line interface)
conf mem: merge startup configuration in NVRAM with the running config
conf network: merge startup config stored on a TFTP server with the running config
conf overwrite-network: overwrite the startup config stored in NVRAM with a configuration from the TFTP server

Cisco ICND1 Flashcard: MAC Addresses and ARP

Taking CCNA Bootcamp course prepares you well for CCNA exam success. They've also created two new exams, the ICND1 and ICND2 which is equivalent to the CCNA split over two component exams. Of course that ends up costing twice as much but you'll half the material to study for. Anyway, you'll have know the fine details of basic information such as MAC addresses and ARP.


Which command will you use on a Cisco router to display the arp cache?
a) arp -a (PC Windows, displays arp cache)
b) arp -s
c) show ip arp (that's right!)
d) arp -d (PC Windows, clears arp cache)

The answer may seem tricky because you've probably seen all of these commands used somewhere in Windows or Linux, but only one is for Cisco. You'll have to pick the right one. Read on!
A MAC address has 12 hex digits, each digit is 4 bits, therefore it is also called a 48 bit addressing. The digits are usually listed in pairs or quads.
For example: 00204a32b0b2

1 bit broadcast
1 bit local
22 OUI
24 vendor assigned (6 bits hex)

A MAC address is also called the Ethernet address, found on the NIC card, known within the LAN.

The Ethernet Frame (Layer 2) has a header and trailer; the trailer containing the FCS for error detection. Error packets are just dropped so lost data will be noticed.
However it's at the TCP/IP (Layer 4) where the error recovery will take place, not here in Layer 2.
The Layer 2 Data Link Layer has two sub components:
802.2 is the Logical Link Control, LLC
802.3 is the Media Access Control, like the MAC address
The 802.2 applies to the Ethernet and Token Ring.

The IEE splits the OSI Data Link Layer into two components or interfaces.
LLC - transitions up to the Network Layer
MAC - transitions down to the Physical Layer (assigning a burned in address to a physical device)


A Switch is a Layer 2 device. Switches examine headers, ports, and does buffering (depends on the format of switching).
A switch provides dynamic addressing by learning the source MAC address of each frame received and the associated port number. Commands for clearing away a switch's MAC address table:

show mac-address table d
clear mac-adress-table

ARP (Address Resolution Protocol) is the command to map and IP address to a physical address on the network.  ARP is used to connect the OSI Layer 3 (Network) to OSI Layer 2 (Data-Link).  ARP entries are usually dynamically created by the ARP protocol, for example to find a route to an webpage on the Internet, say http://www.thebarbiegeek.blogspot.com/ but first the laptop computer has to resolve the hostname with  DNS server, and let's say it comes to 10.1.1.1 but before the laptop computer can communicate with the IP address, it must know the corresponding MAC address.
  • Host A checks its local ARP cache to verify if it is a previously learned address. The ARP cache is typically purged after 5 minutes (300 seconds)
  • If the IP address is not found, host A sends out a broadcast that all systems on the physical segment will receive and process
  • Host B recognizes its IP address and will respond with a MAC address to host A
  • Host A now has host B's MAC address, and will proceed to send the data
  • Host A will add to the ARP table, host B's IP address and the matching MAC address


Cisco Command (does this show MAC address of devices in the subnet?)
show ip arp
show cdp neighbors (another handy command that shows the IP address, MAC address and other info of directly connected devices)
clear arp (to flush the arp cache)

The fields in the ARP table:
Protocol - the protocol for the network address in the Address field, say Internet
Address - the network address that corresponds to the hardware address
Age - the age in minutes of the cache entry, or dash (-) means local
Type- the encapsulation type, ARPA, SNAP, SAP
Interface - the interface associated with this network address, say fa 0/0
Windows Command
arp -a
will display the ARP cache table

arp -a -N 10.1.1.1
will display the MAC address assigned the IP address

arp -s 10.1.1.1 00-AA-00-4F-2A-9C
to add a static ARP cache entry for IP address 10.1.1.1 to the physical address 00-AA-00-4F-2A-9C

arp -d the.ip.address.here to delete the mac address it associates, say you are attaching a different networked device with the same IP address.

Linux
ifconfig (displays the network information of the host, self)
arp -a to list the mac addresses
arp -d to delete the mac address associates, say you are attaching a different networked device with the same IP address.

I have used this command many times to assign a new IP address to a specific hardware, found in /sbin/arp -s $unit_ip $unit_mac
Start with the ping or ifconfig command if you have to reference the MAC address.
Where $unit_ip is the IP address and $unit_mac is the MAC address in lowercase without delimiters.
That links the IP address to the MAC address
telnet $unit_ip 1 (might fail)
telnet $unit_ip 9999 (telnet to a port assigned to connect to the hardware)
"Press Enter to go into Setup Mode", and you will enter the IP address octets and the gateway address at the prompts.

Saturday, January 28, 2012

Techie Barbie listed among Hot Geek Girls

Who do you want to coming to your door to fix a computer problem when you call the Geek Squad or Nerds on Site? Either a male contestant from Beauty and the Geek or a real-life smart and beautiful hot geek girl.  Imagine Barbie as a Computer Software Techie or Engineer. Sounds like a hot career choice for this iconic Mattel girl.  Looking hot in heels and boots, we've seen Barbie as Chief Surgeon, Airline Pilot, Army Medic, Astronaut, and even as US President.
Astronaut Barbie Image Source

The chic techie girl Barbie wears fitted black crop Lululemon-like pants and a glam top (decorated with a binary numbers theme), sporting a pink Blackberry, aqua blue Bluetooth headset, nerdy reading glasses and a pink laptop running Linux. Wow they thought of everything!  Gadgets aside though, I'd have to comment that fashion designers at Mattel could've chosen Lululemon work pants and a hoodie for the casual look, or a professional suit from Tristan and American or Club Monaco, and of course heels. They do expect you to be an amazing Computer Software Engineer and look good in heels though probably not a job requirement the Society of Women Engineers and the National Academy of Engineering would agree with.
The Barbie Geek Image Source
Now begs the question, what qualifies someone to be a hot geek girl? The hot part is essential, including the makeup, clothes, accessories, glasses, and.. assets. To be a geek, chic must be intelligent, smart, resourceful, knowledgable and experienced in a technical field, already dominated by men. A job for nuclear scientist, a satellite engineer,  computer programmer, systems administrator, to name a few.

