Category: Configuration Example
Configuration Example, Wireless
Aruba WPA2 with MAC authentication
Configuring an SSID with WPA2 Pre-Shared key or Enterprise authentication and encryption is very common. Sometimes you would like to add an extra authentication method. Although this method isn’t very secure, MAC authentication is still used as an extra method to strengthen the level of security of a wireless or wired network. These days I … Read More
Configuration Example, Routing
Cisco DHCP server & VRF
I had some issues while configuring some VRF’s on a Cisco router and using that router as a DHCP server. First of all the router wasn’t binding any DHCP request. The DHCP server configuration is defined below. ip dhcp pool guest vrf vrf-guest network 10.10.0.0 255.255.252.0 default-router 10.10.0.1 domain-name internet-only.nl dns-server 208.67.222.222 208.67.220.222 The configuration … Read More
Configuration Example, Management
SecurEnvoy: debug logging
To get more logging from SecurEnvoy SecurAccess on a Windows server you have to add the following line to the file local.ini. Debug_admin=True A log file will be created with detailed logging. The log file is created under C:\Debug\admin.txt.
Configuration Example, Switching
HP A4800G – DHCP relay
This article isn’t very difficult and spectacular. It is just for me as a quick note to configure DHCP relaying on a HP A4800G switch. The configuration of this type of switch is a little different compared to Cisco and/or legacy HP ProCurve switches. The following steps are required to configure DHCP relaying: <SW01>system-view System … Read More
Configuration Example, Switching
HP Virtual Connect Manager
While change the configuration of within a HP Virtual Connect Manager I noticed that I didn’t have any options to delete server profiles, Ethernet Networks or Shared Uplink Sets within the web browser. I needed to change the configuration dramatically from an active / standby configuration to an active / active configuration. I also needed … Read More
Configuration Example, Firewalling
McAfee Firewall – NAT mapping
While testing a McAfee Enterprise Firewall running software 8.2.0, I had some problems with the creation of a NAT mapping. The firewall is configured as standalone firewall. All (NAT / access rule) configuration on the firewall is done using Access Control Rules. McAfee uses two types of NAT mapping: NAT: mostly used to translate a … Read More