Author: Seth Carter
How to assign an IP address to the switch, router, and PC in the Cisco packet tracer? Assigning the IP address is the first step while creating a network …
Working on Cisco packet tracer CLI and how it is different than real routers CLI? CLI in packet tracer mimic the CLI of the real router however packet tracer …
How parental alienation against father is abuse and how it affects the father and children? Parental alienation against father commonly happens when the mother and father are not in …
How to use access list permit statements while creating the access lists While creating an access list, we have to make sure that we are using the correct permit …
Family alienation happens when one of the family members is alienated from the family. Family alienation affects the peace and environment of the family and it is not easy …
/26 subnet mask with practical examples /26 subnet mask in binary is 11111111.11111111.11111111.11000000 so the subnet mask becomes 255.255.255.192 This is the subnetted network in which two host bits …
/25 subnet and its practical use /25 subnet is obtained through subnetting the different types of available default class a, b, and c addresses. /25 in binary is 11111111.11111111.11111111.10000000 …
/24 subnet mask with example /24 subnet mask is the default subnet mask of the class c network which means all IP addresses in the range from 192.0. 0.0 …
Port 22 is the well-known port number that is usually used for SSH connection. SSH provides a secure connection to the remote device in which the communication is encrypted …
In Four examples, we will configure 4 access controls lists covering both standards and extended access lists that will block different types of traffic Example 1 Standard access list …