Blog

python-nedir-ipcisco
Python Nedir?

Python Programlama Dili   Bu yazımızda Python nedir sorusuna yanıt arayacağız. Python, 1990 yılında Guido Van Rossum tarafından temelleri atılmış, son yılların en popüler yüksek seviyeli ve nesne yönelimli bir programlama dilidir. İsmi ilk etapta bir yılan türünden alınmış gibi görünse de, Python programlama dilinin…


what-is-switching-ipcisco
Switching

In this lesson, we will focus on one of the most important lessons of networking. This important lesson is switching. We will learn, what is switching, switching techniques, types of switching and more. Beside we will learn many things about the widely used network equipment,…


top-3-ccna-books-ccna-reference
Most Popular 3 CCNA Books

CCNA (Cisco Certified Network Associate) is one of the most popular network certifications of the World. It is an entrance certification of Cisco to networking World. To have this popular certification, you should work for CCNA Lessons with any resource and you should pass CCNA…


cyber-security-jobs-ipcisco.com
Cyber Security Jobs

Cyber Security is one of the most popular case of today’s information technology World. With the development of the information technology, security attacks has increased and to defend networks and systems towards these attacks, cyber security solutions has also developed. Beside with these solutions, new…


cyber-security-salary-ipcisco.com
Cyber Security Salary

Cyber Security is a popular area of Information Technology (IT). Especially in recent years, with the development of the technology and by the increase of cyber attacks, cyber security became the most important area of technology. There are many types of hackers and bad guys…


cloud-computing
Cloud Computing

What is Cloud Computing?   Cloud Computing is the delivery of computing services like networking, storage, servers, software etc. on demand over internet. With Cloud Computing Services, you pay as much as you use. With such a solution, your operation cost reduces and you can…


cyber-attacks-network-attacks-ipcisco.com
Cyber Attacks, Network Attacks

Cyber Attacks, Network Attacks, Threats, Vulnerabilitis and Mitigation   There are various Network Attacks and various ways to prevent yourself from the attackers. In this lesson we will focus what are these Network Attacks, Cyber Attacks. So, what are the types of Network Attacks (Cyber…


network-command-in-linux-ipcisco-k
Network Commands in Linux

What Are The Top Network Commands in Linux?   Linux is used in the servers as an operation system in many networks. It is the most important and widely used operating system in the World. There are various Linux Commands. Some of these commands are…


what-is-a-network-protocol
What is a Network Protocol?

This is one of the first questions of a Network Engineer: What is a Network Protocol? A Network Protocol is a set of rules, standards, precedures that provide the communication of devices in a network. With all these features, Network Protocols shows how to beahve…


network-engineer-salaries-ipcisco
Network Engineer Salary

How much is a network engineer salary? Network Engineering is one of the trend jobs in the World. Large or small, almost all companies has a network part and so they need network engineers. These companies can be large vendors like Cisco, Juniper, Nokia, Huawei,…


segment-routing-adjacency-node-segment-forwarding-path
Segment Routing

What is Segment Routing? Network technology is developing day by day. With this development many Technologies are coming to our lives and all these new Technologies need different type of requirements. What are these Technologies? For example, Internet of Things (IoT), 5G, Cloud Services etc.…


hacker-types-ipcisco.com
Types of Hackers

A Hacker is a highly skilled person on Cyber Security, Computer Systems and Networks. In other words, they are the Master of Computer World. With such an expertise, a Hacker can do many things  on different computers and networks. So, here the important point is…


site-to-site-vpn-ipcisco
VPN Types and Protocols of VPN

VPN Types   VPN (Virtual Private Network) is a technology that provides a secure connection to a private network  over Internet for users. By encrypting the connections, VPN provides security in this type communication. Basically this security is provided over a VPN Tunnel and provide…


cisco-devnet-certification-steps
Cisco DevNet Certifications

Cisco’s New Software Development Certifications : DevNet Cisco has announced its new certification program as “Next Level Certifications”. One of the most important changes in Cisco Certifications with this new program is new Software Developer Certifications, DevNet Certifications. In this article, we will focus on…


cisco-next-level-certification
Cisco Next Level Certifications

What is new With Cisco Next Level Certifications?   Cisco has changed Cisco Certification Suite with a new focus on latest technologies as Cisco Next Level Certifications. There are new technologies that drives today’s technoology professional. With its new Certification Suite, with Cisco Next Level Certifications,…


BGP-Confederation
BGP Confederation

What is a BGP Confederation?   BGP Confederations is an another mechanism to avoid iBGP Full Mesh topology like Route Reflectors. As a basic definion, BGP Confederaition mechanims is Autonomous Systems (AS) in Autonomous Systems (AS). In other words, in this BGP mechanism, there are…


BGP-RR-update-from-RR-client
BGP Route Reflector

Why We Use BGP Route Reflectors?   By default iBGP Peers need to be Full mesh together. BGP Route Reflector (RR) is a BGP Mechanism used to bypass this iBGP Full Mesh requirement and provide all iBGP Routing information to all iBGP peers. With this…


ccna-salary-london
CCNA Salary

What Does a CCNA Earn in a Month?   Network Engineering and Network Technician Jobs are one of the popular Jobs in Information Technology. With the development of Computer Networks this need has increased and many Network Experts are needed for different level Network Jobs.…


bgp-community-local-as
BGP Community

BGP Community Attribute BGP Community Attribute is an Optional Transitive BGP Path Attribute. With BGP Community Attribute, destinations are grouped and BGP route policy decisions are done special to each of these communities. BGP Community Attributes are assigned to specific prefixes and advertised to the…


linux-ping-commands-ipcisco.com
Ping Command in Linux

Ping Command in Linux Ping Command is the most used command in networking world. Maybe it is the first command that every network engineer has used firstly. During  network integration, network operation and troubleshooting activities, we use Ping. There are different  Linux Ping Commands used…


ipv6-eui-64-format-ipcisco.com
IPv6 Link Local Address

What is IPv6 Link Local Address?   IPv6 has different address types. One of the important and widely used IPv6 Address type is IPv6 Link Local Address. Every IPv6 enable interfaces must have a Link-Local Address either with manual configuration or auto-address configuration. IPv6 Link…


show-control-valid-vedges-cisco-sd-wan
Cisco SD-WAN Verification

Cisco SD WAN Verification Commands In this lesson we will focus on How to Verify Cisco SD WAN Configuration. Here, we will see Cisco SD WAN Architecture vBond Orchestrator, vSmart Controllers, vManage and vEdge SD-WAN devices’ show commands and their outputs. Now, let’s see Cisco…


Cisco-Viptela-vSmart-Controller-Config
Cisco vSmart Controller Configuration

How to Configure vSmart Controller? The Virtual Machines that we will use as Cisco (Viptela) vSmart Controller device come with a factory default configuration. We should do the initial configuration of some key parameters on Cisco vSmart Controller. With this initial configuration, our vSmart Controller…


cisco-viptela-vbond-config
Cisco vBond Initial Configuration

How to Configure vBond Orchestrator? vBond Orchestrator comes with a factory default configuration at the beginning. So, to enroll to the Cisco SD-WAN, it needs to be configured a little. This is the initial configuration of Cisco vBond. After this initial configuration, for full configuration,…


cisco-viptela-sd-wan.ipcisco.com
Cisco SD-WAN Components

Cisco SD-WAN Components In Cisco SD-WAN Architecture, there are main components work on different SD-WAN Architecture Planes. These SD WAN Components and their location in the SD-WAN Architecture ig given below: vBond vManage vSmart Controller vEdge   At 2017, Cisco acquired Viptela. At that time,…


sd-wan-architecture-ipcisco.com
SD-WAN Architecture

Cisco SD-WAN (Viptela SD-WAN) Architecture In SD-WAN Cisco (formerly SD-WAN Viptela), Cisco SD-WAN Architecture consist of four main SD-WAN Planes. Each of this SD-WAN Planes has specific duty in Cisco SD-WAN Architecture (Formerly Viptela SD-WAN Architecture). These SD-WAN Planes are given below: Orchestration Plane Management…


cisco-mst-configuration
MST Configuration on Cisco

In this configuration example, we will learn How to Configure Spanning-Tree MST Mode on Cisco switches. BEfore, we have leared what is STP and MST. Now, we will learn Cisco MST Configuration. To configure MST (Multiple Spanning Tree), we will use the below topology. Now,…


huawei-ftp-server-config
Huawei FTP Configuration

Huawei FTP Configuration In this Huawei FTP Configuration example, we will configure a router as FTP Server and then we will try to connect this FTP Server router from another router. Here, this another router will be our FTP Client. For our configuration, we will…


radius-versus-diameter
Diameter Protocol Overview

With the development of network world, new requirements has appeared in AAA. For this requirements a new protocol was developed as an enhanced version of RADIUS. This protocol is Diameter Protocol.   Diameter Protocol supports many protocols beside IP and it is a solution for…


cisco-span
Cisco SPAN Overview

Cisco SPAN Overview SPAN  (Local Switched Port Analyzer) is used to monitor specific souce ports’ or specific VLANs traffic, mirror this traffic and then sends the traffic to a destination port on Cisco switches and Cisco routers. SPAN is used generally for troubleshooting and monitoring…


wan-topology-types
WAN Topology Types

WANs interconnect different networks over long distances. Various network topologies used to build a WAN network. The main topologies used on WANs are given below: Point-to-Point Topology Hub and Spoke Topology Full Mesh Topology Dual-Homed Topology   Now, let’s talk about these WAN Topologies one…


huawei-mst-configuration-hcia
MSTP Configuration on Huawei eNSP

MSTP Configuration on Huawei eNSP MSTP is an enchanced STP version. With MSTP, both multiple STP instances can be used and one more VLANs can be added to these instances. In this lesson, we will configure MSTP on Huawei switches with Huawei eNSP. For our…


huawei-router-interface-configuration
Huawei Router Interface Configuration with eNSP

Huawei Router Interface Configuration   Huawei Router Interface Configuration is one of the first configuration that Junior Network Engineers learn on Huawei Routers. Here, we will show how to configure Huawei Router Interfaces with given IP addresses.   You can test youself with Huawei HCIA…


PVST-configuration-with-packet-tracer
PVST+ and Rapid PVST+Configuration on Packet Tracer

PVST+ Configuration on Packet Tracer   In this Spanning Tree Configuration Example, we will configure STP with STP Mode PVST+. As you know, Per VLAN STP Plus is the STP Mode that uses one STP instances per VLAN.   For this Configuration Example, we will…


nokia-service-router-event-logs
Logs in Nokia Service Routers

Router Logs are very important for a Network Engineer during troubleshooting. A good  Network Engineer, check the right logs and determine the required actions according to the logs. All the events, errors , etc are in the logs. If you know where to check, you…


OSPFv2-on-eNSP
OSPv2 Configuration on Huawei eNSP

OSPv2 Configuration on Huawei eNSP   In this OSPF Configuration Example, we will configure OSPFv2 on Huawei Routers. We will use eNSP for our Huawei OSPFv2 Configuration Example and our topology will be like below. Here, we will configure only one area, Area 0. So,…


ripv2-configuration-on-huawei-ensp
RIPv2 Configuration on Huawei eNSP

RIPv2 Configuration on Huawei eNSP RIPv2 is an old Routing Protocol but it is the first Routing Protocol that all Network Engineers meet first. In this lesson, we will configure RIPv2 on Huawei Routers. For our Huawei RIPv2 Configuration Example, we will use the below…


packet-tracer-radius-conf -
RADIUS Configuration on Packet Tracer

RADIUS Configuration on Packet Tracer   In this RADIUS Configuration Example, we will configure RADIUS Server and a Cisco Router for RADIUS Authentication, for the users connected to the router via Cisco switch. For out RADIUS Configuration Example, we will use the below topology on…


mst-802.1s
MST (Multiple Spanning Tree)

MST Overview MST (Multiple Spanning Tree) is the version of STP that allows multiple VLANs to a single instance. It is the standard based protocol defined with IEEE 802.1s.You can also check the definion of wiki for MST.   In normal STP (CST) and RSTP,…


pvst-802.1d
PVST+ and Rapid PVST+

PVST+ (Per VLAN Spanning Tree Plus)   PVST+ (Per VLAN Spanning Tree Plus) is a Cisco proprietary STP version. It is also the default STP version for Cisco devices. It is the standard named 802.1d. In another lesson, we will see the configuration of PVST+ on…


mlppp-example
MLPPP Configuration on Cisco Packet Tracer

Packet Tracer MLPPP Configuration Example   In whe previous lesson, we have learned what is MLPPP. Here, we will focus on how to configure MLPPP. In this MLPPP Configuration example, we will use the below simple topology. We will configure MLPPP on both of the…


MLPPP-bundle
What is MLPPP?

