ASDM 6.x conflicts with JRE 1.6.11+

 Posted by at 11:43 pm  Network Administration, Network Research  Comments Off on ASDM 6.x conflicts with JRE 1.6.11+
Jun 072010
 

Working with an under powered ASA 5520 with merely 256MB of RAM whose IOS and ASDM image have not been updated since delivery from the factory, there is a conflict between the ASDM and the Java Runtime Environment (JRE). Sometimes you can back level the version of JRE on the workstation (on Windows clients for instance) unless the older versions are not listed, then you’ll need to acquire the older version and install it in order to back level to it.

The JRE must be 1.6.11 or less, but there may be a workaround, here more on these topics here:

http://www.ccietalk.com/2009/05/19/adaptive-security-device-manager-hot-issues

 Tagged with:

The OSI Reference Model

 Posted by at 5:02 am  Network Administration, Network Research  Comments Off on The OSI Reference Model
Apr 082010
 

The OSI Reference model is the fundamental design of internet communication, and lays out a schematic for the assembly of internet based information, how it is organized and transmitted from one computer to another.� Information is organized like an onion, with layers over layers, and each layer communicates information. The layer effect is called encapsulation, and as encapsulation occurs, the information changes name so that we can speak about it contextually.� Low level information is referred to as bits, slightly higher level information is called a frame, then packets, and then segments, and finally data. Looking at it from the perspective of a user in a word spreadsheet application placing a link to another document in one of the cells, the process begins at the Application Layer.

Starting with some information called data, encapsulating it with a header and footer to create a segment, passing it to the Presentation Layer which adds a header and footer again, and on to the Session layer with another header and footer, and so on down the stack until the bits are transmitter across the network.� Arriving information is then incrementally stripped of its header and footer as it moves up through the layers, until it arrives on a different computer where the linked data resides.� The process happens many time per second, but understanding the process is fundamental to understanding how to troubleshoot the network.

The reference model has seven layers:

  1. Physical
  2. Data Link
  3. Network
  4. Transport
  5. Session
  6. Presentation
  7. Application

Although I’ve listed the layers in ascending order here, the stack is often shown with the Application layer on the top, and the model really becomes helpful when depicted as part of a diagram.

Ports to Remember

 Posted by at 4:33 am  Network Administration, Network Research  Comments Off on Ports to Remember
Apr 082010
 

Port Protocol��� Description

20� TCP��������� FTP, Data

21� TCP��������� FTP, Control

22� TCP/UDP�� SSH

23� TCP��������� Telnet

25� TCP��������� SMTP

42� TCP/UDP�� WINS

43� TCP � � �� � WHOIS

53� TCP/UDP�� DNS

67 UDP���������� BOOTP, DHCP Client

68� UDP��������� BOOTP, DHCP Server

69� UDP��������� TFTP

80� TCP/UDP�� HTTP

110 TCP���������� POP3

135 TCP ��������� Client/Server Communications, Exchange Administrator, DHCP Manager,

137 UDP � � � � � File Shares Name Lookup, Browsing requests to NetBIOS

138 UDP���������� Browsing datagram responses of NetBIOS

139 TCP���������� File Shares Session

143 TCP���������� IMAP

389 TCP���������� LDAP

443 TCP/UDP��� HTTPS

636 TCP���������� LDP over TLS/SSL

989 TCP/UDP �� FTPS data; FTP over TLS/SSL

990 TCP/UDP��� FTPS control; FTP over TLS/SSL

993 TCP���������� IMAP (SSL)

995 TCP���������� POP3 (SSL)

1433 TCP��������� SQL Session

3389 TCP��������� RDP, Terminal Server

Fundamentals of WAN Optimization

 Posted by at 7:50 am  Network Administration, Network Research  Comments Off on Fundamentals of WAN Optimization
Sep 202009
 

The goal of WAN Optimization is to make applications work more efficiently over long links, such as offices connection to data centers.� The devices to perform the optimization are meant to reduce bandwidth utilization, accelerate application performance, and prevent or reduce the need to purchase more bandwidth. A WAN optimization device should pay for itself in three years or not be purchased.

Key features of WAN Optimization devices:

  • Compression–reduces the number of bits transferred from sender to received, and minimizing transmission time as a result.
  • TCP Acceleration–mistaking latency for congestion is a problem for TCP, so helping TCP discern the difference accelerated the TCP traffic rate with device loacted at both ends of the WAN
  • File Caching–the storage of frequntly used files on disk within a WAN Optimization device to speed up delivery.
  • Traffic Shaping–the classification and prioritization of WAN traffic setting limits how much bandwidth is granted to certain classifications

From an article in Network World magazine titled, “The ABCs of WAN Optimization,” by Tim Greene.