QoS Values Calculator v3 (CoS, ToS, ToS HEX, DSCP, AF, IPP, CS, DP, ECN)

This post has been viewed almost 100k times from 2009 when I first time published the image – shock :). If there is still possibility to do something better I try ;). I had to move it from my old blog to new one.

Here you are version 3 of QoS Values Calculator.

I have added applications description and DSCP 0.

Do you think that something is still missing? 🙂

QoS Values Calculator v3 in PDF format you can find here to download.

QoS Values Calculator v3 (CoS, ToS, ToS HEX, DSCP, AF, IPP, CS, DP, ECN)

This post has been viewed almost 100k times from 2009 when I first time published the image – shock :). If there is still possibility to do something better I try ;). I had to move it from my old blog to new one.

Here you are version 3 of QoS Values Calculator.

I have added applications description and DSCP 0.

Do you think that something is still missing? 🙂

QoS-Values-Calculator-v3.jpg

QoS Values Calculator v3 in PDF format you can find here to download.

SD-WAN – ewolucja sieci korporacyjnej

Sieć definiowana programowo to odpowiedź na zmiany jakie zachodzą w sieciach korporacyjnych. Sieci korporacyjne budowane w oparciu głównie o technologię MPLS. Poznaj nowe podejście do budowania sieci korporacyjnej.

SD-WAN – NetContractor

ISAKMP and IPsec lifetimes

I would like to sum up important issue regarding ISAKMP and IPsec lifetimes.

ISAKMP life is always set based on the Initiator ISAKMP lifetime even if its higher then ISAKMP lifetime of the responder.

IPsec lifetime is always set to the lowest value of the IPsec peer.

IKE Phase -1 life time should be greater than IKE Phase-2 life time .

86400 sec (1 day) is a common default value for Phase 1 and 3600 (1 hour) is a common value for Phase 2.

A difference between IKEv1 and IKEv2 is that in IKEv1 SA lifetimes were negotiated. In IKEv2, each end of the SA is responsible for enforcing its own lifetime policy on the SA and rekeying the SA when necessary. If the two ends have different lifetime policies, the end with the shorter lifetime will end up always being the one to request the rekeying.

Useful Command – show control-plane host open-ports

Here you are the first post from the Useful command series.

Have you ever wonder how to figure out under what ports your router is listening, just take a look (try also nice command like show ip sockets detail)

R1#show control-plane host open-ports
Active internet connections (servers and established)
Prot Local Address Foreign Address Service State
tcp *:22 *:0 SSH-Server LISTEN
tcp *:23 *:0 Telnet LISTEN
tcp *:80 *:0 HTTP CORE LISTEN
tcp *:443 *:0 HTTP CORE LISTEN
tcp *:22 10.0.12.2:59470 SSH-Server ESTABLIS
udp *:67 *:0 DHCPD Receive LISTEN
udp *:56186 *:0 IP SNMP LISTEN
udp *:161 *:0 IP SNMP LISTEN
udp *:162 *:0 IP SNMP LISTEN