Profile

Cover photo
Jason Witover
65 followers|434,982 views
AboutPostsPhotosVideos

Stream

Jason Witover

Shared publicly  - 
In this scenario, I have two Cisco Nexus 5548s, two Cisco Nexus 2248 FEXes, and a Windows Server with 4 Ethernet interfaces where two interfaces connect to FEX 100 and the other two connect to FEX 101...
1
Add a comment...

Jason Witover

Shared publicly  - 
 
EIGRP - Authentication and Summarization with Leak-Maps
1
Add a comment...

Jason Witover

Shared publicly  - 
 
Zone-Based Firewall Policy (Filtering with IOS Part 8)
Zone-Based Firewall Policy (Filtering with IOS Part 8). I have R1, R2, R3, R4 and R5. I want to use Zone-Based Firewall Policy to create a security policy that I can apply to R2. I want R2's Fa0/0...
2
Add a comment...
In his circles
66 people
Have him in circles
65 people
Jamin Mace's profile photo
Maria Bozhanova's profile photo
Jeff Vetterick's profile photo
Chris Walden's profile photo
anuj tyagi's profile photo
Evelyn Kar's profile photo
Jaffar Nassiry's profile photo
Stan Hall's profile photo
Rizvan Bayramov's profile photo

Communities

Jason Witover

Shared publicly  - 
In this scenario, I have 4 switches connected in a loop with two links per switch for peering. I want to configure MSTP in such a way that half of the VLANs use SW1 as the root bridge, and the other h...
1
Add a comment...

Jason Witover

Shared publicly  - 
In this scenario, all Router FastEthernet interfaces are in "Primary" VLAN 20 with addressing in the 10.20.1.0/24 space. With private VLANs, the provider can conserve VLANs by not assigning ...
1
Add a comment...

Jason Witover

Shared publicly  - 
 
Basic TCL script for reachability testing. I have R1, R2, R3, and R4. I have a simple configuration where R2 is briding R1 and R3, with a serial link to R4. I want to use a TCL ping script to quickly ...
1
Add a comment...

Jason Witover

Shared publicly  - 
 
Transparent Zone-Based Firewall (Filtering with IOS Part 9). I have R1, R2, R3, and R4. I want to use Transparent Zone-Based Firewall to help create a security policy that I can apply to R2. These are...
1
Add a comment...
People
In his circles
66 people
Have him in circles
65 people
Jamin Mace's profile photo
Maria Bozhanova's profile photo
Jeff Vetterick's profile photo
Chris Walden's profile photo
anuj tyagi's profile photo
Evelyn Kar's profile photo
Jaffar Nassiry's profile photo
Stan Hall's profile photo
Rizvan Bayramov's profile photo
Communities
Apps with Google+ Sign-in
Basic Information
Gender
Male
Links
Contributor to