No Image

Upgrading an Entrepreneur ASP infrastructure – PART II

After analyzing the situation I have identified several key problems. 1. System Availability – Systems fail frequently due to hardware failures, DoS, and application failures. 2. Collocation is far and administration requires frequent visits 3. Mini tower servers consume space…


No Image

Upgrading an Entrepreneur ASP infrastructure – PART I

Any startup entrepreneurial hosting business usually run into many technical challenges. They face difficult business decisions and often have to trade off between stability, scalability and underlying profit. There is no win/win situation, however I do know one thing –…


No Image

Cisco SPAN, SNMP and Wireshark

Today I was assigned a task to find out and explain a certain network anomaly we are experiencing in our network. The mission started out to be a bandwidth monitoring task against a specific router. This router however was owned…


No Image

Layer 2 Best Practices

I think I should be stepping up my security practices. Here’s an article that I came across summarized all the things one should know about Layer 2 security practices on Cisco switches. http://www.networkworld.com/community/node/30682


No Image

How to configure VLANs in Linux

This link from the Redhat knowledge base talks all about it. Here’s the list of steps and pointers I had to go through. 1. Make sure that the 8021q module is loaded modprobe 8021q 2. This step is important as…


No Image

How to do a HTTP POST with Curl

This page proves there are people out there who forget about the same things I forget. Here’s the POST I wanted to run today. curl -d “platform=CHANNEL&processor_target=CERT&charge_type=PING” http://app01.qa.paygateway.com:31080/Quicksilver/


No Image

Cisco ASA/PIX Bandwidth limiting

Today, I got a chance to setup some bandwidth limiting on our Cisco ASA Firewall. The goal was to choke the speed of traffic going to our backup server to 250Mb/s. As our backup traffic goes through a firewall here’s…



How to allow ICMP through your Cisco ASA/PIX firewall

ICMP packets are not stateful, how does the ASA handle them by default? Internet Control Message Protocol (ICMP) pings and traceroute on the PIX Firewall are handled differently based on the version of PIX and ASA code. Inbound ICMP through…


No Image

Most useful commands used in TOP

Top is amongst the most comprehensive and informative process display command in Linux. There’s no reason for a seasoned Linux sysadmin like myself not to know it! Top can display all the information you need to know about processes and…