Recently I installed several Ruckus Access Points at a customer’s site. This customer has several large rooms and was in urgent need of a stable and available internet supply in all rooms. At this customer’s site, I installed several Ruckus models managed by Ruckus Unleashed. This is a free (Cloud)
For testing purposes I’m using PFsense to allow my clients to PXE boot using the FOG TFTP server. This are the settings which are working : [table id=2 /] You can find these settings in the PFsense DHCP service menu.
For some testing in my lab environment I needed PXE boot to work. This is how I configured PfSense to support PXE boot. In this scenario I wanted some Windows and Linux devices to boot to an imaging environment. For the Windows devices I needed option 66 en 67 but
In this scenario I would like to allow SMTP traffic to my internet provider so that an application in my test environment is able to send notification messages. In this environment I use pfSense. For this to work, you have to create a port forwarding rule on the LAN interface
In this blogpost I describe I’ve taken to setyp my Aerohive WiFi whitebox environment. In my case I used the following products : HP 1910 POE Switch (ofcourse you can choose another POE Switch) 2x AP130 Aerohive Accesspoints incl. licenses and 2 cigars while building. 🙂 First I powerd up
Today I was enrolling a Fortigate 60C. A collegae of my grabbed the device before I did and changed the password without writing it down. This is how to reset the device to factory default. First of all, in my case the reset button didn’t work. You can disable the reset