What if I told you that there are over 700 practical Cisco networking tutorials waiting for you on a single website that can help you learn hundreds of different Cisco networking topics? The resource I’m talking about above is NetworkLessons.com and is probably one of the few online education portals with so many practical lessons on Cisco […]
[Continue reading]How to Configure a Loopback Interface on Cisco Router & Switch
A loopback interface is a virtual interface that can be created within a network device and behaves much the same as a physical interface. Loopback interfaces can be configured on a Cisco router or a switch and have many uses. In this article, we’ll examine what they are, how they can be configured, and how […]
[Continue reading]Top 10 PRTG Alternatives for Monitoring Networks and IT Infrastructure
The Paessler PRTG network monitoring solution is well known to network engineers and administrators. It conveniently monitors network activity including bandwidth usage, IP allocation, device status, network health, and even CPU utilization on networked devices (plus much more). Paessler requires users to use a PRTG core server system running on Windows server OS (or two […]
[Continue reading]Comparison of BOOTP vs DHCP Protocols in Computer Networks
Layer 3 addressing can become difficult to manage in a network especially if you have an extensively large number of host devices. With tens, hundreds, or even thousands of hosts in many enterprise networks, the need for an automated mechanism for assigning IP addresses and other network parameters was realized very early on. In this […]
[Continue reading]Pros and Cons of SD-WAN in Networks – Description and Discussion
A Software Defined Wide Area Network (SD-WAN) is a concept that has been around for over a decade. SD-WAN is a WAN architecture that uses software-defined network technology to deliver a high availability, low cost, and highly flexible WAN connections over the Internet and other public networks. In this article, we will attempt to shed […]
[Continue reading]How to Configure SNMP on Cisco Devices (Routers, Switches)
Simple Network Management Protocol (SNMP), so “simple” yet so powerful. SNMP delivers a standardized framework that can be used for the monitoring and management of network devices. SNMP is one of the most powerful tools that can be used by today’s network administrators and engineers. SNMP allows admins to poll for data such as CPU […]
[Continue reading]Comparison of GNS3 vs EVE-NG vs Packet Tracer for Networks Simulation
I have had many years of experience training students and professionals in networks and telecommunications. In those years, I have found time after time that the single most important activity a trainee can do to learn networking concepts is to spend time in the lab. Creating network topologies and applying the theory learned in the […]
[Continue reading]Subnetting vs Supernetting – What’s the Difference? (Explanation Guide)
Subnetting and supernetting are two processes that are applied to IPv4 address spaces. Each one serves a different purpose and can be used in various applications. In this article, we’ll examine and compare Subnetting vs Supernetting in IP networks and see how they are applied to various aspects of network design and configuration. Structure of […]
[Continue reading]Cisco Command to Test a Copper UTP Ethernet Cable on a Switch
Troubleshooting physical layer problems on UTP Ethernet cabling can sometimes be a nightmare. Dealing with patch cables is a snap, but what happens if your structured cabling has a fault, or if a newly created UTP cable results in intermittent connectivity? Further still, what if you don’t have direct access to the faulty cabling because […]
[Continue reading]Comparison of TCP/IP vs OSI Models in Networking
Communication is key in modern life. Emails, phone calls, video calls are obvious examples. But, video streaming, ecommerce, eLearning, gaming etc are also a kind of communication. We are performing some type of communication in most of our life aspects. Successful communication requires that all participating parties know how to “talk” to each other and, […]
[Continue reading]Comparison of Distance Vector vs Link State Dynamic Routing Protocols
Dynamic routing protocols are used by Layer 3 network devices to automatically share routing information. Various routing protocols have been developed over the years, but most fall into one of three categories: Interior Gateway Protocol – Distance vector, such as EIGRP or RIP Interior Gateway Protocol – Link state, such as OSPF or IS-IS Exterior […]
[Continue reading]Top 11 Network Administrators Software Tools (Free&Paid)
A carpenter is only as good as his hammer. A knight is only as good as his sword. A writer is only as good as his pen. These experts would amount to very little if they didn’t have their respective tools to get their jobs done well. Similarly, a network administrator is only as good […]
[Continue reading]Prevent Spoofing Attacks on Cisco ASA using RPF
A common attack found on TCP/IP networks is IP spoofing. This is usually used for Denial-of-Service, Identity hiding, or even to bypass firewalls or Access-Lists security rules. The spoofing attack works like that: A malicious attacker sends packets towards a target host. The attacker disguises itself by inserting a fake source IP into the packet. […]
[Continue reading]