Configuration guides for IT Administrators
⏱︎
Read time:
Sender Policy Framework (SPF) helps to fight against email spoofing for your organization. SPF is generally a TXT record in DNS Zone file that lists the host name or IP address authorized for sending emails for a specific domain name. There is no other configuration required however the recipients must have SPF checking enabled as…

⏱︎
Read time:
tcpdump is a packet sniffing command line tool to capture TCP/IP packets that are received or transmitted on a specific interface. This tool has been used widely for troubleshooting purpose, as well as for security assessments. The output of tcpdump command can be viewed using free wireshark tool. The above commands can be combined as…
⏱︎
Read time:
Our video tutorial explains how to configure HSTS – HTTP Strict Transport Security on F5 Appliance. There are 2 options available to configure Option 1 is using iRule Option 2 is using HTTP Profile, however this option is available from Version 12 onwards. Using iRule option, configure following iRule and attach to HTTPS Virtual Server…

⏱︎
Read time:
#show interface summary command provides bandwidth utilization of each Cisco switch interface, VLAN and port channels. You can either measure bits per sec using RXBS/TXBS fields or packets per sec using RXPS/TXPS fields. Additionally you also get to know counts of pkts dropped in the interface. #show interface gi1/0/40 command provides bandwidth utilization of…

⏱︎
Read time:
An error has occurred while saving a new UCCX script file in UCCX Publisher node. The message was “Error while performing the operation. Please look into logs for more information.” If you encounter similar error, first identify the server roles, ensure they are properly set and finally try to apply your script file in the…

⏱︎
Read time:
In UCCX, there is no concept of Publisher/Subscriber, instead we have Master and Slave concept in UCCX. You can identify the role by following few steps. Login to each UCCX Server Navigate to Cisco Unified CCX Serviceability page Choose Tools > Control Center – Network Services menu Select the Server. If the CCX Engine has…

⏱︎
Read time:
As a Cisco CUCM administration, you may have to find out at some point of time, which users have logged in and to which Cisco phone. Here is how you can check. Login to CUCM Choose Devices > Phone Select ‘Actively Logged in Device Report’ from the drop-down list in the upper, right corner and…

⏱︎
Read time:
We were upgrading all paloalto firewall appliances to latest base version 8.1.0 and we encountered numerous issues. We are sharing our experience here, you may also consider with caution while upgrading to latest version. 1. SMB traffic are blocked: Paloalto firewall blocks SMB traffic traversing through it. You cannot access the share drives that are…

⏱︎
Read time:
To kill process on remote computer, use psExec then pskill.exe \computer_name process_name

⏱︎
Read time:
You need to calculate the power requirements for all the powered devices that you plan to connect to switch. Also be careful while laying longer network cable, as some power is lost over the length of cable.

I’m Lucas Brey, a travel blogger sharing practical guides, hidden gems, and honest tips from the road. Follow along for smart itineraries, great food finds, and stories worth bookmarking.