Other Applications of Policy Routing

One practical application of policy routing is its use with firewalls. Firewalls are devices that apply security requirements to traffic. Firewall implementations include packet filtering, authentication, and encryption. Depending on the network setup, administrators might want to direct some or all...

Determining All Subnets of a Network

Another common question, typically simply a portion of a more challenging question on the CCIE written exam, relates to finding all subnets of a network. The base underlying question might be as follows: Given a particular class A, B, or C network, and a mask/prefix length used on all subnets of ...

General Theory of OSPF

In a typical distance vector protocol, each router advertises its table of reachable destinations (vectors) and the distances to them (distance) on each of its interfaces on a regular basis (periodic updates). OSPF routers advertise the state of their directly connected links to all routers on the ...

Using STUN

STUN provides the ability to emulate an SDLC circuit through an IP network. To simply connect two SDLC or two HDLC ports on different routers, you can use the following: Stun-A#configure terminal Enter configuration commands, one per line.  End with CNTL/Z. Stun-A(config)#interface Loopbac...

LLQ, or PQ/CBWFQ

With the emergence of voice traffic into data networks, the need to differentiate between the various classes of service has become greater. PQ/CBWFQ, most commonly known as LLQ, is a new feature that provides a strict priority queue for voice traffic and a weighted fair queue for each of the other ...

Contact Us

86-136-2222-6316
CALL ME NOW

© 2011 CathaySchool, an ANDA Technology Group company, All Rights Reserved Privacy Policy | Refund Policy | Disclaimer | Sitemap | Resources Tags