I got so curious to know about power consumptions by each card in Nexus 7K and Cat 6095 and calculated power consumption as per typical requirements. It is very evident from the following data that Nexus 7K draws double the power, but it also provides double the port capacity on certain modules. The fan modules draw very high amount of power in Nexus 7K.
Wednesday, September 24, 2008
Power Consumption comparison between Nexus 7K and Cat 65K.
8700 Watt Enhanced AC Power Supply for Cisco Catalyst 6500 Series Switches.
Watch movies online for free.
Tuesday, September 23, 2008
Displaying Hardware ACL hit counters.
This command should help us in identifying the ACL hit count on 6500, which makes most of the ACL filtering on Hardware. The hit count we see on Show access-lists only shows the hit count when the packets are filtered using processor.
show tcam interface vlan
This command will be useful when we would like to clean the ACLs with hit count zero.
Wednesday, September 10, 2008
Some important points of ASA.
Multiple context mode does not support the following features:
- Dynamic routing protocols. Security contexts support only static routes.
- You cannot enable OSPF, RIP, or EIGRP in multiple context mode.
- VPN
- Multicast routing. Multicast bridging is supported.
- Threat Detection
Wednesday, September 03, 2008
Some important notes about ASA 5500.
Some important notes about ASA 5500.
-----------------------------------------------------------------
When the security appliance is configured for IPSec VPN, you cannot enable security contexts (also called firewall multmode) or Active/Active stateful failover. Therefore, these features are unavailable.
Phase 1 ISAKMP negotiations can use either main mode or aggressive mode. Both provide the same services, but aggressive mode requires only two exchanges between the peers totaling 3 messages, rather than three exchanges totaling 6 messages. Aggressive mode is faster, but does not provide identity protection for the communicating parties. Therefore, the peers must exchange identification information prior to establishing a secure SA. Aggressive mode is enabled by default.
• Main mode is slower, using more exchanges, but it protects the identities of the communicating peers.
• Aggressive mode is faster, but does not protect the identities of the peers.
IPSec over TCP works with remote access clients. You enable it globally, and it works on all ISAKMP enabled interfaces. It is a client to security appliance feature only. It does not work for LAN-to-LAN connections
Preparing for an interview?
Are you preparing for a tech interview and not sure about type of questions people will ask, you can use the following website to look into some typical tech questions you normally get in interviews.