diff --git a/404.html b/404.html index 99d2b69c..49b47088 100644 --- a/404.html +++ b/404.html @@ -14,7 +14,7 @@ - + diff --git a/Contact/index.html b/Contact/index.html index e95c2fee..157f84d6 100644 --- a/Contact/index.html +++ b/Contact/index.html @@ -18,7 +18,7 @@ - + @@ -2516,7 +2516,7 @@

Contact

str - '2024-02-16' + '2024-02-17' diff --git a/Hire-Me/index.html b/Hire-Me/index.html index 60ed3c21..47867417 100644 --- a/Hire-Me/index.html +++ b/Hire-Me/index.html @@ -22,7 +22,7 @@ - + diff --git a/IaC/Git/index.html b/IaC/Git/index.html index ba880d33..f834ad29 100644 --- a/IaC/Git/index.html +++ b/IaC/Git/index.html @@ -20,7 +20,7 @@ - + diff --git a/IaC/Mkdocs/index.html b/IaC/Mkdocs/index.html index 614475f0..d82f08cf 100644 --- a/IaC/Mkdocs/index.html +++ b/IaC/Mkdocs/index.html @@ -20,7 +20,7 @@ - + diff --git a/IaC/SoT/index.html b/IaC/SoT/index.html index 6084dc86..95af8a73 100644 --- a/IaC/SoT/index.html +++ b/IaC/SoT/index.html @@ -16,7 +16,7 @@ - + diff --git a/IaC/index.html b/IaC/index.html index 12a1c2bc..3b4378c8 100644 --- a/IaC/index.html +++ b/IaC/index.html @@ -20,7 +20,7 @@ - + diff --git a/Network-Rudiments/DNS/index.html b/Network-Rudiments/DNS/index.html index 1f36d26a..a25e82a7 100644 --- a/Network-Rudiments/DNS/index.html +++ b/Network-Rudiments/DNS/index.html @@ -20,7 +20,7 @@ - + diff --git a/Network-Rudiments/DNS/placeholder/index.html b/Network-Rudiments/DNS/placeholder/index.html index eb407852..9ef4495d 100644 --- a/Network-Rudiments/DNS/placeholder/index.html +++ b/Network-Rudiments/DNS/placeholder/index.html @@ -20,7 +20,7 @@ - + diff --git a/Network-Rudiments/NAC/index.html b/Network-Rudiments/NAC/index.html index 429336e4..7aebe794 100644 --- a/Network-Rudiments/NAC/index.html +++ b/Network-Rudiments/NAC/index.html @@ -20,7 +20,7 @@ - + diff --git a/Network-Rudiments/NAC/placeholder/index.html b/Network-Rudiments/NAC/placeholder/index.html index b64abc27..28c3b275 100644 --- a/Network-Rudiments/NAC/placeholder/index.html +++ b/Network-Rudiments/NAC/placeholder/index.html @@ -20,7 +20,7 @@ - + diff --git a/Network-Rudiments/Subnetting/IPv4/index.html b/Network-Rudiments/Subnetting/IPv4/index.html index 0a4c85a5..4c016870 100644 --- a/Network-Rudiments/Subnetting/IPv4/index.html +++ b/Network-Rudiments/Subnetting/IPv4/index.html @@ -20,7 +20,7 @@ - + diff --git a/Network-Rudiments/Subnetting/IPv6/index.html b/Network-Rudiments/Subnetting/IPv6/index.html index d69daba0..648b73c1 100644 --- a/Network-Rudiments/Subnetting/IPv6/index.html +++ b/Network-Rudiments/Subnetting/IPv6/index.html @@ -20,7 +20,7 @@ - + diff --git a/Network-Rudiments/Subnetting/broadcast/index.html b/Network-Rudiments/Subnetting/broadcast/index.html index fe87677a..684b9f44 100644 --- a/Network-Rudiments/Subnetting/broadcast/index.html +++ b/Network-Rudiments/Subnetting/broadcast/index.html @@ -20,7 +20,7 @@ - + diff --git a/Network-Rudiments/Subnetting/cidr/index.html b/Network-Rudiments/Subnetting/cidr/index.html index 7607bfb9..a5875ac7 100644 --- a/Network-Rudiments/Subnetting/cidr/index.html +++ b/Network-Rudiments/Subnetting/cidr/index.html @@ -20,7 +20,7 @@ - + diff --git a/Network-Rudiments/Subnetting/classy/index.html b/Network-Rudiments/Subnetting/classy/index.html index e662d31a..b24463be 100644 --- a/Network-Rudiments/Subnetting/classy/index.html +++ b/Network-Rudiments/Subnetting/classy/index.html @@ -20,7 +20,7 @@ - + diff --git a/Network-Rudiments/Subnetting/documents/index.html b/Network-Rudiments/Subnetting/documents/index.html index c4166589..edeac0de 100644 --- a/Network-Rudiments/Subnetting/documents/index.html +++ b/Network-Rudiments/Subnetting/documents/index.html @@ -20,7 +20,7 @@ - + diff --git a/Network-Rudiments/Subnetting/example/index.html b/Network-Rudiments/Subnetting/example/index.html index a9f1a617..e5431afd 100644 --- a/Network-Rudiments/Subnetting/example/index.html +++ b/Network-Rudiments/Subnetting/example/index.html @@ -20,7 +20,7 @@ - + diff --git a/Network-Rudiments/Subnetting/hex/index.html b/Network-Rudiments/Subnetting/hex/index.html index 6e943c4d..98756962 100644 --- a/Network-Rudiments/Subnetting/hex/index.html +++ b/Network-Rudiments/Subnetting/hex/index.html @@ -20,7 +20,7 @@ - + diff --git a/Network-Rudiments/Subnetting/index.html b/Network-Rudiments/Subnetting/index.html index 1347daa4..c0af261e 100644 --- a/Network-Rudiments/Subnetting/index.html +++ b/Network-Rudiments/Subnetting/index.html @@ -22,7 +22,7 @@ - + diff --git a/Network-Rudiments/Subnetting/lloret-nets/index.html b/Network-Rudiments/Subnetting/lloret-nets/index.html index 086c35fe..1da3fc38 100644 --- a/Network-Rudiments/Subnetting/lloret-nets/index.html +++ b/Network-Rudiments/Subnetting/lloret-nets/index.html @@ -20,7 +20,7 @@ - + diff --git a/Network-Rudiments/Subnetting/numerics/index.html b/Network-Rudiments/Subnetting/numerics/index.html index 759b8965..6799ed95 100644 --- a/Network-Rudiments/Subnetting/numerics/index.html +++ b/Network-Rudiments/Subnetting/numerics/index.html @@ -20,7 +20,7 @@ - + diff --git a/Network-Rudiments/Subnetting/osi/index.html b/Network-Rudiments/Subnetting/osi/index.html index 17fc1035..85f82902 100644 --- a/Network-Rudiments/Subnetting/osi/index.html +++ b/Network-Rudiments/Subnetting/osi/index.html @@ -20,7 +20,7 @@ - + diff --git a/Network-Rudiments/Subnetting/packet-life/index.html b/Network-Rudiments/Subnetting/packet-life/index.html index b2f626b5..616f470f 100644 --- a/Network-Rudiments/Subnetting/packet-life/index.html +++ b/Network-Rudiments/Subnetting/packet-life/index.html @@ -20,7 +20,7 @@ - + diff --git a/Network-Rudiments/Subnetting/power2/index.html b/Network-Rudiments/Subnetting/power2/index.html index 3c1dffb1..23a570c0 100644 --- a/Network-Rudiments/Subnetting/power2/index.html +++ b/Network-Rudiments/Subnetting/power2/index.html @@ -20,7 +20,7 @@ - + diff --git a/Network-Rudiments/Subnetting/subnetting-101/index.html b/Network-Rudiments/Subnetting/subnetting-101/index.html index b33f4fdf..bef44f4f 100644 --- a/Network-Rudiments/Subnetting/subnetting-101/index.html +++ b/Network-Rudiments/Subnetting/subnetting-101/index.html @@ -20,7 +20,7 @@ - + diff --git a/Network-Rudiments/Subnetting/subnetting/index.html b/Network-Rudiments/Subnetting/subnetting/index.html index 713533ac..15062150 100644 --- a/Network-Rudiments/Subnetting/subnetting/index.html +++ b/Network-Rudiments/Subnetting/subnetting/index.html @@ -20,7 +20,7 @@ - + diff --git a/Network-Rudiments/Subnetting/super-lloret/index.html b/Network-Rudiments/Subnetting/super-lloret/index.html index 89d8f482..18d0926c 100644 --- a/Network-Rudiments/Subnetting/super-lloret/index.html +++ b/Network-Rudiments/Subnetting/super-lloret/index.html @@ -20,7 +20,7 @@ - + diff --git a/Network-Rudiments/Subnetting/trace/index.html b/Network-Rudiments/Subnetting/trace/index.html index 51fa1c9b..022559af 100644 --- a/Network-Rudiments/Subnetting/trace/index.html +++ b/Network-Rudiments/Subnetting/trace/index.html @@ -20,7 +20,7 @@ - + diff --git a/Network-Rudiments/Subnetting/whoami/index.html b/Network-Rudiments/Subnetting/whoami/index.html index 1313994d..bd19a000 100644 --- a/Network-Rudiments/Subnetting/whoami/index.html +++ b/Network-Rudiments/Subnetting/whoami/index.html @@ -20,7 +20,7 @@ - + diff --git a/Network-Rudiments/Subnetting/wild/index.html b/Network-Rudiments/Subnetting/wild/index.html index dbb87eec..44c0010d 100644 --- a/Network-Rudiments/Subnetting/wild/index.html +++ b/Network-Rudiments/Subnetting/wild/index.html @@ -20,7 +20,7 @@ - + diff --git a/Network-Rudiments/index.html b/Network-Rudiments/index.html index 5abfe9a1..f17e2d71 100644 --- a/Network-Rudiments/index.html +++ b/Network-Rudiments/index.html @@ -22,7 +22,7 @@ - + diff --git a/Vendors/Allied-Telesis/documents/index.html b/Vendors/Allied-Telesis/documents/index.html index 21731301..d4bc3981 100644 --- a/Vendors/Allied-Telesis/documents/index.html +++ b/Vendors/Allied-Telesis/documents/index.html @@ -20,7 +20,7 @@ - + diff --git a/Vendors/Allied-Telesis/drawings/index.html b/Vendors/Allied-Telesis/drawings/index.html index 12dbe3a5..986a1320 100644 --- a/Vendors/Allied-Telesis/drawings/index.html +++ b/Vendors/Allied-Telesis/drawings/index.html @@ -20,7 +20,7 @@ - + diff --git a/Vendors/Allied-Telesis/index.html b/Vendors/Allied-Telesis/index.html index bc594065..7421b655 100644 --- a/Vendors/Allied-Telesis/index.html +++ b/Vendors/Allied-Telesis/index.html @@ -20,7 +20,7 @@ - + diff --git a/Vendors/Allied-Telesis/training/index.html b/Vendors/Allied-Telesis/training/index.html index 5c5caf79..adaff6bc 100644 --- a/Vendors/Allied-Telesis/training/index.html +++ b/Vendors/Allied-Telesis/training/index.html @@ -20,7 +20,7 @@ - + diff --git a/Vendors/index.html b/Vendors/index.html index 3d870bbf..d0893acc 100644 --- a/Vendors/index.html +++ b/Vendors/index.html @@ -22,7 +22,7 @@ - + diff --git a/assets/images/favicon.ico b/assets/images/favicon.ico deleted file mode 100644 index f7b6fc95..00000000 Binary files a/assets/images/favicon.ico and /dev/null differ diff --git a/assets/images/favicon/android-chrome-192x192.png b/assets/images/favicon/android-chrome-192x192.png deleted file mode 100644 index 37932449..00000000 Binary files a/assets/images/favicon/android-chrome-192x192.png and /dev/null differ diff --git a/assets/images/favicon/android-chrome-512x512.png b/assets/images/favicon/android-chrome-512x512.png deleted file mode 100644 index e2b8f8b5..00000000 Binary files a/assets/images/favicon/android-chrome-512x512.png and /dev/null differ diff --git a/assets/images/favicon/apple-touch-icon.png b/assets/images/favicon/apple-touch-icon.png deleted file mode 100644 index 487760c8..00000000 Binary files a/assets/images/favicon/apple-touch-icon.png and /dev/null differ diff --git a/assets/images/favicon/favicon-16x16.png b/assets/images/favicon/favicon-16x16.png deleted file mode 100644 index 8e4b83d5..00000000 Binary files a/assets/images/favicon/favicon-16x16.png and /dev/null differ diff --git a/assets/images/favicon/favicon-32x32.png b/assets/images/favicon/favicon-32x32.png deleted file mode 100644 index 8ad70198..00000000 Binary files a/assets/images/favicon/favicon-32x32.png and /dev/null differ diff --git a/blog/2023/12/01/index.html b/blog/2023/12/01/index.html index 76182ee0..71a32895 100644 --- a/blog/2023/12/01/index.html +++ b/blog/2023/12/01/index.html @@ -21,7 +21,7 @@ - + diff --git a/blog/2024/02/04/post01/index.html b/blog/2024/02/04/post01/index.html index ef3124bb..590a3ea3 100644 --- a/blog/2024/02/04/post01/index.html +++ b/blog/2024/02/04/post01/index.html @@ -23,7 +23,7 @@ - + diff --git a/blog/2024/02/08/index.html b/blog/2024/02/08/index.html index 5b6ee446..9d072b05 100644 --- a/blog/2024/02/08/index.html +++ b/blog/2024/02/08/index.html @@ -18,7 +18,7 @@ - + diff --git a/blog/archive/2023/index.html b/blog/archive/2023/index.html index 87f82d67..674eee2e 100644 --- a/blog/archive/2023/index.html +++ b/blog/archive/2023/index.html @@ -20,7 +20,7 @@ - + diff --git a/blog/archive/2024/index.html b/blog/archive/2024/index.html index 6a2b11bc..8147ae5d 100644 --- a/blog/archive/2024/index.html +++ b/blog/archive/2024/index.html @@ -20,7 +20,7 @@ - + diff --git a/blog/category/blog/index.html b/blog/category/blog/index.html index 02df46b2..4340dddf 100644 --- a/blog/category/blog/index.html +++ b/blog/category/blog/index.html @@ -20,7 +20,7 @@ - + diff --git a/blog/category/lukeoson/index.html b/blog/category/lukeoson/index.html index f3722337..c4de6824 100644 --- a/blog/category/lukeoson/index.html +++ b/blog/category/lukeoson/index.html @@ -20,7 +20,7 @@ - + diff --git a/blog/index.html b/blog/index.html index 0d9339f0..05b818e3 100644 --- a/blog/index.html +++ b/blog/index.html @@ -20,7 +20,7 @@ - + diff --git a/index.html b/index.html index c25ade12..b1bbe177 100644 --- a/index.html +++ b/index.html @@ -18,7 +18,7 @@ - + @@ -2445,7 +2445,7 @@

This content is limited. It's less than MVP. And nothing close to MLP. It's Dev in progress.

I have decided not to port any previous content to this site. I'm starting from scratch.


diff --git a/search/search_index.json b/search/search_index.json index 0a683cef..6f54b229 100644 --- a/search/search_index.json +++ b/search/search_index.json @@ -1 +1 @@ -{"config":{"lang":["en"],"separator":"[\\s\\-]+","pipeline":["stopWordFilter"],"fields":{"title":{"boost":1000.0},"text":{"boost":1.0},"tags":{"boost":1000000.0}}},"docs":[{"location":"","title":"Welcome to Lukeoson Labs","text":"

I'm Luke. Currently employed as a Network Architect in London.

Here you will find my Resume, my new Blog, and some Network related content.

I'm open to new and compelling opportunities in the Network Automation realm

If you have a role that you think I might be interested in, please get in touch. You have my thanks and appreciation.

