Tunneling provides a mechanism to transport packets of one protocol within another protocol. The protocol that is carried is called as the passenger protocol, and the protocol that is used for carrying the passenger protocol is called as the transport…

Cisco 880 Series Integrated Services Routers, a type of fixed-configuration router, provide collaborative business solutions for secure voice and data communication to small businesses and enterprise teleworkers. Cisco 880 routers offer concurrent broadband services over third-generation (3G), Metro Ethernet, and…

The acquisition of Meraki, complements Cisco’s strategy to offer more software-centric solutions to simplify network management, help customers empower mobile workforces, and generate new revenue opportunities for partners, Cisco said in a statement. So much for Meraki’s rumored IPO. Late Sunday…

The Root Bridge In STP configured switched LAN or broadcast domain, a switch is designated as the root bridge. The root bridge serves as an administrative point for all spanning-tree calculations to determine which redundant links to block. An election…

Best Paths to the Root Bridge After the root bridge has been designated for the spanning tree process, the next process is to determine the best paths to the root bridge from all destinations in the network. The best path…

When you configure a VLAN, you must assign it a number ID, and you can optionally give it a name. The purpose of VLAN implementations is to associate ports with particular VLANs. You configure the port to forward a frame…

“Hello, i am getting difficulty in the types of VLAN?? Please explain the following: How many types of VLAN are existing? Explain each type? Types of traffic VLAN can carry?” There are different types of VLANs. The type of network traffic…
Cisco Released Cisco ASA Software 9.0

Version 9.0 of the Cisco ASA software has now been released. Here are some of the major features in the new release. Filter ICMP by ICMP code Clustering of multiple ASAs OSPFv3 and EIGRP support IPv6 support on outside interface…
Five Things You Should Know About DHCP Snooping

DHCP snooping allows the switch to monitor and control DHCP messages received from untrusted devices connected to the switch. When DHCP snooping is enabled, the system builds and maintains a database of valid IP-address/MAC-address (IP-MAC) bindings called the DHCP snooping…