You Are Here: Home » Info (Page 2)
FRM – 92095: Oracle JInitiator version too low. Please install version 1.1.8.2 or higher

FRM – 92095: Oracle JInitiator version too low. Please install version 1.1.8.2 or higher

Jika anda menggunakan MAC OS X, apakah anda pernah mendapatkan pesan error pada saat ingin mengakses sebuah web berbasis Java? Pesannya adalah sebagai berikut : "FRM - 92095: Oracl ...

smart city pariaman kota

smart city pariaman kota

smart city pariama  kota ...

Link backbone Mentawai

Link backbone Mentawai

untuk optimalisasi trafik ke mentawai telkom meningkatkan layanannya dengan mengupgrade bacbone dari vsat scpc ke RADIO CERAGON. Hop radio dari bukittinggi ke mentawai ME-D1-BKTA-- ...

Mini ring unand  using omni switch and L3 HP dengan metro satu metro dengan 2 port beda

Mini ring unand using omni switch and L3 HP dengan metro satu metro dengan 2 port beda

ini di karenakan link nya menjadi prioritas karena kampus ini makai bw nya cuku gede. yah alih2 ini untuk meminimalkan ggnnya. yah supaya pelanggan puas. bikin 2 homing transport : ...

Osi Layer and TCPIP

Osi Layer and TCPIP

      Switching concept   ...

Per-VRF MPLS-TE Tunnels

This is a solution to route traffic from different VRFs to different MPLS-TE tunnels rather than making all VRFs traffic to go through a single MPLS-TE tunnel. Network topology: Since TE tunnels will be configured PE-to-PE, no LDP is required. RSVP-TE will be used to exchange labels. However, LDP must be enabled on MPLS TE tunnels. This is required so that labels can be exchanged for Loopback11 and Loopback ...

Read more

Interarea TE tunnels

In MPLS TE Basics article, we examined how link attributes are gathered, how a path is computed based on user-defined constraints and how it is signaled. One of the limitations is that the TE LSP path is computed for single IGP area only due to lack of visibility of the topology in other IGP areas. In OSPF, the ABR hides the topology between two areas. This causes a problem in large networks where multiple ...

Read more

PCE : A High-Level Overview

  Contents 1¬†Introduction 2¬†Path Computation 2.1¬†Per-Domain Path Computation 3¬†Path Computation Element Architecture 3.1¬†Path Computation Element (PCE) 3.2¬†Path Computation Client (PCC) 3.3¬†Path Computation Element Protocol (PCEP) 4¬†PCE Functional Models 5¬†Discovering PCEs 5.1¬†OSPF Protocol Extensions for PCE Discovery 5.2¬†ISIS Protocol Extensions for PCE Discovery 6¬†Stateful versus Stateless PCEs 7¬†Co ...

Read more

Clientless SSL VPN on Cisco IOS Router

Clientless SSL VPN allows a user to securely access resources remotely using a SSL-enabled web browser. This is a step-by-step guide to setup Clientless SSL VPN (WebVPN) on Cisco IOS router. Each SSL VPN Gateway requires a license to serve SSL Clients. Cisco provides a two-user complimentary license on the supported routers. If more users are required to be served by SSL Gateway, licenses need to be purchas ...

Read more

SSL Connection Setup

Secure Socket Layer (SSL) sits on top of TCP layer, below the application layer and acts like sockets connected by TCP connections. It is used to secure TCP-based applications, not UDP or directly over IP. The most popular application used for SSL to secure communications is HTTP over SSL, or HTTPS. Others include SMTP/ IMAP over SSL. An SSL connection is established in two main phases- the Handshake phase  ...

Read more

Digital Certificates Explained

A digital certificate is a digital form of identification, like a passport. A digital certificate provides information about the identity of an entity. A digital certificate is issued by a Certification Authority (CA). Examples of trusted CA across the world are Verisign, Entrust, etc. The CA guarantees the validity of the information in the certificate. In Understanding Digital Signatures article, it was a ...

Read more

Understanding Digital Signatures

A digital signature is a mathematical scheme for ensuring the authenticity of data (document, email, etc). The digital signature assures that any changes made to the data that has been signed cannot go undetected. Digital signatures can also provide non-repudiation, meaning that the signer cannot claim they did not sign the document. 1. Using Key generation algorithms like RSA, a sender generates a key pair ...

Read more

PIX Firewall modes

A Cisco PIX firewall can operate in one of two modes- Routed Mode- This is the default mode. In Routed mode, the PIX firewall is considered to be a network hop. It can perform NAT between connected networks, and run OSPF, RIP & EIGRP (PIX OS version 8.0.4). This mode can support many interfaces. Transparent Mode- A firewall in Transparent mode is a Layer-2 firewall that acts as a "bump in the fire" and ...

Read more

IPv6 over AToM

Here, IPv6 traffic is transported between CE1 and CE2 routers over Any Transport over MPLS (AToM) Layer-2 circuit. PE routers are not required to be dual-stack routers. A Layer-2 circuit is established between PE1 and PE3 routers. CE1 & PE1 Configuration CE1 router: interface Serial 0/0  encapsulation ppp ipv6 address 2001:1::1/124  ipv6 ospf 1 area 0 ! interface Loopback 0  ipv6 address ABCD::1/128  ip ...

Read more

6VPE: IPv6 over MPLS VPN

An IPv6 VPN is connected over an IPv6 interface or sub-interface to the Service Provider (SP) backbone via a PE router. The site can be both IPv4 and IPv6 capable. Each IPv6 VPN has its own address space which means a given address denotes different systems in different VPNs. This is achieved via a new address family- VPN-IPv6 or VPNv6 address-family which prepends a Route Distinguisher (RD) to the IP addre ...

Read more

© 2011 Powered By Wordpress, Goodnews Theme By Geeks Docuementation

Scroll to top