The Request I have a client with a data center, a headquarters/DR site, and a lot of branches spread out all over the world with Internet connectivity. They are currently using static IPSEC Internet facing VPNs to connect to their data center and HQ environemts, but the company is hitting a growth spurt and they are quickly realizing this solution is becoming difficult to scale and manage with their limited in-house IT staff.
The Request: Now that Cisco has included SSL VPN licensing as part of the 15.3(3)M IOS I have had multiple clients ask about turning on the capability and reaching back into Active Directory for authentication. The Solution: The equipment I used to lab this solution: Cisco 881 w/ IOS 15.3(3)M3 (10.0.1.238) Windows Server 2008 R2 (10.0.1.231) First we will go through the steps to configure the RADIUS server on Windows so we have access to Active Directory for authentication.
The Request: I have a client with multiple 6807 VSS pairs that required an IOS upgrade. All of the pairs have a single SUP2-T in each chassis and were in the 15 code train. Although the ISSU process is very straight forward I wanted to put this quick process up as I had to search through multiple documents to gather all the pieces I needed to knock it out. The Solution: Since these switches were in the proper code train to utilize ISSU I decided that was the best route to go.
The Request: I was approached by a client who wanted me to build their multi tenant network for a small office building. During the initial meeting it came out that they already had equipment and would like to use this equipment without purchasing much more. This is what I had to work with: 1 x Cisco X8XX Series ISR1 6 x Cisco 2960X Switches The client also has an existing Cisco Unified Communications System that they will be configuring to provide voice services to all of the tenants.