Switching

In this article, we will focus on detailed Port Security Cisco Configuration. For our Cisco Port Security Configuration, we will use the below topology. In this topology we will make 
Read More
Port Security is the security mechanism used in switches. With this mechanism, a specific port of a switch can be protected with undesirable access. Here, we will learn the theory 
Read More
On Juniper devices, VLAN translation term is used for mentioning the swap of incoming VLAN id to a new VLAN id. In the below configuration examples, we will configure VLAN 
Read More
Virtual LANs (VLANs)  are very important for a network. Sometimes network engineers need to map VLANs to VLANs. This is called VLAN Mapping. In other words, on Cisco devices, VLAN 
Read More
In the different locations of the customer, the same VLAN tag means the same. But there is a service provider network between the customer locations. Customers and the Service Provider 
Read More