I came across a bug in IOS 12.2(53r)SE2 and it shows up in other IOS versions, where the “Total output...
Google has discovered a vulnerability in the design of SSL version 3.0. This vulnerability allows the plaintext of secure connections...
Below I am going to give some examples for Policy Static NATs and Regular Basic NATs. Configuring Policy Static NAT...
Some common ones I use:...
When a switch stack forms a port-channel, the active stack member’s MAC Address is used for the LACP ID. The...
RFC1918 name IP address range number of addresses largest CIDR block (subnet mask) host id size mask bits classful description...
Below I will go over the different security threats that can happen on our network and a way to mitigate...
Here’s something you can come accross. When you do a “sh vpc“, you’ll notice that your Type-2 consistency status is...
RIB vs FIB In Cisco networking, the Routing Information Base (RIB) and Forwarding Information Base (FIB) are two separate but...