Connecting branch offices to the HQ can be done in different ways, depending on the requirements of the customer. One…
One of the ways attackers can infiltrate a network is through the use of a rogue dhcp. In an attack…
Link aggregation is the process of creating a virtual interface (bundle), then adding two or more physical interfaces to the…
There are many methods of deploying wide area network (WAN) when using Cisco routers. Some of these methods are HDLC,…
The Dude is one of the best network monitoring tools out there. When installed, it gives you real-time reporting on…
The Rapid Spanning-tree protocol helps provide redundancy and prevent loops in a switched network. In this post, I will use…
Virtual Private Network, VPN, allows encrypted communicated between two local area network over the public internet. Its importance in the…
We can use the rapid spanning-tree protocol on Mikrotik to avoid layer two loops while creating redundancy on our networks.…
When bgp is configured on a router with dual ISP connections, one of the requirements is to allow all upload…
Route redistribution is a great way to share routes between routers running different routing protocols or routers running the same…