Symbianize Forum

Most of our features and services are available only to members, so we encourage you to login or register a new account. Registration is free, fast and simple. You only need to provide a valid email. Being a member you'll gain access to all member forums and features, post a message to ask question or provide answer, and share or find resources related to mobile phones, tablets, computers, game consoles, and multimedia.

All that and more, so what are you waiting for, click the register button and join us now! Ito ang website na ginawa ng pinoy para sa pinoy!

CISCO Networking Discussions

View attachment 347493
Mga idol pa help naman paano mag configure ikakabit ko sna ung gohan at snippet sa UAAKM? yung snippet and gohan my sariling ISP pag naiconnect ko sila sa UAAKM walang internet. eto kasi ung iniwan ng dating System Administrator dito. haha gusto ko sna mag kanetwork silang lahat. pa help naman thanks
 

Attachments

  • GG.PNG
    GG.PNG
    135.6 KB · Views: 13
Ask lang po sa mga marunong. Paano po gawing OpenVPN client ang TP-Link Router like TL-WR940N?

Yung mga tp-link router po kasi na nasa option na ang paglalagay ng OpenVPN client. Ang mamahal po e. Nasa 5K pataas. :(

TIA po. Sorry kung Off topic
 
View attachment 1263683
Mga idol pa help naman paano mag configure ikakabit ko sna ung gohan at snippet sa UAAKM? yung snippet and gohan my sariling ISP pag naiconnect ko sila sa UAAKM walang internet. eto kasi ung iniwan ng dating System Administrator dito. haha gusto ko sna mag kanetwork silang lahat. pa help naman thanks

You need to have interconnected links on every switch per branches para magkita2x sila. If those switches are already L3 capable pwede kna jan mag declare routing to establish neighborship with those networks on every branches.
 
Last edited:
Ask lang po sa mga marunong. Paano po gawing OpenVPN client ang TP-Link Router like TL-WR940N?

Yung mga tp-link router po kasi na nasa option na ang paglalagay ng OpenVPN client. Ang mamahal po e. Nasa 5K pataas. :(

TIA po. Sorry kung Off topic


Not yet experienced this setup on actual TP-Link router. But I think this link below source from TP link article itself will help to guide you.

https://www.tp-link.com/us/faq-1237.html

Goodluck!
 
Guys need your feedback

Anyone of you know Sir Billy Ramirez gumagawa sya ng tutorial about CCNA, recently i read he will release a video tuts.

May nagAvail naba sa inyu o nagtry, kamusta naman po? Worth it ba? Enough na po ba para makapasa sa CCNA Exam, no need for BootCamp?

Although marami naman talaga nagkalat tuts online pero this one is in TAGLISH.
Thanks sa mga magrerespond.
 
o may online course na rin ata si sir billy ramirez sa first batch. waiting din ako sa feedback sa mga first batch.
 
Question lang sa ganitong scenario..

Let's say SW A, B and C are managed switches at naka enable STP to prevent Loops.

Connected si Unmanaged SW kay SW B.

May nag loop ng connection kay Unmanaged SW. Sa ganitong scenario ba mag aabot ang error or broadcast storm kay SW A and SW C kahit naka enable STP nila?

Hum1G36.jpg
 
Question lang sa ganitong scenario..

Let's say SW A, B and C are managed switches at naka enable STP to prevent Loops.

Connected si Unmanaged SW kay SW B.

May nag loop ng connection kay Unmanaged SW. Sa ganitong scenario ba mag aabot ang error or broadcast storm kay SW A and SW C kahit naka enable STP nila?

https://cdn.pbrd.co/images/Hum1G36.jpg

This could possibly happen if walang STP feature naka enabled from the beginning sa switchports ni Switch B. To prevent this kind of happening, best practice on your core and distro switches is to activate the BPDU guard and BPDU filter globally on all ports and exempt those links that are connected to your neighbor distro switches para hindi maka received ang mga distro switches mo ng mga BPDUs sa mga biglang nag attached ng mga access/cluster switches that are unnecessarily to participate with STP. Karagdagan pa dyan don't set all your switchports by default to switchport mode dynamic auto para yung link ng unmanage switches ay hindi basta2x ma negotiate into trunk links/interface. Hardcode to access mode will be best practice.
 
