Cisco Command
Juniper Command
Co-Ordinating Definition
show run
sh configuration
Show running configuration
sh ver
sh ver
Show version
show ip interface brief
show interface terse
displays the status of interfaces configured for IP
show interface [intfc]
show interfaces [intfc] detail
displays the interface configuration, status and statistics.
show controller intfc
show interfaces intfc extensive
displays information about a physical port device
show interface | incl (proto|Desc)
show interfaces description
displays the interface configuration, status and statistics
show ip route
show route
displays summary information about entries in the routing table
show ip bgp summary
show bgp summary
displays the status of all Border Gateway Protocol (BGP) connections
show ip...
Firewall ( introduction )
A firewall is a device that is part hardware and part software that is used to secure network
access. Fundamentally, both types of firewalls have the same objective: to provide a method of enforcing an access control policy. Indeed, at the simplest definition, firewalls are nothing more than access control policy enforcement points.
Types of Firewalls ;
Packet Filters
The most basic firewall technology is the packet filter.A packet filter is designed to filter packets based on source IP, destination IP, source port, and destination port, and do so on a packet-per-packet basis to determine if that packet should be allowed through.
The basic security principles of a packet filter, such as allowing or denying packets based upon IP address, provide the minimum amount of required security. So...
Jenis-jenis Jalur Koneksi Internet
Artikel berikut masih belum final.
Berikut penulis akan mencoba menjelaskan gambaran umum berbagai jenis-jenis jalur koneksi internet, dilain kesempatan penulis akan jabarkan satu persatu.
Beberapa diantara jalur koneksi internet adalah ;
Dial-up PSTN (Public Switched Telephone Network)
Client melakukan koneksi ke ISP melalui telephone regular ( di Indonesia menggukan jasa PT.TELKOM)
Dial-up GPRS (General Packet Radio Service) dan CDMA (Code Division Multiple Access)
Perangkat ponsel berfungsi sebagai modem yang terhubung ke komputer melalui kabel data ponsel (port comm atau USB), IRDA ataupun bluetooth.
Koneksi internet melalui operator selular bertindak sebagai ISP dengan mengatur konfigurasi pada komputer maupun ponsel.
Leased-Line (dedicated)
dengan jalur Internet Cable,...
Error 1608: File record marked used....
Penulis baru-baru ini gagal meresize harddisk dengan program Partition Magic (PM) 8.x, namun diawal booting ulang windows xp file batch dari PM gagal ketika melakukan proses resizing dan muncul pesan error seperti dibawah ini ;
Error 1608: File record marked used...
dan kemudian reboot kembali kemudian masuk ke Windows XP seperti biasa dan proses resizing partisi harddisk gatot ( gagal total ).
Jika anda pernah atau sedang mengalami hal seperti demikian, berikut solusinya ;
1. Sebelum melakukan resizing dengan PM, ketikkan perintah berikut di command prompt atau dari Run ;
CHKDSK /F
kemudian muncul pesan seperti ;
Chkdsk cannot run because the volume is in use by another
process. Would you like to schedule this volume to be
checked the next time the system restarts? (Y/N)
tekan Y...
Mereset Perangkat Juniper SSG (firewall)
Suatu saat mungkin ada lupa password super administrator yang telah anda ganti sebelumnya, atau anda ingin mengganti konfigurasi kembali ke default karena sesuatu dan lain hal.
Berikut penulis memberikan tutor mereset perangkat juniper ssg ( berdasarkan pengalaman :D ), oke langsung aja ;
Untuk mereset perangkat Juniper SSG bisa dilakukan dengan 2 cara ;
1.mereset dari Screen OS dengan perintah reset kemudian ikuti pentunjuk.
2.menekan panel reset dibelakang perangkat.
sekarang kita melakukan dengan cara yang kedua ;
1. Colokkan kabel pada port console pada Juniper SSG dan hubungkan dengan komputer yang mempunyai port serial dan ditambah dengan konektor DB 9 (biasanya telah ada dalam paket pembelian perangkat).
Tanpa menghubungkan perangkat dengan komputer melalui port serial yang ditambah...
