This article is all about how to troubleshoot your OSPF routing and verify routing on the routers. In the previous article, we easily learn that how to configure OSPF routing protocol on the cisco routers. Now in this tutorial, we learn about how to verify and check OSPF routing protocol using troubleshooting commands on routers. Now to understand these troubleshooting commands Continue reading Learn all the troubleshooting commands for OSPF routing protocol
This article is all about how to configure OSPF routing protocol on cisco routers. Here OSPF stands for Open Shortest Path First. OSPF is a routing protocol that uses a link state routing(LSR) algorithm and falls into the group of Interior Gateway Protocols(IGP’s) and these are operating within a single autonomous system (AS). OSPF is the most widely used IGP in the large enterprise network. Because Continue reading Learn how to configure OSPF routing protocol on cisco routers
This article is all about binary conversion of IPv4 in dotted-decimal notation using some examples. In the previous articles on IPv4, we learn about some interesting facts of IP address and also learn what is subnet mask ad how to identify subnet mask of an IP address. We also read about classes of IP address in detail. Now in this article, we learn about how to convert our IPv4 address from binary to dotted- decimal notation.
This article is all about how to configure LACP (Link Aggregation or Ether Channel) on cisco switches. The term link aggregation applies to various methods of combining (aggregating) multiple network connections in parallel in order to increase throughput beyond what a single sustain and also use to provide redundancy in case one of the links should fail. A link aggregation group (LAG) combines a number of physical ports together to make a single high-bandwidth data path. Continue reading How to configure LACP (Link Aggregation or Ether Channel) on cisco switches
This article is all about how to configure PAGP (Port Aggregation Protocol) on cisco switches. We all know that there are total three methods are present to configure EtherChannel in cisco switches. That are static, PAgP and LACP. In the previous tutorial, we configure EtherChannel on switches using the static method. Now in this tutorial, we use PAgP method to configure EtherChannel on cisco switches. Continue reading How to configure PAgP (Port Aggregation Protocol) on cisco switches
This article is all about how to configure a backup route on cisco routers. In this tutorial, we learn about how to configure a backup route on routers, why we use a backup route, where we use a backup route and features of a backup route. We generally use a backup route in companies because the backup router allows the routing device to install a backup route to the management network before the routing protocol process is up and running. If somehow a router’s dynamic protocol gets a problem, it’s a good idea to have a backup route. Continue reading Understand how to configure backup route on cisco routers
This article is all about how to automatic secure your router using the auto secure feature in it. In this tutorial, we learn about how to secure your router even without having basic knowledge of the router security. By using the auto secure feature we can secure a router even without knowing how to configure telnet or how to enable password on routers. This auto secure feature is also a very useful feature for newcomers who don’t have an idea about how to configure your router securely and you can easily provide security to your router. In general, if you want to secure a router easily then you need to read the whole book on the router just to secure your router easily. But if you don’t want to read a whole book on the router and simply secure a router with ease then this auto secure feature is very useful for you. Cisco introduces the auto secure feature to quickly harden router configuration files in an automated fashion. This is a quick and simple way to secure a router without having basic knowledge about routers. So, let’s start here how to configure a router using the auto secure feature.
This article is all about how to use CDP(Cisco Discovery Protocol) on cisco routers. CDP stands for cisco discovery protocol designed by Cisco company to help the network administrators. In this tutorial, we learn about how to turn on or turn off CDP advertisement on the routers, why we use CDP and as well as see the information of directly and indirectly connected devices. By using CDP you can collect information about both locally attached devices and remote devices. CDP is used to share information about other directly connected Cisco equipment, such as the operating system version and IP address also. CDP can also be used for On-Demand Routing, which is a method of including routing information in CDP announcements so that dynamic routing protocols do not need to be used in simple networks. In this article, we will also learn about how to see ios version of neighbor routers and directly connected routers. So let’s start here how to configure CDP(Cisco Discovery Protocol) on cisco routers.
This article is all about how to configure EtherChannel on cisco switches. In this tutorial, we learn about how EherChannel works, how to configure EtherChannel, why we configure EtherChannel and uses of EtherChannel on cisco switches. EtherChannel is a technique in which we combine two and more than two physical interfaces (ethernet ports) of the cisco switches. After that use them as a single logical interface(port). EtherChannel provides incremental trunk speeds between Fast Ethernet, Gigabit Ethernet, and 10 Gigabit ethernet. By using EtherChannel we can combine the bandwidth of multiple ports. It also provides redundancy because if any port fails then still there is no connection loss. If one port fails then another port still active and provide communication and hence provide redundancy. Always remember that in windows EtherChannel technique is known as NIC Teaming and In Linux, this is known as Ethernet Bridging. So let’s start here how we configure EtherChannel on cisco switches.
This article is all about how to enable two-step verification method in Facebook. No doubt that social networking websites and application such as facebook, WhatsApp, Hike, Instagram, and twitter made communication easier and faster in all over the world. you can use these social platforms for make communication between you, your friends, relatives and family members also. By using these apps you can communicate with anyone via instant messages, voice calls, and video calls also within few seconds. By using these social platforms we can also share photos, videos, and any other data directly from your smartphone and computer also. But security is also an important factor in this field because if someone hacks your account then he can steal all of your personal data from your account and may be he blackmailed you via using your personal data. All social media platform increase their security time to time to prevent users from privacy breach and identity theft. If you don’t know about how to enhance the security of your facebook profile then read this post and prevent yourself from any type of breach and theft. In the previous post, we learn about how to secure your WhatsApp account from hackers and now in this tutorial, we learn about how to prevent your facebook account from hackers. So let’s start here