Marina Orlova Image Source
I found an online poll for the hottest geek girl, so I suppose the third criteria must be highly successful in her techie field, and as a bonus, be featured in a magazine widely read by men for looks and merit. You wanna be grammar-spanked by the lovely Marina Orlova. The under-30 Russian blonde owns a youtube phenomenon at two million views per video in her series called Hot for Words, which features her amazing command of the English language and knowledge of etymology of words, which leaves you wondering, what will she wear to the next English lesson? Wired, G4, and Cosmopolitan hail her as one the world’s sexiest geek girls, if this photo or youtube isn't blocked by your company's firewall or internet usage policy.

I stumbled upon another amazing web blog called Geek In Heels, written by a hot korean girl geek. However I couldn't find her picture because it was dominated with photos of her husband and kids. I was actually looking for hot korean girl makeup tips but I found out her web page is ranked number four in Google page ranks and her Google Analytic stats are insane!  Tech Barbie and my Linux troubleshooting notebook are my inspirations for this blog, but that is one hot chic I would like to meet and web chat with, about work.

Friday, January 27, 2012

Cisco ICND1 Flashcard: Router Memory

CCNA exam success (and doing well on the new ICND1 and ICND2 component exams) depends alot on keeping fine details and facts straight, even the mundane details of ROM, Flash, NVRAM, RAM.  The questions are worded a certain way to test your knowledge on a related areas. For example, there could be a question about POST but it is really about which memory is being used.

When a router boots up, it performs a POST, finds and loads the Cisco IOS image software, finds and loads the configurations, runs the software.
ROM - means Read-Only Memory. Stores the router's bootstrap startup program, operating system software, and runs the power-on self test (the POST).  The mini-IOS is also stored here, the basic IO in case of problems with current IOS.

Flash - memory is erasable and reprogrammable read-only, stores the Cisco ISO Software image and is retained after power down and reload.

NVRAM - means non-volatile RAM. Stores the startup configuration. It is writable and permanent, therefore contents of NVRAM are not lost on power down or reload. Since NVRAM holds the startup configuration file, if the NVRAM is empty when the router reloads, you will be prompted to enter setup mode (default).

RAM - means Random-Access Memory. Stores the routing tables, running config.  At system bootup, the IOS loads into RAM and the router uses the startup configuration, which is the reason to remember to do "copy run start" to copy the running-config into the startup-config. Use the shortcut to avoid making a typo with this command. Contents are not retained on power down or reload. Must be fast switching.

Configuration Registers
These digits are binary and hex, and useful to understand when troubleshooting password recovery or IOS upgrades.
0x2102 loads the startup config in NVRAM and the IOS from flash memory, factory default
0x2142 ignores the startup config but loads IOS from flash memory
0x2142 is the mode used for password recovery

When the boot field value of the configuration register could be 0x2 to 0xF, the bootstrap code will parse the startup config file in NVRAM for the boot system command that indicate the name and location of the Cisco IOS image to load. This is the boot plan.

Summary: Finding the Cisco IOS Image
1. Check configuration register
2. Parse configuration for boot system command
3. Default to first file in flash memory
If no valid Cisco IOS image is found in the flash, these actions are taken
4. Attempt to boot from network TFTP server (5 attempts)
5. Boot helper image from  ROM
6. ROMMON when there is no boot helper image or it is corrupt

What to do if you lost your Cisco Router password login.


Cisco Flash
For each Cisco Router purchased, remember to order one with a flash card 128MB or 256MB. I had the mishap with the test router with flash memory of only 64MB which was too small to load an IOS make room for the vlan dat and other things. Cisco issues a Field Notice that covers this same model.

A quick online search lists vendors selling the the Cisco flash cards for $349 made in Thailand or Malaysia by the Cisco manufacturer,  but I found an American website selling them for $68 Made in the USA. They arrived within a week http://kahlon.com/itemdetailpg.asp?itemid=1241198 and they worked just great.
FACT about switches: A Switch learns MAC address to port mapping by monitoring the source address of frames

Study smart and study hard for success on the CCNA exam.

HOW TO Setup Cisco SDM on a Router

Cisco Secure Device Manager (SDM)
Router configuration can be done by the command line interface, however the newer routers and IOS support the new Cisco SDM web-based device management control interface. I was told that the ICND1 Exam contains questions about the Cisco SDM interface. It would help to navigate through the menus.

Cisco SDM is supported on Cisco 830 Series, Cisco 1700 Series, Cisco 1800 Series, Cisco 2600XM Series, Cisco 2800 Series, Cisco 3600 Series, Cisco 3700 Series, Cisco 3800 Series, and some Cisco 7200 Series and Cisco 7301 routers.
Cisco SDM Wizards
Simple router configurations or even advanced settings using the Cisco SDM Wizards can be done remotely (obviously) from the web browser.  The commands take effect when you click Submit or OK, much the same way when you press the Enter key in the CLI. Wizards for the following configurations
Interface and connections: WAN interfaces for PPP, Frame Relay, HDLC, and even DHCP
Firewall: firewall settings
Security audit: perform a security audit on the router, or issue a lockdown (scary!)
IPS: Intrusion prevention system
QoS: Quality of Service policy for outgoing traffic on the WAN interfaces and IPSec tunnels

If it is not already setup by default, start with enabling https.

First create a secure password policy. Use the command
> conf t
> service password-encryption
> hostname myrouter1
> banner motd #Authorized use only... Enter your display message between the two hash signs#

Enable https on the router
> conf t
> ip http server
> ip http authentication local
> ip http timeout-policy idle 600 life 86400
> requests 1000

Create a user account
> username myusername privilege 15 secret 0 mypassword

Configure the user for access by ssh, telnet, local login
> conf t
> line vty 0 4
> privilege level 15
> login local
> transport input telent ssh
> exit

Cisco SDM is stored on the router in flash memory. Launch the Cisco SDM from the web browser window using https://routerIPaddress The java applet will load on the PC with a possible security warning about certificates. Accept the certificate. On the top menu bar there is a button "Configure". This brings the user to "global configuration mode" in a GUI format.


