Cisco IP SLA Configuration part 2
24:43
Cisco IP SLA Configuration part 1
28:01
Пікірлер
@FindMe-jx1me
@FindMe-jx1me Күн бұрын
can't see your screen clearly
@Autonomous19kpsf
@Autonomous19kpsf 12 күн бұрын
Able to upload the config and diagram thx
@ImaGDTeapot
@ImaGDTeapot 22 күн бұрын
Been struggling to figure this out for awhile. By far the best most thorough video series on KZbin to detail this process. Thanks to you I have 8021x up and running now. Many thanks to you!
@riccardorighetti5632
@riccardorighetti5632 Ай бұрын
Hey man, next time zoom in the windows you focus in. Text was totally unreadable! You had a ton of viewport space totally useless and the space you were working was totally unreadable!
@leosieczka3724
@leosieczka3724 Ай бұрын
So when I do this, the SYSVOL folders dont replicate. It's just empty on the 2019 server. Any ideas why?
@DJSammy69.
@DJSammy69. Ай бұрын
You good Sir are my new Hero!!! I spend hours browsing the webs and then found this!!! Thanks You MIllion times over!! Finally have fully utilized root.
@JimmyBuchanan-z6c
@JimmyBuchanan-z6c Ай бұрын
Great video - very helpful! Thank you for posting!
@vuyisilebhengu7910
@vuyisilebhengu7910 2 ай бұрын
This is thee BEST I've seen, watched all vids. You also covered the DHCP issue I couldnt find in others. DANKO!!
@kevinallamby9730
@kevinallamby9730 2 ай бұрын
Hi Chris, how did you configure Gi0/2 on the access switch? Also, I have the ospf feature enabled but I don't think it is working because I am not seeing any ospf neighbors established.
@greenpill810
@greenpill810 2 ай бұрын
This is would have been a great video tutorial only if it was easy to view
@mariob4735
@mariob4735 2 ай бұрын
For the first time I have 2-tier PKI in my homelab with easy to follow instructions. It's funny to type it out, but I'm really glad this finally works in my homelab. Thanks! :)
@mariob4735
@mariob4735 2 ай бұрын
Awesome guide, thank you very much on this, and thankfully on easy to understand English!
@omolayo_ojo
@omolayo_ojo 2 ай бұрын
can you make a video on how to add new network to policy based vpn
@vitaliisharapov6256
@vitaliisharapov6256 3 ай бұрын
hey Chris. Are you using EVE NG or PNETlab?
@richcruz8924
@richcruz8924 3 ай бұрын
@chris.. I know its been a while, but do you have the video showing how you uploaded the CPPM ISO image to even-ng? You show above from the point of adding it to your lab. I could use some help with actual prior steps.. much appreciated..
@sameerchauhan1616
@sameerchauhan1616 3 ай бұрын
Is it possible to have one side local VPN host as natted. For example from my VPN end the ip 10.1.1.50 should be natted to a static public ip. This is a requirement from one of my client
@sergerobin7234
@sergerobin7234 3 ай бұрын
Thanks for your tutorials. I've started studying networking, and it's a great source of information!
@emekaobizuluigbo1925
@emekaobizuluigbo1925 4 ай бұрын
Hello Chris, thanks for the video and the troubleshooting process. Do you have a link to download the EVE-NG FTD?
@PraveenRai
@PraveenRai 4 ай бұрын
Can we have this eve topology file load in eve and play with it ?
@VFRMan
@VFRMan 4 ай бұрын
Thanks for the great 2 part video. However, at time stamp 13:15 you said something about registering the dll file to be able to view the AD Scheme. What is the command? The screen is too small to be able to read what you typed out. Disregard I found it online.
@PraveenRai
@PraveenRai 5 ай бұрын
Nice topology do you keep these labs somewhere to we can use the lab file in our eve to play with it
@rajeshnanavat
@rajeshnanavat 5 ай бұрын
thank you for sharing amazing content, Can you also share the details of basic configuration for other network devices ? or may be a video series where you have started building this topology
@gaz1978
@gaz1978 5 ай бұрын
What a great video! New subscriber
@bhnane
@bhnane 6 ай бұрын
very good guide, and it is even better on 1.25 speed
@ericneo2
@ericneo2 7 ай бұрын
Thank you for the heads up about the enterprise admins membership and the periods, they solved my "cannot verify certificate chain" error.
@mariob4735
@mariob4735 2 ай бұрын
Hello, I'm facing the same issue here, I'm installing everything with default Administrator account that's already in Enterprise Admins group. This is my homelab infastructure so I think it's fine :) I still have the issue though, I even started rootCA back if it matters but it didn't help. Any ideas? EDIT: I found it! It was DNS, or rather typo in CNAME that pointed to "clr" instead of "crl". Setting this up at 1AM is not the best idea haha
@ericneo2
@ericneo2 2 ай бұрын
@@mariob4735 Double check your rootca url points to your intermediate, put DNS entries for both, add "Enterprise Admins group" to your Domain Admin account and on the rootca before signing the request set the following: certutil -setreg CA\CRLPeriodUnits 6 certutil -setreg CA\CRLPeriod "Months" certutil -setreg CA\ValidityPeriodUnits 5 certutil -setreg CA\ValidityPeriod "Years"
@nareshdink9229
@nareshdink9229 7 ай бұрын
screen size is very small, please try to screen size of whatever u are sharing
@kendalwhite1725
@kendalwhite1725 7 ай бұрын
Thanks for the video. One issue I'm running into is when importing the subordinate certificate into the Certification Authority, I get an error message "Cannot verify certificate chain. The revocation function was unable to check revocation because the revocation server was offline." Any thoughts?
