Cisco CCNA: variable length subnet mask, from start to finish.
Building an efficient network involves design, implementation and optimization. These three are merged together and called network engineering. Just like the foundation … Read more
Building an efficient network involves design, implementation and optimization. These three are merged together and called network engineering. Just like the foundation … Read more
Having treated how to subnet class B and Class C addresses, I did mention that class A was next in line. Starting from … Read more
In my previous post, I shared how we can subnet a class C address with an example. In this post, I will … Read more
Statistics have shown that apart from access control list and OSPF, the major area that CCNA students encounter challenges while studying for … Read more
This video was put together by me to demonstrate how you can configure VLAN and use VTP to replicate the VLANs across … Read more
Assuming you have a dual ISP connection to the internet, the best thing may not be automatic fail-over. Instead of having one … Read more
As a Cisco certified professional with years of industry-proven experience both as an instructor and a practicing engineer with a leading internet … Read more
Given the challenges aspiring network security engineers face trying to set up and use the Cisco Configuration Professional (CCP), I have decided … Read more
Secure shell popularly known as SSH is a TCP application on port 22 that is used to access a router through the … Read more
Creating vlans on cisco switches is one the most common tasks network engineers do. Vlans are so important that we can hardly … Read more
In this demonstration, I will share with us on how to implement eigrp with manual route summarization on a Cisco router. Before … Read more
The Border Gateway Protocol is used to share routing information between internet routers in different autonomous systems (AS) for ebgp or between … Read more
The objective of this lab is to bridge the two interfaces on the router and have the two connected PCs on the … Read more
The importance of port security can never be over emphasized. Most of the time, network security is concerned with efforts aimed at … Read more