VLAN Lab

Introduction The purpose of this exercise is to create separate VLANs for different groups of users in each building. In a later exercise we will configure the core router so that each VLAN is using a different IP subnet. This lab is a continuation from the Spanning Tree exercise and the lab setup is identical: … Read more

CCNP.Lab – VLANs, VTP, DTP and STP

Lab Objective The focus of this lab is to understand basic VLAN, VTP, DTP and STP implementation and configuration in Cisco IOS Catalyst switches. Lab Topology The lab network topology is illustrated below: Topology Task 1 Enable and configure VTP on the switches illustrated in the topology as follows: DLS1 DLS1(config)#vtp domain SWITCH Changing VTP … Read more

Difference between a public and private IP address

All IPv4 addresses can be divided into two major groups: global (or public, external) – this group can also be called ‘WAN addresses’ — those that are used on the Internet, and private (or local, internal) addresses — those that are used in the local network (LAN). Public IP address These are public (global) addresses … Read more

12 Most Important topics in CCNA

1. Address Resolution Protocol (ARP): ARP is a layer of 2 protocols. It’s full form Address Resolution Protocol itself defines its function. A PC sends an ARP request to know the MAC address of a device. ARP request is broadcast. In response to an ARP request, PC generates an ARP reply that is unicast in … Read more

Configuring Palo Alto Networks Firewall

Palo Alto Networks firewall detects traffic from an endpoint that matches a configured security policy using the endpoint’s auth table entry. It determines the role(s) associated with that user and allows or denies the traffic based on the actions configured in the security policy. Configuring User Identification on Security Zones Policy rules on the firewall … Read more

How to limit network bandwidth on linux

Limiting Network Bandwidth One of the easiest way to control over the network traffic is via command line tool called “trickle“. It can be limit application bandwidth, upload or download speed, or prioritizing daemons (a computer program that runs as a background process). tickle works on the concept based on “Linux Pre-Loader”. It controls the … Read more

How to Crack WPA/WPA2 | Wireless hacking tools

Introduction This tutorial walks you through cracking WPA/WPA2 networks which use pre-shared keys. I recommend you do some background reading to better understand what WPA/WPA2 is. The Wiki links page has a WPA/WPA2 section. The best document describing WPA is Wi-Fi Security – WEP, WPA and WPA2. This is the link to download the PDF directly. The WPA Packet Capture Explained tutorial is … Read more

Categories of Ethernet LAN Cables in History

What is the Ethernet? Ethernet is the technology of connecting computers and electronic devices in short distances to form a local area network (LAN). Ethernet networks may include cable connected and wirelessly connected devices. Who invented the Ethernet? The Ethernet was founded by Robert Metcalfe and David Boggs in 1973. The first network connecting computers … Read more