Configuring IPv6 on our Internetwork
In this article, we’ll configure the internetwork using five routers connected together but we are not going to add IPv6…
One Place for Everything
In this article, we’ll configure the internetwork using five routers connected together but we are not going to add IPv6…
We certainly have talked a lot about how IPv6 works and how we can configure it to work on our…
It’s time to explore the finer points of IPv6. A great place to start is by showing you how to…
This article introduces you to the next generation of TCP/IP: IP version 6 (IPv6). Because of the many deficiencies found…
Frame relay is still one of the most popular WAN services deployed over the past decade, and there’s a good…
Link control protocol (LCP) offers different PPP encapsulation options, including the following: Authentication: This option tells the calling side of…
As you can imagine, there are a few things that you need to know before connecting your WAN in order…
So what, exactly, is it makes something a wide area network (WAN) instead of a local area network (LAN)? well,…
As we have an article for the overview of the wireless security considerations, let’s talk about planning to implement wireless…
Understanding the threats Introducing wireless networking into your organization opens the door to three new types of attacks on your…
Now that you have a foundational understanding of RF signals, we can move to the 802.11 standards. When many network…
The funny thing about wireless LAN (WLANs) is that the topology was just so cool that network administrators started deploying…
We can still remember the very first time we saw Network Address Translation (NAT) in action. “This is the most…
You’ve got to have the Cisco IOS firewall set in the IOS to make use of Context-based Access control (CBAC),…
In this article, we are going to show you some more advanced ways to use access lists. Most of the…
In the standard IP access list example, you can notice how you have to block all access from the Sales…
Standard IP access lists filter network traffic by examining the source IP address in a packet. You create a standard…
An Access list is essentially a list of conditions that categorize packets. They can really help when you need to…
All Cisco switches are configured to be VTP servers by default. To configure VTP, first, you have to configure the…
The voice VLAN feature enables access ports to carry IP voice traffic from an IP phone. When a switch is…
By default, only hosts that are members of the same VLAN can communicate. To change this and allow inter-VLAN communication,…
It may come as surprise to you, but configuring VLANs is actually pretty easy. Figuring out which users you want…
Most of the time, VLANs are created by a sys admin who proceeds to assign switch ports to each VLAN.…
The following figure shows how layer 2 switched networks are typically designed as flat networks. With this configuration, every broadcast…
As always, when troubleshooting connectivity issues, use a layered approach and eliminate possibilities at each layer to home in on…
The 802.1d spanning tree protocol was created with very few design flaws; however, as with most great things, there is…
Catalyst switches, for the most part, are designed so that the default state of the switch allows for basic layer…
We already have an article “Datalink networking concepts”, that you can use bridges and switches to segment a LAN into…
One of the greatest aspects of EIGRP is that you get all this advanced functionality with minimal configuration effort. EIGRP…
Balanced hybrid routing protocols are sometimes called advanced distance vector routing protocols. The rationale behind this logic is that these…