Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcuts
Coming soon
Score hidden · 35 minutes ago

No issues.

I'm not going to pretend that physical appearance is not going to be part of my attraction to someone else, but there are far more important things for me to be attracted to. As long as I don't have to walk on eggshells to avoid the topic of weight, and you understand that the sexiest part about you might not be your body, we're completely cool.

I mean, you still need to be a decent human being who I enjoy spending time with for it to work out, but your weight isn't really an obstacle to us getting to know each other. Being considered attractive is an ego boost regardless of who it comes from.

I, however, do not speak for all men, and I've encountered more than a few that would not handle it well, so I sympathize if that doesn't erase your fears.

1 point · 1 hour ago

thought about you could monitor the network traffic on a vlan

Yep, common task

have a monitoring software or the console of the router showing the network traffic in detail

Software, definitely. You don't want to burden your equipment running monitoring tasks. Besides the "console" isn't really a general-purpose shell, you can't run arbitrary software on it (until you get to the big, modern routers).

Is this possible?


And how can i maybe do it?

Find or search for the monitoring package of your choice. /r/networking is a good resource for this. Install, set up according to instructions, monitor.

1 point · 1 hour ago

/r/ccna/wiki/faqs/equipment is a good place to start.

Packet tracer or GNS3?


PT is great for the ICND1, for those who don't want to mess with setting up GNS3, or those with very low computing power. It's also nice to be able to spin up quickly and try a basic task. However, it's usage outside a learning tool is limited as it doesn't really represent reality--it's a simulation.

GNS3 is where you go when you need to "know". It's a good learning tool as it accurately represents the devices you are using and you can get yourself into exactly the same issues as real life. It's also a tool you will continue to use past your certification. When the boss and I are kicking around upgrade paths or possible improvements, any plan is tested in GNS3 first.

1 point · 1 hour ago

I think you have a small misconception: A DC is not an ISP, although they can operate as one.

For small installations, some DCs will offer an Internet drop service to a single or fractional cabinet. This is usually done in a very "traditional" way, where they issue a few static IPs and you use them as a default gateway.

However, many/most DCs are home to ISPs as well, so you can simply order whatever service from that carrier you need and have the DC install a cross-connect from the ISP's equipment to yours.

For example, in our DCs, we have an average of 5 "Internet" connections. On the edge, we try to peer with the four largest ISPs in the area for redundancy and to (hopefully) provide better access to our customers. These are commonly known as "DIA" or Direct Internet Access circuits and are almost exclusively used to support our product, not ourselves. For these circuits, we peer via BGP and advertise our own IP space.

For access to the DC, we have a fifth internet circuit that we connect to our VPN device. This may be provided by the DC or another low-cost carrier. For this circuit, we simply use a static IP provided by the carrier and set a default route.

2 points · 5 hours ago
  • Affected hostnames / IPs / MAC addresses. If the host is reachable, all three are required.
  • Physical location of each host above
  • TCP/UDP ports involved
  • Steps to reproduce the problem, plus machine or source address where these steps were validated from
  • Last date the problem was known not to happen
  • What is the expected behavior, if it's non-trivial
  • If this is a configuration-controlled system, a link to the configuration repository

Don't use static addresses with reservations.


  • Let DHCP assign an address from the pool
  • Reserve an address from the pool, and let DHCP only and always assign this address to your MAC
  • Assign a static address from outside your DHCP pool
5 points · 1 day ago

Do you happen to know the brand of those patch panels or punch downs?

2 points · 1 day ago

This is one of those perception vs reality relationship moments where, if you asked a pair of individuals who live together how often they empty the garbage, they would both answer "90%". It difficult to under-estimate work you have to do yourself and equally hard to over-estimate work you don't see others do.

The husband's version:


  • Packed my stuff
  • Realized I don't need to bring toenail clippers if I just do it now
  • Checked the fluid levels in the car, had to run to AutoZone for low-temperature wiper fluid as we're heading north
  • Filled up the gas tank on the way back
  • Packed the car
  • Waited for my wife to finish whatever she was doing so we could leave...