What is MLPPP?   MLPPP (Multilink Point-to-Point Protocol) is the protocol that bundles multiple serial wan links into a one Logical Bundle. As a name, PPP Multilink, MLP and MP are also used for MLPPP (Multilink Point-to-Point Protocol). Here, we will learn the theorical parts,…


802.1x-Components
EAPoL (Extensible Authentication Protocol over LAN)

EAPoL (Extensible Authentication Protocol over LAN) EAPoL is the abbreviation of Extensible Authentication Protocol over LAN. EAPoL is a network authentication protocol used in 802.1x (Port Based Natwork Access Control). In other words, it is the encapsulation protocol used between Supplicant and Authenticator. As we…


802.1x-EAP-RADIUS-Messaging
802.1x (Port Based Network Access Control)

802.1x (Port Based Network Access Control) 802.1x is a LAN Security Mechanism that provides port based access control in the network devices. In 802.1x mechanism, devices needs to be authenticated before accessing the network. 802.1x Roles In 802.1x mechanism, there are three roles.These 802.1x roles…


huawei-ensp-port-security-topology
Huawei Port Security Configuration on Huawei eNSP

In this Huawei Port Security Configuration Example, we will configure Port Security on a Huawei switch. For our Huawei Port Security Configuration, we will use the below topology consist of one switch, one hub and four PCs. You can also view Cisco Port Security Configuıration…


SLAAC-with-DHCP-IPv6-Stateless-Auto-Configuration
Stateless Address Auto Configuration (SLAAC)

Stateless Address Auto Configuration (SLAAC) Stateless Address Auto Configuration (SLAAC) is the IPv6 Auto Configuration technique that is done automatically on the hosts with the help of IP Prefixes coming from a router with Router Advertisements (RAs). In this type of Auto configuration, in Stateless…


ipv6-address-allocation-mechanisms
DHCPv6 Overview

Dynamic Host Configuration Protocol version 6 IP Allocation can be done with different mechanims in IPv6. Mainly, we can devide IPv6 Allocation mechanims into two. These are: • Manual • Dynamic Manual IP allocation is the way that network engineers manually assign IPv6 addresses. Dynamic…


work time protocol
Cisco NTP Configuration

How to Configure NTP on Cisco? NTP is the aberviation of Network Time Protocol used to set time related configurations on network devices. In Cisco devices, NTP Configuration is done with a little various NTP commands. In this example, we will see how to configure…


ntp-stratum
NTP (Network Time Protocol)

NTP Overview The time on the network devices are very important. In a network all the devices’ times need to be synronized. Using the same time on all the devices in network is especially very important for troubleshooting activities. This time synronization is done by…


NETCONF-messaging
NETCONF Operation Steps

NETCONF Operations NETCONF Operation has three common steps. These steps are: • Session Establishment • Operation Request and Reply • Session Close Firstly, the Session is Established with the messages. Both NETCONF Client and NETCONF Server send message with their capabilities, what operations they support.…


netconf-layers
NETCONF Protocol Stack

NETCONF Protocol Stack NETCONF Protocol Stack consist of four main layers. These NETCONF Protocol Stack are: • Content • Operations • Messages • Transport At the Content Layer, YANG Modeling is used fo data modeling and protocol operations. The configuration for a NETCONF operation is…


NETCONF-in-SDN
NETCONF Overview

Network Configuration Protocol (NETCONF) is a standard based IETF Network Configuration Management Protocol. With this Network Configuration Management Protocol, we can install, modify and remove the configuration of the network devices. Additionally, NETCONF Protocol reduces the cost. It also reduces the given time to the…


huawei-mld-configuration
MLD Configuration on Huawei Routers

MLD Configuration on Huawei Routers In this lesson we will give an example topology consist of Huawei switches and multicast hosts and then we will configure MLD on these devices. For our example, we will use the below topology: Let’s configure MLD on the Switch…


Dynamic Routing Protocol Types

Dynamic Routing Protocol   Dynamic Routing is the routing process that is done via a Routing Protocols in networking. The Routing Protocols that is used for this aim is also called Dynamic Routing Protocols. In this lessons, we will focus on the types of Routing…


uplink-fast-example
STP Convergence Mechanisms - Part 2

Loop Guard, Uplink Fast, Backbone Fast and UDLD In this lesson, we will learn other STP Convergence Mechanisms; Loop Guard, Uplink Fast, Backbone Fast and UDLD. Now, let's learn each of these mechanisms and their roles one by one.     Loop Guard   Loop…


bpdu-guard-example
STP Convergence Mechanisms - Part 1

Portfast, Root Guard, BPDU Filter and BPDU Guard   The are various mechanims used with STP to provide stable STP topology. In this lesson, we will focus on what are these STP Mechanims and what they do to provide a stable STP Topology.   So,…


cisco-dns-server-example
DNS Configuration on Cisco Routers

How to Configure DNS on Cisco Routers?   To use DNS, firstly, we must configure a DNS Server. In a network, we can confgiure a router as a Domain Name System Server. In this lesson, we will talk about Cisco DNS Server Configuration, we will…


dns-operation
Domain Name System Overview

DNS Overview DNS (Domain Name System) is a common protocol that is used to translate hostnames to the IP addresses. Normally, we use website addresses on our browsers. These website addresses are resolved to IP addresses by DNS. Without DNS, we could not reach this…


traffic-policing
Policing and Shaping in QoS

In networks, the traffic increses for a variety of reasons. Some Quality of Service Adjustments are done to handle this increases. During these increases, if the capacity of the link is exceeded, then the traffic on this link is dropped. Without any arrangement, this drop…


Classification and Marking in QoS

To use Quality of Service for a traffic, firstly traffic need to be identified. With this identification, traffic types are classified and then they are marked with an understandable way by the network. This process is basically called "QoS Classification and Marking". Another important mechanisms…


traffic-types
Quality of Service Overview

What Does QoS Stand For? This is th most ask questions by Network Engineers, especially the Newbies, What Does QoS Stand For?QoS (Quality of Service) is the general name of a concept , which is used to optimize networks with different priority levels to different…


tacacs-messaging
TACACS+ Overview

What is TACACS+? TACACS+ (Terminal Access Controller Access-Control System) is a AAA protocol that is developed by Cisco. After a while TACACS+ has became a standard protocol that is supported by all vendors. There is also another standard protocol called RADIUS. If you would like…


radius-messaging
RADIUS Overview

What is RADIUS? RADIUS (Remote Access Dial-In User Service), RADIUS Protocol is a AAA (Authentication, Authorization, Accounting) protocol that is developed by IETF. RADIUS is a standard base AAA Protocol supported by all vendors. Mainly, the job of RADIUS is providing Secure Network Access. RADIUS…


radius-versus-tacacs
AAA Protocols : RADIUS and TACACS+

TACACS versus RADIUS Networks need to be protected against any unknown access. In other words, network administrators need to control the users that can access to the network. They need to check who they are, what are they allowed for and what did they do.…


cir-pir-eir
What is CIR and PIR?

In Metro Ethernet links, the traffic rates are not stable always. Sometimes the traffic rates increase, sometimes they decrease. To overcome and manage this issue, some key parameters are used. This parameters provide to determine guaranteed (without loss) traffic rates, burst traffic rates and drop…


metro-ethernet-services
Metro Ethernet

Metro Ethernet Metro Ethernet Overview Simply, Metro Ethernet is an enhanced version of Ethernet that is used between long distances with higher bandwidths. Metro Ethernet can be used both by companies to connect their sites and by end users to connect Internet. Ethernet is a…


PPPoE-session-establishment
Point-to-Point Protocol over Ethernet (PPPoE)

What is PPPoE? Point-to-Point Protocol over Ethernet (PPPoE) is a network protocol which encapsulates PPP frames inside Ethernet. With PPPoE, multiple hosts in an Ethernet LAN are connected to the Provider Network and throughout this network, they connect Internet. Here, this connection is done over…


sdn-versus-nfv
NFV and SDN

NFV and SDN NFV and SDN are two important concepts for today’s and future network. So, why are they used together? To understand this, let’s firtly look at their main benefits. SDN (Sotware-Defined Networking), • Offer a new architecture by decoupling Control Plane and Data…


NFV-Architecture
NFV Infrastructure

NFV Infrastructure Network Functions Virtualization (NFV) system consists of three key Infrastructure elements. These elements are: • NFVI (Network Functions Virtualization Infrastructure) • VNFs (Virtual Network Functions) • MANO (Management and Orchestration) Let’s talk about each of these elements one by one. NFVI (Network Functions…


without-nfv-with-nfv
NFV Overview

NFV Overview Basically, Network Function Virtualization (NFV) is a network concept that replaces specialized hardwares (routers, firewalls, load balancers etc) used in classical network architecture with softwares running on servers that does the same jobs. NFV was defined at 2012 by a group named Industry…


ipv6-redirection
IPv6 NDP (Neighbour Discovery Protocol)

What is IPv6 NDP? IPv6 NDP (Neighbor Discovery Protocol) is the Protocol that provide Network Nodes’ Discovery as its name implies. In the IPv4 World, we were using ARP, but in IPv6 world there is no ARP. Instead, ICMP based NDP is used for Neighbor…


Open-Flow-Connection-Establishment
Open Flow Messages

Open Flow Messages Open Flow Control Messages are based on TCP. To set up Open Flow communication, Open Flow Controller listens TCP ports 6633/6653. There are five main parts in Open Flow Messages. These are given below: • Version • Type • Message Lenght •…


Open-Flow-Switch
Open Flow Components

Open Flow Components There are two main components used with Open Flow. These are: • Open Flow Switches • Open Flow Controllers Open Flow Switches Open Flow provide the seperation of Control Plane and Data Plane. Open Flow Switches are used in Data Plane Section.…


Open-Flow
Open Flow Overview

Open Flow Overview Open Flow is a Standard based Layer 2 Communication protocol used between Controller and Switch in SDN. It allows to access to the Forwarding Plane of the network devices. OpenFlow was standardised by a non-profit consortium, Open Networking Foundation (ONF) that has…


huawei-floating-static-routing
Floating Static Route and Default Route Configuration

In this lesson we will focus on Huawei Floating Static Route and Default Route on Huawe Routers. We will give examples for How to configure Huawei Floating Static Route Configuration and Default Route Configuration. Let's start.     You can test youself with Huawei HCIA…


huawei-static-routing
Huawei Static Routing and Load Balancing

Huawei Static Routing   Static Route is a manual simple route configuration. In Huawei Routers, Static Routing is similar to the other platforms like Cisco Static Routing, Nokia Static Routing etc.   The concept is simple: Write “ip static route” Add “the Destination IP and…


with-ecmp
ECMP Configuration on Nokia Routers

ECMP Configuration on Nokia Routers In this lesson, we will talk about ECMP (Equal Cost Multipath) Configuration on Nokia Routers. To explaint ECMP better, we will use the below MPLS Topology. As you can see, from Router A to Router B, there are three different…


huawei-vrp
Huawei VRP (Versatile Routing Platform)

What is Huawei VRP (Versatile Routing Platform) Huawei VRP Overview VRP (Versatile Routing Platform) is the Operating System that many Huawei devices operate. This is like Cisco’s IOS, Nokia's (Alcatel-Lucent’s) TiMOS and Juniper’s JUNOS. There is only one difference. There is no “OS” at the…


huawei-file-system
Huawei Router File System

Huawei Router File System In all network device, there is a File System. In Huawei routers and switches there is also a File System. File System stores many important files for the system like sytem files, configuration files, software upgrades etc. File System Commands Almost…


tranport-and-service-labels
MPLS VPN Labelling

MPLS VPN Basics MPLS mechanims uses two types MPLS Label to accomplish MPLS VPN Services. These are the two tunnel mechanims in MPLS mechnism. A Tunnel and many sub service tunnels in it. Two types MPLS Labels that are used in MPLS VPN Services are…


push-swap-pop
MPLS Label Switching

MPLS Label Switching MPLS Technology uses different routers for different roles. There are some common router types that are in these roles. The names of these routers are changing in different vendor naming, but the main role is same. These common routers are given below:…


ipv6-configuration-on-nokia
IPv6 Configuration on Nokia Routers

In this Nokia Configuration Example, we will see IPv6 Configuration on Nokia Routers (Formerly Alcatel-Lcuent Routers). For this simple IPv6 Address configuration example, we will use the below Lord of The Rings Topology : ) To compare with Juniper IPv6 Configuration, you can also check…


juniper-ipv6-example
IPv6 Configuration on Juniper

IPv6 Configuration on Juniper In this configuration example, we will configure IPv6 on Juniper Routers. For our Juniper IPv6 Configuration Example, we will use the below IPv6 Topology. For our Juniper IPv6 Configuration Example, we will use the below IPv6 Addresses. Router 1 Interface Ge…


distributed-service-mirroring-example
Remote Service Mirroring Configuration

Remote Service Mirroring Configuration Remote Service Mirroting is the other Service Mirroring type. As we have talked about before, Remote Service Mirroring is the service mirroring that is done between different devices. In this lesson, we will configure an example topology for Remote Service Mirroring.…


service-mirroring-example
Local Service Mirroring Configuration

Local Service Mirroring Configuration In this article, we will focus on Nokia (Alcatel-Lucent) Service Mirroring Configuration. As we have talked about before, there are two Service Mirroring Type. Local Service Mirroring and Remote Service Mirroring. Here, we will configure Local Service Mirroring. Local Service Mirroring…


service-mirroring
Nokia Service Mirroring

Service Mirroring During troubleshooting activities, different tools are used to determine the cause of a problem. Mirroring is also a troubleshooting tool for these activities. In Nokia (Alcatel-Lucent) world, mirroring term corresponds “Service Mirroring”. As you can understand from the maining, basically, mirroring means copying…


sdn-terminology
SDN Terminology

SDN Terminology In this SDN Terminology lesson, we will define the main terms used in SDN (Software-Defined Networking). SDN : Software-Defined Networking. It is a new SDN network architecture that comprised different network technologies to build a flexible, scalabile, agile and easy manageble networks. SDN…


what-sdn-brings
What Will SDN Bring?

New Features Coming With SDN Software-Defined Networking (SDN) brings many innovation to the Traditional Networks. It provides this with newly defined architecture. So, what will sdn bring? What are these SDN features? These are: • New architecture that seperate Control Plane and Data Plane, •…


SDN-planes
SDN Architecture Components

SDN Architecture Components SDN Architecture consist of different components. Here, we will see all these SDN Architecture Components and their duty one by one. What are these SDN Components? The basic SDN Terms, SDN Components are: • Network Devices (Data Plane) • SDN Conroller (Control…


traditional-versus-sdn
Traditional Network Drawbacks Versus SDN

In this lessons, we will talk about SDN versus Traditional Networks. We will give the drawbacks of traditional networks and give the benefits coming with SDN. Till recent years many companies were using Traditional Network Architectures. They are still widely used in the World. But…


sdn-controlling-the-data-plane
What is SDN ?

