General Switch and Layer 2 Security

Some of the basic rules to keep in mind when setting up a secure Layer 2 switching environment are as follows: VLANs should be set up in ways that clearly separate the network's various logical components from each other. VLANs lend themselves to providing segregation between logical workgroups....

Basic IP Subnetting

Basic subnetting and variable-length subnets are often misunderstood. This section gives a brief introduction to how subnetting works, and the next section discusses variable-length subnet masks (VLSMs). A subnet, or subnetwork, is a subset of a Class A, B, or C network. To better understand subnett...

Area Structure

OSPF creates a two-level hierarchy of areas. Area zero (also called the backbone area or transit area) is always the central area; all other areas attach to area zero. Area zero forms the top level in the hierarchy and the remaining areas form the bottom level of the hierarchy. This hierarchical des...

Setting the Log Size

You can use the optional size attribute with the logging buffered configuration command to change the size of your router's internal log buffer: Router#configure terminal Enter configuration commands, one per line.  End with CNTL/Z. Router(config)#logging buffered 16000 Router(config)#end...

Setting Up Frame Relay with Map Statements

In its simplest form, the Frame Relay map configuration involves considerably less typing than the subinterface version of the same configuration: Central#configure terminal Enter configuration commands, one per line.  End with CNTL/Z. Central(config)#interface Serial0 Central(config)#des...

Contact Us

86-136-2222-6316
CALL ME NOW

© 2011 CathaySchool, an ANDA Technology Group company, All Rights Reserved Privacy Policy | Refund Policy | Disclaimer | Sitemap | Resources Tags