Category: Tutorials
How to assign an IP address to the switch, router, and PC in the Cisco packet tracer? Assigning the IP address is the first step while creating a network …
Working on Cisco packet tracer CLI and how it is different than real routers CLI? CLI in packet tracer mimic the CLI of the real router however packet tracer …
How to use access list permit statements while creating the access lists While creating an access list, we have to make sure that we are using the correct permit …
/26 subnet mask with practical examples /26 subnet mask in binary is 11111111.11111111.11111111.11000000 so the subnet mask becomes 255.255.255.192 This is the subnetted network in which two host bits …
/25 subnet and its practical use /25 subnet is obtained through subnetting the different types of available default class a, b, and c addresses. /25 in binary is 11111111.11111111.11111111.10000000 …
/24 subnet mask with example /24 subnet mask is the default subnet mask of the class c network which means all IP addresses in the range from 192.0. 0.0 …
Port 22 is the well-known port number that is usually used for SSH connection. SSH provides a secure connection to the remote device in which the communication is encrypted …
In Four examples, we will configure 4 access controls lists covering both standards and extended access lists that will block different types of traffic Example 1 Standard access list …
Let’s discuss why VTP is not recommended and how to disable VTP on the Cisco switch VTP replicates the VLANs created on one switch to other switches in the …
In this lab, we will set up Cisco VTP modes and configure them in packet tracer. Download VTP (Virtual trunking protocol) replicates the Vlan information from one switch to …