My Wife:

  • Packs her stuff
  • Packs the kids stuff
  • Calls around to seven neighbors to find someone who can look after her damned cat because she didn't think of doing it yesterday (the cat has it's own toilet and never-ending bowl of food, not sure why it needs looking after)
  • Decides to vacuum the living room rug because we clean house on Sunday... it's Tuesday.
  • Starts worrying about getting heatstroke while skiing, checks every bathroom for a bottle of sunblock to pack with the burn ointment and tourniquet
  • Calls her mother
  • Re-calls the neighbors to find someone who can look after the house (why it can't be Jeff who is looking after the cat, I don't know) because she didn't think of doing it yesterday. I'm pretty sure the house isn't going to run away...
  • Screams at me for asking when she thinks she'll be ready to go.
  • Apparently the answer is "right after I post this to Facebook"
2 points · 2 days ago

If you are using VTP, and you have pruning turned on, then trunks will only carry VLANs that the downstream switch has active ports in. While the "normal" way would be show int trunk, that shows all trunks, or all vlans on a single trunk. A consequence of a VLAN not be active on a trunk is that the PVST instance for that VLAN will also not be running. show span vlan xx is a quick way to see all interfaces associated with that VLAN.

I wouldn't say it's a general use case for that command, but in your topology and config, it does end up providing that information.

1 point · 2 days ago

Lab, office and management equipment--most of which is grey market and doesn't qualify even if we wanted to. In all those cases, downtime isn't as damaging as production DC equipment, and most SLAs can be met with available spares.

2 points · 2 days ago

passing both the ICND1 and then Passing the ICND2 will award you with the CCNA certification, correct?

and the CCENT, but yes, you are correct.

You can also take the composite and be awarded only the CCNA.

just passing ICND1 will award you with the CCENT certification?


1 point · 2 days ago

Your flow basically describes setting up a single server for a single purpose. I like to use 1 role per purpose, and 1 role per base config. I would use a win_base role to setup users, firewall, and updates, and an application role to install your app and dependencies.

Inside each role, main.yml should only import other tasks. I.e., win_base main.yml would import add_users.yml, set_firewall.yml and win_updates.yml.

For your application role, each bullet item should be a separate, imported file.

zanfar commented on
r/ccnaPosted by
4 points · 2 days ago

To be precise, the preamble and SFD are part of the layer 1 packet, not the layer 2 Ethernet Frame. Ethernet contains standards for both layers, so it's common to talk about them as a single entity, but it's somewhat important to understand where the separation is--specifically, Ethernet over fiber will have a different L1 encapsulation, but the same L2 frame format.

* "Packet" is the name of both the IP L3 and Ethernet L1 Protocol Data Unit

The FTP header and data would go inside a TCP packet payload after the TCP header, which all would go inside an IP payload after the IP header, which all would go inside the Ethernet Frame payload between the Ethernet Frame header and FCS, which would all go between the Layer 1 SFD and IPG.

2 points · 2 days ago

It appears that this was a brief bounce of interfaces as all the BLOCK messages have a corresponding UNBLOCK. This is somewhat common once when adding or modifying VLANs.

If you are seeing these continuously, you have a problem, but seeing a VLAN bounce when adding it to a downstream device isn't terribly worrying.

/r/HomeNetworking is best for consumery questions

see more
2 points · 2 days ago


is my new favorite adjective

Original Poster0 points · 2 days ago

Vlans are not set up, STP is not set up

see more
2 points · 2 days ago

Your managed switch most certainly has at least 1 VLAN. It would also have STP setup unless you have specifically disabled it, which would be a Bad Thing.

1 point · 2 days ago

A Kindle and a ChromeCast or Fire Stick have been lifesavers for me if you are actually stuck in a hotel.

Otherwise, get out and see the city.

According to that website, the router will do a max of 150 Mbps. How did your ISP determine 40?

see more
0 points · 2 days ago

wireless speeds of up to 150 Mbps

is not the same as routed throughput.

1 point · 2 days ago

Find the manufactuer's data sheet and look up the spec there. Keep in mind that spec is almost always going to be a best-case throughput. It is not uncommon to see real-world speeds that are 30-50% of the rated throughput, especially when using or enabling high-layer features (mostly firewall-type stuff).

Given your router only has Fast Ethernet ports, 40-50 Mbps sounds completely reasonable. Note that the "150 Mbps" rate is the maximum supported speed of the Wireless N chip, not routing throughput.

Almost any name-brand or high-quality consumer combo-router made in the last 3 years will support a routed throughput of at least 100 Mbps. Even if speeds weren't the issue, your router is seriously dated and would be a prime candidate for replacement.

1 point · 2 days ago

I need to iterate over an inventory and folder of files once the file is found that matches the name of the host is found that file is used as a source config.

Do you need to iterate, or do you need to select a file with the name of the host?

1 point · 2 days ago

IPv4: does it need to be reachable from the Internet? Public space. If not, RFC1918 space.

IPv6: if you have an allocation, use it for all the things.

zanfar commented on
r/ccnaPosted by
2 points · 3 days ago

/r/ccna/wiki/faqs/materials has a breakdown of Odom vs Lammle

2 points · 3 days ago

Your MacBook should be fine, it's the platform of choice for about 50% of network engineers.

