Source video = https://youtu.be/yLA1luus2TM Air Terjun Lubuak Bulan | credit: Anak Anak Minang Satu lagi keindahan alam Minangkabau yang tersembunyi, terletak di Jorong Koto Tinggi, Kabupaten 50 Kota Sumatera Barat. Ini adalah Air terjun yang tidak diketahui kemana aliran air selepas jatuh dari ketinggian? Percayalah, ini bukanlah mengada-ada. Bila anda […]
dba-profile add profile-id 10 profile-name “SPEEDY_MAX” type4 max 51264 dba-profile add profile-id 103 profile-name “UP__type1__384K” type1 fix 384 bandwidth_compensate no dba-profile add profile-id 104 profile-name “UP__type1__448K” type1 fix 448 bandwidth_compensate no dba-profile add profile-id 105 profile-name “UP__type1__512K” type1 fix 512 bandwidth_compensate no dba-profile add profile-id 106 profile-name “UP__type1__576K” type1 fix […]
traffic table ip index 100 name “UP-64K” cir 64 cbs 4048 pir 64 pbs 4048 priority 0 priority-policy local-setting traffic table ip index 101 name “UP-128K” cir 128 cbs 6096 pir 128 pbs 6096 priority 0 priority-policy local-setting traffic table ip index 102 name “UP-192K” cir 192 cbs 8144 pir […]
GPON01-D1-BKT-2(gpon-onu-mng)#show run int gpon-onu_1/3/5:1 Building configuration… ! interface gpon-onu_1/3/5:1 name ONU_1/3/5:1 METROLINK TSEL PDG-PBR description ONU_1/3/5:1 METROLINK TSEL PDG-PBR tcont 2 name METROLINK profile UP-80M tcont 3 name NODE-B profile UP-80M gemport 2 name METROLINK unicast tcont 2 dir both queue 1 gemport 2 traffic-limit downstream DOWN-80M gemport 3 name […]
Ini kerjaan di desak dengan qulity optik dari sto bdt ke arah teluk bayur sangat jauh + marginnya sangat kurang baik. di karenakan olt di sto telkuk bayur baru di pasang duluan dari sto bdta. alih2 mau idupkan ont nya pelanggan punya eos mbak sari dan rekan eos nya tni […]
Kerana port di ces terbatas di link kanlah costumer ini ke dalam gpon. untuk ces dengan keterbatasan port sonet. maka di pakailah alokasi port dari olt huawei di sto bungus. ee tau2 oltnya nya baru belum ke install terpaksa di install dulu baik fisik ke ces dan catuannya. kerja vendor […]
In light of all the complex and specialized attacks on Internet-facing servers, it’s very important to protect your cloud assets from malicious assailants whose sole purpose is to leach, alter, expose, siphon sensitive data, or even to shut you down. From someone who does a lot of Linux deployments, I […]
The Internet Control Message Protocol (ICMP) has many messages that are identified by a “type” field. You need to use 0 and 8 ICMP code types. => Zero (0) is for echo-reply => Eight (8) is for echo-request. To enable ICMP ping incoming client request use following iptables rule (you need to add following […]
Following list summaries the common attack on any type of Linux computer: Syn-flood protection In this attack system is floods with a series of SYN packets. Each packets causes system to issue a SYN-ACK responses. Then system waits for ACK that follows the SYN+ACK (3 way handshake). Since attack never […]
Linux comes with a host based firewall called Netfilter. According to the official project site: netfilter is a set of hooks inside the Linux kernel that allows kernel modules to register callback functions with the network stack. A registered callback function is then called back for every packet that traverses […]