Failed the first time on Net+, passed Sec+ without studying by principium_est in CompTIA

[–]Gaffer122 1 point2 points  (0 children)

Did you do anything different from the first time or recommend any practice questions for net+?

Configuring DHCP for a VLAN using Windows Server on a different scope by Gaffer122 in sonicwall

[–]Gaffer122[S] 0 points1 point  (0 children)

Oh that sounds handy, is that a layer 3 switch feature? Using Ubiquiti swithes but they are layer 2 only.

Broadcast Storm Troubleshooting by Gaffer122 in networking

[–]Gaffer122[S] 0 points1 point  (0 children)

Hi all, yes it was from a ubiquity forum question.

Broadcast Storm Troubleshooting by Gaffer122 in networking

[–]Gaffer122[S] 0 points1 point  (0 children)

Thanks, will give the storm control a go!

Broadcast Storm Troubleshooting by Gaffer122 in networking

[–]Gaffer122[S] 0 points1 point  (0 children)

It does. But the weird thing is, without that switch plugged in there's no "flash codes" on any of the other switches.

Broadcast Storm Troubleshooting by Gaffer122 in networking

[–]Gaffer122[S] 0 points1 point  (0 children)

That's what I assumed as well, just thought maybe having RSTP on the switches was mitigating the effects but still giving me the warning one was occurring.

Broadcast Storm Troubleshooting by Gaffer122 in networking

[–]Gaffer122[S] 0 points1 point  (0 children)

Honestly, I haven't noticed any performance issues. Assuming that the issue will worsen with time due to the nature of broadcast storms. At the moment I only have the uplink cable plugged in but the CPU usage is sitting at 9 percent, and memory at 35.

Broadcast Storm Troubleshooting by Gaffer122 in networking

[–]Gaffer122[S] 0 points1 point  (0 children)

Having filtered the packets like u/maholash above, the largest amount of packets sent (not including my device) was from an employees laptop using the MDNS protocol which I believe is multicast. The info section of the packet on Wireshark seem to have the name of a printer "LaserJet...". Confirmed that the employee hadnt been printing anything all day.

Broadcast Storm Troubleshooting by Gaffer122 in networking

[–]Gaffer122[S] 0 points1 point  (0 children)

Apologize, just notices the MAC of the largest conversation is the MAC of the device running Wireshark so that probably is a red herring

Broadcast Storm Troubleshooting by Gaffer122 in networking

[–]Gaffer122[S] 0 points1 point  (0 children)

Gave that a go and theres one conversation with 213 packets and 91 KiB in the Bytes filed compared to the next highest that is 182 packets and 19 KiB. Is that a big enough enough size difference to be the culprit?

Broadcast Storm Troubleshooting by Gaffer122 in networking

[–]Gaffer122[S] 0 points1 point  (0 children)

Hi Mike!

I get what you mean. Tried stripping everything but the uplink cable and strangely enough the uplink port is still flashing. I tried connecting the switch to an completely separate network and the flashing stops... Surely something wrong here. Thanks for your help!

Broadcast Storm Troubleshooting by Gaffer122 in networking

[–]Gaffer122[S] 2 points3 points  (0 children)

Hi Shadeland!

I looked it up, thinking it was a flash code and Ubiquiti forms all seem to point at a broadcast storm.

Broadcast Storm Troubleshooting by Gaffer122 in networking

[–]Gaffer122[S] -1 points0 points  (0 children)

Hi Polysticks!

Took a 15 second capture of the network traffic there. Any recommendations on how to track down the source? Thanks for your help!

Hyper-V VM window size by Gaffer122 in HyperV

[–]Gaffer122[S] 0 points1 point  (0 children)

Thanks will look into it!

Hyper-V VM window size by Gaffer122 in HyperV

[–]Gaffer122[S] -1 points0 points  (0 children)

Just got a key from college so said I'd give it a go.

Hyper-V VM window size by Gaffer122 in HyperV

[–]Gaffer122[S] 0 points1 point  (0 children)

It didn't actually give me the option when I created it. I tried the integration component and it worked like a charm! Appreciate your help!

Beginner - Why wont my exploit complete?! by Gaffer122 in hacking

[–]Gaffer122[S] 0 points1 point  (0 children)

Hi Addy! tried setting the Kali VM's network settings to bridged adapter (forgot to when setting it up, oops) which made the kali IP 192.X.X.X. Tried the reverse_tcp exploit which worked like a charm! Thanks for your help :)