802.1X defines 802.1X port-based authentication as a client-server based access control and authentication protocol that restricts unauthorized clients from connecting to a LAN through publicly accessible ports. An authentication server validates each supplicant (client) connected to an authenticator (network access switch) port before making available any services offered by the switch or the LAN. Until Read More
Category: Networks
Networks, Routers, Firewalls, Moderns and the likes
LACP vs PAGP
In order to create maximum availability and stability for networks, link redundancy or redundant links are emphasized by enterprises and data centers when deploying networks. Etherchannel technology is the most effective way to achieve network redundancy by providing automatic recovery for the loss of a link. When configuring Etherchannel across network devices such as switches Read More
How to Convert a Cisco CAPWAP AP to a Mobility Express AP
by: François Vergès This article will explains how to convert a CAPWAP AP to a Cisco Mobility Express AP. The AP model used as an example in this article is a Cisco Aironet 2802i. Note: if you are planning on doing an AP-on-a-stick site survey with a Cisco Aironet 2800 or 3800, you will have Read More
What are Route Distinguishers and Route Targets
People new to MPLS VPN are often unclear on what functions route distinguishers and route targets serve, and the difference between the two. Let’s see if we can clear up some of that confusion. If you could use a refresher on VRF fundamentals, I encourage you to first check out my earlier articles on the Read More
Wi-Fi Roaming: Intra-controller vs Inter-controller vs Inter-subnet
A mobility even occur if a client roams between access points. As wireless clients move between APs on the same controller and APs join to different controller within the network four different types of roaming events can take place. 1. Intra Controller2. Inter Controller3. Inter-Subnet (Inter Controller – Layer 3) Intra Controller Roaming : If a Read More
How to Configure Allowed VLANs on Cisco Trunk
By default, all VLANs are allowed across the trunk link. We can verify that using the show interfaces trunk command: You can prevent traffic from certain VLANs from traversing a trunked link using the following interface mode command: switchport trunk allowed vlan {add | all | except | remove} vlan-list For example, to prevent traffic from VLAN Read More