Home Network & Security

Network & Security

BGP next hop behavior

BGP next hop behavior: - BGP is an AS by AS routing protocol. By default, BGP only change the next hop behavior, when it changes...

HSRP Interview Question and Answer

HSRP Interview Question and Answer :- Ques. What do mean by HSRP (Hot standby Router Protocol) or What is the Use of HSRP ? Ans. Normally we use...

How to add host in GNS3

Adding host in GNS3. Router Method:- The following is step by step configuration required to implement. Step 1- Go to the router and follow the below steps. •Router(config)#...
how to check power supply status in cisco router

how to check power supply status in cisco router

how to check power supply status in cisco router :-  The show environment command can be very helpful to alert you of potential hardware issues. But...

Exporting Firewall policies into CSV

Exporting Firewall policies into CSV Here, I am going to export FortiGate firewall policies into CSV. Here is the step by step process with perl script...

Switchport Port-Security Configuration & Troubleshooting

This tutorial explain Switchport Port-Security Configuration, Verification's & troubleshooting, port security violation mode, static & sticky mac address configuration etc... Switch port port-security:- Port security is used to block input to an...
Named-ACL

Named Access List

Named Access List: - Basically, when we create an Access List we assign a number. But number is not so user friendly, so we can...

Sophos real time bandwidth usages for interfaces

Sophos real time bandwidth usages for interfaces :- It would be great to be able to see live Bandwidth speed stats for each Interface using...

Link flap & err-disabled problem in CISO IOS

Link flap & err-disabled problem in CISO IOS Link Flap Problem  :-  Link flap means that the interface continually goes up and down. The interface...
Access Control List Rules

Access Control List Rules

  Access Control List: -  ACL is a set of rules that is usually used to filter the network traffic. Access Control List Rules: - Write deny statement...