Posts

Showing posts from September, 2013

CHECKPOINT SPLAT + R75...

If you don't have Nokia Check Point Hardware Appliance no need to worry. Just download SPLAT iso file and start the same on any desktop or VM. Steps For Installing SPLAT.... COMING SOOOON !!!!!!!!!!!!

BGP Address-Families

The BGP, as you surely know, has a multi-protocol capability - in a single session, it is capable of carrying information about diverse routed protocols (IPv4 Unicast, IPv4 Multicast, IPv6 Unicast, IPv6 Multicast, VPNv4, CLNP), in BGP's parlance called "address families". With BGP being a true multiprotocol routing protocol, however, you need some means to tell BGP which address families should be exchanged with a particular neighbor. We are accustomed to the fact that if we define an IPv4 neighbor, we are planning to exchange IPv4 routes with that neighbor - but why should that actually be a rule? Why should we make hasty assumptions about the address family just because the address of the neighbor is from a particular family itself? This is the point behind diverse address-family commands. Defining a neighbor under a particular address family means that we want to exchange routes from the particular address family with that neighbor. Not having a neighb

BYOD---If U Want to access your official mails or applications on Tables/Iphone/Smartphones in Work Place :) :) :)

What is BYOD?     [BYOD] is about being innovative and helping your employees to work better. As many IT departments struggle to keep up with yearly technology changes, company employees increasingly want to use their own devices to access corporate data. As part of this consumerisation, BYOD encourages company employees to work on the device they choose - accessing corporate email on their   own PCs, smart phones or tablets or Other mobile devices. The goal is to Increase productivity and reduced costs. Why BYOD?? The driving force behind BYOD is a new IT self-sufficiency among company employees who already own and use personal laptops, tablets and smartphones. These mobile devices are often newer and more advanced than the equipment deployed by many IT departments. It's hardly surprising that the rapid adoption of lightweight Ultrabooks , iPads and large-screened phones are changing the way that people want to work. BYOD benefits and advantages There

Fortigate : Ver 5.0 Memory Leaking Issue....

Fortigate : Ver 5.0 Memory Leaking Issue.... 1) Use the command #disgnose sys top 5 20 2) Check the process taking higher memory utilization.. 3) In my case i found "pyfcgid" taking multiple memory sessions. 4) Earlier we used to restart the firewall which can create business downtime if your firewall is not in HA mode. Later i found a better way to restart it "fnsysctl killall pyfcgid". 5) It solved my problem.Now at any time if i found memory above 65%. I simply kill the processes.