Deploying a Ubiquiti UniFi Home Network including Multiple WiFi Access Points July 30, 2020, 11:36 p.m.

Your network design is the greatest factor for poor wireless roaming. To get the best results, you will need to tune your wireless home network. This includes accounting for neighboring networks, interference, the density of your APs, the number of your wireless clients and their idiosyncrasies in terms of wireless standards support. Don’t expect to deploy a multi-AP network in your home, leave everything at the default settings, and have it work flawlessly. The location, power settings, and additional configuration parameters of your AP’s are critical.

UniFi wifi networking

OpenVPN Access Server: Authentication options and command line configuration Sept. 5, 2019, 11:48 a.m.

In the Admin UI under “Authentication" it is possible to select one of 4 methods for authenticating user credentials; LOCAL, PAM, RADIUS or RADIUS. This can be done by changing the configuration key auth.module.type. This configuration key is not optional and is by default set to PAM. With LDAP and RADIUS additional settings are required to be able to authenticate users, for example which server to contact and any required shared secret code to be able to access the external authentication backend.

security documentation openvpn networking

How to add DNS filtering to your NAT instance with Squid Sept. 5, 2019, 11:36 a.m.

In this post, I discuss and give an example of how to use Squid, a leading open-source proxy, to implement a “transparent proxy” that can restrict both HTTP and HTTPS outbound traffic to a given set of Internet domains, while being fully transparent for instances in the private subnet.

tutorial aws networking squid

How to access both subnets (dual NIC) on Ubuntu server from third subnet? May 8, 2019, 10:31 a.m.

If the router is filtering too, ubuntu has to be aware of the gateway's existence for both interfaces and use table and rule settings for a correct routing.

linux networking homelab

Two Default Gateways on One System May 8, 2019, 10:29 a.m.

Normally, a Linux system only has one routing table, in which only one default gateway can make entries. With iproute2, you have the ability to setup an additional routing table, for one thing, and allow this table to be used by the system based on rules, for another.

linux networking homelab

Ubiquiti EdgeRouter Lite SOHO Network Design April 20, 2019, 9:06 p.m.

This project describes the Ubiquiti EdgeRouter Lite (and EdgeRouter 4), EdgeSwitch 24 and UniFi Access Point network design for a SOHO (Small Office/Home Office) network.

ubiquiti networking

How to perform a packet capture in Windows using netsh Oct. 25, 2018, 3:53 p.m.

Start the capture with netsh trace start capture=yes tracefile=foo.etl Stop the capture with netsh trace stop. Two files are created: and foo.etl. These files can be opened with Microsoft Message Analyzer. Once the file has been loaded into Message Analyzer you can export it to pcap to view in Wireshark.

tutorial windows networking

CentOS Wiki - IPTables April 12, 2018, 8:46 a.m.

Iptables places rules into predefined chains - INPUT, OUTPUT and FORWARD - that are checked against any network traffic relevant to those chains and a decision is made about what to do with each packet based upon the outcome of those rules. These actions are referred to as targets, of which the two most common predefined targets are DROP and ACCEPT.

  • INPUT - All packets destined for the host computer.
  • OUTPUT - All packets originating from the host computer.
  • FORWARD - All packets neither destined for nor originating from the host computer, but passing through (routed by) the host computer. This chain is used if you are using your computer as a router.
linux networking

Network Protocols – Programmer's Compendium June 13, 2017, 9:55 a.m.

The network stack does several seemingly-impossible things. It does reliable transmission over our unreliable networks, usually without any detectable hiccups. It adapts smoothly to network congestion. It provides addressing to billions of active nodes. It routes packets around damaged network infrastructure, reassembling them in the correct order on the other side even if they arrived out of order. It accommodates esoteric analog hardware needs, like balancing the charge on the two ends of an Ethernet cable. This all works so well that users never hear of it, and even most programmers don't know how it works.

read later networking

RRDTool Tutorial May 22, 2017, 8:24 a.m.

RRDtool refers to Round Robin Database tool. Round robin is a technique that works with a fixed amount of data, and a pointer to the current element. Think of a circle with some dots plotted on the edge. These dots are the places where data can be stored. Draw an arrow from the center of the circle to one of the dots; this is the pointer. When the current data is read or written, the pointer moves to the next element. As we are on a circle there is neither a beginning nor an end, you can go on and on and on. After a while, all the available places will be used and the process automatically reuses old locations.

tutorial sysadmin networking rrdtool

Easifix Spring loaded Wallboard mounting Flush Box June 29, 2016, 8:20 a.m.

Spring loaded mounting box for mounting directly to gib.

shopping electronics networking

Kiwisparks June 29, 2016, 8:19 a.m.

Sell PDL 600 face plates & modules.

networking electronics shopping

CCNA Practice Tests July 4, 2015, 9:59 a.m.

ccna sysadmin networking

Clear out cached access keys for remote servers - Mac OS X Hints July 22, 2013, 11:06 a.m.

How to clear cached domain passwords (kerberos tickets). Fixes issue where OSX connects to file share using incorrect account. Use terminal command 'kdestroy' to delete all, or delete individually using Keychain Access and opening 'Ticket Viewer'.

osx networking tools tutorial tips reference

GNS3: Graphical Network Simulator March 26, 2013, 1:33 p.m.

GNS3 is a graphical network simulator that allows simulation of complex networks. GNS3 is an excellent complementary tool to real labs for network engineers, administrators and people wanting to study for certifications such as Cisco CCNA, CCNP, CCIP and CCIE as well as Juniper JNCIA, JNCIS and JNCIE.

networks networking tools software simulator virtualization opensource cisco sysadmin network

Intermapper Sept. 22, 2011, 7:36 p.m.

Network Monitoring Software, Network Monitoring Tools

tools networking network