Configuring IPv6 on our Internetwork
In this article, we’ll configure the internetwork using five routers connected together but we are not going to add IPv6 on the 871W router or to the LAN and WLAN…
We Believe in Technology
In this article, we’ll configure the internetwork using five routers connected together but we are not going to add IPv6 on the 871W router or to the LAN and WLAN…
We certainly have talked a lot about how IPv6 works and how we can configure it to work on our networks, but what is doing that going to cost us?…
It’s time to explore the finer points of IPv6. A great place to start is by showing you how to address a host and what gives it the ability to…
This article introduces you to the next generation of TCP/IP: IP version 6 (IPv6). Because of the many deficiencies found in IPv4, as well as the poor scalability for hierarchical…
Frame relay is still one of the most popular WAN services deployed over the past decade, and there’s a good reason for this cost. And it’s a rare network design…
Link control protocol (LCP) offers different PPP encapsulation options, including the following: Authentication: This option tells the calling side of the link to send information that can identify the user.…
As you can imagine, there are a few things that you need to know before connecting your WAN in order to make sure everything goes well. For starters, you have…
So what, exactly, is it makes something a wide area network (WAN) instead of a local area network (LAN)? well, there’s obviously the distance thing, but these days, wireless LANs…
As we have an article for the overview of the wireless security considerations, let’s talk about planning to implement wireless technology. There’s much more to planning a wireless LAN deployment…
Understanding the threats Introducing wireless networking into your organization opens the door to three new types of attacks on your network: war driving, direct hacking, and employee ignorance. Let us…
Now that you have a foundational understanding of RF signals, we can move to the 802.11 standards. When many network administrators hear of 802.11 technology, their mind immediately equates this…
The funny thing about wireless LAN (WLANs) is that the topology was just so cool that network administrators started deploying it and making up the business case as they went…
We can still remember the very first time we saw Network Address Translation (NAT) in action. “This is the most amazing thing we have ever seen,” we said, with the…
You’ve got to have the Cisco IOS firewall set in the IOS to make use of Context-based Access control (CBAC), and the funny thing is, it’s rare to hear someone…
In this article, we are going to show you some more advanced ways to use access lists. Most of the advanced access-list topics are beyond the objectives of this CCNA…
In the standard IP access list example, you can notice how you have to block all access from the Sales LAN to the finance department. What if you needed sales…
Standard IP access lists filter network traffic by examining the source IP address in a packet. You create a standard IP access list by using the access-list numbers 19 or…
An Access list is essentially a list of conditions that categorize packets. They can really help when you need to exercise control over network traffic. An access list would be…
All Cisco switches are configured to be VTP servers by default. To configure VTP, first, you have to configure the domain name you want to use. And of course, once…
The voice VLAN feature enables access ports to carry IP voice traffic from an IP phone. When a switch is connected to a Cisco IP phone, the IP phone sends…
By default, only hosts that are members of the same VLAN can communicate. To change this and allow inter-VLAN communication, you need a router or a layer 3 switch. I’m…
It may come as surprise to you, but configuring VLANs is actually pretty easy. Figuring out which users you want in each VLAN is not; it’s extremely time-consuming. But once…
Most of the time, VLANs are created by a sys admin who proceeds to assign switch ports to each VLAN. VLANs of this type are known as static VLANs. If…
The following figure shows how layer 2 switched networks are typically designed as flat networks. With this configuration, every broadcast packet transmitted is seen by every device on the network…
As always, when troubleshooting connectivity issues, use a layered approach and eliminate possibilities at each layer to home in on the possible cause of the problem. Over time, you will…
The 802.1d spanning tree protocol was created with very few design flaws; however, as with most great things, there is always room for improvement. The biggest grievance the networking community…
Catalyst switches, for the most part, are designed so that the default state of the switch allows for basic layer 2 functionality without requiring any configuration from the administrator. For…
We already have an article “Datalink networking concepts”, that you can use bridges and switches to segment a LAN into smaller collision domains. This article looks in close detail at…
One of the greatest aspects of EIGRP is that you get all this advanced functionality with minimal configuration effort. EIGRP essentially follows the same configuration guidelines as RIPv2. Namely, it…
Balanced hybrid routing protocols are sometimes called advanced distance vector routing protocols. The rationale behind this logic is that these routing protocols use similar metrics and have a maximum hop…