SDN Overview SDN (Software-Defined Networking) is a new network architecture that comprised different network technologies to build a flexible, scalable, agile and easy manageble networks. With its new view, SDN decouple network into two plane as Control Plane and Data Plane. This provide a central…


Ethernet-Frame-Header-Types
Ethernet Basics

Ethernet is the most used technology in LANs in network world. There are various technologies can be used on LANs like Ethernet, Token Ring, FDDI. But the most popular and widely used one is Ethernet. In your career, you will work on Enternet more than…


basic-home-lan
Local Area Networks

There are three common network types according to their coverage size. These are, LANs, MANs and WANs. LAN is the smallest sized network in these three network type. LAN (Local Area Network) is a small network that is built within a small geographical area. A…


switches
Switches

Switches Switches are one of the most important network equipments of a computer network. It is the main device of a LAN (Local Area Network). In this lesson we will see Switches. You can alse check wiki definition, here.   Switch is a Layer 2,…


how-gratuitous-arp-works-4
Gratuitous ARP

Gratuitous ARP, is the ARP that is used to inform the network about IP to MAC Mappings after a change. It is sent as Broadcast message to all the nodes in the network. The usage of Gratuitous ARP is a little diffeerent than ARP (Address…


how-proxy-arp-works-3
Proxy ARP

Basically Proxy ARP is the ARP that is used between one more networks. In other words, we can say that Proxy ARP provides data link dicovery between different networks. Here, we will explain Proxy ARP with an example. For our Proxy ARP example, we will…


how-arp-works-2
Address Resolution Protocol (ARP)

ARP (Address Resolution Protocol) is a Layer 2 Protocol. Layer 2 uses Physical addresses (MAC addresses) for the communication. Here, ARP Protocol is used to convert a given IP address to the related hardware address (MAC Address) to provide this. This important duty makes this…


huawei-aaa-configuration
Huawei AAA Configuration

AAA Configuration is done basically in similar ways in different vendor equipments. But for specific vendors, the configuration commands are a little different than the other. Here, we will focus on Huawei Routers and we will configure AAA on a Huawei Router. We will learn…


lag-saturation
Ethernet Redundancy with LAG

Redundacy is very important for a network. In many networks, redundacy is provided in different type of topologies or protocols. Here, we will talk about redundancy on Ethernet. In this lesson, we will learon one of these redundancy mechansims, Link Aggregation (LAG). There are two…


GLBP-example
GLBP Configuration on Cisco

GLBP Cisco Configuration Example GLBP is a Cisco Proprietary Firsth Hop Redundancy Protocol. In this lesson, we will configure GLBP on Cisco devices with a GLBP Cisco Configuation Example. For our GLBP Example, we will use the below topology. For GLBP Cisco Configuration, there are…


GLBP
GLBP (Gateway Load Balancing Protocol)

GLBP Overview GLBP (Gateway Load Balancing Protocol) is an another First Hop Redundancy Protocol. It is a Cisco proprietary protocol like HSRP. So ,you can only use Gateway Load Balancing Protocol on Cisco devices. Here, we will learn the details of the protocol and we…


first-hop-redundancy-protocols
First Hop Redundancy Protocols (FHRPs)

First Hop Redundancy Protocols (FHRPs) Redundancy is a common point for today’s High Available Networks. First Hop Redundancy is one of the redundancy mechanisms that provide high available and always on networks. These redundancy mechanims provide redundancy by providing multiple alternative paths to the destinations…


hsrp-topology
HSRP Configuration on Cisco IOS

HSRP Configuration Example on Cisco Routers In this section we will do an HSRP Cisco Configuration to understand the issue better. To do this we will use the below HSRP topology. At the end of this article, you will find the GNS3 configuration lab of…


vrrp-configuration
VRRP Configuration on Cisco

How to Configure VRRP on Cisco Switches? In this VRRP exampleCisco Configuration Example, we will work on Cisco IOS and configure VRRP (Virtual Router Redundancy Protocol) on Cisco Routers. Configuring VRRP Protocol is like configuring Cisco Proprietary protocol HSRP. There are only small command differences.…


vrrp-master-backup-selection-1
VRRP (Virtual Router Redundancy Protocol)

VRRP Overview VRRP (Virtual Router Redundancy Protocol) is a standard based First Hop Redundancy Protocol. It eliminates the single point of failure by using multiple optional devices. Traffic prefers going through the selected Master device. You can reaach the related rfc here. If a failure…


HSRP-topology
HSRP (Hot Standby Router Protocol)

HSRP (Hot Standby Router Protocol) HSRP(Hot Standby Router Protocol) is a Cisco proprietary First Hop Redundancy protocol. HSRP first hop redundancy mechanism provide alternative path as a proactive action for any failure on a device. With HSRP mechanism, even if a failure occurs on one…


mld-querier-selection-step-2
MLD Operations

MLD Operations In this lesson, we will talk about the specific operations of MLD. We will see; • MLD Querier Selection • MLD General Query, Group Query and Report Mechanism • MLD Multicast Group Joining Operation • MLD Multicast Group Leaving Operation • MLDv2 Source…


cisco-mld-configuration
MLD Configuration on Cisco

MLD Configuration on Cisco In this lesson we will configure Multicast Listener Discovery (MLD) on Cisco devices. Out Multicast Network will be like below: Now, let’s start to configure MLD. MLD Version The default version of MLD is version 2. But to show you, we…


MLD-topology
MLD (Multicast Listener Discovery)

What is MLD? Multicast Listener Discovery (MLD) is the IPv6 Multicast Group Membership Protocol. It works between the Multicast Routers and the Multicast hosts with Query,Report and Leave Messages. MLD works between MLD Querier router and the hosts. It controls Multicast member joins and leaves.…


huawei-vlan-routing-l2-switch
VLAN Routing with Layer 2 Switch and Router on Huawei

Huawei VLAN Routing with Layer 2 Switch is done with the help of a Layer 3 device, a router. Mainly, in the router, in layer 3, gateways are created for the VLANs. These gateways are the subinterfaces under the physical interface. For each subinterface, an…


huawei-vlan-routing-l3-switch
VLAN Routing with Layer 3 Switch on Huawei

In this lesson we will learn Layer 3 VLAN Routing with VLAN Routing Huawei Configuration Example. We do not need any other Layer 3 device for VLAN Routing with Layer 3 Switch. Because Layer 3 switch can achieve this routing facility. Here, instead of subinterface,…


juniper-static-routing
Static Routing on Juniper Routers

Static Routing on Juniper Routers Static Routing is the manual route configuration on routers. In JUNOS, static route configuration is done similarly with other Network operating systems. After “static route” command, the destination network is mentioned and then next-hop ip address is given. This static…


huawei-advanced-acl-example
Huawei Access-Lists (ACL)

Huawei Access-Lists In this configuration example, we will learn the Access List (ACL) Configuration on Huawei Routers. Configuring Access Lists has some basic steps and we will cover all these steps in this article. First of all, let’s remember the Access List types. There are…


alcatel-nokia-router-cli
Basic Nokia Service Router Configuration

How to Configure a Nokia Service Router?   Command Line Interface (CLI) is the interface that we can configure, manage and maintenance router operations manually. Each Network Engineer works with Command Line Interface (CLI) in daily configuration activities.In this lesson, we will learn Basic Nokia…


iana-rirs-nirs-lirs-isps
Basic Terms for Internet

Like millions of people on the world, as a network engineer we are also using Internet. But a little different from other people, we also need to know some common terms of our main working area, Internet. Let’s begin and see what are the Basic…


CGMP-Operation-2
Cisco Group Management Protocol (CGMP)

Cisco Group Management Protocol (CGMP) Cisco Group Management Protocol (CGMP) is a Cisco proprietary Layer 2 protocol used for Layer 2 efficiency at layer 2. Basically whenever a host want to join a multicast group, it send IGMP Join message to the target group. This…


IGMP-example-1
IGMP Snooping

What is IGMP Snooping? IGMP Snooping is a Multicast mechanism that runs on Layer 2 switch. This mechanism checks the IGMP join, leave messages and record the information about user about the group that it joins or leaves. With this mechanism, Multicast Group Joins and…


cisco-igmp-example
Cisco IGMP Configuration Example

In this configuration example, we will configure Cisco Catalyst Switch for IGMP (Internet Group Management Protocol). As you know IGMP is used to manage host memberships to the multicast groups. This is done at the edge switch in the multicast network. So, we will do…


IGMP-overview
IGMP (Internet Group Management Protocol)

What is IGMP? IGMP (Internet Group Management Protocol) is a Host-Router Multicast Signalling Protocol that provides dynamically registration of the hosts to the desired Multicast Groups. With IGMP, Host requests to join to the Multicast Groups. This join request comes to the DR (Designated Router).…


JUNIPER-BGP-next-hop-self-conf
Next Hop Self Command on Juniper Routers

BGP Next Hop Self Configuration on Juniper Routers In BGP Configuration, there are some key commands and concepts used for a better BGP operation. BGP Next Hop Self is one of these commands used in Juniper routers. When an eBGP route advertised to vie iBGP,…


Juniper-import-export-policy
Routing Policy Configuration on Juniper Routers

Routing Policy Configuration on Juniper Routers Routing Policies are the rules that allows you to control and modify the default behaviour of the routing protocols like RIP, OSPF, IS-IS etc. With this control and modify mechanims, you can arrange the routing facilities for your network…


Juniper-RIP-configuration-example
RIP Configuration on Juniper

RIP Configuration on Juniper In this lesson, we will configure Juniper routers for RIPv2. RIP is the simplest Routing Protocol and configuring RIP on Juniper Routers need a couple of simple steps. We will see each of these steps one by one. For our Juniper…


Juniper-ISIS-configuration-example
ISIS Configuration on Juniper

How to Configure ISIS on Juniper Routers? IS-IS Protocol is a very good Routing Protocol. But it is rarely used nowadays. Instead ISIS Protocol, OSPF is generally used Routing Protocol. By the way, there are still some common Service Providers are using ISIS. So, it…


Juniper-preferences
Routing Tables of Juniper

Routing Tables of Juniper There are multiple Routing Tables in Juniper Routers. These Routing Tables and their roles are given below: • inet.0 - Stores IPv4 Unicast Routes. • inet.1 - Stores IPv4 Multicast Routes. • inet.2 - Stores IPv4 Unicast Routes used for Multicast…


Juniper-OSPFv2-configuration-example
Single Area OSPF (OSPFv2) Configuration on Juniper

Single Area OSPF (OSPFv2) Configuration on Juniper In this lesson, we will see the OSPFv2 Configuration on Juniper for Single Area OSPF.  For this OSPF Example, we will use the below topology consist of four OSPF routers. All of the Interfaces of these routers  (…


Juniper-BGP-configuration-example
Basic BGP Configuration on Juniper

BGP is one of the widely used Routing Protocol. It is also known as Internet Protocol. In this Juniper BGP Configuration Example, we will configure BGP on Juniper Routers. We will use the below simple topology for our Juniper BGP Configuration Example. We will see…


Multicast-MAC-addres-creation
Multicast MAC Addresses

What is Multicast MAC Address? Multicast MAC Addresses are the MAC addresses start with 0100:5e . As you know, MAC address has 48 bits and consist of vendor code and host code. But for one MAC address, only the last 23 bits of that MAC…


ip-multicast-addresses
Multicast IP Addressing

Multicast IP Addressing Multicast Addresing is the addressing that is used for Multicast Groups. We can divide Multicast Addressing into two: IPv4 Multicast Addressing IPv6 Multicast Addresing These addresses identifies the destination of Multicast traffic. In other words, they show the Multicast Groups. The Multicast…


unicast-broadcast-multicast-anycast
Unicast, Broadcast, Multicast, Anycast

There are different transmission techniques in communication if we divide communication according to the receivers. These communication techniques are: Unicast Multicast Broadcast Anycast   Unicast is the communication that there is only one receiver. This is one-to-one communication. Multicast is the communication that there is…


bfd-mechanism-failure-example
BFD Operation

BFD Operation BFD (Bidirectional Forwarding Detection) mechanism uses packets to inform both ends that the protocol is configured. With these packets, BFD provide basic connectivity and the parameter negotiation. The main role of BFD is detecting the link failures by sending BFD packets in regular…


bfd-session-establishment
Bidirectional Forwarding Detection

Bidirectional Forwarding Detection (BFD) BFD (Bidirectional Forwarding Detection) is basically another Hello protocol based on UDP that detects link failures on forwarding plane. BFD runs on top of Layer 2 protocols that is in use between two adjacent systems. BFD mechanism is independent from media,…


Dynamic-NAT-configuration
NAT Configuration on Huawei Routers

Huawei NAT Configuration   NAT (Network Address Translation) is a concept used to translate Private block IP addresses to the Public IP Addresses. By doing this, it provides internet connection to the devices that has Private Blcok IP Addresses. In this lesson we will learn…


huawei-link-aggregation-l3
Link Aggregation on Huawei Routers

Link Aggregation is one of the important lessons of networking. This is also used too much in network operations. In this lesson, we will talk about Huawei Link Aggregation Configuration. We will show Huawei Link Aggregation Configuration with two examples. One of these examples will…


TCP versus UDP

TCP vs UDP Before, we have talked about TCP and UDP as an overview. Here, we will compare these two protocols’s main characteristics and we will see TCP vs UDP. This comparison is very important and generally a question asked in a Network Engineering Technical…


udp-header
UDP (User Datagram Protocol)

UDP Protocol UDP Protocol (User Datagram Protocol) is another Tranport Layer Protocol. It is simpler than TCP. We will also see the differences of these two protocols in TCP vs UDP lesson. It is generally used in unsenstive communications and real time applications that do…


tcp-3-way-handshake
TCP (Transmission Control Protocol)

Transmission Control Protocol (TCP)   TCP (Transmission Control Protocol) is the most important Transport Layer Protocol. It is also one of the important Protocols of network world.  The other Transmission protocol is UDP. We will talk about these two protocols in TCP vs UDP lesson.…


svi-operation
Switch Virtual Interfaces

Inter VLAN Routing, in other words Routing between VLANs can be achieved by SVIs (Switch Virtual Interfaces). Here, we need to have a Multi Layer Switch. Layer 2 switches can also have SVI, but only one.This is the default switch management SVI created for VLAN…


router-on-stick-operation
Inter VLAN Routing with Router on Stick

What is Inter VLAN Routing? VLANs are used to separate different subnetworks in a big network. If you divide a network with VLANs, each of these new VLANs become a different network. Devices reside in different networks, can not communicate with the other devices reside…


network-cable types
Network Cabling

Network Cabling Cabling is the Layer 1 of OSI Model. One of the most important part of a network. With the media the network traffic can travel from one end to the other end. This can be done through wireless networks also. But cabling is…


broadcast-and-collision-domains
Hubs, Switches and Routers

We have talked about the Network Devices before. Now, let’s go deeply with some of the important ones. Hubs, Switches and Routers. Here, we will focus on Ethernet Hub vs Switch vs Router. We will learn the main similarities and the differences of these three…


network-devices
Network Devices

Network Devices In computer networks, many different network devices are used. These devices used in computer networks has different characteristics. Each of them provide a specific role. What are these network equipments? Basically these network equipments are : • Hubs • Bridges • Layer 2…