@ericneo2
@ericneo2 7 ай бұрын
Same. No one seems to have an answer online. The only thing that makes sense to me is the URL for the root CA in the signed certificate is unreachable or some service that is suppose to respond isn't doing so. Possible solution: The Domain Admin account that you use on the sub/intermediate CA at 4:24 needs to have Enterprise Admins group added. By default Domain Admin accounts are missing the Enterprise Admins membership.
@serge2039
@serge2039 7 ай бұрын
Hi Chris, fantastic series! Thank you for documenting this. The only thing missing here is how to tie this up with Account Factory and deploy these stacks as customizations.
@sh.ku3
@sh.ku3 7 ай бұрын
Hi Chris, amazing content. thanks a lot for this effort! please keep them coming.
@brandonunger1689
@brandonunger1689 7 ай бұрын
Hey Chris, can you detail your EVE-NG Pro server specs?
@wgalafassijr2
@wgalafassijr2 7 ай бұрын
Great videos. Thank you
@wgalafassijr2
@wgalafassijr2 7 ай бұрын
about the ntp registry why you dont do the same on the other domain server?
@anhtruongbao76
@anhtruongbao76 8 ай бұрын
Hi Sir, can I have both tacacs+ and local ssh? I'm using aruba cx600 and aruba clearpass
@tonymasse3887
@tonymasse3887 8 ай бұрын
Thanks! Sorted me out :)
@arturit0_
@arturit0_ 8 ай бұрын
Great job Chris can you do one for PBR using FDM as well?
@arturit0_
@arturit0_ 8 ай бұрын
Can you cover the Certificate https for FDM please?
@pit0nka
@pit0nka 9 ай бұрын
Thank you to share your videos with us. This poweshell makes this possible too: Move-ADDirectoryServerOperationMasterRole -Identity YourDCServerName -OperationMasterRole 0,1,2,3,4 -Force names of roles with numbers from 0 to 4: PDCEmulator 0 RIDMaster 1 InfrastructureMaster 2 SchemaMaster 3 DomainNamingMaster 4
@cynthiamoricordova5099
@cynthiamoricordova5099 9 ай бұрын
Great video. Are you using eve-ng professional or free version?
@networkconfigchris4002
@networkconfigchris4002 9 ай бұрын
professional
@redhatcertified
@redhatcertified 9 ай бұрын
Use Ctrl+shift++ to increase the size of terminal so it would be easier to read.
@legokid201
@legokid201 9 ай бұрын
What the hell is with the pauses in between words. Were you kicked in the head? I mean this is a great video. But OMG you are killing me with these pauses. Also your resolution is way to high.
@overproof1460
@overproof1460 9 ай бұрын
Nice! FDM interface looks a lot more detailed than FMC though 😅
@shuihaibshadulyponnan2155
@shuihaibshadulyponnan2155 10 ай бұрын
Hi Chris, could you please share the lab?
@hahahaha7023
@hahahaha7023 10 ай бұрын
Correct me if I'm wrong, can't we just go certutil publish on the root cert that should propagate to all AD joined machines?
@roohax
@roohax 10 ай бұрын
Great video! Thanks for the helpful tutorial
@ferdiugude9689
@ferdiugude9689 10 ай бұрын
Putting the four windows on one screen makes it difficult to see what you are doing
@mrjazze1520
@mrjazze1520 10 ай бұрын
your screen resolution is far too high .
@networkconfigchris4002
@networkconfigchris4002 10 ай бұрын
yes it is. Get a 4k monitor :)
@LeadBariBass
@LeadBariBass 10 ай бұрын
It makes an otherwise great video somewhat pointless. We can't see what is on your screen. I have dual 32" monitors and still can't read the text in your video.@@networkconfigchris4002
@vcp93
@vcp93 6 ай бұрын
Playing it on a 4k, 55inch TV... Still pretty small. Were you unable to maximize the VM screens while you were working on them? Also, what's the topology tool you are using? It looks like something I'd love to test drive. Cheers! ​@@networkconfigchris4002
@captaink118
@captaink118 11 ай бұрын
Why not use the fully qualified domain name for the crl http path?
@networkconfigchris4002
@networkconfigchris4002 11 ай бұрын
I would agree that I should have used the fqdn
@floriantdoungmene5492
@floriantdoungmene5492 11 ай бұрын
Hi Chris. Many thanks again for your videos. For terraform authentication, you used the config file and defined the profile with aliases in the provider blocks. However you need to log in using the sso user credentials and therefore generated temporary credentials valid for one hour. This works perfectly when working locally. is it possible to integrate this authentication method to deploy in multiple accounts in CI / CD pipeline? if yes any suggestion? if no which way should I go?
@networkconfigchris4002
@networkconfigchris4002 11 ай бұрын
Yes, you are correct that using AWS SSO is really not for a CI/CD pipeline. The best way would be to create a role in each account and then use an assume_role block in the Terraform AWS provider to assume the role in the account.
@floriantdoungmene5492
@floriantdoungmene5492 Жыл бұрын
Hi Chris, I watched all your videos and shared it with my colleagues. They are really really awesome. Please updload the remaining videos of the series. I have been waiting for them. I look forward to watching them. Thanks again for the hard work!
@networkconfigchris4002
@networkconfigchris4002 Жыл бұрын
Thank you, I will upload them soon. Really appreciate it.
@aliakbarakbari3802
@aliakbarakbari3802 Жыл бұрын
Good work!!!!!
@networkconfigchris4002
@networkconfigchris4002 Жыл бұрын
Thanks!