Other than that, these pages provide a rudiment of information covering my interests in Network Automation as a career journey captured by the Epics:

This content is limited. It's less than MVP. And nothing close to MLP. It's Dev in progress.

I have decided not to port any previous content to this site. I'm starting from scratch.

While i have you, please do remember ... "},{"location":"tags/","title":"Tags","text":""},{"location":"tags/#example","title":"Example","text":""},{"location":"Contact/","title":"Contact","text":"

Variable Type Content file File page [Page], src_uri = 'Contact/index.md', name = 'index', dest_uri = 'Contact/index.html', url = 'Contact/', abs_src_path = '/Users/lukeoson/Documents/code/lukeoson-mkdocs/docs/Contact/index.md', abs_dest_path = '/Users/lukeoson/Documents/code/lukeoson-mkdocs/site/Contact/index.html', inclusion [InclusionLevel] title str 'Contact' children NoneType None previous_page Page Page(title='Training', url='/Vendors/Allied-Telesis/training/') next_page NoneType None _Page__active bool False update_date str '2024-02-16' canonical_url str 'https://lukeoson.com/Contact/' abs_url str '/Contact/' edit_url str 'https://github.com/lukeoson/lukeoson-mkdocs/edit/master/docs/Contact/index.md' markdown str '\\n\\n- :material-contacts-outline:{ .lg .middle } [__Luke Richardson__](https://www.linkedin.com/in/luke-richardson/) is currently employed as Network Architect in London.\\n\\n ---\\n\\n ![luke-face](../assets/images/luke-face.jpeg){ width=165px align=right } \\n :material-lan: Network Architect \\n :material-email-outline: [Hello@Lukeoson.com](mailto:Luke.richardson@lloret.co.uk) \\n :material-linkedin: [Linkedin](https://www.linkedin.com/in/luke-richardson/) \\n :material-cellphone: [+447376209455](tel:+447376209455) \\n :material-github: [lukeoson](https://github.com/lukeoson/lukeoson.github.io) \\n :material-certificate-outline: [Acclaim](https://www.credly.com/users/luke-richardson.dca3c027)\\n\\n ---\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n {{ context(page) | pretty }}\\n\\n' _title_from_render NoneType None content NoneType None toc list [] meta dict title = 'Contact', icon = 'material/badge-account-horizontal-outline' parent Section title = 'Contact', children = [Page(title='Contact', url='/Contact/')], _Section__active = False"},{"location":"Hire-Me/","title":"Luke Richardson's Resume","text":"

"},{"location":"Hire-Me/#employment-history","title":"Employment History","text":""},{"location":"Hire-Me/#education","title":"Education","text":""},{"location":"Hire-Me/#carreer-achievements","title":"Carreer Achievements","text":""},{"location":"Hire-Me/#hobbies","title":"Hobbies","text":""},{"location":"Hire-Me/#testimonials","title":"Testimonials","text":"

Thanks for taking the time to read my resume. Please get in touch. \ud83c\udf89

"},{"location":"IaC/","title":"Index","text":"

pending

","tags":["Example"]},{"location":"IaC/Git/","title":"Index","text":"

pedning

","tags":["Example"]},{"location":"IaC/Mkdocs/","title":"Index","text":"

pending

","tags":["Example"]},{"location":"Network-Rudiments/DNS/","title":"Index","text":"

pending

","tags":["Example"]},{"location":"Network-Rudiments/DNS/placeholder/","title":"Placeholder","text":"

pending

","tags":["Example"]},{"location":"Network-Rudiments/NAC/","title":"Index","text":"

pending

","tags":["Example"]},{"location":"Network-Rudiments/NAC/placeholder/","title":"Placeholder","text":"

pending

","tags":["Example"]},{"location":"Network-Rudiments/Subnetting/","title":"Subnetting","text":"

pending

","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/IPv4/","title":"IPv4","text":" ","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/IPv4/#each-byte-has-a-value-between-0-and-255","title":"Each Byte has a value between 0 and 255","text":" Octet Number Binary Format Decimal Equivalent 1st Octet 00000000 0 - 255 2nd Octet 00000000 0 - 255 3rd Octet 00000000 0 - 255 4th Octet 00000000 0 - 255","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/IPv4/#example-ipv4-addresses","title":"Example IPv4 Addresses:","text":" Octet Number Binary Format Decimal Equivalent 1st Octet 11000000 192 2nd Octet 10101000 168 3rd Octet 00000001 1 4th Octet 00000010 2","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/IPv4/#bits-bytes-of-19216812","title":"Bits & Bytes of 192.168.1.2","text":"Component Description Details Octet An IPv4 address is divided into 4 octets. Each octet consists of 8 bits. Bit The basic unit of data in an IP address. There are 32 bits in total (8 bits per octet). Byte Equivalent to one octet. Each byte (or octet) ranges from 0 to 255. Example For the IP address 192.168.1.2: - 192 is the first octet (byte).- 168 is the second octet (byte).- 1 is the third octet (byte).- 2 is the fourth octet (byte). Octet Number Binary Format Decimal Equivalent 1st Octet 00001010 10 2nd Octet 01000110 70 3rd Octet 00000011 3 4th Octet 01100100 100","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/IPv6/","title":"IPv6","text":"

Google IPv6 Adoption Tracker

Group Number Binary Format Hexadecimal Equivalent 1st Group 0000000000000000 0000 - FFFF 2nd Group 0000000000000000 0000 - FFFF 3rd Group 0000000000000000 0000 - FFFF 4th Group 0000000000000000 0000 - FFFF 5th Group 0000000000000000 0000 - FFFF 6th Group 0000000000000000 0000 - FFFF 7th Group 0000000000000000 0000 - FFFF 8th Group 0000000000000000 0000 - FFFF

Example IPv6 Address: 2001:0db8:85a3:0000:0000:8a2e:0370:7334

Step Description IPv6 Address 1 Remove leading zeros in each block 2001:db8:85a3:0:0:8a2e:370:7334 2 Collapse consecutive blocks of zeros with :: 2001:db8:85a3::8a2e:370:7334

Note

Dropping leading zeros in IPv6 addresses still makes sense because each field in an IPv6 address is understood to be a fixed size of 16 bits, represented in hexadecimal. When you see a field like 0db8, it's clear that it represents four hexadecimal digits, even if it's written as db8. The leading zero doesn't add any additional information because the size of the field is already established.

graph LR\n    A[IPv6 Address] --> B[Group 1]\n    A --> C[Group 2]\n    A --> D[Group 3]\n    A --> E[Group 4]\n    A --> F[Group 5]\n    A --> G[Group 6]\n    A --> H[Group 7]\n    A --> I[Group 8]\n\n    B --> B1[16 bits<br>Hex: 2001]\n    C --> C1[16 bits<br>Hex: 0db8]\n    D --> D1[16 bits<br>Hex: 85a3]\n    E --> E1[16 bits<br>Hex: 0000]\n    F --> F1[16 bits<br>Hex: 0000]\n    G --> G1[16 bits<br>Hex: 8a2e]\n    H --> H1[16 bits<br>Hex: 0370]\n    I --> I1[16 bits<br>Hex: 7334]\n\n    style A fill:#f9f,stroke:#333,stroke-width:4px\n    style B fill:#ccf,stroke:#f66,stroke-width:2px\n    style C fill:#ccf,stroke:#f66,stroke-width:2px\n    style D fill:#ccf,stroke:#f66,stroke-width:2px\n    style E fill:#ccf,stroke:#f66,stroke-width:2px\n    style F fill:#ccf,stroke:#f66,stroke-width:2px\n    style G fill:#ccf,stroke:#f66,stroke-width:2px\n    style H fill:#ccf,stroke:#f66,stroke-width:2px\n    style I fill:#ccf,stroke:#f66,stroke-width:2px
","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/broadcast/","title":"Bad","text":"","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/broadcast/#why-minimize-broadcast-packets","title":"Why Minimize Broadcast Packets?","text":"
  1. Network Congestion: Broadcast packets are sent to all devices on a network segment, regardless of whether they're the intended recipient. This means every device has to process these packets, even if they're irrelevant. On a busy network, this can lead to a lot of unnecessary data traffic, congesting the network.

  2. Resource Drain: Each device on the network must process and determine the relevance of broadcast packets. This can be a drain on resources, especially on devices that might already be running heavy tasks. It's like getting a bunch of irrelevant group emails; you have to check each one, just in case.

  3. Reduced Performance: High levels of broadcast traffic can slow down the overall network performance. Devices spend time and processing power handling these broadcasts, which could be better spent on actual data transmission relevant to their tasks.

  4. Security Concerns: Broadcasts can be a security risk. They can potentially be used for malicious activities like broadcast storms or as a method to discover devices on a network by an attacker.

","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/broadcast/#the-goal","title":"The Goal","text":"

The goal in network design and management is, therefore, to keep broadcast traffic as minimal as possible. This can be achieved by:

In essence, minimizing broadcast packets helps maintain a smoother, faster, and more secure network. It's like keeping public announcements in a big building to only the floors that need to hear them, rather than blasting them everywhere!

","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/cidr/","title":"CIDR","text":"Classless Inter-Domain Routing

CIDR stands for \"Classless Inter-Domain Routing.\" It's a method used for allocating IP addresses and routing Internet Protocol packets. CIDR replaced the older system based on classes A, B, and C in the 1990s.

","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/cidr/#slash-the-decimals-decimate-to-slash","title":"Slash the Decimals. Decimate to Slash.","text":"

We call slash notation \"CIDR notation\" because it's a key component of Classless Inter-Domain Routing (CIDR), which is a method for allocating IP addresses and routing decisions. The slash notation is a concise way to represent an IP address and its associated routing prefix.

Decimal Subnet Mask Binary Subnet Mask CIDR Notation 255.255.255.255 11111111.11111111.11111111.11111111 /32 255.255.255.254 11111111.11111111.11111111.11111110 /31 255.255.255.252 11111111.11111111.11111111.11111100 /30 255.255.255.248 11111111.11111111.11111111.11111000 /29 255.255.255.240 11111111.11111111.11111111.11110000 /28 255.255.255.224 11111111.11111111.11111111.11100000 /27 255.255.255.192 11111111.11111111.11111111.11000000 /26 255.255.255.128 11111111.11111111.11111111.10000000 /25 255.255.255.0 11111111.11111111.11111111.00000000 /24 255.255.254.0 11111111.11111111.11111110.00000000 /23 255.255.252.0 11111111.11111111.11111100.00000000 /22 255.255.248.0 11111111.11111111.11111000.00000000 /21 255.255.240.0 11111111.11111111.11110000.00000000 /20 255.255.224.0 11111111.11111111.11100000.00000000 /19 255.255.192.0 11111111.11111111.11000000.00000000 /18 255.255.128.0 11111111.11111111.10000000.00000000 /17 255.255.0.0 11111111.11111111.00000000.00000000 /16 255.254.0.0 11111111.11111110.00000000.00000000 /15 255.252.0.0 11111111.11111100.00000000.00000000 /14 255.248.0.0 11111111.11111000.00000000.00000000 /13 255.240.0.0 11111111.11110000.00000000.00000000 /12 255.224.0.0 11111111.11100000.00000000.00000000 /11 255.192.0.0 11111111.11000000.00000000.00000000 /10 255.128.0.0 11111111.10000000.00000000.00000000 /9 255.0.0.0 11111111.00000000.00000000.00000000 /8 254.0.0.0 11111110.00000000.00000000.00000000 /7 252.0.0.0 11111100.00000000.00000000.00000000 /6 248.0.0.0 11111000.00000000.00000000.00000000 /5 240.0.0.0 11110000.00000000.00000000.000000 /4 224.0.0.0 11100000.00000000.00000000.00000000 /3 192.0.0.0 11000000.00000000.00000000.00000000 /2 128.0.0.0 10000000.00000000.00000000.00000000 /1 0.0.0.0 00000000.00000000.00000000.00000000 /0 (Default)","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/classy/","title":"Classy","text":"","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/classy/#ip-classes","title":"IP Classes","text":" ","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/classy/#bits-specified-by-class","title":"Bits specified by Class","text":"Class Leading Bits Range of First Octet A 0xxxxxxx 0 - 127 B 10xxxxxx 128 - 191 C 110xxxxx 192 - 223 D 1110xxxx 224 - 239 E 1111xxxx 240 - 255","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/classy/#subnets-classy-cider","title":"Subnets - Classy Cider \ud83c\udf7b","text":"","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/documents/","title":"Helpful resources for learning to subnet","text":" ","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/example/","title":"Subnetting Examples","text":"","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/example/#example-class-c-subnet","title":"Example Class C Subnet","text":" What is the mask in decimal? IP Address Subnet Mask CIDR Notation Binary Subnet Mask 192.168.100.0 255.255.255.192 /26 11111111.11111111.11111111.11000000 How many subnets? How many hosts per subnet? What subnet is host 192.168.100.130 in? What is the broadcast address of 192.168.100.130/26 host? Example Class C Summary Concept Explanation Network Address 192.168.100.128 (192.168.100.130 falls in this range) CIDR Notation /26 (means 26 bits for network, remaining for host) Subnet Mask 255.255.255.192 (or /26) Binary Subnet Mask 11111111.11111111.11111111.11000000 Host Address Range 192.168.100.128 - 192.168.100.191 Next Network Address 192.168.100.192 (since /26 allows 64 addresses per subnet) Broadcast Address 192.168.100.191 (one less than the next network address)","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/example/#example-class-b-subnet","title":"Example Class B Subnet","text":" What is the mask in decimal? IP Address Subnet Mask CIDR Notation Binary Subnet Mask 172.16.0.0 255.255.224.0 /19 11111111.11111111.11100000.00000000 How many subnets? How many hosts per subnet? What subnet is host 172.16.32.130 in? What is the broadcast address of 172.16.32.130/19 host? Example Class B Summary Concept Explanation Network Address 172.16.32.0 (172.16.32.130 falls in this range) CIDR Notation /19 (means 19 bits for network, remaining for host) Subnet Mask 255.255.224.0 (or /19) Binary Subnet Mask 11111111.11111111.11100000.00000000 Host Address Range 172.16.32.0 - 172.16.63.255 Next Network Address 172.16.64.0 (since /19 allows 8192 addresses per subnet) Broadcast Address 172.16.63.255 (one less than the next network address)","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/example/#example-class-a-subnet","title":"Example Class A Subnet","text":" What is the mask in decimal? IP Address Subnet Mask CIDR Notation Binary Subnet Mask 10.0.0.0 255.240.0.0 /12 11111111.11110000.00000000.00000000 How many subnets? How many hosts per subnet? What subnet is host 10.16.0.130 in? What is the broadcast address of 10.16.0.130/12 host? Example Class A Summary Concept Explanation Network Address 10.16.0.0 (10.16.0.130 falls in this range) CIDR Notation /12 (means 12 bits for network, remaining for host) Subnet Mask 255.240.0.0 (or /12) Binary Subnet Mask 11111111.11110000.00000000.00000000 Host Address Range 10.16.0.0 - 10.31.255.255 Next Network Address 10.32.0.0 (since /12 allows 1,048,576 addresses per subnet) Broadcast Address 10.31.255.255 (one less than the next network address)","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/hex/","title":"Hex","text":"","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/hex/#what-is-hexadecimal","title":"What is Hexadecimal?","text":"","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/hex/#convert-binary-to-hexadecimal","title":"Convert Binary to Hexadecimal","text":"
graph TD\n    subgraph A[Decimal]\n        A1[0]\n        A2[1]\n        A3[2]\n        A4[3]\n        A5[4]\n        A6[5]\n        A7[6]\n        A8[7]\n        A9[8]\n        A10[9]\n        A11[10]\n        A12[11]\n        A13[12]\n        A14[13]\n        A15[14]\n        A16[15]\n    end\n\n    subgraph B[Hexadecimal]\n        B1[0]\n        B2[1]\n        B3[2]\n        B4[3]\n        B5[4]\n        B6[5]\n        B7[6]\n        B8[7]\n        B9[8]\n        B10[9]\n        B11[A]\n        B12[B]\n        B13[C]\n        B14[D]\n        B15[E]\n        B16[F]\n    end\n\n    A1 --> B1\n    A2 --> B2\n    A3 --> B3\n    A4 --> B4\n    A5 --> B5\n    A6 --> B6\n    A7 --> B7\n    A8 --> B8\n    A9 --> B9\n    A10 --> B10\n    A11 --> B11\n    A12 --> B12\n    A13 --> B13\n    A14 --> B14\n    A15 --> B15\n    A16 --> B16
Decimal Hexadecimal Binary 0 0 0000 1 1 0001 2 2 0010 3 3 0011 4 4 0100 5 5 0101 6 6 0110 7 7 0111 8 8 1000 9 9 1001 10 A 1010 11 B 1011 12 C 1100 13 D 1101 14 E 1110 15 F 1111","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/lloret-nets/","title":"Lloret Nets","text":"","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/lloret-nets/#lloret-networks","title":"Lloret Networks","text":"Network IP Address Subnet Mask Description LAN 10.1.0.1 255.255.0.0 LAN Network STAFF 10.70.0.1 255.255.0.0 Staff Network BYOD 10.110.0.1 255.255.0.0 BYOD Network GUEST 10.120.0.1 255.255.0.0 Guest Network Lloret Networks

