- Upvotes Received
- 2
- Posts with Upvotes
- 2
- Upvoting Members
- 2
- Downvotes Received
- 2
- Posts with Downvotes
- 2
- Downvoting Members
- 1
7 Posted Topics
You've posted a request to be provided information on how to subvert a web filter. This implies you are using a network controlled by someone else. Now you either have hijacked that access, or you are a user that has been provided access for a specific reason. In either case …
... when you begin discussing your medical conditions in the most honest of terms with most anyone who will hear... then again that may be a personality issue... still sorting it out... 43 btw... not fully disclosing medical issues... but becoming tempted...
Lets start with some questions; Did removing the PIX solve the connectivity problem? [INDENT]If so the problem is likely associated with the PIX configuration in some way [/INDENT] If not did the nature of the problem change? You can take a trace as suggested, but if done as requested you …
This is another question that falls into the category of "I want to break the rules because my needs clearly supersede the rights of the overall community" There are a couple of options; 1) Make a case for the legitimization of X-Box live as a supported application on the campus …
I'd start with a traceroute from the PCs that you are moving the files between to ensure you are taking the path you expect. Once you have verified that the path is going over the VPN the next question would be how are you testing the file transfer? Are you …
TCL... Mainly because it seems to be embedded in so many vendor systems, F5's irules are TCL based, Cisco has a TCL tool-set embedded into its IOS... I'm sure there are other examples.
Lets deal with the MPLS and private piece first. There is a capability with most routers to use a technique called AS override. This allows the use of same AS at your sites connecting to the MPLS cloud. You shouldn't have to set up an iBGP session on your routers …
The End.
gelgin2k