admin

436 Articles

Network

Author's Biography

Showing 10 of 436 Blog Posts

OSPF Hello/dead time 10/40, 30/1 20 Cisco or IETF I ETF Updates Multicast (224.0.0.5, 224.0.0.6) Load balancing Equal paths Routed protocols IP   OSPF Hello/dead time 10/40,...

   RIP and RIPv2 Comparison RIPv1 RIPv2 Classfu l/classless Classful Both Algorithm Bellman-Ford Bellman-Ford Metric Hops Hops Maximum hop count 15 15 Infinite metric 16 16 Hello/dead...

Packets originating from a nonrouting device destined for another network are sent to their default gateway (Layer 3 device on segment). The router consults its routing table...

VLANs logically divide a switch into multiple broadcast domains at Layer 2. Each VLAN can represent a logical grouping of users by function or department. As users...

STP is enabled by default for all VLANs in a switch. To change the priority to a lower value for root switch elections, use one of the...

Proprietary Cisco Layer 2 protocol that uses multicast to gather hardware and protocol information about directly connected devices. Network layer protocol and media independent. Enabled by default...

Global Configuration Commands Command                                          Description config-registerregister   ...

To gain access to an EXEC session to an IOS for configuration and administration, you can use the following methods: Console: Out-of-band CLI access via a rollover...

IPv4 addresses Consist of 32 bits. Are broken into four octets (8 bits each). Use dotted-decimal format; an example is 172.16.122.204. Minimum value (per octet) is 0,...

Three classes of attack are commonly found in today’s network environment: Access attacks Reconnaissance attacks Denial of service (DoS) attacks Access Attacks An access attack is just...

Cart (0)

  • Your cart is empty.