Popular Tags:

Power Google Search Usage – Part 4

September 8, 2015 at 9:10 pm

Screenshot 2015-09-07 14.44.19Here is my final installment in power Google search tips – have fun!

19 – Page Titles – want to be really specific with your search? You can restrict it to just page titles with intitle:eigrp for example.

20 – Use Google on your Site – check out www.google.com/cse to use the Google search technology for your own Web site.

21 – Advanced Search – having trouble remembering all the syntax for the various advanced search options? Just use www.google.com/advanced_search. It is the GUI method! 🙂

22 – Choose your Source – use the source: command to filter content – for example Cisco Systems source:techradar. Don’t forget to click on NEWS after this search for it to work.

23 – Catch a Movie – need a study break? Search on showtimes – you can even follow that with a location.

24 – Conversions – try things like 20 GBP in USD or 12 cm in inches.

25 – Plain Language – try using plain language in your searching like “What is the stratum in NTP?”

I sure hope you enjoyed these 25 tips for power Google use.

Power Google Search Usage – Part 3

September 7, 2015 at 6:43 pm

Screenshot 2015-09-07 14.44.19

Here are more great tips on power Google searching! Check out the IT Cert category of this blog for the previous parts of this series.

14 – Stay Anonymous – want to eliminate Google from tracking what you are up to as you search? Be sure to log out of your Google account. Just click your image in the top right and choose Sign Out.

15 – Get More Search Results – if you want to see more than 10 results on a page for your Google search – click the cog in the top right of a Google search. Choose Search Settings. Disable instant search predictions and then you can set how many results you want returned for each search. Keep in mind that asking for too many per page can really slow down a system.

16 – SafeSeach – in order to eliminate most violent and inappropriate content that could show up in a search – you can use the SafeSearch feature by clicking the cog in the top right of a search. You can even lock this setting in the Search Settings option.

17 – WebCam Views! – Search for inurl:view/view.shtml in order to peep in on WebCam views from around the world. OK, OK – now get back to studying!

18 – Trends? – want to blog about something people around the world are searching for? Check out www.google.com/trends

Come back tomorrow for more cool tips!

New Courses from Anthony of CBT Nuggets!

September 4, 2015 at 8:40 pm


Got some new course announcements and some dates to announce! Enjoy everyone, I hope you have a fraction of the fun watching these that I have had making them.

Cisco CCIE RS v5 All-In-One: 5.0 Infrastructure Security (Complete 9/8/2015)

Cisco CCIE RS v5 All-In-One: 6.0 Infrastructure Services (Begins 9/8/2015)

Understanding Cisco Cloud Fundamentals (CCNA Cloud)

Juniper Networks Certified Specialist Security (JNCIS-SEC) JN0-332

Introducing Cisco Cloud Administration (CCNA Cloud)

Conducting Cisco Unified Wireless Site Survey (CCNP Wireless)

Access Controls Lists on Multilayer Cisco Catalyst Switches

September 2, 2015 at 12:26 am


Did you ever stop and think about just how many options you have for controlling traffic in the data plane on a multilayer Cisco Catalyst switch?

Here is a recap of your options –

  • Port ACL (PACL) – this option is for your Layer 2 switchports. You can apply:
    • IP standard or extended ACLs for controlling IP traffic
    • MAC ACLs for controlling non-IP traffic
  • Router ACL (RACL) – this options is for your Layer 3 ports on the router. You can apply:
    • IP standard or extended ACLs for controlling IP traffic
  • VLAN ACL (VACL) – these are also referred to as VLAN Access Maps. You can apply:
    • IP VLAN maps are for controlling IP traffic
    • MAC VLAN maps are used for controlling non-IP traffic

For most of us – we are well-versed in IP extended and standard access control lists. It is the MAC ACLs of the PACL approach and the VACLs that we need the practice with. I will be sure to publish my CBT Nuggets on this subject on YouTube for all to enjoy.

IPv4 Access Lists in the CCIE Lab Exam

August 30, 2015 at 2:06 pm


I am getting ready for my Nugget on the above subject and I wanted to provide some thoughts and notes here on the blog on this important subject.

I am currently training for a half-marathon. Yes, and thanks for putting up with all of my RunKeeper Tweets on the subject. 🙂 With the training, there are certain metrics you need to hit in order to really determine if you can finish on race day. It is the same way the CCIE. One metric is ACLs. If you do not have them mastered, you are in big trouble on race day. Think about it, you use them for traffic filtering, and then traffic identification for a whole host of features on the devices. QoS, network management, the list goes on and on.

The traffic filtering part gets really scary. Drop one in that is not doctored up for the other traffic required in your lab scenario and you can easily break things well enough to fail. And when you are building the lists, you must really take your time to ensure that you are meeting their specific directions. Are you getting the EXACT traffic they want, in the correct direction?

Here is a list of tips and things to think about for this important topic. These are in no particular order:

  • Read so carefully if you need to build an ACL traffic filter. Often, you will be asked to block something extremely specific, for example, echo-replies. Should you block too generally, like requests and replies, you fail the task.
  • Drawing out the scenario on your scratch paper will often help you with what specifically to match and in what direction.
  • You certainly would want to avoid this in production, but in the lab it is fine to end your ACLs with deny ip any any log-input. This will allow you to see just what you broke in your lab with your ACL!
  • Remember that an outbound ACL will not impact traffic generated by that local router.
  • access-group is used for traffic filtering on your interfaces, while access-class is used for your VTY lines. Remember with the access-class out command, it is controlling where someone can Telnet out of your router AFTER they have already Telnetted into it.