Cisco ICND1 Flashcard: Classes of IP Addresses, Public Routable and Private

This is a quick reference study guide for IP v4 Addressing.

The number in the first octet
Class A 0-126 network.host.host.host
Class B 128-191 network.network.host.host
Class C 192-223 network.network.network.host
Class D 224-239 Multicast addressing
Class E 240-255 Research and Development

Private IP Address Ranges
Class A 10.0.0.0 - 10.255.255.255
Class B 172.16.0.0 - 172.31.255.255
Class C 192.168.0.0 - 192.168.255.255

Hints on addressing
Class A - first binary bin in the first octet is 0 always (so it cannot be 128 which is the next class)
Class B - first two bits of binary in the first octet is 10 (so it is 128 and up)
Class C - first three bits of binarary in the first octet is 110 (so its 192 and up)

Maximum number of hosts
Class A 2^24 -2 = 16,777,214
Class B 2^16 -2 = 65,534
*Class C 2^8 -2 = 254

Class C addressing is most commonly used for small networks
Using 6 subnet bits, how many usable subnet bits are created?
62 = 2^6 - 2
What is the maximum number of bits to borrow to create a subnet for Class C network?
6
Reserved IP addresses
Network address 172.16.0.0
Directed broadcast 172.16.255.255
Local broadcast 255.255.255.255
*Local loopback 127.0.0.0 to 127.255.255.255
Auto-configuration 169.254.0.0/16 to 169.254.255.255

Use the local loopback address to test the NIC card, sending a ping to your own network interface.

Thursday, January 26, 2012

HOW TO Download a Cisco IOS image using tftpdnld ROM mon Command

I used to think ROM mon mode was something bad and scary, like the blue screen of death!  But actually you could interupt a regular startup sequence and jump into ROM mon mode on purpose, using Ctrl-break during a Hyper Terminal session. (or try Ctrl-c or escape).  Anyway, I arrived in ROM mon during a simple Cisco IOS upgrade that went bad.

WHAT WENT WRONG
Hardware: the Cisco 2800 Series

Somewhere along with the way, during a routine copy tftp flash, there was an incomplete copy of the new Cisco IOS software, and I ended up in ROM mon mode. There was no valid image in the flash, so the router would never boot beyond ROM mon so I had to the tftp transfer by tftpdnld in ROM mon mode.

I found a very useful solution on the Cisco Support website, which I can reference and make some notes for myself:
  • HOW TO Download a Cisco IOS image using tftpdnld ROM mon Command Document ID:12714
  • ROMmon Recovery for the Cisco 2600 Series Router and the VG200 Document ID:15079

Understanding tftpdnld
Use the "set" command to view the ROMmon environment variables.
See Cisco tftpdnld Document 12714 set the correct commands for the tftpdnld
Use TFTPDNLD for extreme disaster recovery only to recover the operating system image software via tftp.

rommon 3> set

Here is the sample settings
IP_ADDRESS: 10.10.10.1 (for your router)
IP_SUBNET_MASK:255.255.255.248
DEFAULT_GATEWAY:10.10.10.6
TFTP_SERVER:10.10.10.2 (the laptop acting as the tftp server)
TFTP_FILE: c2600-is-mz.113-2.0.3.Q

TFTP_CHECKSUM = 0 (If prompted, use this as a workaround for the bug).

rommon 9> sync
Use the "sync" command to save the ROMmon environment variables to NVAM

rommon 10> tftpdnld -r
Choose the -r option if you don't want to overwrite the flash, load to DRAM only and launch
-u means upgrade the rommon, system will reboot once upgrade is complete.

There is a question, WARNING: all existing data in all partitions on flash will be lost! Do you wish to continue, say no, but the file reception will still continue.

rommon 16> reload
Reload reboots the router and you should be back in business!

HOW TO Upgrade the Cisco IOS by TFTP
This is what should've happened... a regular run of the mill Cisco IOS Upgrade of course! The intent was to copy a Cisco IOS from a tftp server to flash.
#show running
#conf  t
(conf)# int eth 0
(conf-int-eth0)# ip address x.x.x.x y.y.y.y
set the IP address to one on the same network as the TFTP Server
#show flash
view the name of the current flash image, and make a copy to a tftp server for safekeeping
#copy flash:flashimage tftp://ipaddress/flashimage
#delete flashimage
copy tftp://ipaddress/flashimage flash:flashimage

However the flash memory was too small, which is normally not a big deal but I further damaged the flash card by accidently re-formatting on Windows and not the Cisco proprietary format.

Anyway if there are too many Cisco IOS software images on the flash, you'll have to update the following in the configuration file.

conf t
no boot system flash oldflashimagename
boot system flash flashimage
exit

ROMMON IN CONFIGURATION REGISTER
Check the value of configuration register.
The first four bits of the configuration register indicate the boot field, which defines the source of the default Cisco IOS software image (normally the flash). If it is 0 as in the configuration register value of XXX0 then at startup the system enters the ROM monitor mode prompt.

(rommon)>

Use the "confreg " command to verify the value of the configuration register and where it will look for the
Cisco IOS software image on startup to boot from.
(rommon) 2 > confreg
0 = ROM Monitor
1 = the boot helper image
2-15 = boot system

Make your choice, say 2 and issue the command to router to reset, to take effect.
(rommon) 3> reset

Looking for the Valid Image in Flash
(rommon) 1 > dir flash
(rommon) 2 > boot flash:c2600-i-mz.122-10b.bin

copy run start
wr or reload (does the same thing)

Cisco Field Notice
Months after I needed to decommission this router and do something else with it so I erased the start-up config and issued the reload command. Remember this is a new 256 MB card (not the 64MB card it came with) It went into ROM MON again, I couldn't see the flash and the confreg was set to something wierd. I believe I should've just set the confreg 0x2102 the factory default but I just swapped cards with the other router a 128MB card and it seemed fine. I fragments of a 64 MB error. I'll have to resolve this tomorrow but here's the scoop: http://www.cisco.com/en/US/ts/fn/620/fn62127.html

Cisco Troubleshoot: Restore Switch to Factory Default

It is a bad day in paradise if you have to restore a switch to default. In an extreme emergency and you had to restore the switch to factory default, this is irecoverable and should be done in a test environment first to try it out; never live unless you are absolutely sure of the damage you might causem but actually it's not usually that bad. Well I'm only saying that because it took me four times before I decided to read the directions in the manual.