Network-Topologies
Network Topologies

Network Topology Types   Basically a network topology means that, connection style of the network nodes. To build a Network, we need a network topolog. There are different LAN Network Topologies that can be used for different network scenarios. What are these Network Topologies?  …


huawei-ospfv3-configuration
OSPFv3 Configuration on Huawei

In this Huawei OSPFv3 Configuration lesson, we will configure OSPFv3 on Huawei routers. For our OSPFv3 Configuration Example, we will use the below OSPFv3 Network Topology:   Let’s start our Huawei OSPFv3 Configuration on these three Huawei Routers.   You can download this configuration on Huawei…


huawei-ripng-configuration
RIPng Configuration on Huawei

In this lessons RIPng Configuration Huawei Example, we will focus on the configuration of the basic IPv6 Routing Protocol, RIPng. We will learn RIPng Configuration on Huawei routers. In another lesson, we will learn also OSPFv3 Configuration on Huawei routers.   For our RIPng Configuration…


nokia-bgp-configuration
Basic BGP Configuration on Nokia 7750 SR

How to COnfigure BGP on Nokia 7750 Service Routers?   In this lesson, we will see How to Configure BGP on Nokia 7750 Service Routers. Here, we will use Nokia 7750 Service Routers. For our Nokia BGP Configuration Example, we will use the below topology.…


nokia-ospf-configuration
Single Area OSPF Configuration on Nokia 7750 SR

How to Configure OSPFv2 on Nokia Service Routers?   In this lesson, we will see How to Configure Single Area OSPF on Nokia (Formerly Alcatel-Lucent) Service Routers. We will learn Nokia OSPF Configuration. Here, we will use Nokia 7750 Service Routers. For our Single Area…


Nokia-7450-ESS-Family
Nokia 7450 ESS Family

Nokia 7450 ESS Family Nokia 7450 ESS (Ethernet Service Switch) Family is the high capacity Multi Layer Switch Family that are mainly used in Backbone Networks of various Service Providers.  There are various members of 7450 SR Family. Each of these has different capability and…


Nokia-7750-SR-Family
Nokia 7750 Service Router Family

Nokia 7750 Service Router Family   Nokia 7750 SR (Service Router) Family is the high capacity Service Router Family that are mainly used in Backbone Networks of various Service Providers. There are various members of 7750 SR Family. Each of these has different capability and capacity.…


nokia-7950-XRS-40
Nokia 7950 XRS Family

Nokia 7950 XRS Family Nokia 7950 XRS (Extensible Routing System) Family is the last and highest capacity Routers of Nokia (Formerly Alcatel-Lucent). These high capacity Nokia Routers are used in the Backbone Networks of Service Providers. There are various members of Nokia 7950 XRS Family.…


Nokia-Service-Router-Components
Nokia Routers and Multi Layer Switches

Nokia Routers and Multi Layer Switches   Nokia (Formerly Alcatel-Lucent) has a very competitive and reliable network devices like its top rival vendors,Cisco, Juniper and Huawei. Especially Routers and Multi Layer Switches of Nokia are high capacity and widely used network equipments in many Service…


ip-filter-example
Nokia IP Filter Configuration Example 2

Almost all Network Engineers have realized that, they can access specific subnets and devices but they can not access the others. One of the ways to do this is IP Filters. With IP Filters, specific subnets can be restircted for some services and can be…


ip-filter-restrict-icmp
Nokia IP Filter Configuration Example 1

Here, we will show the IP Filter Configuration on Nokia (Formerly Alcatel-Lucent) Service Routers with an example. To do this, we will create an IP Filter on S1. And then deny the incoming ICMP traffic from a specific source prefix. For example such a configuration…


ip-filter-configuration-nokia
IP Filters (Access-Lists)

IP Filters, are the rules that force the router to permit or to deny mentioned IP addresses, ports, protocols etc. from a source to a destinatio in Nokia (Formerly Alcatel-Lucent) world. IP Filters is known as Access-List (ACLs). But while working with Alcatel-Lucent devices, generally…


osi-versus-tcpip
TCP/IP Model

TCPIP Model Overview TCP IP Model is another important referance model beside OSI Model in network world. OSI Referance Model was Seven Layered model, TCPIP Model is Four Layered or Five Layered Model. The four layer model is old one. The new one is five…


osi-model-headers
OSI Referance Model

OSI Model and TCP/IP Model Communication in a network has different layers and these different layers are mentioned in two different models. In other words,there are two common models in computer networking. These two common models are OSI Model and TCP/IP Model. As a beginner,…


ppp-session-establishment
HDLC and PPP

HDLC and PPP HDLC (High-Level Data Link Control) HDLC (High-Level Data Link Control) is a Layer 2 WAN Encapsulation Protocol that is used on syncronous data links. It is the simplest WAN Protocol that can connect your remote offices over leased lines. HDLC has two…


cisco-ppp-configuration
PPP Configuration on Cisco

PPP Configuration on Cisco Routers In this lesson, we will talk about PPP Configuration (Point-to-Point Protocol Configuration) on Cisco Routers. We will learn configuration commands for this general standard wan connection. In our PPP Configuration example, we will use the below basic topology: Now, do…


cisco-hdlc-configuration
HDLC Configuration on Cisco

In this lesson, we will talk about HDLC configuration on Cisco Routers. Cisco HDLC has a different proprietary field in the data field of the protocol. For our Cisco HDLC Configuration example, we will use the below basic topology: Let’s start to configure Cisco HDLC…


wan-topology
WAN and WAN Technologies

WAN and WAN Technologies WAN (Wide Area Network) is the network that connects the geographical far areas. It can be used for a client to connect to the corporate network, connections between the branch offices of a company and similar wide area connections etc. As…


huawei-ppp-configuration
PPP Configuration on Huawei

In this lesson, we will talk about PPP configuration on Huawei Routers. For our PPP Configuration example, we will use the below basic topology:   Orderly, we will do the below configuration for our PPP Configuration Example:   1) Enabling PPP 2) PAP and CHAP…


huawei-hdlc-configuration
HDLC Configuration on Huawei

In this lesson, we will talk about HDLC configuration on Huawei Routers. For our HDLC Configuration example, we will use the below basic topology:     Orderly, we will do the below configuration for our HDLC Configuration Example:   1) Enabling HDLC 2) Verifying HDLC…


rstp-port-roles
Rapid Spanning Tree Protocol (RSTP)

Rapid Spanning Tree Protocol (RSTP) is the second STP type. It is a fast converged version of Spanning Tree Protocol as its name implies. RSTP bypass the Blocking State and Listenning State of STP, and provide Forwarding State in 15 Seconds. So, the convergence time…


stp-port-selection
Spanning Tree Protocol Operation

Spanning Tree Protocol (STP) Operation is done with various sub processes. In this lesson, we will talk about each of these sub processes and explain STP Operation detailly. We will configure STP with Packet Tracer in another lesson.   STP Switch Types First of all…


l2-redundancy-broadcast-storm
Spanning Tree Protocol (STP)

STP Overview In Layer 2 domain, redundancy is an important case. To provide redundant links, multiple connections are done between switches. But this redundancy mechanism can cause an undesirable situation that is called “L2 Loop”. To provide L2 redundancy and to avoid L2 loops, Spanning…


huawei-rstp-example-topology
RSTP Configuration on Huawei

In this lessons, we will focus on RSTP (Rapid Spanning Tree Protocol) Configuration on Huawei Switches. For our Huawei RSTP Example, we will use the basic topology below. Let’s start to configure RSTP on one of these Huawei Switches, Switch 1.   You can download…


huawei-stp-configuration
STP Configuration on Huawei

Huawei STP Configuration In this lessons, we will focus on STP (Spanning Tree Protocol) Configuration on Huawei Switches. For our Huawei STP Example, we will use the basic topology below. In another lesson, we will also learn Huawei RSTP Configuration.     Let’s start to…


nokia-ies-service-configuration-example
IES (Internet Enhanced Services) Configuration

In this article, we will focus on how to configure IES (Internet Enhanced Services) on Nokia Service Routers, we will learn Nokia IES Configuration. Here, our Service Router will be Nokia SR 7750. For our IES Example, we will use the below topology: Now, let’s configure…


alcatel-ies-service
IES ( Internet Enhanced Services)

Internet Enhanced Services (IES)   IES (Internet Enhanced Services) is an Nokia (Formerly Alcatel-Lucent) Service that provide Internet Access to the Customers. Here, from the customer view, IES is a connection point of the customers. In this lesson we will learn the theorical parts, configuration…


aaa-authentication-table
Authentication, Authorization, Accounting (AAA)

What is AAA? AAA is the abbreviation for Authentication, Authorization and Accounting terms. This mechanims provide security and some user specific steps for a user that access to the Enterprise Network. In an Enterprise Network, AAA is a very important security implementation. YOu can reach…


alcatel-interface-configuration
Interface Configuration on Nokia Routers

To configure an interface on Nokia Routers, on ALU TiMOS, is a little different that we do on Cisco routers, on Cisco IOS. In Nokia Service Routers, ports are like the interfaces in Cisco devices. Only its name is changing. Beside, the “Interface” name is…


icmp-header-how
ICMP (Internet Control Message Protocol)

Internet Control Message Protocol is a Layer 3 Protocol. In IP networks, devices send ICMP encapsulated in IP packet. The general role of ICMP Protocol is generate error packets about the network devices and it is used in troubleshooting activities. As a summary, ICMP supports…


cisco-gvrp-configuration
GVRP Configuration on Cisco

GVRP Configuration on Cisco In this configuration example, we will focus on how to configure GVRP on Cisco. Here, for our GVRP Configuration Example, we will use the below topology. Let’s start our GVRP Configuration on each of these Switches. Switch A Confguration Firstly, we…


gvrp-configuration-huawei
GVRP Configuration on Huawei

GVRPis the standard based counterpart of Cisco VTP. In this configuration example, we will focus on how to configure GVRP on Huawei switches. For out Huawei GVRP Configuration example, we will use the topology below.     On important reminding. Do not think that there…


cisco-mvrp-configuration
MVRP Configuration on Cisco

MVRP Configuration on Cisco In this configuration example, we will focus on how to configure MVRP on Cisco switches. Here, we will use Cisco Catalyst 6500 series switches. For our MVRP configuration example, we will use the below topology. Let’s start our MVRP configuration. Switch…


juniper-mvrp-configuration
MVRP Configuration on Juniper

MVRP Configuration on Juniper MVRP is the protocol that provides dynamic VLAN registration and creation. The counterparts of MVRP are Cisco VTP and standard GVRP. MVRP is an enhanced version of these protocols. Here, we will focus on how to configure MVRP in Juniper switches.…


mvrp-registration-modes
MVRP (Multiple VLAN Registration Protocol)

MVRP (Multiple VLAN Registration Protocol) MVRP Overview MVRP (Multiple VLAN Registration Protocol) is the counterpart protocol of Cisco VTP and GVRP (GARP VLAN Registration Protocol). It is the last standard VLAN Registration Protocol, so it has richer properties than the other protocols. MVRP is the…


gvrp-and-vlans
GVRP (GARP VLAN Registration Protocol)

GVRP (GARP VLAN Registration Protocol) GVRP Overview GVRP(GARP VLAN Registration Protocol) is a protocol that is used to control VLANs, dynamic VLAN registration and VLAN prunning in a network. GVRP does this dynamically VLAN management with exchanging VLAN information and prunning unnecessary broadcast and unicast…


huawei-ipsec-configuration-example
IPSec VPN Configuration On Huawei

In this lesson we will see IPSec VPN Configuration On Huawei Routers. IPSec configurations has some basic steps.   These steps are given below: IPSec Authentication and Encryption Configuration IPSec Policy Configuration IPSec Interface Association IPSec Configuration Verification   For our Huawei IPSec VPN Configuration,…


ipsec-ah-esp-modes-k
IPSec VPN Overview

IP Sec VPN provides a Private and Secure IP communication over a Public Network Infrastructure. With this technology, different sites or users in different geographical areas can communicate over a network and this provides a very good resource utilization. Here, we will learn tjheorical parts…


huawei-snmp-example-k
SNMP Configuration on Huawei

How to Configure SNMP on Huawei Routers?   In this article we will focus on Huawei SNMP, How to Configure SNMP on Huawei devices. We will use the below simple topology and we will manage a router in Network Management System via SNMP.   Here…


snmp-architecture
SNMP – Overview

Simple Network Management Protocol (SNMP) is the main protocol of Network Management. With SNMP, network devices are easily managed and conttolled by a central mechanism. It is an application protocol that provide the messaging between the controlled device and the management system. In this lesson,…


vpws-cpipe
VPWS (Virtual Private Wire Service) – Fpipe, Apipe and Cpipe Configuration

VPWS Configuration Examples In the previous articles, we have seen Epipe Configuration Examples,  Local Epipe and Distributed Epipe Configurations. Here, we will focus on another VPWS types, Fpipe, Apipe and Cpipe.     Fpipe Configuration   VPWS Fpipe Configuration is similar to Epipe Configuration with…


distributed-epipe-configuration -k
VPWS – Distributed Epipe Configuration

Distributed Epipe Configuration In the previous Epipe Example, we have talked about "Local Epipe Configuration". So, we have used only one device and our Epipe service was in this device. Here, we will use two router and we will show the "VPWS Distributed Epipe Configuration".…


local-epipe-configuration
VPWS – Local Epipe Configuration

Local Epipe Configuration In the previous part we have talked about the VPWS service of Nokia. Now, we will focus on the configuration of the VPWS Service on Nokia devices. In this lesson, we will learn Local Epipe Configuration. In the next lesson, we will…


Virtual-Private-Wire-Service
VPWS (Virtual Private Wire Service)

What is VPWS? VPWS (Virtual Private Wire Service) is Point-to-Point Layer 2 MPLS VPN Service of Nokia Service Routers. The other Layer 2 VPN Service is VPLS that is explained in another lesson. Here, we will focus on Virtual Private Wire Service . In another…


Huawei-gre-tunnel-example-k
Huawei GRE Tunnel Configuration

How to Configure GRE Tunnel on Huawei Routers?   In this lesson, we will use Huawei Routers, to configure GRE Tunnels. For our example, we will use the topology given below:     You can also view Cisco GRE Configuration Example.   You can download…


GRE Tunnel Configuration with Packet Tracer (Cisco)

Packet Tracer GRE Tunnel Configuration In this confgiuration example, we will see how to configure Cisco GRE (Generic Routing Encapsulation) Tunnel with Packet Tracer. For our GRE Tunnel Configuration example, we will use the below topology and the given IP addresses. You can DOWNLOAD the…


gre-tunnel-topology-
GRE Tunnel Overview

GRE (Generic Routing Encapsulation) GRE (Generic Routing Encapsulation) is the mechanism that encapsulate one protocol in another protocol and provides connection between the nodes. This is done basically IP over IP. A Service Provider Network or Internet is used for GRE (Generic Routing Encapsulation). GRE…


home-ip-allocation-k
Home Network IP Address Allocation and Internet Connection

The Internet Connection of our home's need some basic devices, protocols and steps. In this article, we will see how our small networks connect to the Internet. For detailed explanation of the network protocols or concepts here, you can check the related article on ipcisco.com.…


subnetting-example-ipcisco-k
IP Subnetting and Subnetting Examples

IP Subnetting   As we talked about before, there are two parts in an IP Address. One for them is Network part and the another is Host part. With IP Subnetting, we are adding one more part. This is "Subnet Part". From the Host part,…


ip-address-distribution-RIRs-k
IP Addressing (IPv4)

IPv4 Addressing IP Addressing is one of the key point that a network engineer need to learn first. In this article we will start with the distribution of the IP addresses and we will see all the details of IP Addressing. Here, we will mainly…


administrative-distance-cisco-alcatel-huawei-juniper
IP and Layer 3 Overview

IP and Layer 3 Overview Layer 3 is one of the important Layer of OSI Model. This corresponds Internet Layer of TCP/IP Model. Layer 3 or Internet Layer handles end to end delivery of the data. In other words it provides Routing. Routing is one…


vprn-data-plane-operation-k
VPRN Data Plane Activities

VPRN Data Plane is the place that the traffic is sent and received generally. As we mentioned before, CE devices are the devices that are not MPLS capable.They do not know labels. So, they send the data to the PE device as unlabeled. PE router…


vprn-control-plane
VPRN Control Plane Activities

VPRN Control Plane As a basic definition, VPRN Control Plane is the time that routing exchange activities are done in VPRN Network. These are the necesssary routing information exchange of the VPRN routers in IP/MPLS Network. Beginning with CE devices, PE devices continue this exchange…


vprn-mpls-labels-2
VPRN Labels

VPRN is an IP/MPLS Layer 3 VPN Service. So, it uses the same Labels used in IP/MPLS. In MPLS and VPLS articles we have talked about MPLS Labels. Here, we will explain these Labels again for VPRN Service too. Basically, VPRN uses two MPLS labels.…


vprn
How Does VPRN Work?

