Blog

VLAN (Virtual Local Area Network)

vlan-trunks-1-2

A VLAN (Virtual Local Area Network) is a logical grouping of network devices within a local area network (LAN) that allows devices to communicate as if they were on the same physical LAN, even if they are physically located on different segments. VLANs have become essential for network administrators to design efficient, secure and manageable networks. VLANs allow network segmentation, creating virtual networks within a physical infrastructure. This article delves into what VLANs are, why they are important and how to configure them, especially for those preparing for Cisco’s CCNA certification.   What is a VLAN? A VLAN is actually Read More …

BGP CONFIGURATION COMPARISON

HOW TO CONFIGURE BGP ON CISCO VS HUAWEI ROUTERS BGP CONFIGURATION ON CISCO ROUTERS: router bgp 65001 router bgp 65002 bgp router-id 1.1.1.1 bgp router-id 2.2.2.2 network 1.1.1.1 mask 255.255.255.255 network 2.2.2.2 mask 255.255.255.255 neighbor 12.12.12.2 remote-as 65002 neighbor 12.12.12.1 remote-as 65001     BGP CONFIGURATION ON HUAWEI ROUTERS: bgp 65001 bgp 65002 router-id 1.1.1.1 router-id 2.2.2.2 ipv4-family unicast ipv4-family unicast network 1.1.1.1 32 (follow us: networkwalks.com) network 2.2.2.2 32 peer 12.12.12.2 as-number 65002 peer 12.12.12.1 as-number 65001     Also check our free Online Quizzes on all IT topics and CCNA, CCNP, CCIE including new Python Automation Programming. Free Read More …

Linux Intro, versions and installation (Online Quiz Test)

      This Linux Intro, versions and installation quiz & related lecture will help you to improve your knowledge & skills on this topic. You might also be interested in our free Online Quizzes on all IT topics including Cisco CCNA, Cyber Security, Python Programming, Linux & Ethical Hacking: Free Online Quizzes (Best for Cisco CCNA, Huawei HCNA, N+) You can also view free study notes (Cheat sheets) for long term memory: Networkwalks Summary Cheatsheets Follow our Facebook Page & YouTube Channel for more updated Cheatsheets & Quizzes after doing this Scanning quiz: Linux Intro, versions and installation quiz

How Attackers use Scripting & Batch Files to Create Virus for Hacking?

How Attackers use Scripting Quiz

Test your Cyber Security knowledge and skills by practicing this free online quiz on ‘How Attackers use Scripting & Batch Files.       How Attackers use Scripting & Batch Files & its assets from Cybersecurity attacks is critical these days. This quiz & related lecture will help you to improve your knowledge & skills on this topic.   You might also be interested in our free Online Quizzes on all IT topics including Cisco CCNA, Cyber Security, Python Programming, Linux & Ethical Hacking: Free Online Quizzes (Best for Cisco CCNA, Huawei HCNA, N+) You can also view free study Read More …

Network Topology Types

Network Topology Types

Network topology can be defined as the layout pattern and connectivity scheme between the devices in a network. It is simply the layout of network communication. There are two main types of Network topology, and they are Physical and Logical Network topology. Physical Network Topology: Physical topology is the actual connectivity or layout according to real cabling & connections Logical Network Topology: Logical topology is the virtual view of the network devices see   Physical Topology Under the physical topology, there are about seven topologies:  Point-to-Point Network Topology  Star Network Topology  Ring Network Topology  Mesh Network Topology  Tree Network Topology  Bus Network Read More …

QoS (Quality of Service)

QoS Quality of services

QoS (Quality of Service) is simply Traffic discrimination. QoS in Networking can also be defined as a set of technologies used to manage traffic and ensure the performance of critical applications. It enables firms or organizations to adjust their entire network by prioritizing certain high-performing applications.   Problems Solved by Quality of Service (QoS) in Networking The problems that QoS solves are: It provides predictable management of network resources during times of congestion It helps in maximizing the end-user experience of critical sessions It provides differentiated services to packets based on pre-defined user criteria Factors affected by Quality of Service Read More …

Port Security

Port Security

Layer-2 Port Security is used for network traffic control. It allows only the authorized user or filtered MAC address configured to gain access to the network.   Enabling mode Pass/Secret in Port Security To enable mode Pass/Secret we have to Secure the Privileged Mode Access. An encrypted Password is recommended (enable secret)   Example of How to Enable mode Pass/Secret Below is an example of how to enable mode Pass/Secret on the IOS Command Line Interface: R1(config)# enable password networkwalks R1(config)# enable secret networkwalks   Secure the Console (local Access) Secure the Local access by adding a password to Console Read More …

ACL (Access Control List)

acl-access-control-lists 2

ACL (Access Control List) is a list of rules that specifies which users or systems are allowed access to a particular object or system resource. It can simply be defined as a set of instructions to filter inbound and outbound traffic on an interface.   Access Control List Overview and Access List Concepts Access Control List carries out a packet identification mechanism and can also identify packets on the basis of Layer 3 and Layer header. Each access list is composed of one or more ACEs (Access Control Entries) and each ACE is assigned a sequence number. ACEs are processed Read More …

Firewalls and VPNs

VPN

Firewalls are network security devices that monitor and control incoming traffic and outgoing traffic based on a pre-defined set of rules, while VPNs (Virtual Private Networks) are security services that allow devices to access the internet as if they were connected to a private network. Firewalls and VPNs (Virtual Private Networks) in general are both used for security purposes on the network What are Traditional Firewalls? Traditional firewalls sit in the forwarding path. They protect the network from different kinds of issues by allowing only the intended types of traffic to flow in and out of the network, as shown Read More …

STP (Spanning Tree Protocol)

STP (Spanning Tree Protocol) is a Layer-2 protocol that builds a loop-free network topology. Only one active path can exist between two stations in order for them to function properly. STP is a Network Protocol (Layer2) and has a Standard of IEEE 802.1D/W/S/Q, Cisco (Def on Cisco=PVST). Its function is to prevent Layer2 Loops within a network topology, adapt to network changes and failures. The STP Algorithm was designed by Radia Perlman. Spanning Tree Protocol has a Multicast Address of 01:80:C2:00:00:00,  01:00:0C:CC:CC:CD (Cisco’s PVST). There are 5 STP port states and 3 RSTP port states. Likewise, there are 3 STP Read More …