set ip 10.1.0.1 255.255.0.0 #LAN\nset ip 10.70.0.1 255.255.0.0 #STAFF\nset ip 10.110.0.1 255.255.0.0 #BYOD\nset ip 10.120.0.1 255.255.0.0 #GUEST\n
site002 $ get system arp \nAddress           Age(min)   Hardware Addr      Interface\n10.70.3.5         0          64:79:f0:45:eb:56 lloret_staff\n10.70.3.72        15         c4:9d:ed:ad:27:d9 lloret_staff\n10.120.0.32       1          d2:eb:db:14:f6:d5 lloret_guest\n10.70.241.1       1          c0:56:e3:50:32:94 lloret_staff\n10.120.0.44       1          66:c9:6a:28:bd:73 lloret_guest\n10.70.3.29        0          d8:bb:c1:0e:e7:8e lloret_staff\n10.70.3.41        0          f4:a8:0d:5c:e5:82 lloret_staff\n10.120.0.68       1          ce:d9:90:ca:85:38 lloret_guest\n10.70.0.206       0          00:0c:29:95:86:5a lloret_staff\n10.70.0.17        0          00:11:32:b4:fd:93 lloret_staff\n10.70.3.53        3          e0:4f:43:e3:c0:b3 lloret_staff\n10.110.0.40       3          26:39:93:9a:9c:c0 lloret_byod\n10.70.240.100     12         6c:4b:90:6b:a1:d6 lloret_staff\n10.120.0.25       1          ce:91:23:e7:02:c0 lloret_guest\n10.70.3.10        3          d8:5e:d3:ae:d4:3c lloret_staff\n10.70.3.77        0          28:16:a8:04:d8:a7 lloret_staff\n10.70.3.22        0          08:3a:88:6d:d2:45 lloret_staff\n10.70.1.69        0          1c:69:7a:64:db:5f lloret_staff\n10.70.3.34        0          6c:24:08:2c:05:dd lloret_staff\n10.110.0.21       0          5a:20:ea:cb:62:b7 lloret_byod\n10.70.3.46        0          f8:75:a4:7f:21:f2 lloret_staff\n10.70.0.10        0          9c:8e:99:4b:9d:68 lloret_staff\n10.1.0.241        1          78:bc:1a:ad:ed:52 lan\n10.120.0.73       1          ba:cc:77:f4:f0:2b lloret_guest\n10.70.3.70        0          f8:75:a4:7f:40:25 lloret_staff\n10.120.0.30       1          0e:4a:68:ac:9d:e3 lloret_guest\n10.70.3.15        1          50:a4:d0:61:13:bd lloret_staff\n10.70.243.153     1          58:fd:b1:56:7c:81 lloret_staff\n10.1.0.21         3          24:9a:d8:2b:16:79 lan\n10.70.3.27        1          6c:4b:90:59:5e:b7 lloret_staff\n10.70.3.39        0          98:ee:cb:ea:0a:70 lloret_staff\n10.70.3.51        0          44:39:c4:34:ee:5c lloret_staff\n10.70.0.15        0          00:11:32:e9:02:2b lloret_staff\n10.1.0.246        1          08:4f:a9:fd:86:c4 lan\n10.120.0.23       0          a2:60:df:48:18:97 lloret_guest\n10.70.2.248       0          b8:27:eb:3f:36:43 lloret_staff\n10.70.3.8         0          50:a4:d0:61:3b:5f lloret_staff\n10.70.3.20        0          50:a4:d0:61:3b:68 lloret_staff\n10.70.3.32        0          04:ec:d8:26:6b:cd lloret_staff\n10.70.3.44        0          48:2a:e3:aa:f5:e4 lloret_staff\n10.70.3.56        1          50:a4:d0:61:3b:44 lloret_staff\n10.120.0.83       1          3e:93:08:cd:7d:00 lloret_guest\n10.70.3.13        1          50:a4:d0:61:3a:6c lloret_staff\n10.70.243.151     8794       88:c9:b3:d0:17:4f lloret_staff\n10.120.0.40       2          62:ca:9e:c2:99:c6 lloret_guest\n10.70.3.25        0          24:9a:d8:0d:1d:d1 lloret_staff\n10.70.3.49        0          28:16:a8:01:87:f5 lloret_staff\n10.1.0.244        1          5c:5a:c7:57:c4:20 lan\n10.70.3.61        0          a4:f9:33:4d:7c:68 lloret_staff\n10.70.3.6         0          f4:a8:0d:32:44:12 lloret_staff\n10.70.3.18        1          50:a4:d0:61:3a:e4 lloret_staff\n86.188.216.217    0          54:a2:74:27:f7:11 wan1\n10.120.0.45       2          56:c0:73:c9:11:da lloret_guest\n10.70.3.30        0          d8:5e:d3:ae:d4:3b lloret_staff\n10.70.243.101     3          00:0e:c6:d3:f1:e4 lloret_staff\n10.70.0.6         2670       9c:b6:54:74:9c:ca lloret_staff\n10.70.3.42        0          10:60:4b:68:0a:8f lloret_staff\n10.70.3.66        0          0c:37:96:15:9e:c7 lloret_staff\n10.70.3.11        0          10:b5:88:06:96:67 lloret_staff\n10.120.0.93       0          26:61:e0:70:54:60 lloret_guest\n10.120.0.38       3          5e:7e:9c:18:45:d0 lloret_guest\n10.70.3.23        3          02:11:32:2f:e9:be lloret_staff\n10.120.0.50       1          42:16:3f:ae:69:02 lloret_guest\n10.70.3.35        0          04:ec:d8:7c:db:de lloret_staff\n10.70.3.47        0          5c:e9:1e:6b:54:a9 lloret_staff\n10.70.0.11        0          02:11:32:27:bb:b6 lloret_staff\n10.1.0.242        1          10:b3:d6:46:49:ee lan\n10.70.3.83        1          e8:eb:1b:11:af:f7 lloret_staff\n10.70.3.28        0          00:0a:b0:07:25:83 lloret_staff\n10.70.3.40        22         40:16:3b:c1:a3:d1 lloret_staff\n10.70.3.52        0          e4:a8:df:95:98:b8 lloret_staff\n10.70.0.16        0          00:11:32:d2:1d:9e lloret_staff\n10.1.0.247        1          78:bc:1a:ad:ee:28 lan\n10.70.3.64        0          d4:3d:7e:7d:fa:89 lloret_staff\n10.70.2.249       0          b8:27:eb:9a:44:39 lloret_staff\n10.70.3.9         0          d8:5e:d3:ae:d2:34 lloret_staff\n10.70.3.21        1          44:39:c4:34:f8:28 lloret_staff\n10.70.3.33        0          14:d6:4d:1f:e5:fa lloret_staff\n10.70.3.45        0          f4:a8:0d:31:df:d1 lloret_staff\n10.70.242.100     52         00:80:f4:46:e9:a2 lloret_staff\n10.70.3.57        2          98:ee:cb:a5:d7:b6 lloret_staff\n10.1.1.12         4          30:b5:c2:cd:9c:6e lan\n10.70.3.2         8432       9c:50:d1:20:49:01 lloret_staff\n10.70.3.69        0          98:ee:cb:b7:23:61 lloret_staff\n10.120.0.29       0          a2:9b:d9:63:07:4f lloret_guest\n10.70.3.14        2          08:3a:88:69:34:be lloret_staff\n10.70.3.81        5          98:ee:cb:9c:3c:48 lloret_staff\n10.70.3.26        5          60:70:c0:48:f6:e4 lloret_staff\n10.70.3.38        0          d8:80:83:3f:58:fb lloret_staff\n10.70.0.14        5          00:11:32:8a:ac:85 lloret_staff\n10.1.0.245        1          08:4f:a9:ae:44:d4 lan\n10.70.3.62        1          8c:89:a5:3c:bf:bf lloret_staff\n192.168.1.1       0          00:1e:42:15:a3:64 wan2\n10.120.0.22       17         68:ec:c5:b1:8f:0f lloret_guest\n10.120.0.89       1          2a:2a:5d:c2:a0:82 lloret_guest\n10.70.3.74        0          cc:48:3a:c3:2a:67 lloret_staff\n10.70.3.19        0          08:3a:88:6d:6c:59 lloret_staff\n10.70.3.31        0          e0:4f:43:25:04:ab lloret_staff\n10.70.3.55        3          e8:ea:6a:83:df:49 lloret_staff\n10.120.0.82       2          4a:bc:2b:b8:12:89 lloret_guest\n10.120.0.27       0          ca:12:b5:1c:71:18 lloret_guest\n10.70.3.12        1          6c:3c:8c:7a:25:46 lloret_staff\n10.70.243.150     2          00:0a:b0:09:66:11 lloret_staff\n10.70.3.24        0          74:97:79:ec:a4:29 lloret_staff\n10.70.3.36        3          50:a4:d0:61:3b:62 lloret_staff\n10.70.0.12        2          02:11:32:27:ba:55 lloret_staff\n\nsite002 $ \n

","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/lloret-nets/#lloret-lan-block","title":"Lloret LAN Block","text":" What is the mask in decimal? IP Address Subnet Mask CIDR Notation Binary Subnet Mask 10.1.0.1 255.255.0.0 /16 11111111.11111111.00000000.00000000 How many subnets? How many hosts per subnet? What subnet is host 10.1.0.130 in? What is the broadcast address of 10.1.0.130/16 host? Example Specific Subnet Summary Concept Explanation Network Address 10.1.0.0 (10.1.0.130 falls in this range) CIDR Notation /16 (means 16 bits for network, remaining for host) Subnet Mask 255.255.0.0 (or /16) Binary Subnet Mask 11111111.11111111.00000000.00000000 Host Address Range 10.1.0.0 - 10.1.255.255 Broadcast Address 10.1.255.255 (covers the entire 10.1.x.x range)

This example is specific to the 10.1.0.1/16 subnet, detailing its characteristics and addressing within a Class A network.

","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/lloret-nets/#lloret-staff-block","title":"Lloret Staff Block","text":" What is the mask in decimal? IP Address Subnet Mask CIDR Notation Binary Subnet Mask 10.70.0.0 255.255.0.0 /16 11111111.11111111.00000000.00000000 How many subnets? How many hosts per subnet? What subnet is host 10.70.3.130 in? What is the broadcast address of 10.70.3.130/16 host? Example Specific Subnet Summary Concept Explanation Network Address 10.70.0.0 (10.70.3.130 falls in this range) CIDR Notation /16 (means 16 bits for network, remaining for host) Subnet Mask 255.255.0.0 (or /16) Binary Subnet Mask 11111111.11111111.00000000.00000000 Host Address Range 10.70.0.0 - 10.70.255.255 Broadcast Address 10.70.255.255 (covers the entire 10.70.x.x range)","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/lloret-nets/#lloret-byod-block","title":"Lloret BYOD Block","text":" What is the mask in decimal? IP Address Subnet Mask CIDR Notation Binary Subnet Mask 10.110.0.1 255.255.0.0 /16 11111111.11111111.00000000.00000000 How many subnets? How many hosts per subnet? What subnet is host 10.110.0.130 in? What is the broadcast address of 10.110.0.130/16 host? Example Specific Subnet Summary Concept Explanation Network Address 10.110.0.0 (10.110.0.130 falls in this range) CIDR Notation /16 (means 16 bits for network, remaining for host) Subnet Mask 255.255.0.0 (or /16) Binary Subnet Mask 11111111.11111111.00000000.00000000 Host Address Range 10.110.0.0 - 10.110.255.255 Broadcast Address 10.110.255.255 (covers the entire 10.110.x.x range)","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/lloret-nets/#lloret-guest-block","title":"Lloret Guest Block","text":" What is the mask in decimal? IP Address Subnet Mask CIDR Notation Binary Subnet Mask 10.120.0.1 255.255.0.0 /16 11111111.11111111.00000000.00000000 How many subnets? How many hosts per subnet? What subnet is host 10.120.0.130 in? What is the broadcast address of 10.120.0.130/16 host? Example Specific Subnet Summary Concept Explanation Network Address 10.120.0.0 (10.120.0.130 falls in this range) CIDR Notation /16 (means 16 bits for network, remaining for host) Subnet Mask 255.255.0.0 (or /16) Binary Subnet Mask 11111111.11111111.00000000.00000000 Host Address Range 10.120.0.0 - 10.120.255.255 Broadcast Address 10.120.255.255 (covers the entire 10.120.x.x range)","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/numerics/","title":"Numerical Systems","text":" Bit Position 7 6 5 4 3 2 1 0 Binary Value 128 64 32 16 8 4 2 1","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/osi/","title":"OSI Model","text":"","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/osi/#what-is-the-osi-model","title":"What is the OSI Model?","text":" French software engineer Hubert Zimmermann

The OSI model was first defined in raw form in Washington, D.C., in February 1978 by French software engineer Hubert Zimmermann, and the refined but still draft standard was published by the ISO in 1980.

It is a reference model. Ultimately, the TCP/IP model is the more practical model for today's networks, but the OSI model is still used to describe network layers and protocols. The US DoD invented the TCP/IP model in the 1970s, and it was used to build the internet. The OSI model was created in the 1980s by the International Organization for Standardization (ISO), and it was designed to be an abstract model for describing network protocols, not a practical model for building networks.