How Does VPRN Work?   In this lesson weii learn How VPRN Works, we will focus on VPRN Operation. Basically in a VPRN Architecture, there is a Service Provider Network and there are multiple branches of multiple customers. Service Provider consist of P and PE…


huawei-dhcp-configuration-example-
DHCP Configuration On Huawei Routers

Huawei DHCP Configuration   In this DHCP example we will configure, Huawei DHCP, a Huawei Router as a DHCP Server. After the configuration, a host device, here a PC, will receive its IP information from DHCP Server Huawei Router.   For our DHCP configuration example,…


dhcp-messages-and-ip-allocation-
DHCP IP Allocation Operation

How Does DHCP Achieve IP Allocation Operation? DHCP does its job with Messages like many protocol. Here, as we mentined before, DHCP uses DHCP Messages. Let’s see how these DHCP Messages are used in DHCP IP Allocation Operation. Here, firstly we will explain the main…


dhcp-ip-allocation-messages-
DHCP (Dynamic Host Configuration Protocol)

What is DHCP? In a network all the Layer 3 devices need to have an IP address. We can give these IP addresses manually one by one or dynamically and automatically with IP address allocation mechanism, DHCP (Dynamic Host Configuration Protocol. Here, beside IP addresses,…


VPLS Labelling (Tunnel and Service Labels)

As we discussed in the MPLS articles before, for MPLS we need labels. VPLS is also a MPLS Service, so we need to use labels in VPLS too.   There are two MPLS labels used in VPLS. These labels are:   • Outher Label (Transport…


vpls-mac-learning-
VPLS MAC Learning

VPLS is a Leyer 2 VPN technology. Because of its Layer 2 nature, "MAC Learning" is very important for VPLS. So, how does VPLS learn MAC Addresses?   MAC Learning in VPLS is similar to normal switching MAC Learning. The concept is basic. At the…


vpls-topologies-hierarchical-
VPLS Topologies

There are different types of VPLS. In other words, there are different VPLS Topologies. In this lesson, we will talk about these VPLS Topo0logies.   VPLS can be defined on One Service Router or on Multiple Service Routers. Basically we can divide VPLS into two…


isis-for-ipv6-topology2
ISIS For IPv6 Configuration Example on Cisco IOS

How to Configure ISIS For IPv6 on Cisco? In this Cisco ISIS for IPv6 configuration example, we will configure ISIS with IPv6 extension configuration commands. For our example we will use the below four-routered topology. Here, we will have 3 different area. There is a…


isis-single-multi-topology-sfp-restriction2
ISIS for IPv6

Intermediate System to Intermediate System for IPv6 ISIS is one of the important Link-State protocols. With entrence of IPv6 to the network world, ISIS also need to uptade itself for this new Routed protocol. So, ISIS for IPv6 is developed. Basically, ISIS for IPv6 is…


eigrp-for-ipv6-example-topology2
EIGRP For IPv6 Configuration On Cisco IOS

EIGRP for IPv6 is one of the most used routing protocol with IPv6. In this example, we will see how to configure EIGRP for IPv6 on Cisco routers. For our example, we will use the topology below. Here, simply we have four routers connected serially…


EIGRP-for-ipv6-conf-2
EIGRP for IPv6

We can define “EIGRP for IPv6” as the enhancements that is done in EIGRP for IPv6 support. Basically, EIGRP protocol is the same protocol but it has some additional properties at this time. Differences of EIGRP and EIGRP for IPv6 EIGRP and EIGRP for IPv6…


RIPng-example-topology-2
RIPng Configuration Example on Cisco IOS

RIPng Configuration Example on Cisco IOS RIPng Configuration On Cisco IOS The configuration of RIPng is a little different from its predecessor, RIPv2. First of all, RIPng is IPv6 avare routing protocol and before RIPng configuration, IPv6 must be configured in your system. In this…


ipv6-static-route-ipcisco-2
IPv6 Static and Default Route Configuration on Cisco IOS

IPv6 Static and Default Route Configuration on Cisco IOS IPv6 Static Route Configuration on Cisco IOS As you know, static route is the route that you manually define on a router.This is done when we do not want to use Routing Protocols for small part…


ospfv3-topology-ipcisco
OSPFv3 Configuration Example on Cisco IOS

OSPFv3 Cisco Configuration OSPFv3 is the IPv6 cabaple version of OSPF. The previous version of OSPF was OSPFv2. OSPFv2 is for IPv4. Here, we will configure OSPFv3 for the below topology. As you can see, there are three areas and six routers in this topology.…


isis-topology-ipcisco-2
ISIS Configuration Example on Cisco IOS

In this Cisco ISIS configuration example, we will configure an ISIS domain and see how to establish ISIS Routing. For our example we will use the below four-routered topology. Here, we will have 3 different area. We are using multi area model to show you…


protected-port-topology
What is Protected Port ?

Protected Ports are one of the security mechanisms used on switch world. By default all the switch ports are unprotected and equal. But with Protected Port Configuration, some ports are filtered an restricted to access each other. If you configure a port as protected, data…


private-vlans-example
Private VLAN Cisco Configuration Example

Cisco Private VLAN Configuration Example For Private VLAN configuration, we will do a configuration example with one switch and one router. Here, we will use the same topology that we have used before for Private VLAN overview. Our topology, ports and VLANs will be like…


Private-vlan-ports
Private VLANs (pVLANs)

Private VLANs (pVLANs) VLANs used to divide the Broadcast Domains. With this division, different departments, networks are isolated each other and become another Broadcast Domain. Sometimes, this separation is not enough and additional separation is needed. Private VLANs (pVLANs) are used at these times. Basically…


huawei-vlan-configuration-example
VLAN Configuration on Huawei Switches

How to Configure VLAN on Huawei Switches? VLAN Configuration on Huawei switch is not too different than Cisco VLAN Configuration. But there are some differences. In this lesson, we will see the VLAN configuration steps on Huawei devices. For our example, we will use the…


Extended acl with packet tracer
Extended Access List Configuration With Packet Tracer

Packet Tracer Extended Access Lists Configuration   In this lesson we will focus on Cisco Extended ACL Configuration with Cisco Packet Tracer. We will use the below topology for our packet tracer configuration.     You can DOWNLOAD the Cisco Packet Tracer example with .pkt…


standard acl configuration packet tracer
Standard Access List Configuration With Packet Tracer

Packet Tracer Standard Access List Configuration   In this lesson we will see Cisco Standard ACL Configuration and how to configure Standart Access-List in Packet Tracer. There are three types Access Lists in common. Thse access list types are :   Standard Access List Extended…


basic router security ipcisco
Basic Cisco Router Security Configuration

How to Secure a Cisco Router Basically? Security is an important concern for a network engineer. How can a network engineer provide security of a router? In this Basic Cisco Router Security Configuration lesson, we will talk about, how to Secure a Router. We sill…


administrative groups link coloring after cspf
Traffic Engineering, RSVP-TE Path Manuplation and Constraints

RSVP-TE Path Manuplation and Constraints Traffic Engineering is one of the most important routing lessons. With traffic engineering, as a network engineer you are directing your network traffic according to some constraints. By directing the traffic, you provide efficient usage of resources and become proactive…


RIP IPv6 RIPng topology
IPv6 Routing Protocols – Part 4 (RIPng)

RIPng (RIP Next Generation), RIP for IPv6 RIPng (RIP Next Generation)is the IPv6 available next level protocol of RIPv2. In modern large networks, generally RIP is not used and also RIPng. But as a basic protocol, it is still used in many small networks. Basically,…


IPCisco-Cisco-Juniper-Alcatel-Huawei-CheatSheet
COMPARISON OF TOP FOUR VENDORS’S COMMAND LINE

COMPARISON OF TOP FOUR VENDORS’S COMMAND LINE In IP world, there are many Network Equipment Vendors. But some of these Network Equipment Vendors are very Common in Network World and Well Known. These Well Known Vendors are : - Cisco - Juniper - Nokia -…


eigrp-packet-tracer-ipcisco
EIGRP Configuration With Packet Tracer

Packet Tracer EIGRP Configuration   EIGRP (Enhanced Interior Gateway Routing Protocol), is a Cisco Proprietary Hybrid Routing Protocol. The configuration of EIGRP is similar to other Routing Protocols. In this example, we will configure EIGRP on Packet Tracer with Cisco Routers..   With this EIGRP…


eigrp-successor-feasible-succesor-ipcisco
EIGRP - Part 4 (Other EIGRP Properties)

Key Configurations on EIGRP EIGRP is an Enhanced Dynamic Routing Protocol that provide many methods for a good Routing Protocol implementation. In this lesson, we will focus on some of the key methods of EIGRP and we will learn these key methods with many EIGRP…


eigrp-packet-types-ipcisco
EIGRP - Part 3 (EIGRP Packet Types and Neighbourship)

EIGRP Packet Types EIGRP (Enhanced Interior Gateway Routing Protocol) uses EIGRP Messages to establish and maintain the EIGRP Neighborship. In other words, it uses different EIGRP Packet Types for its operations.   EIGRP uses Five Packet Types for as EIGRP Messages. These EIGRP Packet Types…


eigrp-table-types-ipcisco
EIGRP - Part 2 (EIGRP Tables)

EIGRP Tables EIGRP uses different tables for its Routing Operation. Mainly, three types of EIGRP Tables are used in EIGRP (Enhanced Interior Gateway Routing Protocol). What are the EIGRP Tables? These EIGRP Tables are given below: Neighbour Table Topology Table Routing Table EIGRP Table Types …


eigrp-neighbourship-establishment-ipcisco
EIGRP - Part 1

EIGRP Overview   EIGRP Protocol is one of the most used Dynamic Routing Protocol as IGP (Interior Gateway Protocol). Especially it is used for Routing purpose inside the networks that is mostly consist of Cisco devices.   EIGRP (Enhanced Interior Gateway Routing Protocol) is a Hybrid Routing Protocol that show both Distance Vector and Link-State Routing Protocol properties.…


RSTP Configuration Example
RSTP Configuration on Packet Tracer

Packet Tracer RSTP Configuration As you know, STP (Spanning Tree Protocol) is the key protocol of Switching world. With STP, link redundancy is provided and switching loops are avoided. STP has different versions. One of the STP version is RSTP (Rapid Spanning Tree Protocol). Like…


STP Portfast Configuration
STP Portfast Configuration with Packet Tracer

STP Portfast Configuration with Packet Tracer In STP (Spanning Tree Protocol) there are Blocking State, Listenning State, Learning State and Forwarding State. With STP Portfast, Listenning State and Learning State bypassed. The access ports of the switches that connect to hosts can configured with STP…


switch-virtual-interfaces-ipcisco
Switch Virtual Interface Configuration on Packet Tracer

Theorically switches work in Layer 2 (Layer 2 switches). When you talk about switches, generally you do not think IP addresses. One of the ways that make a switch IP available is, configuring Switch Virtual Interfaces (SVI). Switch Virtual Interfaces (SVI) is basically, an IP…


Router-On-Stick-ipcisco
Inter VLAN Routing Configuration on Packet Tracer (Router on Stick)

Router on Stick Configuration on Packet Tracer   VLANs are the virtual LANS that provide divide your big network, into smaller pieces. Many companies use to divide their networks into different departments. We have discussed the basic logic of VLANs in the previous articles.As you…


isis-topology-2
Routing With IS-IS Protocol - Part 5 (IS-IS versus OSPF)

IS-IS versus OSPF IS-IS Protocol and OSPF have some similarities and differences. Lets firstly check the similarities of these two protocol one by one: - IS-IS Protocol and OSPF are both Link-State Interior Gateway Protocols. - IS-IS Protocol and OSPF are both uses Dijkstra SPF…


isis-adjacency-states
Routing With IS-IS Protocol - Part 4 (IS-IS Adjacency)

IS-IS Protocol Adjacency There are three types adjacency in IS-IS Protocol.These are: - Level 1 routers form L1 adjacency with L1 and L1/2 Routers - Level 2 routers form L2 adjacency with L2 and L1/2 Routers - Level 1/2 routers form L1/2 adjacency with L1/2…


isis-helllos-ipcisco
Routing With IS-IS Protocol - Part 3 (IS-IS Packet Types)

IS-IS Packet Types IS-IS Protocol uses L2 encapsulation Ethernet 802.3/802.2. It do not use Ethernet II. Ethernet II is used for IP traffic. IS-IS Protocol exchanges protocol information by using Link-State PDUs (Protocol Data Units). There are four types of PDU packets in IS-IS Protocol.…


ISIS-address-format-ipcisco
Routing With IS-IS Protocol - Part 2 (IS-IS Addresses)

