Simon PainterSomewhere to keep things


Sergeant Clip Review

Full disclosure: I received some free samples and have worked with the inventor at a former employer. I don’t have any financial interest in the product though. I was quite excited to get my Sergeant Clip samples through as the inventor had told me about them in the past and I have been involved in […]

Read more

The best ‘bug’ I have ever seen…

Way back in October 2013 Cisco slipped out this little field notice to customers and engineers across the globe. The position and function of the mode¬†switch is such that it can be pressed by the protective boot on certain types of cables and cause a reset to factory settings. Problem Description Certain types of snagless […]

Read more

Tags: , , ,

Router migration using dual-as

I am working on a project that involves moving a router from one BGP ASN to another. The topology above shows the current situation and we want to move R2 to ASN20 and have it hooked up to R4 instead of R3. Normally this would be pretty trivial however the owner of R1 in ASN […]

Read more

VRF Lite with redistribution between BGP and EIGRP

Some of my posts are just things that I was pretty sure worked but wasn’t 100% on how it worked and what the exact config looked like. In these situations if I can’t find something in a blog or on the Cisco site I post something to make it easier for the next guy trying […]

Read more

Route summarisation

I found a very clever site that does route summarisation from a list. This is ideal if you dump out a copy of your routing table and want to see where the routes can be summarised. It’s also useful if you have subnets for a firewall rule that you want to consolidate.

Read more

Getting your underpants inside out over NAT

A colleague asked me to write a post on NAT and so this one is for him. I’m going to use a very basic three router lab to go through the common types of NAT and where they are used. First off there is the convention of inside and outside interfaces.¬†The golden rule here is […]

Read more

Logical look at masks

Having done an introduction to wildcard masks and the cool things you can do with them I thought it might be worth writing about the logic behind both subnet masks and wildcard masks. Masks use two of the most basic logical functions that computers can perform, a logical AND and a logical OR. Logical AND […]

Read more

Getting Wild[card masks]

If you ask most people what a wildcard mask is they’ll probably say it’s an inverse subnet mask. That is a massive under-representation of the power of a wildcard mask and does not do fair justice to the range of useful tricks you can do with a wildcard mask. We’ll start with why people think […]

Read more

Stats on concurrent SSL VPN sessions.

In the past I always used ‘sh cry is sa’ to give me a view of the number of concurrent VPN sessions on an ASA. I am involved in an Anyconnect SSL VPN roll out and today I was asked to pull off stats on how many users are connected to each solution. The following […]

Read more

Tags: , ,