NETWizz
Well-Known Member
- Reaction score
- 1,925
Good Morning:
I am thinking of writing some more network tutorials for the community. I think I wrote only three (3) based on traffic shaping and prioritization, which is especially useful for VoIP; then another on IPv6; and one on HSRP to have multiple redundant routers. What would you folks like to see? I am trying to think of things that will actually be useful for most tech folks. My experience as a network engineer is just plain different than that of most computer technicians, so I have a unique perspective on networking that is "different" than that of computer technicians. For example, much of what I do is pretty much useless to you and to small organizations for example Policy-Based Routing and VRF Routing probably make no sense for a small organization.
I still want to talk about Link Aggregation and VLANS as promised earlier this year.
That said, I would like to do something you folks can use to really set yourself apart from the competition. What do you folks think of perhaps I write a tutorial on how to do secure, Virtual WAN links over the Internet?
i.e. Say you setup one site as 192.168.1.x and another 192.168.2.x and another 192.168.3.x, etc. I could make a quick tutorial on how to easily make these sites work just as they would independently to the Internet and LAN network only between each other also setup a virtual WAN over GRE tunnels secured with IPSec.
The benefit would be your customer with more than one location could reek ALL the benefits as a corporate WAN would without paying for Metro-E or MPLS. Quite simply, browsing the Internet from say 192.168.1.23 would hit router 192.168.1.1 and go directly to the Internet just as it does now (split-tunnel), BUT if they did something like open a spreadsheet at a remote site hosted by a server on the 192.168.2.x network it would simply and transparently work (provided the file-sharing was setup properly). They could print to a network printer at another location just as if it were in the next room over, authenticate against an Active Directory Domain Controller in another City, use central inventory software, share web-based software i.e. PCRT etc.without having to install a different instance at every site, etc...
What would you folks like to see?
I am thinking of writing some more network tutorials for the community. I think I wrote only three (3) based on traffic shaping and prioritization, which is especially useful for VoIP; then another on IPv6; and one on HSRP to have multiple redundant routers. What would you folks like to see? I am trying to think of things that will actually be useful for most tech folks. My experience as a network engineer is just plain different than that of most computer technicians, so I have a unique perspective on networking that is "different" than that of computer technicians. For example, much of what I do is pretty much useless to you and to small organizations for example Policy-Based Routing and VRF Routing probably make no sense for a small organization.
I still want to talk about Link Aggregation and VLANS as promised earlier this year.
That said, I would like to do something you folks can use to really set yourself apart from the competition. What do you folks think of perhaps I write a tutorial on how to do secure, Virtual WAN links over the Internet?
i.e. Say you setup one site as 192.168.1.x and another 192.168.2.x and another 192.168.3.x, etc. I could make a quick tutorial on how to easily make these sites work just as they would independently to the Internet and LAN network only between each other also setup a virtual WAN over GRE tunnels secured with IPSec.
The benefit would be your customer with more than one location could reek ALL the benefits as a corporate WAN would without paying for Metro-E or MPLS. Quite simply, browsing the Internet from say 192.168.1.23 would hit router 192.168.1.1 and go directly to the Internet just as it does now (split-tunnel), BUT if they did something like open a spreadsheet at a remote site hosted by a server on the 192.168.2.x network it would simply and transparently work (provided the file-sharing was setup properly). They could print to a network printer at another location just as if it were in the next room over, authenticate against an Active Directory Domain Controller in another City, use central inventory software, share web-based software i.e. PCRT etc.without having to install a different instance at every site, etc...
What would you folks like to see?