IPv6 Benefits – Its more than just larger address space
Everybody today is talking about migration to IPv6 becuase very soon there would be no more IPv4 addresses available for the growing number of devices, but IPv6 is much more than just larger address...
View ArticleIPv6 Migration Strategy
// ]]> IPv6 is here and its no more an option. IPv6 is enabling the new Internet, creating new opportunities for business growth. Organizations need to enable IPv6 on their networks to maintain...
View ArticleHow Traceroute Works!
Traceroute is an utility of of TCP/IP Protocol suite. It is a very useful and powerful command when troubleshooting a routing issue. Traceroute program was first written by Van Jacobson in 1984....
View ArticleCommon Routing Performance Issues in the Network
IP networks use many different mechanisms to determine the best possible route for traffic to utilize. The technologies implemented tend to be determined by the business requirements of the network...
View ArticleRedistributing & Selecting the Best Route in the Routing table
The use of a routing protocol to advertise routes that are learned by some other means, such as by another routing protocol, static routes, or directly connected routes, is called redistribution. While...
View ArticleHow to Configure & Verify VLAN ACLs in NX-OS
A VLAN ACL (VACL) is one application of a MAC ACL or IP ACL. You can configure VACLs to apply to all packets that are routed into or out of a VLAN or are bridged within a VLAN. VACLs are strictly for...
View ArticleConfiguring SSH Server in MSR Series Router
Secure Shell (SSH) offers an approach to log into a remote router securely. By providing encryption and strong authentication, it protects routers against attacks such as IP spoofing and plain text...
View ArticleSetting Up Web Interface Management in HP Switches
Ensure you have already set up the switch with IP information & also Ensure that the switch is connected to the network using a Category 5 twisted pair Ethernet cable with RJ-45 connectors with a...
View ArticleUnderstanding How GVRP Works
GARP and GVRP are industry-standard protocols described in IEEE 802.1p. GVRP is a GARP application that provides 802.1Q-compliant VLAN pruning and dynamic VLAN creation on 802.1Q trunk ports. With...
View ArticleIntroduction to Stacking With Configuration – 3Com Switches
If we are talking about 3Com technology the 3Com Switch 4500, up to eight units can be operated together as a single larger logical unit to simplify administration. This is called stacking.Stacking...
View ArticleConfiguring InterVLAN Routing – HP ProCurve Series
Understanding VLANs A VLAN (virtual local area network) allows creation of logical subnetworks, broadening your ability to segment your network in ways independent of the physical setup. VLANs have all...
View ArticleCisco Router Password Recovery procedure
Its a very Simple procedure to recover the enable password and enable secret passwords on Cisco devices. These passwords protect access to privileged EXEC and configuration modes. The enable password...
View ArticleMethods of Redistribution in Network
The use of a routing protocol to advertise routes that are learned by some other means, such as by another routing protocol, static routes, or directly connected routes, is called redistribution. While...
View ArticleHigh Availability with Cisco ASR Series Router
Cisco High Availability (HA) enables network-wide protection by providing fast recovery from faults that may occur in any part of the network. With Cisco High Availability, network hardware and...
View ArticleConfiguring NAT for High Availability on Cisco ASR Series Router
An Address Resolution Protocol (ARP) query is triggered for an address that is configured with NAT static mapping and owned by the router, NAT responds with the burned in MAC (BIA MAC) address on the...
View ArticleBenefits of Configuring NAT,Types of NAT & How NAT Works
Benefits of NAT allows organizations to resolve the problem of IP address depletion when they have existing networks and need to access the Internet. Sites that do not yet possess Network Information...
View Article10 Commands you Should Master When Working with the Cisco IOS
#1: write erase The IOS is generally stored on a piece of compact flash and copied into memory on boot. Not true for 2500 but they are old.The configuration is stored in NVRAM Non Volatile Memory so it...
View ArticleCommand Level & Command View With 3Com Switches
In 3Com Ethernet switch provides a command line interface (CLI) and commands for you to configure and manage the Ethernet switch. Commands are grouped by levels. This prevents unauthorized users from...
View ArticleLogging into the 3Com Switch Through Console Port
Console port is the most common way to log into a switch. It is also the prerequisite to configure other login methods. By default, you can log into an 3Com Ethernet switch through its Console port...
View ArticleConsole Port Login Configuration with Authentication Mode – 3Com Switches
In 3Com Switches level 3 VTY user and want to perform the following configuration for users logging in through the Console port: Authenticate users logging in through the Console port using the local...
View Article
More Pages to Explore .....