Month June 2011

Spanning-tree Guard Root

STP RootGuard Feature §Root guard is useful in avoiding Layer 2 loops during network anomalies. The Root guard feature forces an interface to become a designated port to prevent surrounding switches from becoming root bridges. §Root guard-enabled ports are forced…

3560/3550 Recovery Procedure

3560/3550 Recovery Procedure———————————— Connect a PC to the console port of the switch, Use a terminal emulation program such as Microsoft Windows HyperTerminal in order to establish the console session. These are the settings: Bits per second: 9600 Data bits:…

Configure Replace

Configure Replace ————————– If you want to replace your running configuration with the configuration saved in your router flash: memory , you can simply follow the procedure:- First of all check with the available files in the Router flash: memory,issue…

eBGP Peering

eBGP Peering ——————- We are able to peer with a tool in different Autonomous System utilizing eBGP. The AD(administrative distance) for eBGP friends is 20. By default the time-to-live(TTL) is about to 1 for eBGP classes. If a eBGP session…

Dot1x Authentication

Dot1x Authentication ————————– Recently i have configured the Dot1x authentication in my network, thought of posting on my blog. It is a cool feature,with Dot1x authentication we can provide added security at the access layer switches of the network,it uses…

QinQ Tunneling

QinQ Tunneling ———————— This is the method basically used by service providers to preserve Vlan-Ids and to segregate traffic of different customers.It enables service providers to use a single VLAN to support different customers who have a single or multiple…

MPLS Terminologies

MPLS Terminologies ————————– >MPLS:-The evolution of MPLS was Cisco’s TAG Switching however as it seems it was Cisco’s proprietary so it must be used in Cisco world only,to make it open standard IEEE made a similar kind of Protocol not…

MPLS VPN Scenario

OSPF /32 issue in MPLS VPN Scenario =========================== Yesterday i and my office colleague were doing a MPLS-VPN scenario,where we stuck at a place , the issue was really good , thats why thought of posting it on my blog.…

OSPF Cost Manipulation

OSPF Cost Manipulation ====================== The equation used for cost manipulation in OSPF is :- OSPF Cost=Reference Bandwidth/Interface Bandwidth It simply means that we can manipulate any one of the three parameters to adjust our OSPF cost. First of all we…

Switchport Mode Private-Vlan

Hi guys i am back was stuck in some office work. As per the heading we are discussing Private-Vlans today,First of all Why we use Private Vlans in our switches? ,even before why we even use Vlans in our switches?…