","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/osi/#from-binary-to-magic","title":"From Binary to Magic","text":"Layer Number Layer Name Function Examples 7 Application Provides network services directly to applications HTTP, FTP, SMTP 6 Presentation Translates data between the network and application formats SSL, TLS, JPEG, MPEG 5 Session Manages sessions between applications NetBIOS, RPC 4 Transport Provides reliable data transfer TCP, UDP 3 Network Handles addressing and routing of data packets IP, ICMP, IPSec 2 Data Link Transfers data between network and physical layers Ethernet, PPP, Switch, Bridge 1 Physical Deals with the physical connection to the network, data transmission Cables, Hubs, Repeaters, Network Cards","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/osi/#how-does-the-osi-reference-model-relate-to-tcpip","title":"How does the OSI Reference Model relate to TCP/IP?","text":"Layer Number Layer Name Function Examples 4 Application Handles high-level protocols, representation, encoding HTTP, SMTP, FTP, DNS 3 Transport Manages end-to-end data transmission TCP, UDP 2 Internet Determines the best path through the network IP (IPv4, IPv6), ICMP 1 Network Access (or Link) Deals with the physical aspects of data transmission Ethernet, Wi-Fi, ARP","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/osi/#in-case-you-were-wondering","title":"In case you were wondering...","text":"Protocol OSI Layer Description BACnet Application Provides rules for data representation and communication. Network BACnet/IP uses IP for networking. Physical/Data Link Uses Ethernet, ARCNET, or MSTP for physical communication. Modbus Application Defines its own data model and functions at this layer. Transport In Modbus TCP/IP, TCP is used for transport. Network Modbus TCP/IP uses IP. Physical/Data Link In Modbus Serial (RTU or ASCII), operates over RS-232 or RS-485 lines.","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/packet-life/","title":"The Life of a Packet","text":"","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/packet-life/#a-unholy-flow-of-complexity-to-deliver-a-payload-simplified","title":"A unholy flow of complexity to deliver a Payload - Simplified","text":"Stage Description 1. Generation Data is generated or requested by an application. 2. Encapsulation Data is encapsulated into packets with headers. 3. Transmission Packets are transmitted over the network. 4. Routing Routers forward packets based on destination. 5. Switching Switches forward packets within local networks. 6. Arrival Packets arrive at their destination. 7. Decapsulation Packets are decapsulated to retrieve data. 8. Delivery Data is delivered to the destination app.","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/packet-life/#data-journey-through-the-osi-model","title":"Data Journey Through the OSI Model","text":"
  +-----------------------------------+\n  | Layer 7: Application            |\n  |   - Data generated by app       |\n  +-----------------------------------+\n  | Layer 6: Presentation           |\n  |   - Data conversion and encoding|\n  +-----------------------------------+\n  | Layer 5: Session                |\n  |   - Session management          |\n  +-----------------------------------+\n  | Layer 4: Transport              |\n  |   - Segmentation/Reassembly     |\n  |   - Ports and error checking    |\n  +-----------------------------------+\n  | Layer 3: Network                |\n  |   - Routing                    |\n  |   - Logical addressing          |\n  +-----------------------------------+\n  | Layer 2: Data Link              |\n  |   - Frame creation/interpretation|\n  |   - MAC addressing              |\n  +-----------------------------------+\n  | Layer 1: Physical               |\n  |   - Transmission of raw bits    |\n  +-----------------------------------+\n
","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/power2/","title":"The Power of 2","text":"Power of 2 Result 2^0 1 2^1 2 2^2 4 2^3 8 2^4 16 2^5 32 2^6 64 2^7 128 2^8 256 2^9 512 2^10 1,024 2^11 2,048 2^12 4,096 2^13 8,192 2^14 16,384 2^15 32,768 2^16 65,536 2^17 131,072 2^18 262,144 2^19 524,288 2^20 1,048,576 2^21 2,097,152 2^22 4,194,304 2^23 8,388,608 2^24 16,777,216 Bit Position Possible Values 1 128 2 192 3 224 4 240 5 248 6 252 7 254 8 255","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/subnetting-101/","title":"Subnet 101","text":"\ud83d\udd15 Do not be alarmed. Most people use a subnet calculator in the real world. \ud83d\ude0c ","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/subnetting-101/#binary-to-decimal","title":"Binary to Decimal","text":"Zero-based Indexing

In most programming languages, arrays and sequences start at index 0. This convention carries over to how we count positions in a binary number. It aligns with the way memory addresses and offsets are calculated in computer systems.

","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/subnetting-101/#an-octets-decimal-values","title":"An Octets Decimal Values \u266b","text":" Bit Position 7 6 5 4 3 2 1 0 Binary Value 128 64 32 16 8 4 2 1","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/subnetting-101/#2-the-power-of-8","title":"2 the Power of 8","text":" Binary Bits Decimal Number 00000000 0 00000001 1 00000010 2 00000011 3 00000100 4 00000101 5 00000110 6 00000111 7 00001000 8 00001001 9 ... ... 11111110 254 11111111 255","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/subnetting-101/#basic-example","title":"Basic Example","text":"","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/subnetting-101/#network","title":"Network","text":" Octet Number Binary Format Decimal Equivalent 1st Octet 11000000 192 2nd Octet 10101000 168 3rd Octet 00000001 1 4th Octet 00000000 0","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/subnetting-101/#broadcast","title":"Broadcast","text":" Octet Number Binary Format Decimal Equivalent 1st Octet 11000000 192 2nd Octet 10101000 168 3rd Octet 00000001 1 4th Octet 11111111 255","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/subnetting-101/#potential-gateway","title":"Potential Gateway","text":" Note Octet Number Binary Format Decimal Equivalent 1st Octet 11000000 192 2nd Octet 10101000 168 3rd Octet 00000001 1 4th Octet 00000001 1","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/subnetting-101/#all-zeros-and-all-ones","title":"All Zeros and All Ones","text":"Host Bits Status Address Type Description All 0s Network Address The address used to identify the subnet itself. All 1s Broadcast Address The address used to send data to all hosts on the subnet.","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/subnetting-101/#network-address-all-host-bits-off","title":"Network Address --> All Host Bits OFF:","text":" ","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/subnetting-101/#broadcast-address-all-host-bits-on","title":"Broadcast Address --> All Host Bits ON:","text":" ","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/subnetting-101/#cheat-sheet","title":"Cheat Sheet","text":"","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/subnetting/","title":"Subnet Things","text":"","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/subnetting/#overview","title":"Overview","text":"","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/super-lloret/","title":"Super Lloret","text":"","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/super-lloret/#lloret-networks","title":"Lloret Networks","text":"Network IP Address Subnet Mask Description LAN 10.1.0.1 255.255.0.0 LAN Network STAFF 10.70.0.1 255.255.0.0 Staff Network BYOD 10.110.0.1 255.255.0.0 BYOD Network GUEST 10.120.0.1 255.255.0.0 Guest Network","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/super-lloret/#lloret-supernetted","title":"Lloret Supernetted","text":"

When we talk about aggregating subnets, we're basically trying to find a bigger subnet that can neatly fit all these smaller subnets inside it.

  1. LAN Network: 10.1.0.0 to 10.1.255.255
  2. STAFF Network: 10.70.0.0 to 10.70.255.255
  3. BYOD Network: 10.110.0.0 to 10.110.255.255
  4. GUEST Network: 10.120.0.0 to 10.120.255.255

We're looking for the common ground here, the starting point that fits all these ranges. If we look closely, all the addresses start with \"10.\", which is our first clue. After the \"10.\", things start to get different, so that's where we need to focus.

When we do a bit of magical binary conversion and comparison, we find that the common bits in all these addresses go up to the first 8 bits (that's the \"10\" part). After that, the bits start to differ.

So, if we were to aggregate these networks, our new subnet would start at 10.0.0.0. But what about the mask? Well, since we only have the first 8 bits in common, our new mask would be 255.0.0.0.

Therefore, your aggregated subnet would be 10.0.0.0 with a subnet mask of 255.0.0.0. This big subnet umbrella can cover all your smaller subnets like a cozy blanket! \ud83c\udf10\ud83d\udcbb\ud83c\udf89

","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/super-lloret/#or-to-get-more-granular","title":"Or to get more granular...","text":"Network IP Address Binary Representation (First 10 bits) LAN 10.1.0.1 00001010.00 STAFF 10.70.0.1 00001010.01 BYOD 10.110.0.1 00001010.01 GUEST 10.120.0.1 00001010.01","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/trace/","title":"Trace","text":"
traceroute bad.horse\ntraceroute to bad.horse (162.252.205.157), 64 hops max, 52 byte packets\n 1  192.168.200.254 (192.168.200.254)  2.121 ms  2.470 ms  2.295 ms\n 2  79.173.166.153 (79.173.166.153)  2.599 ms  3.316 ms  2.614 ms\n 3  195.167.176.78 (195.167.176.78)  3.516 ms  3.514 ms  3.220 ms\n 4  lon00-br0.as5631.net (83.143.228.238)  4.232 ms  3.710 ms  3.021 ms\n 5  xe-9-1-2.edge3.london2.level3.net (212.113.9.201)  3.169 ms  3.103 ms  2.936 ms\n 6  ae1.8.bar4.toronto1.level3.net (4.69.218.54)  90.796 ms  90.944 ms  90.892 ms\n 7  level3-gw.core02.tor1.prioritycolo.com (4.16.51.30)  91.740 ms  91.998 ms  91.592 ms\n 8  67.223.96.90 (67.223.96.90)  91.401 ms  91.863 ms  91.377 ms\n 9  bad.horse (162.252.205.130)  91.974 ms  91.953 ms  91.525 ms\n10  bad.horse (162.252.205.131)  97.062 ms  96.838 ms  98.465 ms\n11  bad.horse (162.252.205.132)  101.131 ms  98.995 ms  99.642 ms\n12  bad.horse (162.252.205.133)  106.636 ms  106.428 ms  106.886 ms\n13  he.rides.across.the.nation (162.252.205.134)  111.930 ms  112.171 ms  131.932 ms\n14  the.thoroughbred.of.sin (162.252.205.135)  116.678 ms  116.763 ms  116.639 ms\n15  he.got.the.application (162.252.205.136)  129.628 ms  121.732 ms  119.512 ms\n16  that.you.just.sent.in (162.252.205.137)  127.010 ms  127.023 ms  125.168 ms\n17  it.needs.evaluation (162.252.205.138)  129.663 ms  131.599 ms  131.342 ms\n18  so.let.the.games.begin (162.252.205.139)  137.167 ms  136.652 ms  134.110 ms\n19  a.heinous.crime (162.252.205.140)  142.548 ms  140.485 ms  141.390 ms\n20  a.show.of.force (162.252.205.141)  146.570 ms *  146.862 ms\n21  a.murder.would.be.nice.of.course (162.252.205.142)  150.387 ms  152.285 ms  148.757 ms\n22  bad.horse (162.252.205.143)  156.445 ms  156.839 ms  156.380 ms\n23  bad.horse (162.252.205.144)  161.859 ms  161.328 ms  161.561 ms\n24  bad.horse (162.252.205.145)  167.209 ms  166.741 ms  165.658 ms\n25  he-s.bad (162.252.205.146)  171.489 ms  169.464 ms  169.579 ms\n26  the.evil.league.of.evil (162.252.205.147)  175.822 ms  176.793 ms  176.918 ms\n27  is.watching.so.beware (162.252.205.148)  181.350 ms  181.487 ms  181.877 ms\n28  the.grade.that.you.receive (162.252.205.149)  186.980 ms  186.881 ms  183.815 ms\n29  will.be.your.last.we.swear (162.252.205.150)  191.504 ms  192.136 ms  191.605 ms\n30  so.make.the.bad.horse.gleeful (162.252.205.151)  194.137 ms  196.883 ms  196.596 ms\n31  or.he-ll.make.you.his.mare (162.252.205.152)  201.546 ms  201.798 ms  201.274 ms\n32  o_o (162.252.205.153)  206.265 ms  207.723 ms  206.742 ms\n33  you-re.saddled.up (162.252.205.154)  323.803 ms  211.544 ms  211.737 ms\n34  there-s.no.recourse (162.252.205.155)  216.559 ms  217.206 ms  216.652 ms\n35  it-s.hi-ho.silver (162.252.205.156)  223.292 ms  333.837 ms  248.602 ms\n36  signed.bad.horse (162.252.205.157)  221.292 ms  221.970 ms  297.960 ms\n
","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/whoami/","title":"Hello","text":"

Here is an image showing a group of diverse cavemen inventing the decimal system, with thought bubbles depicting their dreams of future computers, branded with \"Lloret Control Systems\", and used for counting a vast number of antelopes. The scenes blend primitive settings with futuristic elements.

","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/wild/","title":"Wildcards","text":"Aspect Wildcard Mask Subnet Mask Purpose Used in Access Control Lists (ACLs) to specify which IP addresses to permit or deny access to. Used in IP addressing to divide a network into subnetworks and determine the network and host portions of an IP address. Format Inverse of subnet mask. It marks the bits that are to be matched with the corresponding bits in an IP address. Binary mask with 1s indicating the network portion and 0s indicating the host portion. Representation Typically represented with the \"wildcard bits\" keyword in ACLs, followed by a series of four octets with values between 0 and 255 separated by dots. Example: 0.0.0.255 Represented using the same dotted decimal format as IP addresses, with a varying number of bits set to 1. Example: 255.255.255.0 Usage Example To permit access to IP addresses within a specific range, specify the wildcard mask in an ACL entry. Example: permit 192.168.1.0 0.0.0.255 allows all addresses in the 192.168.1.0/24 subnet. To define network boundaries within an IP address range, apply the subnet mask to the IP addresses. Example: 192.168.1.0/24 represents a subnet with a subnet mask of 255.255.255.0. Network Calculation To calculate the network ID from an IP address, perform a bitwise AND operation with the IP address and the wildcard mask. To calculate the network ID from an IP address, perform a bitwise AND operation with the IP address and the subnet mask.","tags":["Example","Example"]},{"location":"Vendors/Allied-Telesis/","title":"Allied Telesis","text":"

pending

"},{"location":"Vendors/Allied-Telesis/documents/","title":"Documents","text":" "},{"location":"Vendors/Allied-Telesis/drawings/","title":"Drawings","text":"

pending

"},{"location":"Vendors/Allied-Telesis/training/","title":"Introduction","text":"

Alas, my Company has a preference for Allied Telesis, as a cheaper alternative.

Value Engineering, so they say.

So I have to learn it.

Manager Friendly

I have touched Allied Telesis before. My former employer had a lucky dip smattering of Allied Telesis in the Network i would occasionally stumble upon. I remember them well because they were known by the slang manager friendly due to the default credentials being manager:friend! that chimed with the lower price point... to the chagrin of the Network Team.

"},{"location":"Vendors/Allied-Telesis/training/#course-details","title":"Course Details","text":"

The CAP/ENT training course provides knowledge of the AlliedWare Plus operating system.

The course ends with an open-book multiple-choice exam.

Monday 5th February 2024 - Wednesday 7th February 2024

"},{"location":"Vendors/Allied-Telesis/training/#course-content","title":"Course Content","text":""},{"location":"Vendors/Allied-Telesis/training/#course-lab","title":"Course Lab","text":"

A remote lab is provided for the course. You SHH to a Linux box and onward to the console of the Allied Telesis Firewall & Switches.

No Stack
Host AT-LAB-FW\n    Hostname uk-1.training.alliedtelesis.com\n    User training41\n    # Welcome 4 (1)\n    # manager   (2)\n    # friend    (3)\n\nHost AT-LAB-530-ONE\n    Hostname uk-1.training.alliedtelesis.com\n    User training42\n\nHost AT-LAB-530-TWO\n    Hostname uk-1.training.alliedtelesis.com\n    User training43\n
  1. Password for SSH connection
  2. Username for Device login
  3. Password for Device login
lsof -i tcp:22

Use lsof -i tcp:22 to see the SSH sessions to the lab devices. In our case we have x2 per lab device as we are passing a linux jump box to reach the device console.

The command lsof -i tcp:22 is used in Unix-like operating systems to list open files and network connections. The components of this command (lsof, -i, tcp:22) each have specific meanings:

lsof: This stands for \"List Open Files\". lsof is a command-line utility that provides information about files that are opened by processes. In Unix and Linux systems, almost everything is treated as a file, including physical devices, directories, and network sockets.

-i: This option tells lsof to show network connections. When used without any additional parameters, -i lists all network files. However, it can be further narrowed down with additional parameters like protocol type (TCP or UDP) and port numbers.

tcp:22: This further filters the lsof output to show only TCP connections (due to tcp) that are using port 22. Port 22 is the default port for SSH (Secure Shell) connections, which are used for securely accessing remote machines.

