Category: Tutorials
How to use access list permit statements while creating the access lists While creating an access list, we have to make sure that we are using the correct permit …
/26 subnet mask with practical examples /26 subnet mask in binary is 11111111.11111111.11111111.11000000 so the subnet mask becomes 255.255.255.192 This is the subnetted network in which two host bits …
/25 subnet and its practical use /25 subnet is obtained through subnetting the different types of available default class a, b, and c addresses. /25 in binary is 11111111.11111111.11111111.10000000 …
/24 subnet mask with example /24 subnet mask is the default subnet mask of the class c network which means all IP addresses in the range from 192.0. 0.0 …
Port 22 is the well-known port number that is usually used for SSH connection. SSH provides a secure connection to the remote device in which the communication is encrypted …
In Four examples, we will configure 4 access controls lists covering both standards and extended access lists that will block different types of traffic Example 1 Standard access list …
Let’s discuss why VTP is not recommended and how to disable VTP on the Cisco switch VTP replicates the VLANs created on one switch to other switches in the …
In this lab, we will set up Cisco VTP modes and configure them in packet tracer. Download VTP (Virtual trunking protocol) replicates the Vlan information from one switch to …
Setting up a DHCP server and configuring the router as DHCP a server in the Cisco packet tracer In the Cisco packet tracer, various endpoints are given that we …
Configure and customize router 1841 in Cisco packet tracer Router 1841 is the next version of the Cisco 1700 series routers. 1841 is considered more powerful with a lot …