Play Video
Featured videos

A Video Collection For Entrepreneurs

Article Category

Latest Articles

Browse videos

Installing and Configuring PowerDNS with Poweradmin in CentOS

Installing and Configuring PowerDNS with Poweradmin Add Repositories # yum install yum-priorities # rpm –import http://www.jasonlitka.com/media/RPM-GPG-KEY-jlitka # nano -w /etc/yum.repos.d/utterramblings.repo [utterramblings] name=Jason’s Utter Ramblings Repo baseurl=http://www.jasonlitka.com/media/EL$releasever/$basearch/ enabled=1 gpgcheck=1 priority=1 gpgkey=http://www.jasonlitka.com/media/RPM-GPG-KEY-jlitka Installing MySQL # yum install mysql mysql-server # chkconfig –levels 235…

Installing and Configuring PowerDNS on CentOS

Installing and Configuring PowerDNS with PowerAdmin from Source Pre-requisites ============== # yum group install ‘Development Tools’ # yum install libxml2-devel gd gd-devel libmcrypt-devel libmcrypt libmhash curl curl-devel libtool-ltdl-devel libtool-ltdl libpng-devel imagemagick ncurses ncurses-devel pce-devel zlib-devel bzip2-devel Apache 2.2.15 ============= #…

PPPoE Dialer or ADSL Setup on CentOS

PPPoE Dialer or ADSL Setup on CentOS, Fedora and Redhat  1. Find the package >rp-pppoe rpm -qa | grep rp-pppoe 2. If not installed , install it from the cd> rpm -ivh rp-pppoe 3. Login as root. 4. Type adsl…

Juniper Basic ZONE Configuration

At first you must declare ZONE information at any Juniper firewall device. Here I describe two types of ZONE with simpleast way. Trust and Untrust. Basically TRUST zone is your LAN SIDE And UNTRUST zone is your WAN SIDE. First, you…

Juniper NAT Configuration in SRX

There are different types of NAT that you can configure as per your requirement. Different types of NAT are, source NAT, destination NAT and static NAT. Here giving example of static nat which is based by pool. First, you need to…

Creating a Simple Routing Policy

You want to advertise configured static routes to adjacent OSPF neighbors, going beyond the OSPF default of advertising only the routes learned from an OSPF neighbor. To modify the route advertisement behavior, create and apply a routing policy. First, create…

Juniper Creating Policy with Term

Here I create three terms on a single policy-statement. Policy Statement Name is “Upstream”. First term name ISP-1, Second term ISP-2, Third term name is ISP-3 and Finally I make term that is Reject. That mean only those prefixes will…

Filtering Routes by IP Address with Prefix-List

If we want to filter unwanted prefixes from our routing table, we can filter those prefixes with a list and in this scenario, we can create a prefix-list. Here I am showing how we can create a prefix-list Create a list of all…

How to Show VPN Routing Tables

Viewing the VPN Routing Tables You want to check the routing tables on the PE routers to determine that they contain all the expected routes. The show route command displays the contents of all routing tables on the PE router:…

How Juniper Routing Policy Works

A advantage of route lists over prefix lists is that each prefix can include an action. When a match occurs, the action is taken immediately instead of waiting to reach the then clause. When the list of prefixes is long,…

Juniper Route Preference Value

The Junos OS routing protocol process assigns a default preference value (also known as an administrative distance) to each route that the routing table receives. The default value depends on the source of the route. Ranks routes received from different sources…

Juniper VPN Configuration for two Customer

Adding a VPN for a Second Customer You want to configure a single PE router to keep the traffic for the two different VPNs separated. Configure the VPN for the second customer on the PE router: [edit   routing-instances VPN1…

Juniper Layer 3 VPN Configuration

Setting Up a Simple Layer 3 VPN You want to set up a Layer 3 VPN for a customer who wants a private network for internal network communication and transactions. Creating a Layer VPN for the customer involves setting up…

Block Telnet and SSH Access on JUNIPER

If you want to restrict access to particular source IP then this is the right topics for you. First need to create Allow Rules for IP Block and port. Here I use allowed IP Block 192.168.1.0/24 and allowed port ssh and…
Article Category

Popular Articles

About the motion

What you will learn with our Videos

Pork belly portland fingerstache pitchfork dreamcatcher, retro lo-fi deep v chillwave fixie kitsch bitters ugh normcore shoreditch. Pitchfork mlkshk retro, swag master cleanse pork belly 3 wolf moon kitsch deep v VHS authentic DIY. 

inspired

We are inspired by challenges

creative

We are creatively adaptive

resourcefull

We are experienced and resourceful