IS-IS Protocol Addresses IS-IS (Intermediate System to Intermediate System) Protocol was developed as a OSI network protocol, not TCP/IP. So, normally IS-IS Protocol not uses IP address, but it uses NET (Network Entity Title) addresses. Let’s check this address issue a little. In IS-IS Protocol,…


basic-is-is-topology-ipcisco
Routing With IS-IS Protocol - Part 1

Routing With IS-IS Protocol IS-IS (Intermediate System to Intermediate System Protocol) is a Link-State routing protocol that is developed by ANSI ISO. It is an open standard and classless Interior Gateway Protocol (IGP). IS-IS Protocol uses Dijkstra SPF (Shortest Path First) algorithm like OSPF, to…


cisco-xr-bundle-topology-ipcisco
Link Aggregation on Cisco IOS XR

Link Aggregation on Cisco IOS XR Link aggregation, LAG, Bundle, EtherChannel, what ever you say, they have the same logic in real. So, the configuration logic of Link Aggregation (LAG) is not different than Ether Channel logic on Cisco devices that run Cisco XR software.…


cisco-vpls-configuration-example-ipcisco
Cisco VPLS Configuration

In this lesson, we will configure VPLS on Nokia Service Routers. Before any Service configuration, our IGP configuration must be done and the network must be converged. We had talked about this preparations in the previous articles. In this article, we will focus on VPLS…


basic-vpls-architecture-ipcisco
VPLS Versus h-VPLS

VPLS (Virtual Private LAN Service) and h-VPLS (Hierarhical VPLS) has some common and different properties. So they have different aadvantages and disadvantages. In this article, we will focus on the comparison of these two concepts and we will see Hierarhical VPLS versus VPLS. The most…


h-vpls-architecture-ipcisco
Hierachical-VPLS (H-VPLS)

H-VPLS (Hierarchical VPLS) is the more scalable version of VPLS. Basically, H-VPLS has some architectural difference than flat VPLS. You can also view the lesson, that we have talked about Hierarhical VPLS versus VPLS.   VPLS Architecture, Flat VPLS     You can also view…


bgp-med
BGP Path Attributes - MED

BGP MED (Multi Exit Discriminator) Attribute is the BGP Path attribute which provides information to the external neighbours, about how to come their Autonomous System. This is opposite of Local Preference. BGP Local Preference Atribute says to the internal neighbours, “How to Exit AS”. BGP…


bgp-path-attribute-origin-ipcisco
BGP Path Attributes - Origin

BGP Path Attributes - Origin BGP Origin Attribute informs the Autonomous Systems (AS) about the originator of that route. It is a Well-Known Mandatory BGP Path attribute like AS Path Attribute and Next Hop Attribute. BGP Origin Attribute is supported in all BGP implementations and…


as-path-topology
BGP Path Attributes - AS Path

BGP AS Path Attribute AS Path Attribute is another Well-Known and Mandatory BGP Path Attribute. Here, as we have discusssed before, Well-Known means “it is supported by every BGP implementation” and Mandatory means “it must be included in every route entry”. AS Path Attribute is…


bgp-path-attribute-local-preference-ipcisco-
BGP Path Attributes - Local Preference

What is BGP Local Preference Attribute? In BGP Path selection algorithm, if your device is a different vendor product (not Cisco), the first BGP Path Attribute that is taken into account during path selection is Local Preference attribute. Local Preference is not a vendor specific…


bgp-path-attribute-weight-ipcisco
BGP Path Attributes - Weight

BGP Path Attributes - Weight Attribute Weight Attribute is a Cisco proprietary BGP Path Attribute that is the first step in the BGP Best Path Selection Algorithm. In Cisco devices, BGP firstly check the Weight Attribute value and prefer the Highest Weight Attribute value. Then…


lldp-neighbour-discovery
Neighbour Discovery Protocols - Part 6 ( LLDP Cisco Configuration)

In this configuration lesson, we will focus on Cisco LLDP Configuration. To understand LLDP better, let’s check the configuration of LLDP on the Cisco IOS. The most important commands related with LLDP configuration is showed below.   LLDP Configuration TopologyLLDP is disabled by default. To…


lldp-med
Neighbour Discovery Protocols - Part 5 ( LLDP-MED )

As a standard and open protocol, LLDP is a good protocol. After the development of LLDP, some of the additional properties needed especially for Voice Over IP (VoIP). So LLDP extended. The extended version of LLDP is LLDP-MED (Link Layer Discovery Protocol - Media Endpoint Discovery).…


CDP Packet Tracer Example
Neighbour Discovery Protocols - Part 4 (CDP Configuration with Packet Tracer)

Packet Tracer CDP Configuration   As we have talked about in the previous lesson, CDP is a Cisco proprietary Neighbor Discovery Protocol. In this article, we will discuss how to configure CDP in Cisco IOS, we will learn CDP Cisco Configuration. LLDP is a standard…


network-neighbour-discovery-
Neighbour Discovery Protocols - Part 3 ( CDP )

CDP (Cisco Discovery Protocol) is a Cisco specific Neighbour Discovery Protocol works on Layer 2. CDP (Cisco Discovery Protocol) is also licensed to run on some network devices of other vendors. There is also a standard Neighbor Discovery Protocol named LLDP that works on all…


how-lldp-works
Neighbour Discovery Protocols - Part 2 ( LLDP )

LLDP (Link Layer Discovery Protocol) is a Standard Neighbour Discovery Protocol that is used by all vendors. Like all other Neighbour Discovery Protocols like Cisco CDP, LLDP works on Layer 2 (Data-link Layer). By using this Neighbor Discovery Protocol, directly connected neighbours are discovered. You…


neighbour-discovery-protocols
Neighbor Discovery Protocols - Part 1

Neigbour Discovery Protocols provides directly connected devices to discover and collect information about each other. Network devices can provide directly connected neighbour device’s identification, configuration and any capabilities. Neighbour Discovery Protocols work on Layer 2.     There are different Neigbour Discovery Protocols for different…


rip-configuration-example
RIP Configuration With Packet Tracer

Packet Tracer RIP Configuration In this article, we will focus on how to configure RIP (Routing Information Protocol) on Cisco Routers. Generally in all network courses, RIP is used to explain routing protocol configuration basically. This is because of its basic configuration. You can DOWNLOAD…


routing-with-rip
Routing Information Protocol (RIP)

RIPv2 Overview RIP (Routing Information Protocol) is a Distance Vector Routing Protocol. It is the simplest Routing Protocol. So, Routing with RIP is generally used for small networks. For large networks and WAN links, it is inefficient. In this article, we will focus on RIPv2,…


How Will Be Our Lifes With IoT ?

How Will Be Our Lifes With IoT ? IoT (Internet of Things) will create values in many parts of our lifes. From home to work, city to urban IoT will provide us many user friendly and effective applications. With IoT, world will enter a new…


The Future Technolgy : Internet of Things (IoT)

The Future Technolgy : Internet of Things (IoT) IoT is the abbreviation of Internet of Things. And Internet of Things is basically connecting IP available devices (even if they are not computers) over internet and letting them to talk eachother. By doing this, IoT (Internet…


packet-tracer-vlan-topology
Packet Tracer VLAN Configuration Example

Packet Tracer VLAN Configuration As an example, you can see a VLAN topology below. In this topology, 2 Cisco Catalyst 2950-24 switches and 6 PCs are used.   Packet Tracer VLAN Topology ExampleYou can DOWNLOAD the Cisco Packet Tracer example with .pkt format at the…


vlan-topology
How to Configure Cisco VLANs

Cisco VLAN Config Commands In this lesson we will learn How to Configure VLANs on Cisco devices. Here, we will see the necessary commands for Cisco VLAN Configuration. You can also check VLAN Configuration Example on Packet Tracer lesson to learn and practice more on…


vlan frame tagging protocols
DTP and VLAN Frame Tagging protocols ISL, dot1.q

VLAN Frame Tagging Protocols (ISL and dot1.q) In this lesson, we will learn VLAN Frame Tagging Protocols detailly. In the next lessons, you can also check Cisco VLAN Configuration Examples. What are these VLAN Frame Tagging Protocols? Let's see each of them. There are two…


vlan port assignment
VLAN Port Assignment and VLAN Port Types

In this lesson, we will focus on some of the key lessons of VLANs. We will learn how to assign ports to VLAN, VLAN Port types and VLAn Tagging. Static and Dynamic VLAN Assignments VLANs can be assigned statically and dynamically. Static configuration is more…


vlans
VLANs (Virtual Local Area Networks)

What is a VLAN? In this lesson, we will talk about one of the key lessons in networking, especially in switching. We will explain VLAN definition and we will answer the question what is a VLAN?  In the following lessons, we will learn the details…


5620 Service Avare Manager
Nokia 5620 SAM (Service Avare Manager)

Nokia 5620 Service Aware Manager (SAM) is the network and service management application of Nokia. It is generally used on service providers’s big netwoks consist of Nokia devices like 7950 XRS, 7750 SR, 7450 ESS and so on. Nokia 5620 Service Aware Manager (SAM) uses…


BGP Path Attributes and BGP Administrative Distance

BGP Path Attributes BGP uses BGP Path Attributes to determine the Best Path to a destination. According to BGP Best Path Algorithm, BGP Path Attributes are used to determine the BGP Best Path selection. With these Path Attributes, network administrators can manage the BGP Traffic…


bgp-ibgp-ebgp
BGP - Part 2 (BGP Peers, BGP Sessions, BGP Messages)

BGP Peers, BGP Sessions and BGP Messages What is BGP peer? To use BGP, the neighbourship between the BGP routers must be established. You can use the statement BGP neighbour or BGP peer for this establishment. There are two types of BGP peer. These are…


border gateway protocol
BGP - Part 1

BGP (Border Gateway Protocol) AS you know there are two types of routing protocols in general. These are IGP(Interor Gateway Protocols) and EGP(Exterior Gateway Protocols). In the previous posts we have talked about some of IGP protocols. In this post, we will talk on EGP.…


bgp-ibgp-ebgp
BGP - Part 3 (IBGP, IBGP Topologies and EBGP)

In the previous post, we have talked about BGP generally. In this post we will handle IBGP and EBGP detailed.   IBGP and EBGP  IBGP (Internal Border Gateway Protocol) * BGP, which is used in the same Autonomous System. Neighborship is established with the peer…


traffic-flow-without-ECMP
ECMP (Equal Cost Multi Path)

ECMP (Equal Cost Multi Path) If the total IGP cost to a destination are same for two path, these paths are called Equal Cost Multi Path. Normally if there are two path that have same IGP cost, in Alcatel-Lucent Service Routers, lower interface wins and…


LDP-configuratio
LDP Configuration on Nokia Routers

LDP Configuration on Nokia Routers To do an LDP Configuration Example , we will use the below basic topology. Here, we will configure these two routers to become an LDP peer and establish an LSP session. LDP Configuration Example Topology Configuration on Router A A:RouterA>config>router…


label-distribution-and-traffic-flow
MPLS Label Distribution Protocol, LDP - Part 2

Label Distribution After LDP session establishment, labels are distributed from the Tail-End router to the Head-End router for each prefix. This process occurs at the opposite direction of the data plane. At the data plane the traffic flow goes form the Head-End to the Tail-End.…


transport tunnel service tunnel
MPLS Label Distribution Protocol, LDP - Part 1

MPLS Label Distribution Protocol, LDP LDP (Label Distribution Protocol) is one of the two label exchange protocols of MPLS. The other is RSVP (Resource Reservation Protocol). And there is also one more, Cisco specific protocol, TDP(Tag Distribution protocol). In this article, we will talk abbout…


lte_a_carrier_aggregation
LTE Advanced (LTE-A) Features

LTE Advanced (LTE-A) Features As you know after LTE, LTE-A (LTE Advanced) is the next step of mobile technology. In this article, I will try to explain this LTE-A (LTE Advanced) features basically.Let's start ;) CA (Carrier Aggregation) Carrier Aggregation is the most important feature…


2g 3g network view
4G – LTE (Long Term Evolution)

4G LTE (Long Term Evolution) As you know mobile telecommunication has evolved for years. With this evolution, new network elements were included or the existing ones were upgraded. Startig with 2G GSM technology, the evolution has continued orderly with: - 2.5G GPRS, - 2.75 EDGE,…


OSPF Area Types 3
OSPF Area Types on Packet Tracer (NSSA and Totally NSSA)

Not So Stubby Area (NSSA) Not So Stubby Area name is the most funny name in network world, I think : ) Funny and useful. With NSSA, the External LSAs (Type 5) that is not accepted by Stub Areas, accepted as Type 7. Normally, NSSA…


OSPF Area Types
OSPF Area Types on Packet Tracer (OSPF External Routes)

OSPF External Routes Example on Cisco Packet Tracer As you know External Routes are the routes that provide connection to the other networks working with different IGP. Here, we are talking about OSPF and the networks routed by another routing protocol will be External for…


ospf area types
OSPF Area Types on Packet Tracer (Standard Area, Backbone Area)

OSPF Backbone Area, Standard Area and Vitual-Links In this article series we will concentrate on OSPF Area Types and their configuration examples on Packet Tracer. You can DOWNLOAD the Packet Tracer example with .pkt format HERE. As you know from the previous posts, OSPF has…


VPRN Example Topology
VPRN Configuration on Nokia Service Routers

How to Configure VPRN on Nokia Service Routers? In this post, we will focus on the configuration of VPRN Service on Nokia (Alcatel-Lucent) Service Routers. Here, We will use Alcatel-Lucent 7450 Service Router as a PE Router. Our Provider Routers will be Nokia (Alcatel-Lucent) 7750…


Logical-view-of-VPRN
VPRN (Virtual Private Routed Network)

VPRN Overview   VPRN (Virtual Private Routed Network) is a Multipoint-to-Multiponit Layer 3 VPN Service that connects multiple branches in a single logical routed architecture over IP/MPLS network of a Service Provider. This is called Layer 3 VPN generally, but Nokia (Formerly Alcatel-Lucent) defines this…


vpls
VPLS Configuration on Nokia Service Routers

In this lesson, we will configure VPLS on Nokia Service Routers. Before any Service configuration, our IGP configuration must be done and the network must be converged. We had talked about this preparations in the previous articles. In this article, we will focus on VPLS…


vpls architecture
VPLS (Virtual Private LAN Service)

What is VPLS? Nokia VPLS is a Multipoint-to-Multipoint Layer 2 VPN Service that connects multiple branches of a Customer, in a single logical switched architecture over Service Provider IP/MPLS network. Service Provider IP/MPLS network is our transit network here. Different brances of a customer, pass…


sevice-core-network-topology
Network Preparation for Nokia L2 VPN and L3 VPN Services

