Port aggregation is a technique to bind more than one physical port and create a bigger virtual port. It is done for multiple purposes. The biggest advantage of this technique is increasing the bandwidth of a port. If you have two 100Mb Read More …
Category: Labs
Layer 2 Threat Mitigation Part 2
VLAN Hopping An attack in which an attacker jumps from one VLAN to another VLAN by tagging targeted VLAN number to frame. For example I am an attacker and I am connected to VLAN 10 but I want to get Read More …
Layer 2 Threat Mitigation
Layer 2 threat mitigation is important, it is defense from an insider who aims to damage the network. There are security devices such as firewall, IDS/IPS, and other systems to protect the network but these technologies do not work at layer 2.There Read More …
Quality of Service
QoS is an umbrella term that includes many tools and techniques to improve the performance of network, it is very complex topic as well. QoS is intended to prioritize the traffic on the basis of protocols. For example, the VoIP traffic take 64Kb bandwidth Read More …
Spanning Tree Protocol Part 3
Spanning tree (802.1d) also known as common spanning tree (CST) which means only one big spanning tree for all VLANs.Where Cisco uses per vlan spanning tree (PVST+) which means running individuals spanning tree for each VLAN. Rapid Spanning Tree Protocol It is 802.1w which does not takes Read More …
Quality of Service Part – 2
Random Early Detection – RED Random Early Detection (RED) is the mechanism that detects the memory buffer size before it gets full. It looks for the hosts that are sending more data and it drops the packet of host that is Read More …
Access Control List Part – 2
We discussed the standard ACL but there is a big limitation in this list that it can only work on source IP address. This can only work on layer 3.The numbers for Standard ACL are 1 – 99 and 1300 – 1999. Extended ACL can Read More …
Access Control List Part – 3
By this point we have created ACL and each access control entry (ACE) comes below the existed entries and here we are going to modify and manage the ACLs. Let’s say we have configured the ACL 103 with some entries and a new requirements come to create Read More …
Access Control Lists
We learned about ACL in the CCENT course but there we only tired to understand the standard ACL which filters traffic using source IP address. ACL is basically a filtering mechanism that makes a router a small firewall that inspect the traffic and filters it. Read More …
Using APIC-EM
Advanced Policy Infrastructure Controller – Enterprise Module (APIC-EM) is a collection of tools available via web-interface for modern network operations. Enterprise module is one module from set of tools and it is designed to let you monitor your equipments and to test and Read More …