Cisco Networking

Configuring VRRP

What is VRRP and why to use it?Virtual Router Redundancy Protocol (VRRP) is an election protocol that dynamically assigns responsibility for one or more virtual routers to the VRRP routers on a LAN, allowing several routers on a multiaccess link to utilize the same virtual IP address. A VRRP router Read more…

By Joe Conklin, ago
Cisco Firewall

Basic use of ACLs

What are Access Control Lists and why to use them?An access control list is a rule, or can be comprised of one or more rules, that are applied to an interface allowing hosts to communicate to other hosts by filtering traffic using specific protocols such as tcp, udp, icmp or Read more…

By Joe Conklin, ago
Cisco Firewall

Zone-Based Firewall

What are Zone-Based Firewalls and how to use them?Zone-Based Firewalls (ZBF) is a firewall methodology of placing interfaces into zone and defining traffic definitions to allow traffic to pass or drop. In the past firewalls were comprised of access-list that would define both source and destination as well as having Read more…

By Joe Conklin, ago
Cisco Networking

Configuring VRFs

What are VRFs and why to use them?Virtual Routing and Forwarding (VRF) is an IP technology that allows multiple instances of a routing table to coexist on the same router at the same time. Because the routing instances are independent, the same or overlapping IP addresses can be used without Read more…

By Joe Conklin, ago
Cisco Networking

Configuring VTP

What is VLAN trunking protocol and why to use it?VLAN Trunking Protocol (VTP) is a Cisco proprietary protocol that propagates the definition of Virtual Local Area Networks (VLAN) between switching systems. VTP carries VLAN information to all the switches in a VTP domain and advertisements are sent over 802.1Q trunks. Read more…

By Joe Conklin, ago
Cisco Networking

Configuring VLANs

What are vlans and why to use them?A virtual LAN (VLAN) is any broadcast domain that is partitioned and isolated in a computer network at the data link layer (OSI layer 2). VLANs work by applying tags to network packets and creating the appearance and functionality of network traffic that Read more…

By Joe Conklin, ago