\u279c  ~ lsof -i tcp:22\n\nCOMMAND   PID     USER   FD   TYPE             DEVICE SIZE/OFF NODE NAME\nssh     94715 lukeoson    4u  IPv4 0x52af948b88c31015      0t0  TCP 192.168.1.108:61894->194.73.86.54:ssh (ESTABLISHED)\nssh     94715 lukeoson    5u  IPv4 0x52af948b88c31015      0t0  TCP 192.168.1.108:61894->194.73.86.54:ssh (ESTABLISHED)\nssh     94838 lukeoson    4u  IPv4 0x52af948b8986327d      0t0  TCP 192.168.1.108:61928->194.73.86.54:ssh (ESTABLISHED)\nssh     94838 lukeoson    5u  IPv4 0x52af948b8986327d      0t0  TCP 192.168.1.108:61928->194.73.86.54:ssh (ESTABLISHED)\nssh     94938 lukeoson    4u  IPv4 0x52af948b8862e705      0t0  TCP 192.168.1.108:61965->194.73.86.54:ssh (ESTABLISHED)\nssh     94938 lukeoson    5u  IPv4 0x52af948b8862e705      0t0  TCP 192.168.1.108:61965->194.73.86.54:ssh (ESTABLISHED)\n

And you get a topology like this:

"},{"location":"Vendors/Allied-Telesis/training/#at-trn-capent-training","title":"AT-TRN-CAP/ENT Training","text":""},{"location":"Vendors/Allied-Telesis/training/#stacking","title":"Stacking","text":"

The first thing we did was unstack the switches. Couple of reboots required to remove the provisioned devices and renumber to 1. This exercise was to prepare the lab for the content to follow.

No Stack
awplus(config)#no stack 1 enable\nawplus(config)#no switch 2 provision\nawplus(config)#end\nawplus#write memory\nawplus#reload  # (1)\n
  1. Remove Stacking configuration and reboot the device.

With the devices unstacked we can proceed to the course content.

"},{"location":"Vendors/Allied-Telesis/training/#spanning-tree","title":"Spanning Tree","text":"

The first module covered some Spanning Tree features.

"},{"location":"Vendors/Allied-Telesis/training/#root-guard","title":"Root Guard","text":" Root Guard
awplus# configure terminal\nawplus(config)# interface port1.0.1\nawplus(config-if)# spanning-tree guard root # (1)\n
  1. The Root Guard feature makes sure that the port on which it is enabled is a designated port. If the Root Guard enabled port receives a superior BPDU, it goes to a Listening state (for STP) or discarding state (for RSTP and MSTP). This root\u2212inconsistent state is effectively equal to a listening state.

Verify with show spanning-tree brief.

"},{"location":"Vendors/Allied-Telesis/training/#bpdu-guard","title":"BPDU Guard","text":" BPDU Guard
awplus# configure terminal\nawplus(config)# interface port1.1.2\nawplus(config)# spanning-tree portfast\nawplus(config-if)# spanning-tree portfast bpdu-guard enable  (1)\n
  1. spanning-tree portfast bpdu-guard
    • the port will block all traffic (BPDUs and user data) - the STP blocking state, if it starts receiving BPDUs.
Error Disabled Timeout
awplus# configure terminal\nawplus(config)# spanning-tree errdisable-timeout enable      (1)\nawplus(config)# spanning-tree errdisable-timeout interval 50 (2)\n
  1. Usage:

    • the BPDU guard feature shuts down the port on receiving a BPDU on a BPDU-guard enabled port.
    • this command associates a timer with the feature such that the port is re-enabled without manual intervention after a set interval.
  2. specifies the time interval after which a port is brought back up when it has been disabled by the BPDU guard feature

    • valid in Global Configuration mode, for RSTP or MSTP
    • the interval in seconds is <10-1000000>
"},{"location":"Vendors/Allied-Telesis/training/#loop-detection","title":"Loop Detection","text":" Loop Detection
awplus(config)# loop-protection loop-detect ldf-interval 5 (1)\nawplus(config-if)# loop-protection action link-down (2)\nawplus(config-if)# loop-protection timeout 10 (3)\n
  1. Enables the loop-detect mechanism and generates loop-detect frames once every 5 seconds
  2. Disables the interface and brings down the link
  3. Configures a loop protection action timeout of 10 seconds

Warning

Always remove loop-protection loop-detect ldf-interval 5 when enabling EPSR.

"},{"location":"Vendors/Allied-Telesis/training/#thrash-limiting","title":"Thrash Limiting","text":"
2017 Feb 24 00:58:39 user.warning RACK1 HSL[877]: Thrash-limiting: Disabled learning on port2.0.26 by 0202.0ayy.xxxx on VLAN 20\n2017 Feb 24 00:58:39 user.warning RACK1 HSL[877]: Thrash-limiting: Disabled learning on port1.0.25 by 0202.0ayy.xxxx on VLAN 2\n2017 Feb 24 00:58:39 user.warning RACK1 HSL[877]: Thrash-limiting: Disabled learning on sa50 by 0202.0ayy.xxxx on VLAN 2\n
"},{"location":"Vendors/Allied-Telesis/training/#advanced-vlan","title":"Advanced VLAN","text":""},{"location":"Vendors/Allied-Telesis/training/#espr-diable-loop-prevention","title":"ESPR - diable loop prevention!","text":""},{"location":"Vendors/Allied-Telesis/training/#acl","title":"ACL","text":""},{"location":"Vendors/Allied-Telesis/training/#lldp","title":"LLDP","text":""},{"location":"Vendors/Allied-Telesis/training/#lldp-protocol-interaction","title":"LLDP & Protocol Interaction","text":"

