Configuring IPv6 on our Internetwork
In this article, we’ll configure the internetwork using five routers connected together but we are not going to add IPv6 on the 871W router or to the LAN and WLAN…
We Believe in Technology
In this article, we’ll configure the internetwork using five routers connected together but we are not going to add IPv6 on the 871W router or to the LAN and WLAN…
We certainly have talked a lot about how IPv6 works and how we can configure it to work on our networks, but what is doing that going to cost us?…
It’s time to explore the finer points of IPv6. A great place to start is by showing you how to address a host and what gives it the ability to…
This article introduces you to the next generation of TCP/IP: IP version 6 (IPv6). Because of the many deficiencies found in IPv4, as well as the poor scalability for hierarchical…
Frame relay is still one of the most popular WAN services deployed over the past decade, and there’s a good reason for this cost. And it’s a rare network design…
Link control protocol (LCP) offers different PPP encapsulation options, including the following: Authentication: This option tells the calling side of the link to send information that can identify the user.…
As you can imagine, there are a few things that you need to know before connecting your WAN in order to make sure everything goes well. For starters, you have…
So what, exactly, is it makes something a wide area network (WAN) instead of a local area network (LAN)? well, there’s obviously the distance thing, but these days, wireless LANs…
As we have an article for the overview of the wireless security considerations, let’s talk about planning to implement wireless technology. There’s much more to planning a wireless LAN deployment…
Understanding the threats Introducing wireless networking into your organization opens the door to three new types of attacks on your network: war driving, direct hacking, and employee ignorance. Let us…
Now that you have a foundational understanding of RF signals, we can move to the 802.11 standards. When many network administrators hear of 802.11 technology, their mind immediately equates this…
The funny thing about wireless LAN (WLANs) is that the topology was just so cool that network administrators started deploying it and making up the business case as they went…
We can still remember the very first time we saw Network Address Translation (NAT) in action. “This is the most amazing thing we have ever seen,” we said, with the…
You’ve got to have the Cisco IOS firewall set in the IOS to make use of Context-based Access control (CBAC), and the funny thing is, it’s rare to hear someone…
In this article, we are going to show you some more advanced ways to use access lists. Most of the advanced access-list topics are beyond the objectives of this CCNA…
In the standard IP access list example, you can notice how you have to block all access from the Sales LAN to the finance department. What if you needed sales…