  1. Videos are not platform-specific
  2. Putty is a Windows tool, use something like the native Unix shell

LOL, you should definitely get at least 8 rams, but if you're in a bind, you can always download more RAM.

8 GB is fine for CCNA. If you start down the GNS3 route, 16 GB will be nicer, but not absolutely required.

1 point · 3 days ago

No. Every link has an active (non-blocking) interface that will forward BUM traffic so that any other hosts on that link receive it.

Yes, it's unlikely in a full-duplex situation, that there is a host on that segment outside the two bridges, but it is possible (specifically, RX-only devices like taps, IDS/IPS, or monitors).

I’m curious about how you use tags, I haven’t started using them yet. Care to share what kind of system you setup with them?

see more
3 points · 4 days ago

Basically, the PRTG interface is terrible at selecting or searching for a specific group of sensors (more than 1, less than all the sensors of 1 type) because you can't reliably AND tags together. The best way to handle this is to make sure any group of sensors you'd ever think about can be defined by a type and tag.

To do this, each geographical group has the site ID and common name as tags. Each organizational group uses that org name as a tag. Each device gets tags for: vendor, model, type, purpose, and class. Then some sensors get additional tags: IPSLA gets a tag for the type of SLA, traffic sensors get 'uplink', 'trunk', 'portchannel', 'member', and/or 'gateway'.

This makes it very easy to define reports that will continue to work in the future without additional maintenance. I also use them to bookmark groups of sensors for quick status checks or maintenance.

I would also add that you can use tags to create 'sensor libraries', for which you can define unqiue alert thresholds and notifications.

see more
1 point · 3 days ago

We just discovered this, and it is another awesome feature I need to dive into.

Load more comments

2 points · 5 days ago

We use Wave out of PNAP via XO. Generally, across the nation, we have better uptime with our XO wave service than our identical CL service. Be aware, however, when comparing Wave with Ethernet Transport, that Wave will have significant downtime. "Fiber breaks" are common and you will lose your link regularly. If uptime is an issue, make sure you are comparing similar SLAs. Among our 7 XO wave circuits, we have at least one downtime event per week. CL is slightly higher and tends to go down in geographic pairs.

We use carrier-redundant Wave for DCI, so the breaks aren't terribly disruptive in our case, and the reduced latency is worth it.

Original Poster1 point · 5 days ago

Thanks for the input. I didnt necessarily think of XO, wasn't sure how feasible or good they would be to work with post Verizon acquisition.

As for the downtime, obviously i was aware of the possible downtime, i suppose that will vary a lot based on the route, how "good" it is, distance, etc, but with only 7 waves and one outage peer week that sounds pretty high.

This would basically be DCI for replication and a few other things. We replicate now via vpn over the internet, but obviously speeds/latency/etc constancy can vary.

I suppose if cost is the same, and one trusts the provider/SLA regarding performance/over subscription, then clearly ethernet transport would be the better choice due to reliability?

see more
1 point · 3 days ago

Ran an uptime report for all of July including 7 XO Wave links and 7 CL Wave links, covering almost identical routes. "Downtime" is reported via UDP Jitter IP SLA running on both ends of the link. I picked this range because, during this period, our notification system was broken, and no tickets were placed for these outages--meaning the fix time was completely determined by the carrier.

XO: 5 downtime events:

  1. no downtime
  2. no downtime
  3. no downtime
  4. 0:08
  5. 14:48
  6. 4:38, 0:06
  7. 4:37

* Link 6/7 share a termination site, where a single major fiber cut caused both ~4:30 outages.

CL: 13 downtime events:

  1. 0:09, 0:03
  2. 20:43, 1:20
  3. no downtime
  4. 4:42, 11:17, 0:01
  5. 7:37
  6. 0:08, 0:01, 0:37, 20:08
  7. 5:15

* Link 2/6 share a termination site, where a single major fiber cut caused both ~20:00 outages.

Out closest link to your PHX-STL route is link #2

2 points · 5 days ago

with only 7 waves and one outage peer week that sounds pretty high.

If I remember, I'll run the numbers at work next week, but that's off the top of my head. Mind you, these those links are 1,100-2,800 km in straight-line distance, so I assume a fair bit of equipment is involved.

I suppose if cost is the same ... then clearly ethernet transport would be the better choice due to reliability?

If reliability is your #1 concern, then yes.

Cake day
August 31, 2012
Trophy Case (1)
Five-Year Club

Cookies help us deliver our Services. By using our Services or clicking I agree, you agree to our use of cookies. Learn More.