Last edited:


This could possibly happen if walang STP feature naka enabled from the beginning sa switchports ni Switch B. To prevent this kind of happening, best practice on your core and distro switches is to activate the BPDU guard and BPDU filter globally on all ports and exempt those links that are connected to your neighbor distro switches para hindi maka received ang mga distro switches mo ng mga BPDUs sa mga biglang nag attached ng mga access/cluster switches that are unnecessarily to participate with STP. Karagdagan pa dyan don't set all your switchports by default to switchport mode dynamic auto para yung link ng unmanage switches ay hindi basta2x ma negotiate into trunk links/interface. Hardcode to access mode will be best practice.

Ang alam ko hindi nakaka send ng BPDU and unmanaged switch? So ok pa rin na enabled ang BPDU and BPDU filter?

Saka alam ba ng mga unmanaged switch and mga trunks encapsulation?

Pero ok best practice sa access mode:thumbsup:
 
Ang alam ko hindi nakaka send ng BPDU and unmanaged switch? So ok pa rin na enabled ang BPDU and BPDU filter?

Saka alam ba ng mga unmanaged switch and mga trunks encapsulation?

Pero ok best practice sa access mode:thumbsup:

Since this are unmanaged devices and we don't know any events running behind it, what i'm saying is that we are already enabling loop prevention or L2 issues on our Distro and Core Switches. These are the best practices we could enabled as for precaution to prevent any kind of issues. Meron din kasi penetration apps/techniques which any of the device connected to any backbone switches that able to turned right away as a root bridge and then dun na lahat mag reredirect yung BDPU updates came from other neighboring switches. Please do also consider to enable root guard on your specific links papunta sa root bridge mo including as one of best practices.
 


Since this are unmanaged devices and we don't know any events running behind it, what i'm saying is that we are already enabling loop prevention or L2 issues on our Distro and Core Switches. These are the best practices we could enabled as for precaution to prevent any kind of issues. Meron din kasi penetration apps/techniques which any of the device connected to any backbone switches that able to turned right away as a root bridge and then dun na lahat mag reredirect yung BDPU updates came from other neighboring switches. Please do also consider to enable root guard on your specific links papunta sa root bridge mo including as one of best practices.

Ah ok medyo gets ko na...

Another question lang dre...

Ano magandang setup for an office with more than 20 departments? Each depts are consisting more or less 20 employees lang..

Balak ko kasi gumamit ng vlan per department kaso per vlan = per subnet masyadong malaki ung gagamitin ko..
 
Ah ok medyo gets ko na...

Another question lang dre...

Ano magandang setup for an office with more than 20 departments? Each depts are consisting more or less 20 employees lang..

Balak ko kasi gumamit ng vlan per department kaso per vlan = per subnet masyadong malaki ung gagamitin ko..

Hindi naman ganon kalaki even if you do have only single L3 capable managed switch and single Edge Router you can implement that kind of setup for 20 employees or if you'd like to create specific VLAN for 20 department. These VLANs are logically configured on your device and it won't be a big factor when comes to physical capability of device unless if so marami na yung users mo. You had to monitor the memory, cpu and bandwidth usage ng network mo pag dumating na sa ganong point.
 


Hindi naman ganon kalaki even if you do have only single L3 capable managed switch and single Edge Router you can implement that kind of setup for 20 employees or if you'd like to create specific VLAN for 20 department. These VLANs are logically configured on your device and it won't be a big factor when comes to physical capability of device unless if so marami na yung users mo. You had to monitor the memory, cpu and bandwidth usage ng network mo pag dumating na sa ganong point.

Pero praktikal ba un dre? like for Vlan 10 = xxx.xxx.10.xx, Vlan 20 = xxx.xxx.20.xx, total of 20 vlans. Hindi ba malaki ung subnet for dhcp server?
 
Pero praktikal ba un dre? like for Vlan 10 = xxx.xxx.10.xx, Vlan 20 = xxx.xxx.20.xx, total of 20 vlans. Hindi ba malaki ung subnet for dhcp server?

Hindi naman ganon talaga kalaki but you have to effort to add those DHCP per VLAN statements. Follow your mindset if how are you gonna organized your network.
 


Hindi naman ganon talaga kalaki but you have to effort to add those DHCP per VLAN statements. Follow your mindset if how are you gonna organized your network.

Pero kung ikaw mag design ng 20 departments dre? Ano magiging output mo? Hingi lang ako ng idea:lol:
 
Back
Top Bottom