Author: Kévin SAS
Smooth Dual core migration to Distributed trunking solution
Another day in network engineer life. I was working for a hospital and have to propose some enhancements to their network. They already had a…
Configuring transparent proxy on fortigate
Today I will write about implicit proxy configuration on fortigate in 6.2 version. I had quite a lot of problem when configuring it on lab,…
Troubleshooting transparent proxy on fortigate
Several command are available to diagnose issue when using this function on fortios.Traditionnal diag debug flow may be irrelevant if proxy policy is blocking the…
Troubleshooting FSSO connexion on Fortigate
In this post, I will write about an issue I was facing off during a Fortigate Firewall migration. Customer had already FSSO “working” (in fact…
Properly and safely collect debugs on Aruba OS switches
Debugs can be run safely in almost all environments as soon as you don’t enable a “debug all” command on the equipment. Enabling debug on Aruba…
OSPF LSA types
The first time I read about LSA types, It was a little blur for me to understand.Then I read the CCNP routing and switching (route…
OSPF LSA type 4 – E bit for ASBR
As a reminder, LSA Type 4 are used by SPF to locate an ASBR. This is to know the path to the route redistributed by…
Using netmiko library to configure network equipments
When you want to retrieve information from network equipments, you can use : Web interface (usually disabled for security purpose, and slow) CLI (fast but…
Dot1X and MAB Authentication on Aruba OS
For security purpose, one customer asked to add Mac Access Bypass (MAB) to the existing 802.1X configuration. He had a few non compatibles 802.1X supplicants…