vPC and STP By default, only vPC primary switch (Verify it using show vpc role) sends and receives BPDUs on the member ports (even if the root bridge is the vPC secondary switch. Verify it yourself by show spanning-tree interface pomember detail | i sent on the secondary switch). Let’s imagine that primary devices goes […]
Network Fundamentals Lab Introduction Cisco Packet tracer GNS3 EVE-NG Open Systems Interconnection OSI Model Review OSI Layer 1 – The Physical Layer OSI Layer 2 – Data-Link, Describe and verify switching concepts MAC LLC OSI Layer 3 – The Network Layer OSI Layer 4 – The Transport Layer TCP UDP Compare TCP to UDP OSI […]
Why FHRP? A reliable network must address the following characteristics: High Availability and Fault Tolerance, Scalability, Security, and QoS. For a fault-tolerant network we must address the single of points of failures. A reliable network provides redundancy by implementing a packet-switched network wherein each packets could take a different path to the destination. Not that […]
In this article, we will introduce 15 widely used tools in Blue Team (Blue Team). These tools are among the most important and most commonly used tools in the area of Blue Team, which are provided for free and open-source, and you can use You do. From the need to pay. Tool 1 – TheHive […]
In this first article, we are going to do a factory reset on the firewall and then begin the configuration. So here are our current firewall, let’s see the CLI (Command Line Interface) and the syntax we are going to use is: Execute factoryreset Because our firewall is a VM so I need to take […]
Introduction Topology : Individual Point-to-PointTechnology : IPsec Crypto map IPsec VPN site-to-site is generally used to transfer data securely when we use Internet or service providers as the backbone. IPsec is the only technology to secure VPN site-to-site. IPsec provides a security triangle which prevents several potential threats on internet such as masquerading, eavesdropping, man-in-the-middle, […]
In this lesson, we will talk about the path in Linux, which is one of the essential concepts in Linux administration. What is a Path? Every file and directory has a unique location in the Linux file system structure. To access files and directories or to call them in a command or script, Administrators need […]
Array Array is a data structure consist multiple elements based on key pair basis and the element is accessible via a key index number. Unlike most of the programming languages, Bash array elements don’t have to be of the same data type. You can create an array that contains both strings and numbers. How to […]
Scope of Work You’ll be sorry if you miss CCNA to climb your IT career ladder. Your career in networking begins with CCNA. The Cisco certification program was drastically changed on Feb. 24, 2020. There are no longer multiple different CCNA exams and certifications – only a single, comprehensive exam is available. The new exam’s code is 200-301 […]
In this section, let’s see vPC initialization process; then we will discuss on different failure scenarios: The minute you enable vPC feature, the switch sends UDP 3200 ping keepalive to establish connectivity with its peer. Once the connectivity established, the switch in turn enables CFSoE to synchronize the control plane and to carry PDUs for […]