Switching

In this article, we will focus on detailed Port Security Configuration. For our Port Security Configuration, we will use the below topology. In this topology we will make examples for 
Read More
Port Security is the security mechanism used in switches. With this mechanism, a specific port of a switch can be protected with undesirable access. Here, we will learn the theory 
Read More
On Juniper devices, VLAN translation term is used for mentioning the swap of incoming VLAN id to a new VLAN id. In the below configuration examples, we will do this 
Read More
On Cisco devices, VLAN mapping term is used for mentioning the swap of incoming VLAN id to a new VLAN id. In the below configuration examples, we will see Cisco 
Read More
In the different locations of the customer, the same VLAN tag means the same. But there is a service provider network between the customer locations. Customers and the service provider 
Read More