Home > Network Certifications

What is Protected Port ?

Posted by gokhankosem on 10 Sep 17 - 0 Comments
protected-port-topology

What is Protected Port ? Protected Ports are one of the security mechanisms used on switch world. By default all the switch ports are unprotected and equal. But with protected port configuration, some ports are filtered an restricted to access each other. If you configure a port as protected, data traffic on layer 2 is […]

Private VLAN Cisco Configuration Example

Posted by gokhankosem on 10 Sep 17 - 0 Comments
private-vlans-example

Private VLAN Cisco Configuration Example For Private VLAN configuration, we will do a configuration example with one siwtch and one router. Here, we will use the same topology that we have used before for Private VLAN overview. Our topology, ports and VLANs will be like below. On switch, we will do the below configuration one […]

Private VLANs (pVLANs)

Posted by gokhankosem on 10 Sep 17 - 0 Comments
Private-vlan-ports

Private VLANs (pVLANs) VLANs provide dividing the broadcast domains. With this divition, different departments, networks are isolated each other and become another broadcast domain. Sometimes, this separation is not enough and additional separation is needed. Private VLANs are used at these times. Basically we can say that private VLANs are sub-VLANs or VLAN of VLANs. […]

VLAN Configuration on Huawei Switches

Posted by gokhankosem on 10 Sep 17 - 0 Comments
huawei-vlan-configuration-example

VLAN Configuration on Huawei Switches VLAN configuration on Huawei switch is not too different than Cisco VLAN configuration. But there are some differences. In this lesson, we will see the VLAN configuration steps on Huawei devices. For our example, we will use the below VLAN topology. We will configure each switch for VLANs one by […]

Extended acl with packet tracer

Extended Access Lists Configuration With Packet Tracer In this lesson we will focus on Extended ACL Configuration with Packet Tracer. We will use the below topology for our packet tracer configuration. You can DOWNLOAD the Packet Tracer example with .pkt format HERE. Like Standard ACL configuration example, we will use one router, one destination server […]


Copy Protected by Chetan's WP-Copyprotect.