Traffic

Showing 9 of 9 Blog Posts

10 things you need to know about Cisco IOS access lists, beginning with the basic definition of an ACL. What is an access control list? In the...

Extended ACL is implemented on the bases of source, Destination and Application. The application are telnet, ICMP, HTTP, SMTP etc it also work on port no of...

Access control list is used for security on a Network from other Network. By this we restrict an IP or pool of IP to access a computer...

  Router# conf terminal Router(config)# int e0 Router(config_if)# ip add 192.168.10.10 255.255.255.0 Router(config_if)# no shut Router(config_if)# exit Router(config)# int s0 Router(config_if)# ip add 1.1.1.1 255.255.255.0 Router(config_if)# no...

Configuration for EIGRP     Router# conf terminal Router(config)# int e0 Router(config_if)# ip add 192.168.10.10 255.255.255.0 Router(config_if)# no shut Router(config_if)# exit Router(config)# int s0 Router(config_if)# ip add...

Configuration for IGRP:     Router# conf terminal Router(config)# int e0 Router(config_if)# ip add 192.168.10.10 255.255.255.0 Router(config_if)# no shut Router(config_if)# exit Router(config)# int s0 Router(config_if)# ip add...

It consistent VLAN configuration across all switches in the network.VLAN trunking over mixed networks, suck as Ethernet ATM LAN or even FDDI. It accurate tracking and monitoring...

Question : We can connect two switches via Ethernet cable why we use trunk port between switches ? Ans: Trunk links are required to pass VLAN information...

Have you ever wondered what a Virtual LAN (or VLAN) is or been unclear as to why you would want one? If so, I have been in...

Your purchase with Ciscoforall is safe and fast.

Your Learning Solution will be available for immediate download after your payment has been received.

comodo_secure_seal_113x59_transpnorton_vsign