#PEERS Internal BGP (iBGP) peers and external BGP (eBGP) peers are the two types of peers used by BGP. BGP...
Finding Spanning Tree Protocol (STP) topology changes in a network is not always straightforward. However, it is critical to identify...
So what is Akamai prolexic routed DDOS protection? Prolexic Routed is a simple and effective approach for businesses to secure...
This post shows three IPv4 address blocks that are available for documentation purposes. Predefined address ranges for documentation and examples...
I’m hoping to post some examples in the near future but below is how you manipulate the traffic flow with...
One ASN is usually given to the Regional Internet Register (RIR) when two companies merge. Each organization must maintain its...
There’s been reports of RADIUS issues when dealing with the cloud because of out of order packets and fragmentation. On...
I’m writing this post because I’ve been in many environments where a VLAN is brought up as if it’s securing...
Cost consideration is an essential aspect when designing and implementing network architecture. Here, we delve into the three primary components...
LLDP and CDP are both network discovery protocols, but they have some key differences: 1. Standardization and Vendor-Neutrality: LLDP is...