Skip to content
No results
  • Home
  • Learn Networking Basics
  • Blog
  • Courses
  • Tools
    • Subnet & Wildcard Calculator
    • Who is my ISP Tool
    • Word Counter Tool
  • About Me
  • Contact
Afroz Ahmad
  • Home
  • Learn Networking Basics
  • Blog
  • Courses
  • Tools
    • Subnet & Wildcard Calculator
    • Who is my ISP Tool
    • Word Counter Tool
  • About Me
  • Contact
Afroz Ahmad
  • ByAfroz Ahmad
  • OnOctober 29, 2011
  • InMulticast
  • Read Time10 mins

MSDP with BGP Address-family Ipv4 Multicast

Today we delve into the foundational architecture of MSDP with BGP IPv4 Multicast address-family. While initially published in 2011, the core principles of inter-Autonomous System (AS) multicast routing remain critical for understanding modern network designs. This updated post revisits the…

Read MoreMSDP with BGP Address-family Ipv4 Multicast
  • ByAfroz Ahmad
  • OnJune 18, 2011
  • InSwitching
  • Read Time8 mins

STP Root Guard: Automation & Best Practices 2025

Spanning Tree Protocol (STP) remains a critical Layer 2 defense mechanism, even in the age of advanced network fabrics. The STP Root Guard feature is an indispensable tool for preventing rogue switches from becoming the root bridge, thus maintaining network…

Read MoreSTP Root Guard: Automation & Best Practices 2025
  • ByAfroz Ahmad
  • OnJune 15, 2011
  • InSwitching
  • Read Time17 mins

Cisco 3560/3550 EOL Console Recovery Procedure

While much of the networking world has shifted towards automation and API-driven recovery, there are still situations where understanding fundamental device recovery procedures is critical. This guide, originally published in 2011 and updated in 2021, focuses on the console-based recovery…

Read MoreCisco 3560/3550 EOL Console Recovery Procedure
  • ByAfroz Ahmad
  • OnJune 14, 2011
  • InWeird Cisco Commands
  • Read Time9 mins

Cisco Configure Replace: Modern Use & Best Practices

As a network engineer, I’ve broken configs enough times to know the value of a solid rollback strategy. One of the most powerful, yet sometimes underutilized, commands in the Cisco IOS and IOS-XE toolkit is configure replace. While it might…

Read MoreCisco Configure Replace: Modern Use & Best Practices
  • ByAfroz Ahmad
  • OnJune 13, 2011
  • InBGP
  • Read Time7 mins

eBGP Peering: Intent-Based Path Selection

The backbone of inter-Autonomous System (AS) communication on the internet relies heavily on External Border Gateway Protocol (eBGP). As networks evolve, so do the best practices and methods for configuring, securing, and automating eBGP peering. This updated guide dives into…

Read MoreeBGP Peering: Intent-Based Path Selection
  • ByAfroz Ahmad
  • OnJune 12, 2011
  • InSwitching
  • Read Time10 mins

Cisco IOS Dot1x Authentication Configuration

Ah, 802.1X authentication – a true veteran in network security, often affectionately (or sometimes exasperatedly) known as Dot1x. I remember configuring my first Dot1x setup way back in the day, and it felt like unlocking a new level of control…

Read MoreCisco IOS Dot1x Authentication Configuration
  • ByAfroz Ahmad
  • OnJune 11, 2011
  • InSwitching
  • Read Time20 mins

QinQ Tunneling: Modern Deployments and Automation Practices

QinQ Tunneling

When I first wrote about QinQ tunneling (or IEEE 802.1ad, formally known as Provider Bridging) back in 2011, it was an absolutely foundational technology for service providers. Fast forward to today, and while the network landscape has evolved dramatically with…

Read MoreQinQ Tunneling: Modern Deployments and Automation Practices
  • ByAfroz Ahmad
  • OnJune 10, 2011
  • InMPLS
  • Read Time9 mins

Foundational MPLS Terminologies

The Big Picture MPLS Network Overview

As a senior network engineer, I’ve witnessed firsthand the dramatic evolution of network technologies. While innovations like SD-WAN and cloud networking are now standard, fundamental concepts like MPLS remain vital, especially in service provider and large enterprise networks. Understanding MPLS…

Read MoreFoundational MPLS Terminologies
  • ByAfroz Ahmad
  • OnJune 9, 2011
  • InMPLS
  • 2 Comments
  • Read Time8 mins

MPLS VPN Scenario: OSPF Loopback /32 Routes

OSPF /32 Issue in MPLS VPN Scenario: A Modern Troubleshooting and Automation Perspective =========================== Recently, while collaborating with a colleague on an MPLS Layer 3 VPN deployment, we encountered a deceptively simple issue that caused considerable head-scratching. It turned out…

Read MoreMPLS VPN Scenario: OSPF Loopback /32 Routes
  • ByAfroz Ahmad
  • OnJune 8, 2011
  • InOSPF, Routing and Switching
  • Read Time6 mins

OSPF Cost Manipulation: Modern Best Practices and Automation

As a network engineer, I often find myself fine-tuning routing protocols to optimize traffic flow and ensure network resilience. One of the fundamental ways we influence Open Shortest Path First (OSPF) behavior is through cost manipulation. While the core principles…

Read MoreOSPF Cost Manipulation: Modern Best Practices and Automation
Prev
1 … 30 31 32 33 34
Next

About Me - My name is Afroz, and I bring over 17 years of expertise as a Network Engineer. I've worked with multiple ISPs throughout my career and am currently engaged with one of the major ISP equipment vendors as a Network Designer.  - My Linkedin Profile

Disclaimer: As an Amazon Associate, I earn from qualifying purchases. Read More

  • Home
  • Learn Networking Basics
  • Blog
  • Courses
  • Tools
  • About Me
  • Contact

Policies

  • Terms of Use
  • Privacy Policy

Copyright © 2025 Afroz Ahmad