Advanced Search
Search Results
200 total results found
Accesories
CCNP Enterprise: Core Networking
CCNA Routing & Switching
CCNA Wireless
CCNA Security
CCNA Voice
Mobile broadband modems
pfSense
Mejoras de seguridad
Network Addressing and Basic Troubleshooting
Wireless
Automation and Programmability
Practice
Switching
Routing
Cisco UC500
Pages about the "heart" of the Cisco Smart Business Communication System
Branch Routers
Access
IP Phones
UC Appliances
Firewalls
Wireless LAN Controller
Access Points
Introduction to Networks (v6 + v7)
Routing and Switching Essentials (v6)
Scaling Networks (v6)
Preparación del laboratorio para curso de Ansible
Se necesitan 3 máquinas para el laboratorio, 1 Ansible controller y 2 Ansible target. El entorno lo levanto a través de Vagrant con 3 máquinas Centos 9 Stream. El Vagrantfile que creo es: Vagrant.configure("2") do |config| config.vm.define "ans_controll...
Getting started with Ansible
Siguiendo los pasos en: https://docs.ansible.com/ansible/latest/getting_started/index.html Resumo que: Ansible automatiza la gestion de sistemas remoto y controla su estado deseado. Un entorno basico de Ansible consta de 3 componentes: Control node: dond...
Habilitar SSH passwordless (desde Windows y Linux)
Se tiene una máquina virtual ansibletarget1 (192.168.1.39) a la cual se quiere hacer SSH desde el equipo host (192.168.1.10) y desde otra máquina virtual ansiblecontroller (192.168.1.39). Para poder hacer SSH desde el equipo host y ansiblecontroller, el la VM...
Ansible Inventory: teoría + ejercicios resueltos
Introducción Guía de lectura sobre inventarios: Building an inventory Building Ansible inventories How to build your inventory Resumen: el formato del inventario puede ser en INI o YAML principalmente, y dependiendo de si se usa uno u otro, la f...
YAML teoría y ejemplos + ejercicios resueltos
Introducción Guía de lectura sobre YAML: YAML Syntax - Ansible Docs YAML - Wikipedia YAMLLint - YAML Syntax Checker Teoría y ejemplos For Ansible, nearly every YAML file starts with a list. Each item in the list is a list of key/value pairs, common...
Pasos para instalar LineageOS 19.1 (miatoll) en Xiaomi Redmi Note 9 Pro (joyeuse)
El primer paso es tener el bootloader desbloqueado. Sin esto no se puede hacer NADA. Hay que hacerlo con la herramienta oficial de Xiaomi (Mi Unlock Tool). Seguir esta guía de Xiaomi: Complete Guide to Unlocking the Bootloader: Announcement, Troubleshoot and...
Vagrant: introducción, documentación y comandos básicos
Índice de recursos oficiales Introduction to Vagranthttps://developer.hashicorp.com/vagrant/intro Get Started (9 tutorials)https://developer.hashicorp.com/vagrant/tutorials/getting-started/getting-started-index What is Vagrant? Install Vagrant Initialize a P...
Git: introducción, comandos básicos
Tutoriales y documentación Git Tutorial (W3Schools)https://www.w3schools.com/git/default.asp Git Cheat Sheet $ git init [name] Create a new repository in the project folder with the specified name $ git clone (repo URL) Download a project fr...
Wireless LANs fundamentals
Wireless LAN Topologies Wireless communication takes place over free space through the use of RF signals. The transmitter can contact the receiver at any and all times, as long as both devices are turned to the same frequency (or channel) and use the same sch...
Analyzing Cisco Wireless Architectures
The architectures: Autonomous AP architecture Cloud-based AP architecture Split-MAC architectures Autonomous AP architecture Autonomous APs offer one or more fully functional, standalone BSSs. They are also a natural extension of a switched networ...
Securing Wireless Networks
Authentication To use a wireless network, clients must first discover a basic service set (BSS) and then request permission to associate with it. Clients should be authenticated by some means before they can become functioning members of the wireless LAN. Gue...
Building a Wireless LAN (teoría sobre WLCs + LAPs; split-MAC)
Introduction The AP maps each VLAN to a WLAN and BSS. The autonomous AP has a single wired Ethernet interface, which means that multiple VLANs must be brought to it over a trunk link. A LAP also has a single wired Ethernet interface; however, it must be p...
IPv4 Subnetting
Analyze Subnetting and Addressing Needs Which hosts should be grouped together into a subnet? Addresses in the same subnet are not separated by a router. Addresses in different subnets are separated by at least one router. Note that the point-to-po...
IPv4 addressing
IPv4 address structure An IPv4 address is a 32-bit hierarchical address that is made up of a network portion and a host portion. When determining the network portion vs. the host portion, you must look at the 32-bit stream. The bits within the network po...
Anexo - Backups
Se sigue la guía: https://www.bookstackapp.com/docs/admin/backup-restore/ Para hacer un backup de la BBDD de contenidos (estanterías, libros, paginas): sudo su mysqldump -u root -p bookstack > bookstack.backup.sql A continuación quedaría hacer una copia ...
Redmi A1 (ice): unlock bootloader (Windows)
This process will erase user data so please make a backup before continuing with the procedures below. Mi Unlock tool does not work with Redmi A1 because there is no way to bind Mi account (there is just no option on the menu to add Mi account). If you try to...
Redmi A1 (ice): root the phone with Magisk
This tutorial should be followed after unlocking bootloader. According to Magisk installation instructions here, the bootloader must be unlocked. Introduction For this tutorial I am assuming the OS used is MIUI latest version after having unlocked the bootlo...
Redmi A1 (ice): factory reset + update to latest MIUI via fastboot (clean install) + lock bootloader
Factory reset I will do the factory reset from official recovery. To do this I have to enter first the recovery mode. From MIUI and with USB debugging enabled and phone connected to PC, I enter this command on PC: abd reboot fastboot The phone reboots to f...
Redmi A1 (ice): compile boedhack99's TWRP recovery (Windows)
This recovery is not really functional, but the method provided here to build/compile a TWRP recovery can be exported to other devices. Setting up the environment First step: create this folder C:\temp\twrp. We will use it later. We need a virtual machine (VM...
Module 1: Network Support
Diagnostics and Troubleshooting Methodologies Troubleshooting is the process of identifying, locating and correcting problems. This process involves gathering information and using one or more structured troubleshooting methods. The seven-step troubleshooting...