We also started the first part of our tower series. In the first part we speak about:
-what are your favorite brands
—DBI SALA – exofit harness
-what gear is a necessity
-why does Justin wear such stank old nikes?
-what are your favorites
-what do you consider a necessity to keep on you
–Knife, Justin’s Boker
—Leatherman Wave, though I carry the old style with a real screwdriver on it. I don’t like the bit style.
-ropes & pullies
-ground to tower?
-ground at base?
Here’s the video:(if you don’t see it, hit refresh)
This go around we have Greg, Andrew Cox, JJ Boyd, and surprise guest Andrew Thrift.
Thrift is our pal from New Zealand. He is a network engineer with a wide range of experiences, though we only really grilled him about his MPLS experience with Mikrotik and about where he buys his hair products. BTW when Andrew talks about carting he is talking about racing go-carts!
This week we have Andrew, JJ, Justin and myself(Greg) on the call! Brothers Unite!
We are talking about future proofing your WISP.
What equipment we choose
Why we choose it
Techniques we employ
We speak about fiber optic cable.
How we terminate
Where we use it
why we use it
We also give a war story or two. Everyone messes up, so enjoy listening to us talk about how we’ve embarrassed ourselves. All hail king JJ with his fail stories…at least he told us his worse, the rest of us were holding back(or was that just me…hehehe).
We talk loosely about WISP security, bonding multiple connections across the internet, and Ubiquiti open lower frequency channels.
Talking points for the security section:
Securing border router
+ Router itself
+ • Disable unused services. Lock down administrative access. Put reflexive rules in place.
+ Access to publicly addressed assets inside
+ • Block external admin access. Put reflexive rules in place.
+ Protect from clients
+ • Towers should already be protected from outside access. Disable unused services. Lock down administrative access. Prevent clients from communication through tower.
+ • Encrypt backhauls. Potential impact to Aps should be pretty low.
+ Protect from clients.
+ • Disable unused services. Lock down administrative access.
+ • Encrypt to clients. Why not?
Securing administrative machines
+ Protect dude server
+ • Don’t install on local machine. Keep it secured on a machine you don’t surf the web from.
+ Protect admin machines
+ • Attempt to keep your work machine as clean as possible. Don’t be the source of the problem.
We were trying a new application called VodBurner and I had LOTS of trouble with it. It would work a little, then wouldn’t…lots of crashes. In the end it dropped the video from JJ and Justin…sorry guys.
As always, let us know about any questions, comments or topics you want to hear about.