CISCO vs Juniper – Comparing 10 Common Network Commands

CISCO vs Juniper – Comparing 10 Common Network Commands

Configuration
Introduction Are you a CISCO or Juniper person? Have you ever wondered what certain commands look like in CISCO’s IOS, or in Juniper’s Junos? This article covers 10 common network engineering commands and compares the CISCO vs Juniper version. Tasks 1. Change Host-Name Every device has a device name or hostname. This is an easy way to know which device you are currently logged into. Most network administrators give their network devices hostnames that describe what device it is and what it does. Think of a core router located at your main office, you could use a hostname like “CORE-RTR-HQ”. The more descriptive the name, the better. CISCO Router(config)# hostname CORE-RTR-HQCORE-RTR-HQ(config)# Note how the prompt changes from “Router” to “CORE-RTR-HQ” which is the new hostname. Juniper root@# set host-name CORE-RTR-HQroot@CORE-RTR-HQ#…
Read More
The Untold Power Behind CISCO Network SPAN

The Untold Power Behind CISCO Network SPAN

Configuration, Tips n Tricks
They say “Knowledge is Power”, well I believe that “Applied Knowledge, is Power”. - Eric Thomas. Being a network administrator for the past 8 years, I have learned many lessons through experience and learning. Key among these is that the more you know your network, and the more you can see on your network, the more effective you will be as a network admin. There is true power in being able to monitor all the traffic that flows through your network. Seeing all of this traffic lets you quickly and effectively find and fix problems. To be able to quickly see a point of failure, identify which user, or which traffic is causing the issue and fix it, really is a skill that you cannot put a price on. I…
Read More
Secure your CISCO device in under 3 Minutes

Secure your CISCO device in under 3 Minutes

Configuration
With these Simple Easy to follow commands, secure how you connect to your remote CISCO device in less than 3 minutes. In my last post, I shared how I have come up with a list of commands that I have used over the years to set up new CISCO devices (Routers & Switches) when they are straight out the box. This list includes device host names and local user accounts e.t.c. An important part of initial device configuration is adding in some security, so that your device is safe from intruders. One weak point in your network or organization's network can often prove costly in today’s world. A very important security feature that must be at the front of your mind, is securing the remote connection to your network device.…
Read More
7 easy commands to setup your new CISCO device

7 easy commands to setup your new CISCO device

Configuration
So you have just cracked open a brand new CISCO device for your organization, and now you need to set it up. Where to begin? I have found myself in this situation many times. The initial commands you give your device will lay a foundation for how you eventually set it up. I have found that having a standard set of initial commands for new devices speeds up and automates the setup process. Over the years i have put together a number of commands that get my devices ready quickly. These base configurations include things like host name and local user accounts. I use these same basic commands for every new router or switch i setup I have broken them up into two main categories, check them out below. Device…
Read More
Find Top Talkers on your Network-With 4 Easy Commands

Find Top Talkers on your Network-With 4 Easy Commands

Best Posts, Configuration
Which Users are pulling the most Bandwidth on your Network? Find Top Talkers on your Network-With 4 Easy Commands. A slow sluggish network is one of the most frequent complaints received by network administrators. The most common cause of this a slow user experience is Link Saturation, or link chocking. Wether it’s an Internet link that is being used to full capacity or a Remote Branch link that has been maxed out, we often experience poor performance on the LAN because of over-utilization of one of our links. A quick easy way I have found to pinpoint which user on your LAN is abusing your network resources (often someone downloading Torrents) is to use the ‘Top-Talkers’ and the ‘Flow’ feature on your CISCO router. Top-Talkers will allow you to collect…
Read More
4 Steps to setup CISCO IPSEC VPN

4 Steps to setup CISCO IPSEC VPN

Configuration
After completing these 4 easy to follow steps, you will have your Secure VPN tunnel up and running. If you are new to Computer Networking, A VNP can be thought of as a secure tunnel That runs across the internet from one location to another. It allows you to to build a secure path through the internet so that the data you transfer remains private and more importantly remains safe. Yes… It’s possible to configure an IPSec (IP Security) Site-to-Site VPN using only 4 key steps. It may sound a little far-fetched, but in the next few minutes, I will walk you through the process of configuring a fully functional IPSec VPN from scratch. At every step I will show you the commands needed to make it happen. I will…
Read More