Spanning tree Ports blocked by a spanning tree protocol can still transmit and receive LLDP advertisements. 802.1x Ports blocked by 802.1x port authorization cannot transmit or receive LLDP advertisements. If LLDP has stored information for a neighbor on the port before it was blocked, this information will eventually time out and be discarded. VLAN tagging LLDP packets are untagged; they do not contain 802.1Q header information with VLAN identifier and priority tagging. Virtual Chassis Stacking (VCStack) resiliency link When a port is configured as a VCStack resiliency link port, LLDP does not operate on the port; LLDP neither transmits nor receives advertisements, and any LLDP configuration and data stored for the port, including counters, is discarded. Mirror ports * LLDP does not operate on mirror analyzer ports

``` py linenums=\"1\" title=\"LLDP\" hl_lines=\"1 2\"

"},{"location":"Vendors/Allied-Telesis/training/#at-trn-capent-exam","title":"AT-TRN-CAP/ENT-EXAM","text":""},{"location":"blog/archive/2024/","title":"2024","text":""},{"location":"blog/archive/2023/","title":"2023","text":""},{"location":"blog/category/blog/","title":"Blog","text":""},{"location":"blog/category/lukeoson/","title":"Lukeoson","text":""},{"location":"tags/","title":"Tags","text":""},{"location":"tags/#example","title":"Example","text":""}]} \ No newline at end of file +{"config":{"lang":["en"],"separator":"[\\s\\-]+","pipeline":["stopWordFilter"],"fields":{"title":{"boost":1000.0},"text":{"boost":1.0},"tags":{"boost":1000000.0}}},"docs":[{"location":"","title":"Welcome to Lukeoson Labs","text":"

I'm Luke. Currently employed as a Network Architect in London.

Here you will find my Resume, my new Blog, and some Network related content.

I'm open to new and compelling opportunities in the Network Automation realm

If you have a role that you think I might be interested in, please get in touch. You have my thanks and appreciation.

Other than that, these pages provide a rudiment of information covering my interests in Network Automation as a career journey captured by the Epics:

This content is limited. It's less than MVP. And nothing close to MLP. It's Dev in progress.

I have decided not to port any previous content to this site. I'm starting from scratch.

While i have you, please do remember ... "},{"location":"tags/","title":"Tags","text":""},{"location":"tags/#example","title":"Example","text":""},{"location":"Contact/","title":"Contact","text":"

Variable Type Content file File page [Page], src_uri = 'Contact/index.md', name = 'index', dest_uri = 'Contact/index.html', url = 'Contact/', abs_src_path = '/Users/lukeoson/Documents/code/lukeoson-mkdocs/docs/Contact/index.md', abs_dest_path = '/Users/lukeoson/Documents/code/lukeoson-mkdocs/site/Contact/index.html', inclusion [InclusionLevel] title str 'Contact' children NoneType None previous_page Page Page(title='Training', url='/Vendors/Allied-Telesis/training/') next_page NoneType None _Page__active bool False update_date str '2024-02-17' canonical_url str 'https://lukeoson.com/Contact/' abs_url str '/Contact/' edit_url str 'https://github.com/lukeoson/lukeoson-mkdocs/edit/master/docs/Contact/index.md' markdown str '\\n\\n- :material-contacts-outline:{ .lg .middle } [__Luke Richardson__](https://www.linkedin.com/in/luke-richardson/) is currently employed as Network Architect in London.\\n\\n ---\\n\\n ![luke-face](../assets/images/luke-face.jpeg){ width=165px align=right } \\n :material-lan: Network Architect \\n :material-email-outline: [Hello@Lukeoson.com](mailto:Luke.richardson@lloret.co.uk) \\n :material-linkedin: [Linkedin](https://www.linkedin.com/in/luke-richardson/) \\n :material-cellphone: [+447376209455](tel:+447376209455) \\n :material-github: [lukeoson](https://github.com/lukeoson/lukeoson.github.io) \\n :material-certificate-outline: [Acclaim](https://www.credly.com/users/luke-richardson.dca3c027)\\n\\n ---\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n {{ context(page) | pretty }}\\n\\n' _title_from_render NoneType None content NoneType None toc list [] meta dict title = 'Contact', icon = 'material/badge-account-horizontal-outline' parent Section title = 'Contact', children = [Page(title='Contact', url='/Contact/')], _Section__active = False"},{"location":"Hire-Me/","title":"Luke Richardson's Resume","text":"

"},{"location":"Hire-Me/#employment-history","title":"Employment History","text":""},{"location":"Hire-Me/#education","title":"Education","text":""},{"location":"Hire-Me/#carreer-achievements","title":"Carreer Achievements","text":""},{"location":"Hire-Me/#hobbies","title":"Hobbies","text":""},{"location":"Hire-Me/#testimonials","title":"Testimonials","text":"

Thanks for taking the time to read my resume. Please get in touch. \ud83c\udf89

"},{"location":"IaC/","title":"Index","text":"

pending

","tags":["Example"]},{"location":"IaC/Git/","title":"Index","text":"

pedning

","tags":["Example"]},{"location":"IaC/Mkdocs/","title":"Index","text":"

pending

","tags":["Example"]},{"location":"Network-Rudiments/DNS/","title":"Index","text":"

pending

","tags":["Example"]},{"location":"Network-Rudiments/DNS/placeholder/","title":"Placeholder","text":"

pending

","tags":["Example"]},{"location":"Network-Rudiments/NAC/","title":"Index","text":"

pending

","tags":["Example"]},{"location":"Network-Rudiments/NAC/placeholder/","title":"Placeholder","text":"

pending

","tags":["Example"]},{"location":"Network-Rudiments/Subnetting/","title":"Subnetting","text":"

pending

","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/IPv4/","title":"IPv4","text":" ","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/IPv4/#each-byte-has-a-value-between-0-and-255","title":"Each Byte has a value between 0 and 255","text":" Octet Number Binary Format Decimal Equivalent 1st Octet 00000000 0 - 255 2nd Octet 00000000 0 - 255 3rd Octet 00000000 0 - 255 4th Octet 00000000 0 - 255","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/IPv4/#example-ipv4-addresses","title":"Example IPv4 Addresses:","text":" Octet Number Binary Format Decimal Equivalent 1st Octet 11000000 192 2nd Octet 10101000 168 3rd Octet 00000001 1 4th Octet 00000010 2","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/IPv4/#bits-bytes-of-19216812","title":"Bits & Bytes of 192.168.1.2","text":"Component Description Details Octet An IPv4 address is divided into 4 octets. Each octet consists of 8 bits. Bit The basic unit of data in an IP address. There are 32 bits in total (8 bits per octet). Byte Equivalent to one octet. Each byte (or octet) ranges from 0 to 255. Example For the IP address 192.168.1.2: - 192 is the first octet (byte).- 168 is the second octet (byte).- 1 is the third octet (byte).- 2 is the fourth octet (byte). Octet Number Binary Format Decimal Equivalent 1st Octet 00001010 10 2nd Octet 01000110 70 3rd Octet 00000011 3 4th Octet 01100100 100","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/IPv6/","title":"IPv6","text":"

Google IPv6 Adoption Tracker

Group Number Binary Format Hexadecimal Equivalent 1st Group 0000000000000000 0000 - FFFF 2nd Group 0000000000000000 0000 - FFFF 3rd Group 0000000000000000 0000 - FFFF 4th Group 0000000000000000 0000 - FFFF 5th Group 0000000000000000 0000 - FFFF 6th Group 0000000000000000 0000 - FFFF 7th Group 0000000000000000 0000 - FFFF 8th Group 0000000000000000 0000 - FFFF

Example IPv6 Address: 2001:0db8:85a3:0000:0000:8a2e:0370:7334

Step Description IPv6 Address 1 Remove leading zeros in each block 2001:db8:85a3:0:0:8a2e:370:7334 2 Collapse consecutive blocks of zeros with :: 2001:db8:85a3::8a2e:370:7334

Note

Dropping leading zeros in IPv6 addresses still makes sense because each field in an IPv6 address is understood to be a fixed size of 16 bits, represented in hexadecimal. When you see a field like 0db8, it's clear that it represents four hexadecimal digits, even if it's written as db8. The leading zero doesn't add any additional information because the size of the field is already established.

graph LR\n    A[IPv6 Address] --> B[Group 1]\n    A --> C[Group 2]\n    A --> D[Group 3]\n    A --> E[Group 4]\n    A --> F[Group 5]\n    A --> G[Group 6]\n    A --> H[Group 7]\n    A --> I[Group 8]\n\n    B --> B1[16 bits<br>Hex: 2001]\n    C --> C1[16 bits<br>Hex: 0db8]\n    D --> D1[16 bits<br>Hex: 85a3]\n    E --> E1[16 bits<br>Hex: 0000]\n    F --> F1[16 bits<br>Hex: 0000]\n    G --> G1[16 bits<br>Hex: 8a2e]\n    H --> H1[16 bits<br>Hex: 0370]\n    I --> I1[16 bits<br>Hex: 7334]\n\n    style A fill:#f9f,stroke:#333,stroke-width:4px\n    style B fill:#ccf,stroke:#f66,stroke-width:2px\n    style C fill:#ccf,stroke:#f66,stroke-width:2px\n    style D fill:#ccf,stroke:#f66,stroke-width:2px\n    style E fill:#ccf,stroke:#f66,stroke-width:2px\n    style F fill:#ccf,stroke:#f66,stroke-width:2px\n    style G fill:#ccf,stroke:#f66,stroke-width:2px\n    style H fill:#ccf,stroke:#f66,stroke-width:2px\n    style I fill:#ccf,stroke:#f66,stroke-width:2px
","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/broadcast/","title":"Bad","text":"","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/broadcast/#why-minimize-broadcast-packets","title":"Why Minimize Broadcast Packets?","text":"
  1. Network Congestion: Broadcast packets are sent to all devices on a network segment, regardless of whether they're the intended recipient. This means every device has to process these packets, even if they're irrelevant. On a busy network, this can lead to a lot of unnecessary data traffic, congesting the network.

  2. Resource Drain: Each device on the network must process and determine the relevance of broadcast packets. This can be a drain on resources, especially on devices that might already be running heavy tasks. It's like getting a bunch of irrelevant group emails; you have to check each one, just in case.

  3. Reduced Performance: High levels of broadcast traffic can slow down the overall network performance. Devices spend time and processing power handling these broadcasts, which could be better spent on actual data transmission relevant to their tasks.

  4. Security Concerns: Broadcasts can be a security risk. They can potentially be used for malicious activities like broadcast storms or as a method to discover devices on a network by an attacker.

","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/broadcast/#the-goal","title":"The Goal","text":"

The goal in network design and management is, therefore, to keep broadcast traffic as minimal as possible. This can be achieved by:

In essence, minimizing broadcast packets helps maintain a smoother, faster, and more secure network. It's like keeping public announcements in a big building to only the floors that need to hear them, rather than blasting them everywhere!

","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/cidr/","title":"CIDR","text":"Classless Inter-Domain Routing

CIDR stands for \"Classless Inter-Domain Routing.\" It's a method used for allocating IP addresses and routing Internet Protocol packets. CIDR replaced the older system based on classes A, B, and C in the 1990s.

","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/cidr/#slash-the-decimals-decimate-to-slash","title":"Slash the Decimals. Decimate to Slash.","text":"

We call slash notation \"CIDR notation\" because it's a key component of Classless Inter-Domain Routing (CIDR), which is a method for allocating IP addresses and routing decisions. The slash notation is a concise way to represent an IP address and its associated routing prefix.

Decimal Subnet Mask Binary Subnet Mask CIDR Notation 255.255.255.255 11111111.11111111.11111111.11111111 /32 255.255.255.254 11111111.11111111.11111111.11111110 /31 255.255.255.252 11111111.11111111.11111111.11111100 /30 255.255.255.248 11111111.11111111.11111111.11111000 /29 255.255.255.240 11111111.11111111.11111111.11110000 /28 255.255.255.224 11111111.11111111.11111111.11100000 /27 255.255.255.192 11111111.11111111.11111111.11000000 /26 255.255.255.128 11111111.11111111.11111111.10000000 /25 255.255.255.0 11111111.11111111.11111111.00000000 /24 255.255.254.0 11111111.11111111.11111110.00000000 /23 255.255.252.0 11111111.11111111.11111100.00000000 /22 255.255.248.0 11111111.11111111.11111000.00000000 /21 255.255.240.0 11111111.11111111.11110000.00000000 /20 255.255.224.0 11111111.11111111.11100000.00000000 /19 255.255.192.0 11111111.11111111.11000000.00000000 /18 255.255.128.0 11111111.11111111.10000000.00000000 /17 255.255.0.0 11111111.11111111.00000000.00000000 /16 255.254.0.0 11111111.11111110.00000000.00000000 /15 255.252.0.0 11111111.11111100.00000000.00000000 /14 255.248.0.0 11111111.11111000.00000000.00000000 /13 255.240.0.0 11111111.11110000.00000000.00000000 /12 255.224.0.0 11111111.11100000.00000000.00000000 /11 255.192.0.0 11111111.11000000.00000000.00000000 /10 255.128.0.0 11111111.10000000.00000000.00000000 /9 255.0.0.0 11111111.00000000.00000000.00000000 /8 254.0.0.0 11111110.00000000.00000000.00000000 /7 252.0.0.0 11111100.00000000.00000000.00000000 /6 248.0.0.0 11111000.00000000.00000000.00000000 /5 240.0.0.0 11110000.00000000.00000000.000000 /4 224.0.0.0 11100000.00000000.00000000.00000000 /3 192.0.0.0 11000000.00000000.00000000.00000000 /2 128.0.0.0 10000000.00000000.00000000.00000000 /1 0.0.0.0 00000000.00000000.00000000.00000000 /0 (Default)","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/classy/","title":"Classy","text":"","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/classy/#ip-classes","title":"IP Classes","text":" ","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/classy/#bits-specified-by-class","title":"Bits specified by Class","text":"Class Leading Bits Range of First Octet A 0xxxxxxx 0 - 127 B 10xxxxxx 128 - 191 C 110xxxxx 192 - 223 D 1110xxxx 224 - 239 E 1111xxxx 240 - 255","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/classy/#subnets-classy-cider","title":"Subnets - Classy Cider \ud83c\udf7b","text":"","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/documents/","title":"Helpful resources for learning to subnet","text":" ","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/example/","title":"Subnetting Examples","text":"","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/example/#example-class-c-subnet","title":"Example Class C Subnet","text":" What is the mask in decimal? IP Address Subnet Mask CIDR Notation Binary Subnet Mask 192.168.100.0 255.255.255.192 /26 11111111.11111111.11111111.11000000 How many subnets? How many hosts per subnet? What subnet is host 192.168.100.130 in? What is the broadcast address of 192.168.100.130/26 host? Example Class C Summary Concept Explanation Network Address 192.168.100.128 (192.168.100.130 falls in this range) CIDR Notation /26 (means 26 bits for network, remaining for host) Subnet Mask 255.255.255.192 (or /26) Binary Subnet Mask 11111111.11111111.11111111.11000000 Host Address Range 192.168.100.128 - 192.168.100.191 Next Network Address 192.168.100.192 (since /26 allows 64 addresses per subnet) Broadcast Address 192.168.100.191 (one less than the next network address)","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/example/#example-class-b-subnet","title":"Example Class B Subnet","text":" What is the mask in decimal? IP Address Subnet Mask CIDR Notation Binary Subnet Mask 172.16.0.0 255.255.224.0 /19 11111111.11111111.11100000.00000000 How many subnets? How many hosts per subnet? What subnet is host 172.16.32.130 in? What is the broadcast address of 172.16.32.130/19 host? Example Class B Summary Concept Explanation Network Address 172.16.32.0 (172.16.32.130 falls in this range) CIDR Notation /19 (means 19 bits for network, remaining for host) Subnet Mask 255.255.224.0 (or /19) Binary Subnet Mask 11111111.11111111.11100000.00000000 Host Address Range 172.16.32.0 - 172.16.63.255 Next Network Address 172.16.64.0 (since /19 allows 8192 addresses per subnet) Broadcast Address 172.16.63.255 (one less than the next network address)","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/example/#example-class-a-subnet","title":"Example Class A Subnet","text":" What is the mask in decimal? IP Address Subnet Mask CIDR Notation Binary Subnet Mask 10.0.0.0 255.240.0.0 /12 11111111.11110000.00000000.00000000 How many subnets? How many hosts per subnet? What subnet is host 10.16.0.130 in? What is the broadcast address of 10.16.0.130/12 host? Example Class A Summary Concept Explanation Network Address 10.16.0.0 (10.16.0.130 falls in this range) CIDR Notation /12 (means 12 bits for network, remaining for host) Subnet Mask 255.240.0.0 (or /12) Binary Subnet Mask 11111111.11110000.00000000.00000000 Host Address Range 10.16.0.0 - 10.31.255.255 Next Network Address 10.32.0.0 (since /12 allows 1,048,576 addresses per subnet) Broadcast Address 10.31.255.255 (one less than the next network address)","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/hex/","title":"Hex","text":"","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/hex/#what-is-hexadecimal","title":"What is Hexadecimal?","text":"","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/hex/#convert-binary-to-hexadecimal","title":"Convert Binary to Hexadecimal","text":"
graph TD\n    subgraph A[Decimal]\n        A1[0]\n        A2[1]\n        A3[2]\n        A4[3]\n        A5[4]\n        A6[5]\n        A7[6]\n        A8[7]\n        A9[8]\n        A10[9]\n        A11[10]\n        A12[11]\n        A13[12]\n        A14[13]\n        A15[14]\n        A16[15]\n    end\n\n    subgraph B[Hexadecimal]\n        B1[0]\n        B2[1]\n        B3[2]\n        B4[3]\n        B5[4]\n        B6[5]\n        B7[6]\n        B8[7]\n        B9[8]\n        B10[9]\n        B11[A]\n        B12[B]\n        B13[C]\n        B14[D]\n        B15[E]\n        B16[F]\n    end\n\n    A1 --> B1\n    A2 --> B2\n    A3 --> B3\n    A4 --> B4\n    A5 --> B5\n    A6 --> B6\n    A7 --> B7\n    A8 --> B8\n    A9 --> B9\n    A10 --> B10\n    A11 --> B11\n    A12 --> B12\n    A13 --> B13\n    A14 --> B14\n    A15 --> B15\n    A16 --> B16
Decimal Hexadecimal Binary 0 0 0000 1 1 0001 2 2 0010 3 3 0011 4 4 0100 5 5 0101 6 6 0110 7 7 0111 8 8 1000 9 9 1001 10 A 1010 11 B 1011 12 C 1100 13 D 1101 14 E 1110 15 F 1111","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/lloret-nets/","title":"Lloret Nets","text":"","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/lloret-nets/#lloret-networks","title":"Lloret Networks","text":"Network IP Address Subnet Mask Description LAN 10.1.0.1 255.255.0.0 LAN Network STAFF 10.70.0.1 255.255.0.0 Staff Network BYOD 10.110.0.1 255.255.0.0 BYOD Network GUEST 10.120.0.1 255.255.0.0 Guest Network Lloret Networks

set ip 10.1.0.1 255.255.0.0 #LAN\nset ip 10.70.0.1 255.255.0.0 #STAFF\nset ip 10.110.0.1 255.255.0.0 #BYOD\nset ip 10.120.0.1 255.255.0.0 #GUEST\n
site002 $ get system arp \nAddress           Age(min)   Hardware Addr      Interface\n10.70.3.5         0          64:79:f0:45:eb:56 lloret_staff\n10.70.3.72        15         c4:9d:ed:ad:27:d9 lloret_staff\n10.120.0.32       1          d2:eb:db:14:f6:d5 lloret_guest\n10.70.241.1       1          c0:56:e3:50:32:94 lloret_staff\n10.120.0.44       1          66:c9:6a:28:bd:73 lloret_guest\n10.70.3.29        0          d8:bb:c1:0e:e7:8e lloret_staff\n10.70.3.41        0          f4:a8:0d:5c:e5:82 lloret_staff\n10.120.0.68       1          ce:d9:90:ca:85:38 lloret_guest\n10.70.0.206       0          00:0c:29:95:86:5a lloret_staff\n10.70.0.17        0          00:11:32:b4:fd:93 lloret_staff\n10.70.3.53        3          e0:4f:43:e3:c0:b3 lloret_staff\n10.110.0.40       3          26:39:93:9a:9c:c0 lloret_byod\n10.70.240.100     12         6c:4b:90:6b:a1:d6 lloret_staff\n10.120.0.25       1          ce:91:23:e7:02:c0 lloret_guest\n10.70.3.10        3          d8:5e:d3:ae:d4:3c lloret_staff\n10.70.3.77        0          28:16:a8:04:d8:a7 lloret_staff\n10.70.3.22        0          08:3a:88:6d:d2:45 lloret_staff\n10.70.1.69        0          1c:69:7a:64:db:5f lloret_staff\n10.70.3.34        0          6c:24:08:2c:05:dd lloret_staff\n10.110.0.21       0          5a:20:ea:cb:62:b7 lloret_byod\n10.70.3.46        0          f8:75:a4:7f:21:f2 lloret_staff\n10.70.0.10        0          9c:8e:99:4b:9d:68 lloret_staff\n10.1.0.241        1          78:bc:1a:ad:ed:52 lan\n10.120.0.73       1          ba:cc:77:f4:f0:2b lloret_guest\n10.70.3.70        0          f8:75:a4:7f:40:25 lloret_staff\n10.120.0.30       1          0e:4a:68:ac:9d:e3 lloret_guest\n10.70.3.15        1          50:a4:d0:61:13:bd lloret_staff\n10.70.243.153     1          58:fd:b1:56:7c:81 lloret_staff\n10.1.0.21         3          24:9a:d8:2b:16:79 lan\n10.70.3.27        1          6c:4b:90:59:5e:b7 lloret_staff\n10.70.3.39        0          98:ee:cb:ea:0a:70 lloret_staff\n10.70.3.51        0          44:39:c4:34:ee:5c lloret_staff\n10.70.0.15        0          00:11:32:e9:02:2b lloret_staff\n10.1.0.246        1          08:4f:a9:fd:86:c4 lan\n10.120.0.23       0          a2:60:df:48:18:97 lloret_guest\n10.70.2.248       0          b8:27:eb:3f:36:43 lloret_staff\n10.70.3.8         0          50:a4:d0:61:3b:5f lloret_staff\n10.70.3.20        0          50:a4:d0:61:3b:68 lloret_staff\n10.70.3.32        0          04:ec:d8:26:6b:cd lloret_staff\n10.70.3.44        0          48:2a:e3:aa:f5:e4 lloret_staff\n10.70.3.56        1          50:a4:d0:61:3b:44 lloret_staff\n10.120.0.83       1          3e:93:08:cd:7d:00 lloret_guest\n10.70.3.13        1          50:a4:d0:61:3a:6c lloret_staff\n10.70.243.151     8794       88:c9:b3:d0:17:4f lloret_staff\n10.120.0.40       2          62:ca:9e:c2:99:c6 lloret_guest\n10.70.3.25        0          24:9a:d8:0d:1d:d1 lloret_staff\n10.70.3.49        0          28:16:a8:01:87:f5 lloret_staff\n10.1.0.244        1          5c:5a:c7:57:c4:20 lan\n10.70.3.61        0          a4:f9:33:4d:7c:68 lloret_staff\n10.70.3.6         0          f4:a8:0d:32:44:12 lloret_staff\n10.70.3.18        1          50:a4:d0:61:3a:e4 lloret_staff\n86.188.216.217    0          54:a2:74:27:f7:11 wan1\n10.120.0.45       2          56:c0:73:c9:11:da lloret_guest\n10.70.3.30        0          d8:5e:d3:ae:d4:3b lloret_staff\n10.70.243.101     3          00:0e:c6:d3:f1:e4 lloret_staff\n10.70.0.6         2670       9c:b6:54:74:9c:ca lloret_staff\n10.70.3.42        0          10:60:4b:68:0a:8f lloret_staff\n10.70.3.66        0          0c:37:96:15:9e:c7 lloret_staff\n10.70.3.11        0          10:b5:88:06:96:67 lloret_staff\n10.120.0.93       0          26:61:e0:70:54:60 lloret_guest\n10.120.0.38       3          5e:7e:9c:18:45:d0 lloret_guest\n10.70.3.23        3          02:11:32:2f:e9:be lloret_staff\n10.120.0.50       1          42:16:3f:ae:69:02 lloret_guest\n10.70.3.35        0          04:ec:d8:7c:db:de lloret_staff\n10.70.3.47        0          5c:e9:1e:6b:54:a9 lloret_staff\n10.70.0.11        0          02:11:32:27:bb:b6 lloret_staff\n10.1.0.242        1          10:b3:d6:46:49:ee lan\n10.70.3.83        1          e8:eb:1b:11:af:f7 lloret_staff\n10.70.3.28        0          00:0a:b0:07:25:83 lloret_staff\n10.70.3.40        22         40:16:3b:c1:a3:d1 lloret_staff\n10.70.3.52        0          e4:a8:df:95:98:b8 lloret_staff\n10.70.0.16        0          00:11:32:d2:1d:9e lloret_staff\n10.1.0.247        1          78:bc:1a:ad:ee:28 lan\n10.70.3.64        0          d4:3d:7e:7d:fa:89 lloret_staff\n10.70.2.249       0          b8:27:eb:9a:44:39 lloret_staff\n10.70.3.9         0          d8:5e:d3:ae:d2:34 lloret_staff\n10.70.3.21        1          44:39:c4:34:f8:28 lloret_staff\n10.70.3.33        0          14:d6:4d:1f:e5:fa lloret_staff\n10.70.3.45        0          f4:a8:0d:31:df:d1 lloret_staff\n10.70.242.100     52         00:80:f4:46:e9:a2 lloret_staff\n10.70.3.57        2          98:ee:cb:a5:d7:b6 lloret_staff\n10.1.1.12         4          30:b5:c2:cd:9c:6e lan\n10.70.3.2         8432       9c:50:d1:20:49:01 lloret_staff\n10.70.3.69        0          98:ee:cb:b7:23:61 lloret_staff\n10.120.0.29       0          a2:9b:d9:63:07:4f lloret_guest\n10.70.3.14        2          08:3a:88:69:34:be lloret_staff\n10.70.3.81        5          98:ee:cb:9c:3c:48 lloret_staff\n10.70.3.26        5          60:70:c0:48:f6:e4 lloret_staff\n10.70.3.38        0          d8:80:83:3f:58:fb lloret_staff\n10.70.0.14        5          00:11:32:8a:ac:85 lloret_staff\n10.1.0.245        1          08:4f:a9:ae:44:d4 lan\n10.70.3.62        1          8c:89:a5:3c:bf:bf lloret_staff\n192.168.1.1       0          00:1e:42:15:a3:64 wan2\n10.120.0.22       17         68:ec:c5:b1:8f:0f lloret_guest\n10.120.0.89       1          2a:2a:5d:c2:a0:82 lloret_guest\n10.70.3.74        0          cc:48:3a:c3:2a:67 lloret_staff\n10.70.3.19        0          08:3a:88:6d:6c:59 lloret_staff\n10.70.3.31        0          e0:4f:43:25:04:ab lloret_staff\n10.70.3.55        3          e8:ea:6a:83:df:49 lloret_staff\n10.120.0.82       2          4a:bc:2b:b8:12:89 lloret_guest\n10.120.0.27       0          ca:12:b5:1c:71:18 lloret_guest\n10.70.3.12        1          6c:3c:8c:7a:25:46 lloret_staff\n10.70.243.150     2          00:0a:b0:09:66:11 lloret_staff\n10.70.3.24        0          74:97:79:ec:a4:29 lloret_staff\n10.70.3.36        3          50:a4:d0:61:3b:62 lloret_staff\n10.70.0.12        2          02:11:32:27:ba:55 lloret_staff\n\nsite002 $ \n

","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/lloret-nets/#lloret-lan-block","title":"Lloret LAN Block","text":" What is the mask in decimal? IP Address Subnet Mask CIDR Notation Binary Subnet Mask 10.1.0.1 255.255.0.0 /16 11111111.11111111.00000000.00000000 How many subnets? How many hosts per subnet? What subnet is host 10.1.0.130 in? What is the broadcast address of 10.1.0.130/16 host? Example Specific Subnet Summary Concept Explanation Network Address 10.1.0.0 (10.1.0.130 falls in this range) CIDR Notation /16 (means 16 bits for network, remaining for host) Subnet Mask 255.255.0.0 (or /16) Binary Subnet Mask 11111111.11111111.00000000.00000000 Host Address Range 10.1.0.0 - 10.1.255.255 Broadcast Address 10.1.255.255 (covers the entire 10.1.x.x range)

This example is specific to the 10.1.0.1/16 subnet, detailing its characteristics and addressing within a Class A network.