What is Normal Behaviour?
When a router first boots the following steps happen in sequence (almost the same thing for a switch).
  • The bootstrap in ROM performs the POST (Power on Self Test)
  • The Cisco IOS is loaded into memory (quiz: which type of memory?)
  • The configuration file is loaded into memory from NVRAM

 
I guess you could do this if you could no longer recover the password and the default cisco cisco is no longer valid.  Requires physical access to the switch.
  1. Reconfigure the console login password
  2. Add Vlan 2
  3. Enable Telnet

 
HOW TO Reset the switch to Brand New in Box Configuration.
  1. Unplug everything from each port on the switch, power off or pull the plug
  2. Power on the Switch
  3. Allow POST (Power On Self Test) to complete. The System LED blinks green; RPS, Status, Duplex and Speed LED turn sold green). Wait till System LED remainds solid green and other lights go off (about 5 minutes)

 
Cisco Switch Express Startup Mode
  1. Let the IP address of Laptop be assigned by DHCP. Connect laptop to any Ethernet port on the Switch.
  2. Hold MODE button down for 3 to 7 seconds till the Status, Duplex, and Speed lights stay solid
  3. In the web browser, enter default IP address 10.0.0.1 to load the Cisco SDM
  4. Login with default username cisco password cisco. Note you will be required to change the default password.
  5. Express Startup window, Basic Settings: enter Vlan 2, enter specific IP address of the switch, subnet mask, default gateway and password with confirmation.
  6. Enter new hostname of the switch
  7. Accept the Ethernet Management port IP address 10.0.1.3
  8. Click Advanced Settings to enable Telnet. Set the Telnet password; against most security policies, you might as well use the local password so you won't forget it.
  9. When you click Submit, the new IP address of the switch will be assigned and your laptop will be disconnected. Change the IP address of the laptop in the Network Settings in teh same subnet. Launch the Cisco SDM webpage again with the new IP address of the switch.
Example for adding additional VLAN, another topic:
int fa 0/15
switchport trunk allowed vlan 1-3, 1002-1005

Cisco Troubleshoot: VLAN mismatch

Hardware: Cisco Catalyst 2960 S Series Switch
Use "show version" to display the hardware configuration, Cisco IOS version, names and sources of configuration files, boot images (and boot sequences).

Symptoms:
The "show logging" displays a large volume of CDP messages potentially bogging down the network with warnings about vlan mismatch.

What is a VLAN?
Diagnosis:
Vlan mismatch could indicate that the switch does not have the VLAN 2 created on it, and is being asked to route traffic from a VLAN that is not advertised on the switch. Usually, only the default native VLAN 1 is configured by factory default, but the attached router is advertising VLAN 2.

Fix: Add VLAN 2 to the swtich
Access: Console Access or Cisco SDM (web GUI)
  • If Console login is not configured by default, user must telnet to swtich to configure the "line con 0"
  • If Telnet is disabled/ not configured by default and must be enabled first through the Cisco SDM
  • web GUI.
  • Cisco SDM is a web interface to configure the switch as an alternative to the Command Line Interface

HOW TO Use the Cisco SDM
1) Launch the webpage http://ipaddressoftheswitch
2) Login as cisco, cisco; You will be asked to change after the first login
3) Enable Telnet access to the switch from the Advanced Settings page
4) Use the web menus and configuration tabs, Add VLAN 2 and assign all the switchports to VLAN2

If you cannot open the Cisco SDM webpage because the username login is invalid and cannot be recovered, you can resort to restore the Switch to factory default to use the default login.


Alternatively, you may login as EXEC Privileged, global configuration mode and use the Cisco commands
switch (config)# line con 0
login
password mypassword

This indicates the maximum number of 5 sessions for telnet.
Additional lines may be specified with line vty 5 15
switch (config)# line vty 0 4
password
password myTelnetpassword


Verify Telnet and Assign ports to VLAN 2
Before closing the Cisco SDM or the CLI, verify that you can telnet into the switch from another machine on the network.
switch (config)# int range fa 0/1 - 24
switchport mode acces vlan 2
no schutdown

Do a "show running" on the switch and all the switchports should be ssigned to VLAN2.
This command configures ssh (and removes Telnet access. Beware!)
line vty 0 15
login local
transport input ssh

(if you leave that blank after ssh, then there is no longer any telnet acces)

Cisco ICND1 Quiz: Switched LAN Topology

Collision Domain
The set of LAN interfaces (say NIC) whose frames would collide with each other, but  not with frames sent by an other devices in the network.
- On a Switch one switchport one collision domainÉ. Switchports connected to one device is dedicated bandwidth, and can support full duplex and rate adaptation. Different Ethernet speeds can communicate through a switch not a hub.

Bridges and Routers also separate LANs into different collision domains.
Compare this with a Hub or repeater; does not create multiple collision domains for each interface, it just repeats all frames out all ports.

In a single collision domain the devices share the available bandwidth

Broadcast Domain
The terms refers to where broadcasts can be forwarded. The domain within where one devices sends a broadcast and the others receive a copy. A switch floods broadcast and multicast out all ports. A single switch creates a single broadcast domain.

A router stops the flow of broadcasts.
But an IP ARP  is a LAN Broadcast

Scenarios
Consider a LAN with multiple switches with 500 PC.  The switces are part of the same broadcast domain, so imagine one broadcast sent by one PC is processed by 499 others! A better idea would be to separate 500 machines into five groups of 100, segmented by a router. Then one broadcast from one host would only impact 99 others.
The answers are tricky!