Network Preparation for Nokia (Alcatel-Lucent) L2 VPN and L3 VPN Services In the first part of this article series we talked about service terms and some steps about service creation and the preparing the network for service creation. Here, in this article, we will talk…


Logical-view-of-IES
Nokia L2 VPN and L3 VPN Services

Nokia Layer 2/3 VPN Services In this article we will talk about Nokia VPN Service Types used in Nokia Service Routers. Why Nokia use "Service Router" term for their service routers? This is because, different Nokia VPN Services are given to customers through these routers.  …


Alcatel-Lucent-Service-Routers-Service-Logic
Nokia VPN Service Terms and Creation Steps

Service perspective is a Nokia's view for providing internet and VPN services to the customers. In other words Nokia MPLS VPN is called as Services. There are many services in Nokia Service Routers. For this services some configurations must be done under Nokia Service Routers.…


VPN-Labels
Nokia VPN Services Tunnel Structure

Nokia VPN Services Tunnel Structure In this article I want to tell you about the tunnels used for services that is set up via MPLS. Here there are some key points that you must know to understand service structure well. Think about physically we have…


Link-Aggregation-Nokia
Link Aggregation Configuration on Nokia Routers

Link Aggregation (LAG) Configuration on Nokia Routers   In the previous article we focus on how to configure Link Aggregation on Cisco and Juniper devices. Here we will see how is this configuration done on Alcatel-Lucent devices. Alcatel-Lucent 7750 Service Router will be our device.…


Link-Aggregation-Juniper
Link Aggregation – Part 3 (LACP Configuration on Juniper Devices)

How to Configure LACP on Juniper Routers   We have talked about LACP in the previous articles on Cisco Routers. Here we will focus on how to do LACP Configuration on Juniper devices on ethernet links. We will learn LACP Configuration on Juniper. As you…


Link-Aggregation-Example
LACP Configuration on Cisco Devices

We have learned LACP and Link Aggregation before detailly and in this article we will focus LACP Cisco Configuration. We will make a link aggregation protocol with two ports in one bundle. You can use more port up to 8 ports in Cisco devices.  …


Link-Aggregation-Cisco
Link Aggregation – Part 1 (Link Aggregation Control Protocol, LACP)

Link Aggregation Control Protocol (LACP)   Link Aggregation is bundling two or more links as one logical link for increasing bandwidth and availability. This can be done by one of the two protocols . One of them is the Cisco proprietary PAgP and the other…


common-cisco-router-configuration
Common Cisco Router Configuration on Packet Tracer

Basic Cisco Router Configuration In this post, we will see how to configure a Cisco router basically with the help of Packet Tracer.This post will be an entrance to routers for a Cisco router newbie. We will see Basic Cisco Router Configuration. You can DOWNLOAD…


spanning-tree-configuration-example
STP (Spanning Tree Protocol) Example on Packet Tracer

Packet Tracer STP Configuration In this post, instead of detaily talk about STP (Spanning Tree Protocol), we will focus on a basic Switching Loop topology and how STP mechanism helps to avoid this Switching Loop. You can DOWNLOAD the Packet Tracer example with .pkt format…


rsvp-configuration-example
MPLS RSVP-TE Configuration on Nokia Routers

RSVP-TE Nokia (Alcatel-Lucent) Configuration Prerequisites and Configuring RSVP-TE - Configure IGP. - Enable MPLS context. - Enable RSVP context. - Configure interfaces for MPLS ( automatically RSVP). Let’s check these step sone by one. Configuring IGP (Routing Protocol) is required for routing between the nodes.…


path message label request message
MPLS, RSVP-TE - Part 1

RSVP-TE (Resource Reservation Protocol-Traffic Engineering) RSVP-TE(Resource Reservation Protocol-Traffic Engineering) is the enhanced RSVP for MPLS. RSVP-TE is not a real routing protocol, but it works with routing protocols. For RSVP-TE, bidirectional flow is required. To provide this, there must be two RSVP sessions. Because RSVP-TE…


MPLS Label Distribution Protocol, LDP – Part 5 (Export and Import Policy, Prefix Aggregation)

Export and Import Policy and Prefix Aggregation with LDP LDP and Export Policy By default ALU only distribute a label only for its system addresses. To distribute additional other local prefixes, “export policy” is used. You can find an “export-policy” example below: A:>config router policy-options…


transport tunnel service tunnel
MPLS Label Distribution Protocol, LDP – Part 6 (T-LDP)

As we talked about, LSRs(P routers) are not service avare, they do not know anything about services. So they use only the outer label. But PE routers are service avare and they use outer and inner label together. With inner label, they classfy the different…


MPLS Label Distribution Protocol, LDP – Part 7 (CR-LDP)

CR-LDP (Contraint-based Routing LDP) Before discussing the CE-LDP, lets explaint “constraint-based routing” term. "Contraint-based Routing" is the routing which in which the routing process is done according to some constraints. Both QoS-based routing and policy-based routing belong to Contraint-based Routing. As you know these routing…


switch port security
Switch Port Security Configuration with Cisco Packet Tracer

In this article, we will focus on detailed Port Security Configuration. For our Port Security Configuration, we will use the below topology. In this topology we will make examples for the configuration cases on Port Security.   You can DOWNLOAD the Packet Tracer example with…


switch port security
Switch Port Security - Part 1

Port Security is the security mechanism used in switches. With this mechanism, a specific port of a switch can be protected with undesirable access. Here, we will learn the theory of this lesson. We will focus on the properties of this mechanism and some of…


next-hop-self
BGP Next Hop Self Command

BGP Next Hop Self Command In this post, we will talk about an important and mostly used command of BGP. This command is used under the BGP process in the router and the usage is like below: neighbor {ip-address | peer-group-name} next-hop-self In the routing,…


Basic-BGP-Topology
BGP Configuration Example with Packet Tracer

Packet Tracer BGP Configuration Example To understand BGP (Border Gateway Protocol) better, we will make a basic Packet Tracer BGP Configuration example. Because of the limited numbers of commands available on Packet Tracer, we will practice a very basic configuration for our BGP Config Example.…


ping command
Ping Command (Pinging Peers)

Ping Command and Ping Command Options Whenever other engineers see network engineers during troubleshooting, they think that, network engineers only ping from one node to another. But as you know a network engineer is more than a pingman :) This command is a basic but…


mpls-point-of-local-repair-(PLR)-and-merge-point-(MP)
MPLS Protection and Restoration – Part 5 (Fast Reroute Protection Types)

Fast Reroute Protection Types Both One-to-One and Facility Backup can protect different network elements. And these can be achieved by two ways: - Node Protection : Protect against the failure of the next downstream router. The upstream router before the failure node establishes a protection…


mpls-point-of-local-repair-(PLR)-and-merge-point-(MP)
MPLS Protection and Restoration – Part 4 (Local Protection, Fast Reroute)

MPLS Local Protection (Fast Reroute) The goal of the protection is minimizing the down time. To do this, protection must be done near to the failure. Local protection does this. By doing this types of protection, it avoids using entire path protection. Local protection reroutes…


MPLS Strict Path
MPLS Protection and Restoration – Part 3 (Path Diversity in Secondary Paths)

Path Diversity in Secondary Paths As we say in the following articles, while using Secondary LSP-Paths, sharing links between Primary and Secondary LSP-Paths must be avoided. We can say this term "Path Diversity". There are some methods to achieve Path Diversity. These methods are: -…


mpls-end-to-end-protection-primary-path-and-secondary-path
MPLS Protection and Restoration – Part 2 (End-to-End Protection, Secondary Paths)

MPLS Protection Types There are some different types traffic protections. In general we can divide these types into two groups. End-to-end Protection and Local Protection. End-to-end Protection is using Secundary LSP-Paths as a backup, beside Primary LSP-Path. Local Protection is the mostly used MPLS recovery…


mpls-protected-path-and-backup-path
MPLS Protection and Restoration – Part 1

MPLS Protection and Restoration,MPLS Recovery As you know, we can prioritize some of the traffic with MPLS-TE because of their nature. The high priority can be given to the voice and video traffic. Because they are fragile traffic types. During a failure normally these real…


MPLS Protection and Restoration – Part 9 (MPLS Convergence Factors)

MPLS Convergence Factors After the link failure in MPLS network, there are some actions need to be done orderly for MPLS recovery. This actions need to converge the MPLS network again. These MPLS Recovery steps are: - MPLS Recovery Failure Detection : Detecting the failure…


MPLS Protection and Restoration – Part 8 (Actions After the Failure)

MPLS Recovery, Actions After the Failure What Happens After the Failure Recovered By Fast Reroute (FRR) ? After detecting the failure in an MPLS network, in Fast Reroute (FRR) mechanism, PLR switches the traffic to the protected tunnel. At the same time it sends a…


MPLS Protection and Restoration – Part 7 (Verification Commands on Alcatel-Lucent Routers)

MPLS Recovery, Secondary Paths Verification   In the Alcatel-Lucent 7750 Service Routers, we can verify the Secondary LSP-Path configuration with the following commands. Verifying secondary LSPs use the following commands: show router mpls lsp show router mpls lsp path If Standby Secondary LSP-Path, the Primary…


RSVP-Objects
MPLS Protection and Restoration – Part 6 (RSVP Objects Used for MPLS Fast Reroute)

RSVP Objects Used for MPLS Fast Reroute There some RSVP Objects used in Fast Reroute(FRR). Beside this, RSVP-TE extend for this purposes. There are also some extensions on RSVP-TE for automatic signalling in protection tunnels.So some additional objects and flags are coming for FRR. These…


MPLS Protection and Restoration – Part 13 (Juniper Configuration Samples)

Node-Link Protection Configuration [edit] user@R1# edit protocols mpls label-switched-path lsp-path-name [edit] user@R1# edit protocols mpls label-switched-path lsp2-A-to-B To configure node-link protection for the LSP... [edit protocols mpls label-switched-path lsp-path-name] user@R1# set node-link-protection To configure link protection for the interface... [edit protocols] user@R1# edit protocols rsvp…


MPLS Protection and Restoration – Part 12 (Juniper Configuration Samples)

Link Protection Configuration [edit] user@R1# edit protocols rsvp interface type-fpc/pic/port [edit] user@R1# edit protocols rsvp interface fe-1/1/1 To configure link protection for the interface... [edit protocols rsvp interface type-fpc/pic/port] user@R1# set link-protection To configure link protection for LSPs requiring use of the bypass path... [edit…


MPLS Protection and Restoration – Part 11 (Juniper Configuration Samples)

Juniper Configuration Samples for Protection One-to-one (fast reroute) backup Configuratio To enter edit mode... [edit] user@R1# edit protocols mpls To configure the LSP... [edit protocols mpls] user@R1# set label-switched-path lsp-path-name to address [edit protocols mpls] user@R1# set label-switched-path A-to-B to 1.1.1.1 To configure one-to-one(fast rerote)…


MPLS Protection and Restoration – Part 10 (Juniper Configuration Samples)

Juniper Configuration Samples for Protection One-to-one (Fast Reroute) configuration on JuNOS [edit] protocols { mpls { label-switched-path lsp-path-name { fast-reroute; } } } Many-to-one (Facility Backup) Link protection configuration on JuNOS [edit] protocols { rsvp { interface type-fpc/pic/port { link-protection; } } mpls { label-switched-path…


Global Mobile Data Traffic Forecast by Cisco (2014–2019)

In this post, you can find several important points about mobile data traffic growth between 2014 and 2019. This summary info will provide you a general view on mobile data traffic growth. The original document is released by Cisco with the name Global Mobile Data…


vlan-translation-single-tag
VLAN Mapping (VLAN Translation) on Juniper

On Juniper devices, VLAN translation term is used for mentioning the swap of incoming VLAN id to a new VLAN id. In the below configuration examples, we will do this job on Juniper devices. In the first example, we will swap the incoming VLAN 60…


vlan-translation-cvlan-and-svlan
VLAN Mapping (VLAN Translation) on Cisco

On Cisco devices, VLAN mapping term is used for mentioning the swap of incoming VLAN id to a new VLAN id. In the below configuration examples, we will see Cisco configuration for this swapping. Lets check this configuration for a Cisco switch. The related congfiguration…


vlan-mapping-vlan-translation
VLAN Mapping (VLAN Translation)

In the different locations of the customer, the same VLAN tag means the same. But there is a service provider network between the customer locations. Customers and the service provider use different VLAN tags in their networks. So, here there must be VLAN mapping or…


Port-address-translation-pat
PAT Configuration with Packet Tracer

Packet Tracer PAT Configuration Example In some cases there can be hundreds of inside local addresses and at the same time your global ip addresses can be limited.At this time you can use PAT instead of static and dynamic NAT translation. Here, with PAT(Port Address…


Dynamic nat
Dynamic NAT Configuration with Packet Tracer

Packet Tracer Dynamic NAT Configuration Example Before this article, we have talked about Static NAT configuration. Here, we will talk about another types of NAT, Dynamic NAT configuration on Packet Tracer. As in Static NAT, in the Dynamic NAT configuration, the interfaces must be identified…


Static NAT
Static NAT Configuration with Packet Tracer

Packet Tracer Static NAT Configuration Example In this example we will configure Static NAT (Network Address Translation) on Packet Tracer. For our Static NAT configuration, we will use the topology below. You can DOWNLOAD the Cisco Packet Tracer example with .pkt format at the End…


network address translation, NAT
NAT – Part 1 (Network Address Translation)

NAT (Network Address Translation) The increase of the internet users has consumed IPv4 addresses rapidly. And to continue with these addresses various techniques have used by organizations. One of them is Network Address Translation(NAT). As you know there are public and private addresses. The public…


SNMP – Part 4 (SNMP Configuration On Nokia Service Routers)

In the previous articles on SNMP Cofigurations, we have talked about Huawei, Juniper, Cisco SNMP Configurations. In this article, we will handle Nokia SNMP configuration on Nokia Routers. As you know, the main aim to use SNMP is the same. We use SNMP to manage…


ospf-virtual-link-topology-k
Routing with OSPF - Part 7

In htis article, we will talked about the remainning main lessons of OSPF. These small but important lessons are : OSPF Router ID OSPF Virtual Links OSPF Authentication OSPF Timers   Let's talk about these parts one by one. If you would like to learn…


ospf-network-types-k
Routing with OSPF – Part 6

OSPF Protocol can work in different network topologies. Some of these Network types are Standard and Some of them is Cisco Proprietary. Mainly,these networks types are given below: • Broadcast Networks (Cisco Proprietary) • Nonbroadcast Multi Access(NBMA) Networks • Point-to-Point Networks (Cisco Proprietary) • Point-to-Multipoint…


ospf-lsa-types-and-advertisements-k
Routing with OSPF – Part 5 (OSPF Area Types)

