image-2

How to Configure Allowed VLANs on Cisco Trunk

By default, all VLANs are allowed across the trunk link. We can verify that using the show interfaces trunk command: You can prevent traffic from certain VLANs from traversing a trunked link using the following interface mode command: switchport trunk allowed vlan {add | all | except | remove} vlan-list For example, to prevent traffic from VLAN Read More

image-2

What Is Cisco Express Forwarding (CEF)

Cisco Express Forwarding (CEF) is a packet-switching technique used within Cisco routers. The main purpose of CEF is to optimize the forwarding of packets and increase the packet switching speed. HISTORY Prior to CEF there were 2 methods for packet-switching – Process- Switching and Fast-Switching. PROCESS-SWITCHING The first method, process-switching is the oldest and slowest. In short the Read More

image-2

How to Setup Dynamic DNS on a NETGEAR Nighthawk Router?

A Dynamic Domain Name System (DDNS) service automatically updates the IP address information that is assigned to your host (domain) name. Whenever the IP address of your host name changes, the associated DNS server is updated. NETGEAR is partnered with No-IP to provide DDNS services. Create a NETGEAR No-IP account to set up your MyNetgear.com host name. Read More

image-2

BGP Path Selection

IGPs, such as EIGRP or OSPF, choose routes based on lowest metric. They attempt to find the shortest, fastest way to get traffic to its destination. BGP, however, has a different way of route selection. It assigns various attributes to each path; these attributes can be administratively manipulated to control the path that is selected. Read More

image-2

Understanding Media Access Control Security (MACsec)

Media Access Control security (MACsec) provides point-to-point security on Ethernet links. MACsec is defined by IEEE standard 802.1AE. You can use MACsec in combination with other security protocols, such as IP Security (IPsec) and Secure Sockets Layer (SSL), to provide end-to-end network security. MACsec is capable of identifying and preventing most security threats, including denial Read More