Showing 10 of 52 Blog Posts
VLANs logically divide a switch into multiple broadcast domains at Layer 2. Each VLAN can represent a logical grouping of users by function or department. As users...
STP is enabled by default for all VLANs in a switch. To change the priority to a lower value for root switch elections, use one of the...
Proprietary Cisco Layer 2 protocol that uses multicast to gather hardware and protocol information about directly connected devices. Network layer protocol and media independent. Enabled by default...
Global Configuration Commands Command Description config-registerregister ...
IPv4 addresses Consist of 32 bits. Are broken into four octets (8 bits each). Use dotted-decimal format; an example is 172.16.122.204. Minimum value (per octet) is 0,...
Three classes of attack are commonly found in today’s network environment: Access attacks Reconnaissance attacks Denial of service (DoS) attacks Access Attacks An access attack is just...
Internet Control Messaging Protocol (ICMP) is used by ping and traceroute utilities. Packet Internet Groper (ping) allows you to validate that an IP address exists and can...
WAN Interfaces WAN interfaces are used to provide a point of interconnection between Cisco routers and other network devices. Types of WAN interfaces include Basic Rate Interface...
A MAC address is hard-coded (burned in) on the network interface controller (NIC) of the Physical layer device attached to the network. Each MAC address must be...