Feature                                                  Hub     Switch     Router
Greater cabling distances are allowed  Y         Y              Y
Creates multiple collision domains       N        Y              Y
Increases bandwidth                              N        Y              Y   
Creates multiple broadcast domains     N         N              Y
You could do VLANs, to segment the device into smaller LANs (broadcast domains) to reduce overhead

Topology
Access switches - connect to end users, like multiple PC hosts.
Distribution switches - provids a path to the core switch. One access switch would have atleast two uplinks to distribution switches for redundancy
Core switches - higher forwarding rates, more aggregation benefits for very large campus LANs.
1. What are characteristics of a bridge? choose three
a) Bridges forward but do not filter data frames between LAN segments
b) Bridges maintain MAC address tables
c) Bridges are more intelligent than hubs
d) Bridges can buffer and forward frames between two or more LAN segments
e) Bridges create fewer collision domains
f) Bridges operate at Layer 3 or the OSI model

2 .Which three characteristics apply to a switch? choose three
a) uses a table of MAC addresses to determine the port to which the data is to be sent
b) connects LAN segments
c) reduces the number of collision domains
d) increases the number of collision domains
e) filters data before forwarding it to the its destination on the network

3. Which three features differentiate switches from bridges? choose three
a) large frame buffers
b) use of a table of MAC addresses to determine the segment to whicih the data is to be sent
c) support for the mixed media rates
d) high port densities
e) ability to segment LANs

4. Which is not provided by flow control
a. Windowing
b. Buffering
c. full duplex transmission
d. source quench messaging

1. bcd
2. abd
3. acd
4. c (explanation: an Ethernet concept)

Wednesday, January 25, 2012

Cisco ICND1 Flashcard: Bridges, Switches on Collision Domains

HOW To deal with Carrier Sense Multiple Access/ Collision Detect (CSMA/ CD) in Ethernet.

 
Bridge
Bridges (I don't see these as often) will divide a single Ethernet LAN into multiple segments, to increase the number of collision domains and reduce network congestion.
Here are some facts about bridges:
  • Bridges operate at Layer 2 of OSI
  • Bridge is a "smart hub", can analyze incoming frames and forward/ drop based on address info
  • Bridges can buffer frames between two or more LAN segments
  • Bridges created more collision domains;  this allows more than one device to transmit simultaneously without collisions
  • Bridges maintain MAC address tables, by examining the source MAC of an incoming frame
Here are some benefits:
  • Bridges can isolate a network problem to a specific segment
  • Filter frames within or between LAN segments
  • Extend a LAN to cover greater distances, joining multiple segments

 
Switch
For example, a Cisco Catalyst 2960-S, 24 ports.
  • Switches operate at Layer 2 of OSI
  • Forward, filter or flood frames based on the MAC table
  • Have many full-duplex ports to segment a LAN into small segments
  • Faster processing, can support different speeds

How does a switch build a MAC table?
The switch builds a MAC table that matches destination MAC address with the port used to connect to a node. The switch examines each incoming frame, the destination MAC address is compared to the list in the MAC table. The switch uses the MAC table to decide to forward, filter or flood frames.

 
What happens when switch examines a unicast frame?
Filter - when the switch determines that the destination MAC address of the frame resides on the same network segment as the source, it does not forward.
Forward - when the switch determines that the destination MAC address of the frame is not on the same network segment, it forwards the frame to the right segment
Flood - when the switch does not have an entry for the destination MAC address in the table, it will transmit the frame out all ports except the source port (the one which it received it from).

 
LAN Switch
These are more expensive, each port has it's own buffer and ASIC chip

 
1. Store and Forward switching, stores data in the buffer until the complete frame is received and error checking, while reading the destination address.

 
2. Cut-through switching, very low latency but subject to errors
  • Fast-forward switching: immediately forwards a packet after reading the destination address
  • Fragment-free switching: ensures enough bytes are read from the source to detect a collision before forwarding.

 
Pickup your own Cisco Study Guide at Chapters-Indigo.ca

Cisco ICND1 Flashcard: Cables and Fiber, Ethernet LAN Connectors

Quiz: Match the type of wiring with the distance
1000BaseCX - copper shielded twisted pair
1000BaseT - that's Cat 5 or 6, four pair UTP
1000BaseSX - that's 780nm laser, 62.5-50micron cores
1000BaseLX - that's 1300nm laser, 9 micron core

(25m, 100m, 250m, 10km)

NIC
An Ethernet NIC (network interface card) is a LAN adapter, which operates both as a Layer 1 (physical layer) and Layer 2 (data-link layer) device, and contains a physical MAC address used in the Layer 2 addressing.

The distance requirements and data rates (available in 10 Mb/s Ethernet, 100 Mb/s Ethernet and 1 Gb/s Ethernet)  will determine the media to use, and the connectors as well.  For example, an RJ-45 connector (has 4 pairs so 8 conductors) is commonly used for unshielded twisted pair (UTP) cable Cat 5. However GigE (Gigabit Ethernet) required Cat 5e (I've heard guyz refer to this as Cat 7 but I believe Cat 5e is the more correct term).

Cables (Copper)
There are two types of Ethernet connection media, copper unshielded twisted pair and fiber optic.
Categories of UTP Cables used for networks at speeds:
  • Category 1: telephone, not for data
  • Category 2: data transmission up to 4 Mb/s
  • Category 3: 10BASE-T, transmit data up to 10 Mb/s
  • Category 4: token ring, transmit data up to 16 Mb/s
  • Category 5: transmit data up to 100 Mb/s
  • Category 5e: transmit data up to 1000 Mb/s (1 Gb/s)
  • Category 6: aka thick ethernet, consists of four pairs of 24-gauge copper wires, transmit data up to 1000 Mb/s
When to use a straight through cable or a crossover cable?

