Posts

CCNA Extra Class 03: Basic VPN Tunneling Configuration in Cisco

Image
 How to Configure the Basic VPN Tunneling Between Cisco Routers Step-01: Routing Protocol Configuration R1(config)#route rip R1(config-router)#network 10.0.0.0  R1(config-router)#network 1.0.0.0 R2(config)#router rip  R2(config-router)#network 20.0.0.0 R2(config-router)#network 2.0.0.0 Core_R(config)#router rip  Core_R(config-router)#network 1.0.0.0 Core_R(config-router)#network 2.0.0.0 Step-02: Create VPN Tunneling both Routers R1(config)#interface tunnel 100 R1(config-if)#ip address 172.31.0.1 255.255.255.0 R1(config-if)#no shutdown  R1(config-if)#tunnel source serial 0/0/0 R1(config-if)#tunnel destination 2.0.0.2 R2(config)#interface tunnel 200 R2(config-if)#no shutdown  R2(config-if)#ip address 172.31.0.2 255.255.255.0 R2(config-if)#tunnel source serial 0/0/0 R2(config-if)#tunnel destination 1.0.0.2 Step-03: Routing For passing Data through VPN Tunnel R1(config)#ip route 20.0.0.0 255.255.255.0 172.31.0.2 R2(config)#ip route 10.0.0.0 255.255.255.0 172.31...

CCNA Extra Lesson 02: Concept of Switch Port Security in Cisco

Image
Port Security in Cisco Switch Port Security in a Cisco switch is a feature that helps protect the network by restricting input to an interface and limiting and identifying the MAC addresses of the stations allowed to access the port. It’s widely used in enterprise and ISP networks to prevent unauthorized devices from connecting to the network. Ethernet Port Security Use - Preventing unauthorized access — stops users from plugging in personal laptops or switches. Limit MAC flooding attacks — protects the MAC address table from being overfilled. Enforce endpoint control — only pre-approved devices can connect.    When port security is enabled: The switch port learns or is configured with allowed MAC addresses Any device with an unrecognized MAC address trying to send traffic is blocked or triggers an action. You can set how many devices are allowed per port (default: 1).      Port Security Terms Static Secure MAC Address -- Manually configured MAC address ...

CCNA Extra Lesson 01: VTP (VLAN Trunking Protocol) Concept and Configuration

Image
Overview of the VTP in Networking "" Can you imagine that you have hundreds of Cisco Switches among your networks and you have huge amount of VLANs, that you have to provisioning to among of those switches.? What will you have to do when the you have to configure all of the VLANs manually.? "" So, to reduce the burden of provisioning VLANs on switches, CISCO came up with this solution: VTP – VLAN Trunking Protocol. VLAN Trunking Protocol (VTP) is a Cisco proprietary Layer 2 protocol that helps manage VLAN configuration consistently across a network of Cisco switches. Instead of manually creating, deleting, or renaming VLANs on every switch, VTP allows you to configure VLAN information on one switch (the VTP server) and automatically propagate those changes to all other switches in the same VTP domain. It’s like having one “control center” for VLAN management in your network. How VTP Works VTP messages are sent over trunk links (such as IEEE 802.1Q or ISL) to share...

CCNA Class 20: Hybrid Network Configuration with Concept

Image
Overview of Hybrid Network A Hybrid Network refers to a network design that integrates multiple types of networking technologies, topologies, or routing protocols. In networking, "hybrid" can refer to: - A mix of wired and wireless networks. A blend of client-server and peer-to-peer models. A combination of routing protocols (e.g., static, RIP, OSPF, EIGRP, BGP). In a word, Hybrid Network combination of different types of network components and technologies to maximize efficiency, flexibility, scalability, and reliability. Instance of Hybrid Networking in computer science, that in the intricate world of network engineering, mastering the seamless integration of EIGRP, BGP, and OSPF is not only importance but also part and parcel of network architecture. For providing extensive solution by EIGRP, BGP and OSPF routing protocol in the network architecture is called Redistributing Routes as a Network administrator. The Redistribution Routing process a critical skill for networ...

MS-AZ-Q1:How to Change the Default RDP Port Number in the Azure Virtual Machine

Image
Step-by-Step Guide to Changing the RDP Port in Azure VPS Machine - Setup the VM Machine’s Firewall Rule for RDP Create a Inbound Rules. Setup Registry in the VM Machine for RDP (if needed) Change a PortNumber Script from regedit Setup the Azure Portal for Custom RDP  Create a Rule for RDP on NSG (Network Security Group) Run Script for RDP Run Command Change the Port Number Access from Connect Option from Left-side Nav Pane. Step-01: Create a New Inbound Rule for the RDP Port => Control Panel\All Control Panel Items\Windows Defender Firewall\Advanced Settings. => Click on Right Button Mouse above Inbound Rules Option at the left side nevigation bar + Create New Rules & Select Port + Click Next Button =>Write the Specific Port on the Local Ports Field & Click Next => Please follow the instructions according to the below pictures until click on finished button. =>  Verify the Firewall Rule Profile Step-02:  Access the Registry Editor for RDP Port Num...