Showing 10 of 424 Blog Posts
Packets originating from a nonrouting device destined for another network are sent to their default gateway (Layer 3 device on segment). The router consults its routing table...
VLANs logically divide a switch into multiple broadcast domains at Layer 2. Each VLAN can represent a logical grouping of users by function or department. As users...
STP is enabled by default for all VLANs in a switch. To change the priority to a lower value for root switch elections, use one of the...
Proprietary Cisco Layer 2 protocol that uses multicast to gather hardware and protocol information about directly connected devices. Network layer protocol and media independent. Enabled by default...
Global Configuration Commands Command Description config-registerregister ...
IPv4 addresses Consist of 32 bits. Are broken into four octets (8 bits each). Use dotted-decimal format; an example is 172.16.122.204. Minimum value (per octet) is 0,...
Three classes of attack are commonly found in today’s network environment: Access attacks Reconnaissance attacks Denial of service (DoS) attacks Access Attacks An access attack is just...
Internet Control Messaging Protocol (ICMP) is used by ping and traceroute utilities. Packet Internet Groper (ping) allows you to validate that an IP address exists and can...
WAN Interfaces WAN interfaces are used to provide a point of interconnection between Cisco routers and other network devices. Types of WAN interfaces include Basic Rate Interface...