Use a Straight-though cable for joining dissimilar equipment together (the switch will do the crossing):
  • Switch to router
  • Swtich to PC or server
  • Hub to PC or server

Use a Crossover cable to connect similar equipment together
  • Switch to switch
  • Switch to hub
  • Hub to hub
  • Router to router
  • Router Ethernet port to PC NIC
  • PC to PC

Fiber Optic  
There are a variety of Fiber Optic Connector tips, but the most common ones I see are
Straight Tip (ST): barrel shaped connector like a BNC, multimode fiber
Subscriber Connector (SC) or SC-Duplex: square face, push pull connection, single mode fiber
Lucent Connector (LC): small connector, popular for use with single mode, can support multimode

Single mode fiber has a single strand of glass, laser light, high bandwidth for longer distances.

Multimode fiber has several strands of glass, LED light, high bandwidth for medium distances.
2km for 100 Mb/s
550m for 1 Gb/s
300m for 10 Gb/s

GBIC
Cisco Fiber-Optic Gigabit Interface Converter (GBIC) is a hot swappable I/O device for the Gigabit Ethernet port in a router; means that other 1000BASE-X can be deployed without having th change the physical interface, or model of router and switch. GBIC can support UTP (copper) and fiber optics.

A fiber optic GBIC is a transciever, by converting serial electric currents to optical signals, and then the optical signals are converted to digital electric currents. Here are three main types:
  • Short wavelenth (1000Base-SX)
  • Long wavelenth or long haul (1000Base-LX/ LH)
  • Extended distance (1000Base-ZX)

I had to order a bunch of Cisco Fiber Optic SFPs and I made a summary list of what formats they came in, to order the correct one. They just slide into the GBIC card. Here are the main types of Cisco SFP, and respectively the application:
  • Short haul (1000BASE-T; 1000BASE-SX): Cat 5 100m; multimode fiber to 550m or laser multimode (1km)
  • Long haul (1000BASE-LX/LH): both fiber optic (10km) or multimode (550m)
  • Long reach (1000BASE-EX, 1000BASE-ZX): single mode 40km; single mode 70 km
  • 1000BASE-BX10-D/U: single mode 10km 
Decoding naming conventions.
The "10" refers to the speed, that is 10 Mb/s
"BASE" refers to baseband Ethernet
"T" is twisted Pair
"X" is fiber optic
"L" sounds long, like up to 10km
"S" seems short, like up to 250m
1000BASE-CX is GigE over copper, 25m

FUN FACTS from the Cable Guy
The original purpose of the Multimedia Cable Network Partners Ltd was to develop a product and system standard for providing data and future services on CATV plants.
Cable modems enable two-way high speed data transmission using the same coaxial lines that transmit cable TV.
Cable modems provide access speeds faster than leased lines with lower costs and easier installation.

Exam Quiz
What is the distance of 1000BaseSX?
This is multimode fibre using 62.5 to 50 micron core, 780 nm laser up to 260m

What is needed for Fast Ethernet?
How to run full duplex Ethernet - have two 10 Mbps or 100 Mbps paths, two full duplex compatible NICs, loopback disabled, collision detection disabled, corect software drivers to support two simulataneous data paths, see Ethernet distances

Distance limitation for Cat 5 cabling.
Approximately 100 m or 300 ft.

Distance for T1 cabling, Layer 1 Troubleshooting - about 655 feet.
conf t
controller t1 0
Issue the cablelength long controller configuration command in order to configure transmit and receive levels for a cable length (line build-out) longer than 655 feet for a T1 trunk with a channel service unit (CSU) interface. Issue the cablelength short controller configuration command in order to configure transmit attenuation for a cable length (line build-out) of 655 feet or shorter for a T1 trunk with a DSX-1 interface.

Cisco Router Configuration: rate-limit and bandwidth monitoring

For the purpose of managing bandwith usage on peak hours (office hours) and off-peak hours (after work hours), use access lists in the router configuration in conjunction with the Cisco rate-limit command and time related rules,  like enable ntp, scheduler, and the time-range commands.

Mitigate Denial of Service Attack
Another application for the rate-limit command is a method to prevent DoS attacks, by controlling the bandwidth rate or to limite the connection rate of incoming traffic. If used properly, this command will reduce  the impact of an attack on a vulnerable computer. Most effectively used in conjunction with an Access Control List (ACL), a firewall, and an intrusion detection system (IDS). However it may be necessary to establish a traffic flow reporting baseline first.

Firewalls are a separate topic beyond the scope of the course, but I saw a practise quiz question ask about Cisco PIX firewalls.  A firewall is useful for infection containment during threat detection in the mitigation process by splitting the network into different security zones.

Configuration
The full description is found on the Cisco website in the set qos-group of commands, and I have the habit of taking a few notes down for myself. The usage:
rate-limt {input|output}[dscp dscp-value] [access-group rate-limit access list] bps burst-normal burst-max conform-action [action you want] exceed-action [action you want]

To remove the command, use no in front of the whole configuration line.

rate-limit output access-group 100 192000 36000 72000 conform-action transmit exceed-action drop
rate-limit output access-group 101 800000 150000 300000 conform-action transmit exceed-action drop

Where access-list 100 is for office hours
access-list 101 is for off peak hours or after work hours

The three numbers indicating bit rates for the rate-limit command listen in order. The bit rates to use can be calculated form the excel bit rate calculator link below.
bps - average bit rate in increments of 8kps
burst-normal - average burst size in bytes. The minimum value is bps/ 200
burst-max - excess burst size in bytes

Specify a time-range, example if Office Hours were 8am to 4pm Zulu (you'll have to change your numbers to match your real office hours but Cisco uses the time settings in Zulu only. I don't actually work 8am to 4pm Zulu just makes it easy to write this time-range article). The question mark is a symbol that prompts the Cisco IOS to list follow on options you can use.

time-range OFF-PEAK-TIME-RANGE
periodic ?
list days of the week: Monday Tuesday Wednesday Thursday Friday Saturday Sunday
periodic Monday Tuesday Wednesday Thursday Friday ?
specify the time in zulu
periodic Monday Tuesday Wednesday Thursday Friday 16:00 to 23:59
periodic Tuesday Wednesday Thursday 0:00 to 7:59

time-range OFFICE-HOURS-TIME-RANGE
periodic Monday Tuesday Wednesday Thursday Friday  8:00 to 15:59

My question is what happens with Saturday and Sunday? I've been just leaving it blank and assuming that goes full throttle. Never seen anything bad happen so I've been assuming it's working out ok.