","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/lloret-nets/#lloret-staff-block","title":"Lloret Staff Block","text":" What is the mask in decimal? IP Address Subnet Mask CIDR Notation Binary Subnet Mask 10.70.0.0 255.255.0.0 /16 11111111.11111111.00000000.00000000 How many subnets? How many hosts per subnet? What subnet is host 10.70.3.130 in? What is the broadcast address of 10.70.3.130/16 host? Example Specific Subnet Summary Concept Explanation Network Address 10.70.0.0 (10.70.3.130 falls in this range) CIDR Notation /16 (means 16 bits for network, remaining for host) Subnet Mask 255.255.0.0 (or /16) Binary Subnet Mask 11111111.11111111.00000000.00000000 Host Address Range 10.70.0.0 - 10.70.255.255 Broadcast Address 10.70.255.255 (covers the entire 10.70.x.x range)","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/lloret-nets/#lloret-byod-block","title":"Lloret BYOD Block","text":" What is the mask in decimal? IP Address Subnet Mask CIDR Notation Binary Subnet Mask 10.110.0.1 255.255.0.0 /16 11111111.11111111.00000000.00000000 How many subnets? How many hosts per subnet? What subnet is host 10.110.0.130 in? What is the broadcast address of 10.110.0.130/16 host? Example Specific Subnet Summary Concept Explanation Network Address 10.110.0.0 (10.110.0.130 falls in this range) CIDR Notation /16 (means 16 bits for network, remaining for host) Subnet Mask 255.255.0.0 (or /16) Binary Subnet Mask 11111111.11111111.00000000.00000000 Host Address Range 10.110.0.0 - 10.110.255.255 Broadcast Address 10.110.255.255 (covers the entire 10.110.x.x range)","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/lloret-nets/#lloret-guest-block","title":"Lloret Guest Block","text":" What is the mask in decimal? IP Address Subnet Mask CIDR Notation Binary Subnet Mask 10.120.0.1 255.255.0.0 /16 11111111.11111111.00000000.00000000 How many subnets? How many hosts per subnet? What subnet is host 10.120.0.130 in? What is the broadcast address of 10.120.0.130/16 host? Example Specific Subnet Summary Concept Explanation Network Address 10.120.0.0 (10.120.0.130 falls in this range) CIDR Notation /16 (means 16 bits for network, remaining for host) Subnet Mask 255.255.0.0 (or /16) Binary Subnet Mask 11111111.11111111.00000000.00000000 Host Address Range 10.120.0.0 - 10.120.255.255 Broadcast Address 10.120.255.255 (covers the entire 10.120.x.x range)","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/numerics/","title":"Numerical Systems","text":" Bit Position 7 6 5 4 3 2 1 0 Binary Value 128 64 32 16 8 4 2 1","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/osi/","title":"OSI Model","text":"","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/osi/#what-is-the-osi-model","title":"What is the OSI Model?","text":" French software engineer Hubert Zimmermann

The OSI model was first defined in raw form in Washington, D.C., in February 1978 by French software engineer Hubert Zimmermann, and the refined but still draft standard was published by the ISO in 1980.

It is a reference model. Ultimately, the TCP/IP model is the more practical model for today's networks, but the OSI model is still used to describe network layers and protocols. The US DoD invented the TCP/IP model in the 1970s, and it was used to build the internet. The OSI model was created in the 1980s by the International Organization for Standardization (ISO), and it was designed to be an abstract model for describing network protocols, not a practical model for building networks.

","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/osi/#from-binary-to-magic","title":"From Binary to Magic","text":"Layer Number Layer Name Function Examples 7 Application Provides network services directly to applications HTTP, FTP, SMTP 6 Presentation Translates data between the network and application formats SSL, TLS, JPEG, MPEG 5 Session Manages sessions between applications NetBIOS, RPC 4 Transport Provides reliable data transfer TCP, UDP 3 Network Handles addressing and routing of data packets IP, ICMP, IPSec 2 Data Link Transfers data between network and physical layers Ethernet, PPP, Switch, Bridge 1 Physical Deals with the physical connection to the network, data transmission Cables, Hubs, Repeaters, Network Cards","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/osi/#how-does-the-osi-reference-model-relate-to-tcpip","title":"How does the OSI Reference Model relate to TCP/IP?","text":"Layer Number Layer Name Function Examples 4 Application Handles high-level protocols, representation, encoding HTTP, SMTP, FTP, DNS 3 Transport Manages end-to-end data transmission TCP, UDP 2 Internet Determines the best path through the network IP (IPv4, IPv6), ICMP 1 Network Access (or Link) Deals with the physical aspects of data transmission Ethernet, Wi-Fi, ARP","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/osi/#in-case-you-were-wondering","title":"In case you were wondering...","text":"Protocol OSI Layer Description BACnet Application Provides rules for data representation and communication. Network BACnet/IP uses IP for networking. Physical/Data Link Uses Ethernet, ARCNET, or MSTP for physical communication. Modbus Application Defines its own data model and functions at this layer. Transport In Modbus TCP/IP, TCP is used for transport. Network Modbus TCP/IP uses IP. Physical/Data Link In Modbus Serial (RTU or ASCII), operates over RS-232 or RS-485 lines.","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/packet-life/","title":"The Life of a Packet","text":"","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/packet-life/#a-unholy-flow-of-complexity-to-deliver-a-payload-simplified","title":"A unholy flow of complexity to deliver a Payload - Simplified","text":"Stage Description 1. Generation Data is generated or requested by an application. 2. Encapsulation Data is encapsulated into packets with headers. 3. Transmission Packets are transmitted over the network. 4. Routing Routers forward packets based on destination. 5. Switching Switches forward packets within local networks. 6. Arrival Packets arrive at their destination. 7. Decapsulation Packets are decapsulated to retrieve data. 8. Delivery Data is delivered to the destination app.","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/packet-life/#data-journey-through-the-osi-model","title":"Data Journey Through the OSI Model","text":"
  +-----------------------------------+\n  | Layer 7: Application            |\n  |   - Data generated by app       |\n  +-----------------------------------+\n  | Layer 6: Presentation           |\n  |   - Data conversion and encoding|\n  +-----------------------------------+\n  | Layer 5: Session                |\n  |   - Session management          |\n  +-----------------------------------+\n  | Layer 4: Transport              |\n  |   - Segmentation/Reassembly     |\n  |   - Ports and error checking    |\n  +-----------------------------------+\n  | Layer 3: Network                |\n  |   - Routing                    |\n  |   - Logical addressing          |\n  +-----------------------------------+\n  | Layer 2: Data Link              |\n  |   - Frame creation/interpretation|\n  |   - MAC addressing              |\n  +-----------------------------------+\n  | Layer 1: Physical               |\n  |   - Transmission of raw bits    |\n  +-----------------------------------+\n
","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/power2/","title":"The Power of 2","text":"Power of 2 Result 2^0 1 2^1 2 2^2 4 2^3 8 2^4 16 2^5 32 2^6 64 2^7 128 2^8 256 2^9 512 2^10 1,024 2^11 2,048 2^12 4,096 2^13 8,192 2^14 16,384 2^15 32,768 2^16 65,536 2^17 131,072 2^18 262,144 2^19 524,288 2^20 1,048,576 2^21 2,097,152 2^22 4,194,304 2^23 8,388,608 2^24 16,777,216 Bit Position Possible Values 1 128 2 192 3 224 4 240 5 248 6 252 7 254 8 255","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/subnetting-101/","title":"Subnet 101","text":"\ud83d\udd15 Do not be alarmed. Most people use a subnet calculator in the real world. \ud83d\ude0c ","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/subnetting-101/#binary-to-decimal","title":"Binary to Decimal","text":"Zero-based Indexing

In most programming languages, arrays and sequences start at index 0. This convention carries over to how we count positions in a binary number. It aligns with the way memory addresses and offsets are calculated in computer systems.

","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/subnetting-101/#an-octets-decimal-values","title":"An Octets Decimal Values \u266b","text":" Bit Position 7 6 5 4 3 2 1 0 Binary Value 128 64 32 16 8 4 2 1","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/subnetting-101/#2-the-power-of-8","title":"2 the Power of 8","text":" Binary Bits Decimal Number 00000000 0 00000001 1 00000010 2 00000011 3 00000100 4 00000101 5 00000110 6 00000111 7 00001000 8 00001001 9 ... ... 11111110 254 11111111 255","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/subnetting-101/#basic-example","title":"Basic Example","text":"","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/subnetting-101/#network","title":"Network","text":" Octet Number Binary Format Decimal Equivalent 1st Octet 11000000 192 2nd Octet 10101000 168 3rd Octet 00000001 1 4th Octet 00000000 0","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/subnetting-101/#broadcast","title":"Broadcast","text":" Octet Number Binary Format Decimal Equivalent 1st Octet 11000000 192 2nd Octet 10101000 168 3rd Octet 00000001 1 4th Octet 11111111 255","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/subnetting-101/#potential-gateway","title":"Potential Gateway","text":" Note Octet Number Binary Format Decimal Equivalent 1st Octet 11000000 192 2nd Octet 10101000 168 3rd Octet 00000001 1 4th Octet 00000001 1","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/subnetting-101/#all-zeros-and-all-ones","title":"All Zeros and All Ones","text":"Host Bits Status Address Type Description All 0s Network Address The address used to identify the subnet itself. All 1s Broadcast Address The address used to send data to all hosts on the subnet.","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/subnetting-101/#network-address-all-host-bits-off","title":"Network Address --> All Host Bits OFF:","text":" ","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/subnetting-101/#broadcast-address-all-host-bits-on","title":"Broadcast Address --> All Host Bits ON:","text":" ","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/subnetting-101/#cheat-sheet","title":"Cheat Sheet","text":"","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/subnetting/","title":"Subnet Things","text":"","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/subnetting/#overview","title":"Overview","text":"","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/super-lloret/","title":"Super Lloret","text":"","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/super-lloret/#lloret-networks","title":"Lloret Networks","text":"Network IP Address Subnet Mask Description LAN 10.1.0.1 255.255.0.0 LAN Network STAFF 10.70.0.1 255.255.0.0 Staff Network BYOD 10.110.0.1 255.255.0.0 BYOD Network GUEST 10.120.0.1 255.255.0.0 Guest Network","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/super-lloret/#lloret-supernetted","title":"Lloret Supernetted","text":"

When we talk about aggregating subnets, we're basically trying to find a bigger subnet that can neatly fit all these smaller subnets inside it.

  1. LAN Network: 10.1.0.0 to 10.1.255.255
  2. STAFF Network: 10.70.0.0 to 10.70.255.255
  3. BYOD Network: 10.110.0.0 to 10.110.255.255
  4. GUEST Network: 10.120.0.0 to 10.120.255.255

We're looking for the common ground here, the starting point that fits all these ranges. If we look closely, all the addresses start with \"10.\", which is our first clue. After the \"10.\", things start to get different, so that's where we need to focus.

When we do a bit of magical binary conversion and comparison, we find that the common bits in all these addresses go up to the first 8 bits (that's the \"10\" part). After that, the bits start to differ.

So, if we were to aggregate these networks, our new subnet would start at 10.0.0.0. But what about the mask? Well, since we only have the first 8 bits in common, our new mask would be 255.0.0.0.

Therefore, your aggregated subnet would be 10.0.0.0 with a subnet mask of 255.0.0.0. This big subnet umbrella can cover all your smaller subnets like a cozy blanket! \ud83c\udf10\ud83d\udcbb\ud83c\udf89

","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/super-lloret/#or-to-get-more-granular","title":"Or to get more granular...","text":"Network IP Address Binary Representation (First 10 bits) LAN 10.1.0.1 00001010.00 STAFF 10.70.0.1 00001010.01 BYOD 10.110.0.1 00001010.01 GUEST 10.120.0.1 00001010.01","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/trace/","title":"Trace","text":"
traceroute bad.horse\ntraceroute to bad.horse (162.252.205.157), 64 hops max, 52 byte packets\n 1  192.168.200.254 (192.168.200.254)  2.121 ms  2.470 ms  2.295 ms\n 2  79.173.166.153 (79.173.166.153)  2.599 ms  3.316 ms  2.614 ms\n 3  195.167.176.78 (195.167.176.78)  3.516 ms  3.514 ms  3.220 ms\n 4  lon00-br0.as5631.net (83.143.228.238)  4.232 ms  3.710 ms  3.021 ms\n 5  xe-9-1-2.edge3.london2.level3.net (212.113.9.201)  3.169 ms  3.103 ms  2.936 ms\n 6  ae1.8.bar4.toronto1.level3.net (4.69.218.54)  90.796 ms  90.944 ms  90.892 ms\n 7  level3-gw.core02.tor1.prioritycolo.com (4.16.51.30)  91.740 ms  91.998 ms  91.592 ms\n 8  67.223.96.90 (67.223.96.90)  91.401 ms  91.863 ms  91.377 ms\n 9  bad.horse (162.252.205.130)  91.974 ms  91.953 ms  91.525 ms\n10  bad.horse (162.252.205.131)  97.062 ms  96.838 ms  98.465 ms\n11  bad.horse (162.252.205.132)  101.131 ms  98.995 ms  99.642 ms\n12  bad.horse (162.252.205.133)  106.636 ms  106.428 ms  106.886 ms\n13  he.rides.across.the.nation (162.252.205.134)  111.930 ms  112.171 ms  131.932 ms\n14  the.thoroughbred.of.sin (162.252.205.135)  116.678 ms  116.763 ms  116.639 ms\n15  he.got.the.application (162.252.205.136)  129.628 ms  121.732 ms  119.512 ms\n16  that.you.just.sent.in (162.252.205.137)  127.010 ms  127.023 ms  125.168 ms\n17  it.needs.evaluation (162.252.205.138)  129.663 ms  131.599 ms  131.342 ms\n18  so.let.the.games.begin (162.252.205.139)  137.167 ms  136.652 ms  134.110 ms\n19  a.heinous.crime (162.252.205.140)  142.548 ms  140.485 ms  141.390 ms\n20  a.show.of.force (162.252.205.141)  146.570 ms *  146.862 ms\n21  a.murder.would.be.nice.of.course (162.252.205.142)  150.387 ms  152.285 ms  148.757 ms\n22  bad.horse (162.252.205.143)  156.445 ms  156.839 ms  156.380 ms\n23  bad.horse (162.252.205.144)  161.859 ms  161.328 ms  161.561 ms\n24  bad.horse (162.252.205.145)  167.209 ms  166.741 ms  165.658 ms\n25  he-s.bad (162.252.205.146)  171.489 ms  169.464 ms  169.579 ms\n26  the.evil.league.of.evil (162.252.205.147)  175.822 ms  176.793 ms  176.918 ms\n27  is.watching.so.beware (162.252.205.148)  181.350 ms  181.487 ms  181.877 ms\n28  the.grade.that.you.receive (162.252.205.149)  186.980 ms  186.881 ms  183.815 ms\n29  will.be.your.last.we.swear (162.252.205.150)  191.504 ms  192.136 ms  191.605 ms\n30  so.make.the.bad.horse.gleeful (162.252.205.151)  194.137 ms  196.883 ms  196.596 ms\n31  or.he-ll.make.you.his.mare (162.252.205.152)  201.546 ms  201.798 ms  201.274 ms\n32  o_o (162.252.205.153)  206.265 ms  207.723 ms  206.742 ms\n33  you-re.saddled.up (162.252.205.154)  323.803 ms  211.544 ms  211.737 ms\n34  there-s.no.recourse (162.252.205.155)  216.559 ms  217.206 ms  216.652 ms\n35  it-s.hi-ho.silver (162.252.205.156)  223.292 ms  333.837 ms  248.602 ms\n36  signed.bad.horse (162.252.205.157)  221.292 ms  221.970 ms  297.960 ms\n
","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/whoami/","title":"Hello","text":"

Here is an image showing a group of diverse cavemen inventing the decimal system, with thought bubbles depicting their dreams of future computers, branded with \"Lloret Control Systems\", and used for counting a vast number of antelopes. The scenes blend primitive settings with futuristic elements.

","tags":["Example","Example"]},{"location":"Network-Rudiments/Subnetting/wild/","title":"Wildcards","text":"Aspect Wildcard Mask Subnet Mask Purpose Used in Access Control Lists (ACLs) to specify which IP addresses to permit or deny access to. Used in IP addressing to divide a network into subnetworks and determine the network and host portions of an IP address. Format Inverse of subnet mask. It marks the bits that are to be matched with the corresponding bits in an IP address. Binary mask with 1s indicating the network portion and 0s indicating the host portion. Representation Typically represented with the \"wildcard bits\" keyword in ACLs, followed by a series of four octets with values between 0 and 255 separated by dots. Example: 0.0.0.255 Represented using the same dotted decimal format as IP addresses, with a varying number of bits set to 1. Example: 255.255.255.0 Usage Example To permit access to IP addresses within a specific range, specify the wildcard mask in an ACL entry. Example: permit 192.168.1.0 0.0.0.255 allows all addresses in the 192.168.1.0/24 subnet. To define network boundaries within an IP address range, apply the subnet mask to the IP addresses. Example: 192.168.1.0/24 represents a subnet with a subnet mask of 255.255.255.0. Network Calculation To calculate the network ID from an IP address, perform a bitwise AND operation with the IP address and the wildcard mask. To calculate the network ID from an IP address, perform a bitwise AND operation with the IP address and the subnet mask.","tags":["Example","Example"]},{"location":"Vendors/Allied-Telesis/","title":"Allied Telesis","text":"

pending

"},{"location":"Vendors/Allied-Telesis/documents/","title":"Documents","text":" "},{"location":"Vendors/Allied-Telesis/drawings/","title":"Drawings","text":"

pending

"},{"location":"Vendors/Allied-Telesis/training/","title":"Introduction","text":"

Alas, my Company has a preference for Allied Telesis, as a cheaper alternative.

Value Engineering, so they say.

So I have to learn it.

Manager Friendly

I have touched Allied Telesis before. My former employer had a lucky dip smattering of Allied Telesis in the Network i would occasionally stumble upon. I remember them well because they were known by the slang manager friendly due to the default credentials being manager:friend! that chimed with the lower price point... to the chagrin of the Network Team.

"},{"location":"Vendors/Allied-Telesis/training/#course-details","title":"Course Details","text":"

The CAP/ENT training course provides knowledge of the AlliedWare Plus operating system.

The course ends with an open-book multiple-choice exam.

Monday 5th February 2024 - Wednesday 7th February 2024

"},{"location":"Vendors/Allied-Telesis/training/#course-content","title":"Course Content","text":""},{"location":"Vendors/Allied-Telesis/training/#course-lab","title":"Course Lab","text":"

A remote lab is provided for the course. You SHH to a Linux box and onward to the console of the Allied Telesis Firewall & Switches.

No Stack
Host AT-LAB-FW\n    Hostname uk-1.training.alliedtelesis.com\n    User training41\n    # Welcome 4 (1)\n    # manager   (2)\n    # friend    (3)\n\nHost AT-LAB-530-ONE\n    Hostname uk-1.training.alliedtelesis.com\n    User training42\n\nHost AT-LAB-530-TWO\n    Hostname uk-1.training.alliedtelesis.com\n    User training43\n
  1. Password for SSH connection
  2. Username for Device login
  3. Password for Device login
lsof -i tcp:22

Use lsof -i tcp:22 to see the SSH sessions to the lab devices. In our case we have x2 per lab device as we are passing a linux jump box to reach the device console.

The command lsof -i tcp:22 is used in Unix-like operating systems to list open files and network connections. The components of this command (lsof, -i, tcp:22) each have specific meanings:

lsof: This stands for \"List Open Files\". lsof is a command-line utility that provides information about files that are opened by processes. In Unix and Linux systems, almost everything is treated as a file, including physical devices, directories, and network sockets.

-i: This option tells lsof to show network connections. When used without any additional parameters, -i lists all network files. However, it can be further narrowed down with additional parameters like protocol type (TCP or UDP) and port numbers.

tcp:22: This further filters the lsof output to show only TCP connections (due to tcp) that are using port 22. Port 22 is the default port for SSH (Secure Shell) connections, which are used for securely accessing remote machines.

\u279c  ~ lsof -i tcp:22\n\nCOMMAND   PID     USER   FD   TYPE             DEVICE SIZE/OFF NODE NAME\nssh     94715 lukeoson    4u  IPv4 0x52af948b88c31015      0t0  TCP 192.168.1.108:61894->194.73.86.54:ssh (ESTABLISHED)\nssh     94715 lukeoson    5u  IPv4 0x52af948b88c31015      0t0  TCP 192.168.1.108:61894->194.73.86.54:ssh (ESTABLISHED)\nssh     94838 lukeoson    4u  IPv4 0x52af948b8986327d      0t0  TCP 192.168.1.108:61928->194.73.86.54:ssh (ESTABLISHED)\nssh     94838 lukeoson    5u  IPv4 0x52af948b8986327d      0t0  TCP 192.168.1.108:61928->194.73.86.54:ssh (ESTABLISHED)\nssh     94938 lukeoson    4u  IPv4 0x52af948b8862e705      0t0  TCP 192.168.1.108:61965->194.73.86.54:ssh (ESTABLISHED)\nssh     94938 lukeoson    5u  IPv4 0x52af948b8862e705      0t0  TCP 192.168.1.108:61965->194.73.86.54:ssh (ESTABLISHED)\n

And you get a topology like this:

"},{"location":"Vendors/Allied-Telesis/training/#at-trn-capent-training","title":"AT-TRN-CAP/ENT Training","text":""},{"location":"Vendors/Allied-Telesis/training/#stacking","title":"Stacking","text":"

The first thing we did was unstack the switches. Couple of reboots required to remove the provisioned devices and renumber to 1. This exercise was to prepare the lab for the content to follow.

No Stack
awplus(config)#no stack 1 enable\nawplus(config)#no switch 2 provision\nawplus(config)#end\nawplus#write memory\nawplus#reload  # (1)\n
  1. Remove Stacking configuration and reboot the device.

With the devices unstacked we can proceed to the course content.

"},{"location":"Vendors/Allied-Telesis/training/#spanning-tree","title":"Spanning Tree","text":"

The first module covered some Spanning Tree features.

"},{"location":"Vendors/Allied-Telesis/training/#root-guard","title":"Root Guard","text":" Root Guard
awplus# configure terminal\nawplus(config)# interface port1.0.1\nawplus(config-if)# spanning-tree guard root # (1)\n
  1. The Root Guard feature makes sure that the port on which it is enabled is a designated port. If the Root Guard enabled port receives a superior BPDU, it goes to a Listening state (for STP) or discarding state (for RSTP and MSTP). This root\u2212inconsistent state is effectively equal to a listening state.

Verify with show spanning-tree brief.

"},{"location":"Vendors/Allied-Telesis/training/#bpdu-guard","title":"BPDU Guard","text":" BPDU Guard
awplus# configure terminal\nawplus(config)# interface port1.1.2\nawplus(config)# spanning-tree portfast\nawplus(config-if)# spanning-tree portfast bpdu-guard enable  (1)\n
  1. spanning-tree portfast bpdu-guard
    • the port will block all traffic (BPDUs and user data) - the STP blocking state, if it starts receiving BPDUs.
Error Disabled Timeout
awplus# configure terminal\nawplus(config)# spanning-tree errdisable-timeout enable      (1)\nawplus(config)# spanning-tree errdisable-timeout interval 50 (2)\n
  1. Usage:

    • the BPDU guard feature shuts down the port on receiving a BPDU on a BPDU-guard enabled port.
    • this command associates a timer with the feature such that the port is re-enabled without manual intervention after a set interval.
  2. specifies the time interval after which a port is brought back up when it has been disabled by the BPDU guard feature

    • valid in Global Configuration mode, for RSTP or MSTP
    • the interval in seconds is <10-1000000>
"},{"location":"Vendors/Allied-Telesis/training/#loop-detection","title":"Loop Detection","text":" Loop Detection
awplus(config)# loop-protection loop-detect ldf-interval 5 (1)\nawplus(config-if)# loop-protection action link-down (2)\nawplus(config-if)# loop-protection timeout 10 (3)\n
  1. Enables the loop-detect mechanism and generates loop-detect frames once every 5 seconds
  2. Disables the interface and brings down the link
  3. Configures a loop protection action timeout of 10 seconds

Warning

Always remove loop-protection loop-detect ldf-interval 5 when enabling EPSR.

"},{"location":"Vendors/Allied-Telesis/training/#thrash-limiting","title":"Thrash Limiting","text":"
2017 Feb 24 00:58:39 user.warning RACK1 HSL[877]: Thrash-limiting: Disabled learning on port2.0.26 by 0202.0ayy.xxxx on VLAN 20\n2017 Feb 24 00:58:39 user.warning RACK1 HSL[877]: Thrash-limiting: Disabled learning on port1.0.25 by 0202.0ayy.xxxx on VLAN 2\n2017 Feb 24 00:58:39 user.warning RACK1 HSL[877]: Thrash-limiting: Disabled learning on sa50 by 0202.0ayy.xxxx on VLAN 2\n
"},{"location":"Vendors/Allied-Telesis/training/#advanced-vlan","title":"Advanced VLAN","text":""},{"location":"Vendors/Allied-Telesis/training/#espr-diable-loop-prevention","title":"ESPR - diable loop prevention!","text":""},{"location":"Vendors/Allied-Telesis/training/#acl","title":"ACL","text":""},{"location":"Vendors/Allied-Telesis/training/#lldp","title":"LLDP","text":""},{"location":"Vendors/Allied-Telesis/training/#lldp-protocol-interaction","title":"LLDP & Protocol Interaction","text":"

Spanning tree Ports blocked by a spanning tree protocol can still transmit and receive LLDP advertisements. 802.1x Ports blocked by 802.1x port authorization cannot transmit or receive LLDP advertisements. If LLDP has stored information for a neighbor on the port before it was blocked, this information will eventually time out and be discarded. VLAN tagging LLDP packets are untagged; they do not contain 802.1Q header information with VLAN identifier and priority tagging. Virtual Chassis Stacking (VCStack) resiliency link When a port is configured as a VCStack resiliency link port, LLDP does not operate on the port; LLDP neither transmits nor receives advertisements, and any LLDP configuration and data stored for the port, including counters, is discarded. Mirror ports * LLDP does not operate on mirror analyzer ports