Virtualization System
this article still on my draft so don't forget to read again.
was taken from some references, if any question about this i hope i can help :)
Network Virtualization
A method of combining the available resources in a network by splitting up the available bandwidth into channels, each of which is independent from the others, and each of which can be assigned (or reassigned) to a particular server or device in real time. Each channel is independently secured. Every subscriber has shared access to all the resources on the network from a single computer.
Network management can be a tedious and time-consuming business for a human administrator. Network virtualization is intended to improve productivity, efficiency, and job satisfaction of the administrator by performing many of these tasks automatically,...
CINTA KEPADA ALLAH
Diambil dari BAB 8 : Kimia Kebahagiaan karangan Al-Ghazali
Kecintaan kepada Allah adalah topik yang paling penting dan merupakan tujuan akhir pembahasan kita sejauh ini. Kita telah berbicara tentang bahaya-bahaya ruhaniah karena mereka menghalangi kecintaan kepada Allah di hati manusia. Telah pula kita bicarakan tentang berbagai sifat baik yang diperlukan untuk itu. Penyempurnaan kemanusiaan terletak di sini, yaitu bahwa kecintaan kepada Allah mesti menaklukkanhati manusia dan menguasainya sepenuhnya.
Kalaupun kecintaan kepada Allah tidak menguasainya sepenuhnya, maka hal itu mesti merupakan perasaan yang paling besar di dalam hatinya, mengatasi kecintaan kepada yang lain-lain. Meskipun demikian, mudah dipahami bahwa kecintaan kepada Allah adalah sesuatu yang sulit dicapai, sehingga suatu...
Mengganti default folder Command form di Windows
Normal 0 false false false MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman"; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;} Secara default jika membuka command prompt di windows xp maka akan langsung masuk kedalam folder document user yang kita gunakan , contoh ;
C:\Documents and Settings\predi>
Untuk menggantinya silahkan buka registry (regedit.exe) kemudian...
Ten Commandments for Your Computer Sanity
1. Dont assume anything. Make some time to learn about securing your system.
2. Acquire and use a reliable antivirus program. Select an antivirus that has a consistent track record. Checkmark, AV-Test.org and TuV are among the most respected independent testers of antivirus software.
3. Acquire and use a reliable firewall solution. Again, independent reviewers are your best bet for reasonable choices. Some operating systems come with a firewall which only filters incoming traffic. Use a firewall that can control both incoming and outgoing Internet traffic.
4. Do not open e-mails coming from unknown or distrusted sources. Many viruses spread via e-mail messages so please ask for a confirmation from the sender if you are in any doubt.
5. Do not open the attachments of messages with a suspicious...
Security tips for network administrators - Enterprise
1. Define correct user rights for the correct task Users who have administrator rights have the ability to perform activities that could be damaging, such as
accidentally making changes that decrease the overall level of network securitybeing fooled into running malware, which would adopt user's administrator privilegeshaving logon details stolen, which would allow third parties to log in and carry out damaging actions To increase security, ensure that your users have the appropriate privilege level for the task at hand, and limit the number of users that have administrator usernames and passwords to a minimum.
2. Download files from trusted sites only Many files can be downloaded from multiple locations on the internet, but not all locations are created equal. Some are more secure...
Juniper
Beberapa kenalan pernah bertanya kepada penulis apa itu "juniper" (dalam bidang IT) apakah itu perangkat keras atau perangkat lunak ? , untuk menjawabnya penulis mengambil referensi dari wikipedia berikut kutipannya;
- - -Juniper Networks, Inc. adalah perusahaan Teknologi Informasi yang bermarkas di Sunnyvale,California. Perusahaan ini mendesain dan menjual layanan dan perangkat-perangkat jaringan IP (Internet Protocol).Juniper juga bekerjasama dengan Nokia, Siemens Networks, Ericson, dan Alcatel-Lucent dalam menyediakan solusi jaringan IP/MPLS (Multiprotocol Label Switching) bagi pelanggan. Produk Juniper terdiri atas keluarga router T-series, M-series, E-series, MX-series, dan J-series, Switch ethernet EX-series, perangkat optimasi WAN WX-series, dan perangkat Session & Resource...