Download your own Bit Rate Calculator here:
https://learningnetwork.cisco.com/docs/DOC-7874

HOW TO Remote Network Installation of Red Hat Linux

This is a summary of commands and tools I found useful to do the  Network Installation in a Diskless Environment

Kickstart is an automated installation tool set used by Red Hat Linux to perform automated or unattended OS Installation and Configuration. Process in simplified steps
1. Boot the machine from a CD/DVD, USB device or over the network using PXE, DHCP or TFTP
2. The Kickstart file shall be located on the boot media, accessible over the network, and will be downloaded
3. Linux OS installation is launched, the system will consult the kickstart file for the location of the Installation Tree file.
4. After accessing the installation tree, the rest of the configuration information should be in the kickstart file without too much need for user intervention.

Jumpstart is similar to Kickstare, for Solaris OS. Easier to manage multiple system installations with the same configuration over time (meaning you probably can't do them all simultaneously) but I could be wrong.
1) Move and Expand Files Required on the TFTP Server
Red Hat AS 5 Operating System, example: rhas5_u2.tar
Rebuild Server Kickstart file, see AS5_U2ks.cfg
DHCP configuration file, see dhcpd.conf

On the host asting as the NFS and TFTP server, create a directory called /apps/LINUX
Place the rhas5_u2.tar file there
Expand the file: tar -xvf rhas5_u2.tar

2) Edit the DHCP Configuration File
The host which is to host the NFS mounted OS files and conifguration files must provide dynamic hosting of the IP addresses.
Copy the dhcpd.conf file to the /etc
Type: dhcpd service reload
Type: dhcpd service restart

3) Place RedHat in the NFS mount directory
Make the RedHat installation files in a directory that can be NFS mounted by the client host. Add this line to the /etc/exports file using a vi editor.
/apps/LINUX 192.168.2.1 (sync) *(ro)
Note, please use your own specified IP address. This is the host which is the client PXE booting the requested O/S.  This allows the host to PXE boot and access the NFS mounted files also called kickstart and linux images.

The NFS server must be restarted with the command issued in terminal window:
service NFS restart

4) Enable TFTP
To list the status of all the services (user should be logged in at runlevel 5)
in  a terminal window  type the command :   ntsysv

A window opens with an alphabetical (a-z) list of services. Use the  Down arrow key to scroll to  “iptables”  . If there is an asterix next to “iptables” this means it is selected to start at reboot. The “iptables” service is for the firewall and it should be off.   Use the  spacebar to toggle the asterix off so that the “iptables” service is inactive at startup.


Use the Down arrow key to scroll to “tftp” service . Use the spacebar to toggle the asterix on  so that the “tftp” service is active at startup.

Use the TAB key to highlight “OK” button and select Enter to dismiss the window.

5) Disable Selinux
In a terminal window  type the command “sestatus” to display the security status.
SELINUX status should be displayed as   DISABLED.

 If it is enabled , edit the /etc/selinux/config  file  and change the line from: selinux=enabled   to: selinux=disabled

Save the file

6) Reboot/ BIOS settings for PXE Network Enabling
Reboot the server .

When the BIOS is displayed (DELL Logo) press F2  (Setup).
The setup window will load. Using the down arrow scroll down to integrated devices.

Enable eth0  with PXE enabled.
Enable  eth1  without PXE enabled.

Press escape and save the changes.
The server will continue to boot from here.

The server can now provide DHCP related protocols on eth0.

The server which will be PXE booting to load the OS must also have eth0 enabled with PXE and have physical network connectivity to this (in this example 192.168.2.1) server.


Under construction:
7) Setup Network booting on the boot server

Sample Kickstart file

Sample DHCP Configuration File for Boot Server

Bootable CDROM install option selection/ Create the Anaconda-ks.cfg file

Training for a Competition

There's an event in Ottawa on Saturday June 9 if you're game? I haven't quite decided it I should go for a team relay or do one on my own.  A Triathlon is a very competitive individual sport, but at the same time when you join a local triathlon club there's a lot of value in training together. The Ottawa Triathlon Club offers a training studio, workshops and even power swim lessons.

http://somersault.ca/eventottawariverkeeper.htm
Here is a summary of the events & distances. Sign up before January 31, 2012 for an early bird discount.

* Olympic Triathlon & Relay - 1500M Swim / 44.4Km Cycle / 10Km Run
Sprint Triathlon - 500M Swim / 23.7 Km Cycle / 5Km Run
* Try A Tri & Try A Tri Relay - 200M Swim / 13.3Km Cycle / 3Km Run
Super Sprint Triathlon - 200M Swim / 13.3Km Cycle / 5Km Run
Canoe Triathlon - 5Km Paddle / 23.7Km Cycle / 5Km Run
Kayak Triathlon - 5Km Paddle / 23.7Km Cycle / 5Km Run
Olympic Duathlon - 5Km Run / 44.4Km Cycle / 10Km Run
Olympic SwimCycle - 1500M Swim / 44.4Km cycle
Swim Sprint Triathlon Relay - 500M Swim / 23.7Km Cycle / 5Km Run
Canoe Triathlon Relay - 5Km Paddle / 23.7Km Cycle / 5Km Run
Kayak Triathlon Relay - 5Km Paddle / 23.7Km Cycle / 5Km Run


Make a committment to always do your best. Set a goal and take manageable steps daily.  I was doing some soul-searching to make a list of things I'd like to do before I die, and doing a Triathlon seemed like a good idea at the time. (I'll start with doing a doing relay with two other able-bodied teammates) If you're committed to working out, you could reward yourself with fashionable Lululemon Athletica clothes to arrive in style at the gym, and keep fit. Don't forget to eat well and sleep well too.

For all-purpose, ultra glamorous swimwear (not necesarily appropriate for race day) Victoria's Secret has an impressive product line.  Additionally Lululemon might not have swimwear but you could definitely find something for running and biking, in addition to yoga.

