Entradas

Mostrando entradas de febrero, 2022

Cisco Privilege Levels – Explanation and Configuration

 Thanks to: https://study-ccna.com/ It is important to secure your Cisco devices by configuring and implementing username and password protection and assigning different Cisco privilege levels to control and restrict access to the CLI. Hence, protecting the devices from unauthorized access. In this article, we will discuss how to configure user accounts and how to associate them to the different Cisco privilege levels. Then, we’ll take a deep dive into their purposes and functions, as well as their importance in network security design.   Privilege Level Security Cisco IOS devices use privilege levels for more granular security and Role-Based Access Control (RBAC) in addition to usernames and passwords. There are 16 privilege levels of admins access, 0-15, on the Cisco router or switch that you can configure to provide customized access control. With 0 being the least privileged and 15 being the most privileged. These are three privilege levels the Cisco IOS uses by default: Level 0  –

Backup Hyper-V Virtual Machines with Pass-Through Disks

Imagen
 Thanks to: https://www.doitfixit.com/ We cannot backup Hyper-V Virtual Machines with pass-through virtual disks due to Hyper-V checkpoints limitation. Backup software will stop processing the backup job with “Processing VMs with pass-through disks is not supported” or similar error. To fix this issue (We are going to backup the Virtual Machine without pass-through disks) we can use pre/post scripts option in backup softwares. What we do here is when the backup starts we remove the pass-through disks and once the backup job is completed we re-attach the disks to the virtual machine. Pre-Script: Remove-VMHardDiskDrive -VMName  <VirtualMachineName>  -Passthru -ControllerType SCSI -ControllerNumber  <ID>  -ControllerLocation  <ID> Eg:  Remove-VMHardDiskDrive -VMName VM01 -Passthru -ControllerType SCSI -ControllerNumber 0 -ControllerLocation 0 Post-Script: Add-VMHardDiskDrive -VMName  <VirtualMachineName>  -ControllerType SCSI -ControllerNumber  <ID>  -Control

Configure The HTTP Server On The Switch

 Thank to: https://guides.co/ Step 1 Set the DNS domain name on the switch. Cisco IOS® Software does not allow for certificates, or even self-generated keys, to be created and installed without first defining a DNS domain name on the device. Enter the following: C3750X(config)#ip domain-name domain_name Step 2 Generate keys to be used for HTTPS by entering the following: C3750X(config)#crypto key generate rsa general-keys mod 2048 Step 3 Enable the HTTP servers on the switch. The HTTP server must be enabled on the switch to perform the HTTP / HTTPS capture and redirection. Enter the following: C3750X(config)#ip http server C3750X(config)C3750X(config)#ip http secure-server

How to create a Failover Cluster in WIndows Server 2016 Hyper-V

Imagen
 Thank to: https://www.vembu.com/ Let’s get started. Installing Failover Clustering Role Now that we have the Hyper-V role installed on both Hyper-V hosts, we need to install the Failover Cluster feature on both servers in our cluster. To do that, you simply run through the Add Roles and Features Wizard and we select the Role-based or feature-based installation. Choose the host. We simply Next past the Server Role screen to move onto the Add Features page. Select the Failover Clustering feature. We will be prompted to Add features that are required for Failover Clustering. This includes the Failover Clustering tools, management tools, and PowerShell module. The Failover Clustering feature is now selected. We choose to Install the Failover Clustering Feature. You can also select to Restart the destination server automatically if required. However, usually from my experience installing the feature, it doesn’t require a reboot unless there are pending operations at play. The install shoul