I recently wrote an article for Bluecoat describing how to limit Skype access based on usernames and passwords. The article is available here. This got me wondering if I can achieve the same functionality that the Bluecoat ProxySG offers but using open source programs. In short…. yes we can with a little tinkering. For those … Continue reading User based access control for Skype
If you are the admin of a cisco (and sonicwall now in the newer firmware) network, NetFlow is a good and easy way of gathering insight into what exactly is passing through your cisco. Apart from seeing link usage, netflow also allows the admin to see which protocols, ports and hosts are being used. This … Continue reading Configuring basic cisco network traffic monitoring with ntop and NetFlow
During troubleshooting, or even when setting up an unfamiliar server, it’s quite a common question to ask what software / packages is actually installed on the server you’re working on. For example, I got asked to install Joomla on a server I’ve never touched before. I needed to check which of the prerequisite software packages … Continue reading Quick Tip : What software do I have installed on my Ubuntu / Debian server?
Trying to do more with less is definitely one aim that virtualising helps you achieve. There are quite a bit of guides on how to use GNS3 to build a virtual cisco lab. There are also very good guides that explain how to bridge your physical LAN to the virtual cisco lab. A really good … Continue reading Creating a virtual cisco router (VMWare ESX + GNS3 + Linux)
Update: The method I go on to describe is over complicated for the objective. Matt in the comments section pointed out a much easier, OpsView method of doing this. Still, the below is a good exersize in bash / gnuPlot scripting. So, OpsView has away around it's own limitation of not graphing host checks. Thanks … Continue reading OpsView, bash and GNUplot
There are plenty of guides on how to setup SSH login to a remote host without having to provide a password. The one I followed was: http://www.cyberciti.biz/faq/ssh-password-less-login-with-dsa-publickey-authentication/ It essentially is just creating a pair of files on your local machine: your private key and your public key. The public key must be sent to the … Continue reading Nugget post: Lessons learned in SSH password-less login
The scenario I faced is probably typical of many IT guys who work from home: I needed to connect to my work VPN but I prefer to use my more powerful linux machine from home. IT here only really support windows so I was on my own here. The VPN uses cisco technology, and IT … Continue reading Small note: Linux and Cisco VPN client (vpnc)