I stumbled upon a collection of "30 Thoughts for a Victorious Triathlete" inpsirations to conquer your toughest race by Coach Julian Dean, that I'd like to share. Check out http://www.triathlongeek.com/

Monday, January 23, 2012

FREE Bootable Linux Image CD

Of course it's free if you Do It Yourself!  The bootable disk should contain only one file, a *.iso file. Oddly, when you view the disk contents in Windows you will see directories with the required files.

The secret command is mkisofs. To create a bootable Linux installation CD for your new server, these are the files (names may vary) you will need from an existing server with the similar hardware, operating system and revisions:
  1. initrd.img
  2. isolinux.bin
  3. isolinux.cfg
  4. linux (kernel)
  5. boot.cat
* Where isolinux is the original directory where all these components reside

1. Create the iso file
Do a man mkisofs
the slash \ allows you to keep writing the same command on the same line

--mkisofs -o /tmp/MyBootImage.iso -b \
isolinux.bin -c boot.cat -no-emul -boot \
-boot-load-size 4 -boot-info-table \
-R -J -v -T isolinux

Process takes a couple of minutes, go grab a coffee.

2. Burn the MyBootImage.iso to a CD or DVD
Hints: If you're using a Windows Nero program, make sure that you choose a Project or Bootable Image format with the file type *.iso A data CD will not boot, as this is a common mistake.

3. Using your CD or DVD
Make sure your RAID configuration is set properly.

Make sure you choose the correct boot sequence.

Simply load the disk into the tray. Make sure that it is a DVD going into a DVD drive (I've made that mistake before on a Dell 2850, so I had to swap out the CD drive for a DVD drive).

FREE Long Distance Calling


Of course it's free if you Do It Yourself!  And I'm not talking about a Magic Jack (see it on the scrolling slideshow). This is a VoIP network I setup while my guy was posted overseas. We were able to stay connected through a homegrown VoIP service.  Everytime that phone rang, I called it the "Bat" phone cuz I envision this to be the service Batman himself must be using, right? If I missed the call, the voice mail was sent as a wav file to my email!  The service was provided by ICONSA.CA 


How to set up a VoIP network
Plug and play, what else can I say? Seriously, though when connecting a VoIP phone to the network, you can buy a wired VoIP phone that connects directly to the switch or a wireless VoIP phone that is connected to the switch via an access point. I found this one online recently and it simplifies completely the setup I used to own. For example, http://www.voiplink.com/Cisco_SPA301G_1_Line_1_Ethernet_p/cisco-spa301g.htm


Well that is presuming I have a Cisco Catalyst switch, which offers a separate voice VLAN to overlay the voice topology onto the data network. Once again this is plug and play, because the voice VLAN feature is usually automatically configured. Simply plug the phone into the switch, and the switch provides the phone with the necessary VLAN information. Make sure you choose a model that supports PoE (power of Ethernet) to avoid having another power cord to contend with.


However, back to the home network which requires something less costly than a smart Cisco Catalyst switch but a bit more wiring.  I presume this is the same equipment my grandma uses for her "land-line" that is a VoIP phone connected to her internet service.


Here is the Cisco Linksys VoIP Internet Phone Adapter I eventually sold on ebay for only $19.99.

 



The PAP2T offers the benefits of high-quality voice over IP (VoIP) without the need to upgrade your existing analog phones.  The following weblink has more specs from the manufacture...

Saturday, January 21, 2012

Hidden USB Keys

How do you sneak in a USB key? Wear it on your neck hiding in plain site, disguised as something rough and tough like the Razor Blade Necklace USB Key that ships with "The Girl with the Dragon Tattoo" soundtrack boxed set. How will it look on you?

Perhaps something less edgier to mark the first day of the Lunar Year of the Dragon. Happy Chinese New Year! For a little bit of luck, you could carry around a USB stick hidden as Hello Kitty in a Dragon costume. Where to buy your own Hello Kitty!
If you like the Calvin Klein bling factor, this is the spy-wear for you. Read more at technabob, found via Ubergizmo




For a thousand other good ideas on the best hidden USB keys, check out this photo gallery someone has already created.

Lululemon Warehouse Sale

Braving twenty-something degrees subzero temperatures on Friday yesterday in Ottawa, thousands of women arrived in droves and fought through crowds of very athletic and ambitious like-minded women to grab something from the Lululemon Warehouse Sale in Ottawa.


http://www.ottawacitizen.com/business/Ottawa+Lululemon+warehouse+sale+attracts+throngs+Centre/6027711/story.html?cid=megadrop_story

It was 9am and I was somewhere other than where I wanted to be... with these thousand other women who had waited hours to get in! I was on my computer at work, reading about the sale. Even my coworkers, who happen to be men, were wondering why I wasn`t missing work to be there. Seriously, I couldn`t more than agree.  Anyway they were getting the occassionally live update from the girlfriend, wife, daughter etc.  My husband on the other hand is the guy looking up the stock market online, and checking how good his Lululemon is doing today.

I waited until 7pm to get there after work, after the gym, after swimming; perhaps hoping the mad crowd would`ve somewhat dispersed; knowing all the good stuff would be gone, and the early morning crowds would`ve moved on. I couldn`t even get to the $7 parking lot gate entrance, where among other vehicles I was told by security that the fire marshall had to close the event and limit further admission. Apparently this already happened at 6:15pm.

It was easy for me to just make a quick U-turn in my zippy little black Prius, while watching the long line of other vehicles, hopeless to face the same fate. Needless to say the husband felt that much richer since I didn`t end up buying anything at the Lululemon Warehouse Sale, and guess what he was doing when I got home.

Sale Day 3
I did end up going to the Lululemon Warehouse Sale on the final day. The final tally: one faux-fur trim hoodie in white, grey track pants, and six men's items for $100. Glad I waited till the last day. I only lined up less than 10 minutes to get in to the sale, and 1 hour to pay. I parked far though, cuz I wanted to free parking. Not many people could say they trekked in from the NRC wind tunnel to save the $7 on parking.