``` py linenums=\"1\" title=\"LLDP\" hl_lines=\"1 2\"

"},{"location":"Vendors/Allied-Telesis/training/#at-trn-capent-exam","title":"AT-TRN-CAP/ENT-EXAM","text":""},{"location":"blog/archive/2024/","title":"2024","text":""},{"location":"blog/archive/2023/","title":"2023","text":""},{"location":"blog/category/blog/","title":"Blog","text":""},{"location":"blog/category/lukeoson/","title":"Lukeoson","text":""},{"location":"tags/","title":"Tags","text":""},{"location":"tags/#example","title":"Example","text":""}]} \ No newline at end of file diff --git a/sitemap.xml b/sitemap.xml index e245c4b6..9a234432 100644 --- a/sitemap.xml +++ b/sitemap.xml @@ -2,237 +2,237 @@ https://lukeoson.com/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/tags/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/Contact/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/Hire-Me/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/IaC/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/IaC/Git/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/IaC/Mkdocs/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/IaC/SoT/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/Network-Rudiments/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/Network-Rudiments/DNS/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/Network-Rudiments/DNS/placeholder/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/Network-Rudiments/NAC/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/Network-Rudiments/NAC/placeholder/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/Network-Rudiments/Subnetting/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/Network-Rudiments/Subnetting/IPv4/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/Network-Rudiments/Subnetting/IPv6/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/Network-Rudiments/Subnetting/broadcast/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/Network-Rudiments/Subnetting/cidr/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/Network-Rudiments/Subnetting/classy/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/Network-Rudiments/Subnetting/documents/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/Network-Rudiments/Subnetting/example/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/Network-Rudiments/Subnetting/hex/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/Network-Rudiments/Subnetting/lloret-nets/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/Network-Rudiments/Subnetting/numerics/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/Network-Rudiments/Subnetting/osi/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/Network-Rudiments/Subnetting/packet-life/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/Network-Rudiments/Subnetting/power2/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/Network-Rudiments/Subnetting/subnetting-101/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/Network-Rudiments/Subnetting/subnetting/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/Network-Rudiments/Subnetting/super-lloret/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/Network-Rudiments/Subnetting/trace/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/Network-Rudiments/Subnetting/whoami/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/Network-Rudiments/Subnetting/wild/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/Vendors/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/Vendors/Allied-Telesis/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/Vendors/Allied-Telesis/documents/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/Vendors/Allied-Telesis/drawings/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/Vendors/Allied-Telesis/training/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/blog/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/blog/2024/02/04/post01/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/blog/2023/12/01/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/blog/2024/02/08/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/blog/archive/2024/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/blog/archive/2023/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/blog/category/blog/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/blog/category/lukeoson/ - 2024-02-16 + 2024-02-17 daily https://lukeoson.com/tags/ - 2024-02-16 + 2024-02-17 daily \ No newline at end of file diff --git a/sitemap.xml.gz b/sitemap.xml.gz index f564c688..df415fa9 100644 Binary files a/sitemap.xml.gz and b/sitemap.xml.gz differ diff --git a/tags/index.html b/tags/index.html index 5a42d428..689d07d4 100644 --- a/tags/index.html +++ b/tags/index.html @@ -16,7 +16,7 @@ - +