This is one of the methods I've used in the past to secure a Linux host against brute force ssh attacks. While its not a perfect method, it does a good job of preventing 100s of brute force entries in your syslog. … [Read more]
Regular Expression Basics
Before I even get started, I want to mention that not all regular expression metacharacters are supported in every application. Keep this in mind when building your matches. Regular expressions are made up of normal characters and metacharacters. … [Read more]
Cisco IOS Tips and Tricks
So, I'm sure these have been posted almost on every networking blog under the sun, but who knows, right? Here are a few tips and tricks to help you move around the IOS a bit faster, find information faster, and locate problems... faster. … [Read more]
Working on my new lab setup

So, I purchased a couple extra routers, and a second layer3 switch from @usedciscoguy. He gave me a really good deal and I plan on purchasing a 6500 series switch from him as soon as I can afford it. Anyway.... I've spent a little bit of time working … [Read more]
Layer 2 Ethernet transport over OpenVPN
One of the things I used to deploy frequently at my previous position was transport for other ISPs and businesses. Since MPLS support is in its infancy on the Imagestream platform, and was yet to be deployed at the time, this is what I came up with. … [Read more]
Using OSPF to create unlicensed full duplex connections.

Recently one of my clients asked me to help resolve an issue at an aggregation point on their network. They had several connections that converged onto a single unlicensed link on their network, not only was the link saturated, but it had lots of … [Read more]