OSPF Area Types OSPF uses an hierarchical architecture and build OSPF network with different Areas. There are many specific Area types that are used with OSPF and these Area types has specific characteristics. So, what are these areas? General OSPF Area types are: • Standart…


lsa-types-of-ospf-k
Routing with OSPF – Part 4 (OSPF LSA Types)

OSPF LSA Types In OSPF Link-State information, in other words,Routing information is exchanged between routers. This exchange is done with LSAs (Link State Advertisements). There are eleven different LSA types and each of them has a special purpose. Some of the LSA types are the…


ospf-packet-types
Routing with OSPF – Part 3 (OSPF Packet Types)

OSPF Packet Types OSPF use OSPF Packet sto communicate and establish OSPF Operation. There are different Packet types in OSPF and in this article, we will focus on these OSPF Packet Types. We will explaint each Packet and see the duty of this packet. In…


OSPF-Neighbourship-States
Routing with OSPF – Part 2 (OSPF Adjacency)

OSPF Adjacency OSPF Adjacency States Routers establish OSPF adjacency to use OSPF. From the beginning of the establishment to the full adjacency, there are some states. These states are mentioned below: OSPF (Open Shortest Path First) Neighbourship States • Down • Init : Hello packet…


ospf-router-types-k
Routing with OSPF - Part 1

OSPF(Open Shortest Path First) Overview OSPF(Open Shortest Path First) is a Link-State Routing Protocol. It is also Classless and an Open, Standard Protocol used by all vendors. OSPF uses Dijsktra Algortihm, a Shortest Path First Algorithm(SPF) to determine the best path to a destination network.…


TCP Header MSS and MTU
TCP Header Part – 5

TCP Options   The last part of this article series is related to TCP options. After this there is aleady the data part. In this section there are some options that enhance TCP protocol. This options are MSS, Window Scaling, Selective Acknowledgements, Timestamps and Nop.…


TCP Header window calculation
TCP Header Part – 4

TCP Window Size, Checksum & Urgent Pointer The window, checksum and urgent pointer are another important fields in TCP header. Each of these fields are 2 bytes long. Window Size Window size the most important part in the TCP header. This fields is used by…


ipv6-subnetting-www.ipcisco.com
Subnetting in IPv6

IPv6 Subnetting We have talk about IPv4 Subnetting in another lessons. In this lesson, we will focus on IPv6 Subnetting and how to use it with IPv6 Addresses. Subnetting is used in IPv4 to use the address spaces effectively. But IPv6 provide too much addresses.…


Global-Unicast-IPv6-Address-2
IPv6 Address Types

What Are The Types of IPv6 Addresses? IPv6 has some similar and some different address types than IPv4. There are still unicast addresses in IPv6 world but this time there will be one more Unicast address types. Still multicast addresses are being used but with…


ipv6-features-ipcisco.com
What does IPv6 bring?

What are the IPv6 Benefits? The new IP Protocol, IPv6 Protocol comes with some new features beside it. These new features brings manay benefits together with IPv6. What are these IPv6 Benefits? In this lessons, we will focus on Features coming withh IPv6 and IPv6…


IPv6 Interface ID with EUI64 Format
IPv6 and IPv6 Addresses

What is an IPv6 Address?   IPv6 Address is the new generation IP address that is mainly deveoped to overcome IPv4 exhaust and its limitations. As you know, IPv4 Addresses were limited and exhaused shortly. For the new technologies, more IP addresess needed and for…


ospfv3-versus-ospfv2-ipcisco
IPv6 Routing Protocols – Part 2 (OSPFv3)

OSPFv3 is a new version of OSPFv2 protocol that is developed for IPv6. The previous version, OSPFv4 was only used for IPv4. With the IPv6 revolution, routing protocols have also changed and new versions of routing protocols developed. OSPFv3 is one of the routing protocols…


ipv4 ipv6 routing protocols transition
IPv6 Routing Protocols

IPv6 Routing Protocols IPv4 and IPv6 Protocol Comparison Routing is a process that we route packets in a network as static or dynamic. Static routing is done manually and dynamic routing is done with the help of Routing Protocols. These routing protocols are RIP, EIGRP,OSPF,ISIS…


IPTV network design
IPTV Overview– Part 2

Components of The IPTV System We can divide the IPTV compontents into 5 parts. These parts are defined below: National Head-End : Origination point of network broadcasts for tranmisssion over the IP network. Core Network : Generally an IP/MPLS network that transports the traffic to…


IPTV multicast
IPTV Overview– Part 1

IPTV Overview IPTV with its long name Internet Protocol Television is a television system that this service is delivered using the IP suite over a packet-switched network like internet. Traditionally, the television system is delivered through terrestrial , cable tv or satellite. But IPTV is…


Ethernet collision
Ethernet Collisions and Troubleshooting

In this article, we will focus on ethernet collisions and how to troubleshoot these common situations. Let’s start with, what is collision. In computer networking Collision is the situation that occurs while the two or more device try to use the shared medium at the…


Juniper-Static-Routing-Example
IPv6 Static Routes (On Juniper Routers)

IPv6 Static Routes (On Juniper Routers) On Juniper routers to create a static route for IPv6 we use “routing-options” hierarchy as IPv4. But this time after this hierarchy, we go under another hierarchy, “ rib inet6.0”. The below example will be a basic example of…


cisco-static-routing-example
IPv6 Static Routes (On Cisco Routers)

IPv6 Static Routes (On Cisco Routers) On Cisco routers to create a static route for IPv6, we use the similar commands with IPv4. We can make this configuration with three ways : 1) To send all packets to the next-hop address : ipv6 route 2001:dc8:b15:4::1/64…


packet tracer vtp topology
VTP Configuration with Packet Tracer

Packet Tracer VTP Configuration   In this article, we will focus on how to configure VTP, with Packet Tracer. For VTP Configuration, we will use the topology below with two switches and two PCs.   VTP Example Topology You can DOWNLOAD the Packet Tracer example…


VTP, VLAN Trunking Protocol
VTP (VLAN Trunking Protocol)

What is VLAN Trunking Protocol? VTP (VLAN Trunking Protocol) is a Layer 2 Protocol that allows to control, create and delete VLANs from a central VTP Server. Cisco switches are in “vtp server mode” by default. In a large network there can be mant switches…


snmp configuration on juniper
SNMP - Part 3 (Configuration On Juniper Junos)

SNMP Configuration On Juniper Junos We begin the SNMP configuration with Cisco devices and here, we will continue how to configure a Juniper device for SNMP. In this article we will not mention all the parameters deeply like in the before article. We will check…


snmp configuration example on cisco
SNMP Configuration On Cisco IOS

In this Cisco SNMP Configuration Example, we will see how to configure SNMP on Cisco SNMP Agent device. In this part I do not consider necessary what the snmp agent is. You already know that it is the device that we consider to manage with…


MPLS Enabling on Cisco IOS
Enabling MPLS On Cisco Routers

Enabling MPLS On Cisco Routers In this article, we will study how to enable CEF, how to enable MPLS and how to configure label protocol ldp on Cisco routers. During this survey we will check the configuretion with various basic show command that will be…


tcp header
TCP Header Part – 3

TCP Flags Each TCP segment has a special purpose and this is determined by flags.Here we will study on 6 important control flags. There are also other options in flag field, but we will focus only 6 of them. You can check these flags below.…


TCP Header
TCP Header Part – 1

TCP Header Part 1 In this section, we will survey the TCP header in packets. As you know TCP is a layer 4 protocol and its header is also have parameters about layer 4. Before TCP header, packet has layer 3 header, it is IP…


TCP Header seq ack
TCP Header Part – 2

Sequence & Acknowledgement Number Sequence and Acknowledgement fields are another important fields in TCP Header. Each of these TCP Header Fields are 32 bits long. Datas generally sent and received with packets larger than MTU. So using sequence and acknowledgement number getting important during this…


Nokia-default-and-floating-routing
Default Routes and Floating Static Routes on Alcatel Routers

In this lesson we will talk about two different Static Route types. One of them is "Default Routes" and the other is "Floating Static Routes". Now, let's see what are they and why we use these different Static Routes. We will also see, how to…


Alcatel static route configuration
Static Routing with Alcatel-Lucent Service Routers

Static Routing with Nokia (Alcatel-Lucent) Service Routers   As you know Nokia is another network device vendor like Cisco and Juniper. Here, we will see the static route configuration with Nokia routers. For this configuration, we will use one of the routers in Nokia's Service…


cisco forecast
Cisco Global Cloud Index (2010-2015)

Cisco Global Cloud Index (2010-2015) In Cisco’s Global Cloud index, Cisco explore the trends and make the next 5 years datacenter virtualization and cloud computing forecasts. The key points in this document are summarized below.   By the end of 2015, the annual data center…


SNMP Configuration on Cisco Routers

  SNMP Configuration Commands for Cisco Routers There are a number of commands can be used to configure SNMP on a Cisco device. Some of these commands are required although some are optional. The required ones are mentioned below: Router(config)# snmp-server community string [view view-name]…


Frame Relay Map
Basic Frame-Relay Configuration with both Inverse-ARP and Frame-Relay Map Command

[/wcm_restrict] Basic Frame-Relay Configuration with Both Inverse-ARP and Frame-Relay Map Command Here, we will talk about two options for configuring Frame-Relay Maps. One is Inverse-ARP and the other is with “frame-relay map” command. To show this in a basic topology, we will use the below…


Basic Multipoint Frame Relay Configuration
Basic Multipoint Frame Relay Configuration

Basic Multipoint Frame RelayConfiguration on Cisco Here, in multipoint Frame-Relay configuration, we will use the same Cisco 3600 series routers and a frame relay switch. But here, our configuration will not be point-to-point only. Routers will be connecting to the routers as multipoint. We will…


Basic Frame Relay Point-to-Point Configuration

Basic Frame Relay Point-to-Point Configuration on Cisco AS you know Frame-Relay is a well-known WAN technology that generally used for backbone routers. To understand the basic configuration of Frame-Relay, there is a configuration below with three Cisco 3600 Series Router and one Frame-Relay Switch. First…


Juniper Static Configuration
Static Route Configuration on Juniper Routers

Static Route Configuration on Juniper Routers In this article we will focus on static route configuration on Juniper routers. Here, we will use Juniper JuNOS and we will be familiar with some JuNOS commands. The basic topology that we will use is below. We have…


GSM Edge TEchnology
Evolution from 2G to LTE (Part 3 – EDGE)

Evolution from 2G to LTE (Part 3 – EDGE) Beyond GPRS, EDGE(Enhanced Data rates for GSM Evolution) takes the cellular community one step closer to UMTS. It provides higher data rates than GPRS and introduces a new modulation scheme called “8-PSK”. EDGE is also being…


GPRS Topology
Evolution from 2G to LTE (Part 2 – GPRS)

Evolution from 2G to LTE (Part 2 – GPRS) The evolution had started with additional of the packet switched network to the GSM network architecture. And this new technology called GPRS(General Packet Radio Service). It is also called 2,5G. GPRS is important as a migration…


GSM to LTE
Evolution from 2G to LTE (Part 1 – GSM)

Evolution from 2G to LTE (Part 1 – GSM) The evolution of the 2G technology to LTE technology is in three types: Technical evolution : The new network elements are developed with new technology Network Evolution : General functionality of network will change Service Evolution…


DHCP4
Router DHCP Configuration with Packet Tracer

In this DHCP Cisco Packet Tracer router example, we will focus on DHCP Configuration in Cisco Packet Tracer. In other words, we will see how to configure a DHCP Server with Packet Tracer Router. Before start up I want to give some basic information about…


access-lists, pacl,racl,vacl
Access Control Lists for Traffic Control

Access Control Lists for Traffic Control There are various ways for network traffic control. One of the common ways for this job is using Access Contorol Lists. There are three types of access lists. These are; • Router Access Control Lists( RACLs) • Port Access…


mpls-header
What is MPLS?

What is MPLS? MPLS is a packet-forwarding technology which uses labels for data forwarding decisions.Over time, users in networks have increased and this big traffic has brougt high bandwidth and forwarding speed need.The existing routing protocols was looking to the routing table for forwarding decision…


Basic JUNOS
Initial Configuration for Juniper Routers

Initial Configuration for Juniper Routers This article is telling about some of the initial configurations of Juniper Routers. Here are the steps that you will experience when you firstly start the Juniper CLI Junos. 1) The first thing you will see is the default user…


IPv4 Header
IPv4 and IPv6 Headers

IPv4 Header versus IPv6 Header   IPv4 and IPv6 are the two man version of Internet Protocol, IP. Both IPv4 and IPv6 has Headers and these headers are a little different. After IPv4 Header, IPv6 Header has designe to be simpler and more efficient even…


single area ospf
Cisco Single Area OSPF Configuration

OSPF Cisco Configuration   OSPF (Open Shortest Path First) protocol is a well-known routing protocol that is widely used today. To configure a network for OSPF properly there are some steps. For basic OSPF Cisco Configuration, the following scenario will be a good example.  …


static routing
Static Route Configuration on Cisco Routers

Cisco Static Route Configuration To send the traffic to the destination we can use two types of routing. Static and Dynamic routing. Static route tell the network devices about exact location.Beside, static routers can work well with small networks. For large scale networks dynamic routing…


router-password-recovery
Cisco Router Password Recovery

How to Password Recovery on Cisco Routers? There are several reasons to recover a router’s enable password. For example you can forget the password or somebody might give a password that you don’t know. So, to reach your router's or switch's command line interface, you…


Ether Channel
EtherChannel Configuration

Etherchannel Configuration Layer 3 Etherchannel with PAgP Spanning-Tree blocks redundant links and avoid Layer 2 loops. Etherchannels load balance the traffic between the redundant links and uses the bandwidth more efficient. Sp, how can we configure etherchannel? To understand more clear,  here is a basic…


IP (Internet Protocol)

IP is the primary netwok protocol that used for relaying packets across an internetwork. It is developed in the 1970s. In the network world it is commonly used with TCP(Transmission Control Protocol) as TCP/IP... Internet Protocol supports unique addresses for network devices. The previous version…