Configuring IPv6 on our Internetwork

configuring-IPv6

In this article, we’ll configure the internetwork using five routers connected together but we are not going to add IPv6 on the 871W router or to the LAN and WLAN networks connected to the R1, R2, and R3 routers, to keep things simple and easier to understand. So let’s get started by adding IPv6 to … Read more

How IPv6 works in an Internetwork

How IPv6 works in an Internetwork

It’s time to explore the finer points of IPv6. A great place to start is by showing you how to address a host and what gives it the ability to find other hosts and resources on a network. We’ll also demonstrate a device’s ability to automatically address itself something called stateless autoconfiguration, plus another type … Read more

Internet Protocol Version 6 (IPv6)

Internet-Protocol-Version-6-IPv6

This article introduces you to the next generation of TCP/IP: IP version 6 (IPv6). Because of the many deficiencies found in IPv4, as well as the poor scalability for hierarchical addressing in IPv4, IPv6 was developed to meet the rapidly growing needs of small companies, corporations, and the explosive growth of the internet, especially in … Read more

Introduction to Frame Relay Technology

Introduction to Frame Relay Technology

Frame relay is still one of the most popular WAN services deployed over the past decade, and there’s a good reason for this cost. And it’s a rare network design or designer that has the privilege to ignore that all-important cost factor!  By default, frame relay is classified as a non-broadcast multi-access (NBMA) network, meaning … Read more

Link Control Protocol (LCP) configuration options

Link-Control-Protocol-LCP-configuration-1

Link control protocol (LCP) offers different PPP encapsulation options, including the following: Authentication: This option tells the calling side of the link to send information that can identify the user. The two methods are PAP and CHAP. Compression: This is used to increase the throughput of PPP connections by compressing the data or payload prior … Read more

Cabling the Serial Wide Area Network

Cabling-the-Serial-Wide-Area-Network

As you can imagine, there are a few things that you need to know before connecting your WAN in order to make sure everything goes well. For starters, you have to understand the kind of WAN physical layer implementation that cisco provides as well as ensure that you’re familiar with the various types of WAN … Read more

Introduction to wide area networks

Introduction-to-wide-area-networks

So what, exactly, is it makes something a wide area network (WAN) instead of a local area network (LAN)? well, there’s obviously the distance thing, but these days, wireless LANs can cover some serious turf. What about bandwidth? Well, here again, some really big pipes can be had for a price in many places, so … Read more

Wireless Implementation Guidelines

Wireless Implementation Guidelines

As we have an article for the overview of the wireless security considerations, let’s talk about planning to implement wireless technology. There’s much more to planning a wireless LAN deployment than putting a few wireless access points in place. You need to understand how the topology, distance, and placement of the wireless access points can … Read more

Wireless security and Implementation considerations

Wireless-security-and-Implementation-considerations

Understanding the threats Introducing wireless networking into your organization opens the door to three new types of attacks on your network: war driving, direct hacking, and employee ignorance. Let us explain each of these in detail. War driving You know you’ve entered a new realm of network security when “driving” becomes one of the intrusion … Read more

The 802.11 standards family

802.11-standards-family

Now that you have a foundational understanding of RF signals, we can move to the 802.11 standards. When many network administrators hear of 802.11 technology, their mind immediately equates this with the three or four popular wireless networking standards: 802.11a, 802.11b, 802.11g, and the standard 802.11n. however, 802.11 describes much more than this when dealing … Read more

Cisco’s Wireless Technologies

Cisco-wireless-technology

The funny thing about wireless LAN (WLANs) is that the topology was just so cool that network administrators started deploying it and making up the business case as they went along. Wireless networks were a new way of looking at infrastructure, and within a few years of mainstream deployment, the applications that used this infrastructure … Read more

Enabling Internet connectivity with NAT

Enabling-Internet-connectivity-with-NAT

We can still remember the very first time we saw Network Address Translation (NAT) in action. “This is the most amazing thing we have ever seen,” we said, with the same awestruck feeling as the first time you walk up and look over the Grand Canyon. Okay, perhaps it wasn’t that fantastic, but at the … Read more

Context-based Access Control (Cisco IOS Firewall)

context based access controla

You’ve got to have the Cisco IOS firewall set in the IOS to make use of Context-based Access control (CBAC), and the funny thing is, it’s rare to hear someone even Cisco differentiate between the two. People usually just refer to the Cisco IOS firewall and leave it at that. But what is it? Well, … Read more

Advanced Access lists – CCNA Course

Advanced Access lists - CCNA Course

In this article, we are going to show you some more advanced ways to use access lists. Most of the advanced access-list topics are beyond the objectives of this CCNA course, so we’ll just discuss them briefly and you can find more information on the Cisco website if you are interested. However, with that said, … Read more

Extended Access Lists – CCNA Course

extended-access-lists-ccna-course

In the standard IP access list example, you can notice how you have to block all access from the Sales LAN to the finance department. What if you needed sales to gain access to a certain server on the finance LAN but not to other network services, for security reasons? With the standard IP access … Read more