Current category:
This example shows how to generate 254 loop interfaces with assigned ipv4 addresses 172.16.0.1/24 up to 172.16.255.1/24. The code is: enable tclsh for {set i 0} {$i < 256} {incr i} { ios_config „int loop $i“ „ip address 172.16.$i.1 255.255.255.0″…
Teaching CCNP ROUTE courses and describing the problematic of two-way routing redistribution I need an example describing the case which point out to the process of creating a routing loop. This example shows how such routing loop may arise using…
We investigate a special topology condition, where a switch is connected itself on ports Faa0/1 and Fa0/2, and one of the port has BPDUFilter feature applied (i.e. simulating STP is switched off). Both ports are in the same vlan (vlan…
There is some confusion and misunderstanding regarding VTP (VLAN Trunking Protocol)+DTP (Dynamic Trunking Protocol) and this article will hopefully make it all clear. Most of the confusion comes from the statement that VTP is always a security threat to your…
Notes: Loki is a Python based framework implementing many packet generation and attack modules for Layer 3 protocols, including BGP, LDP, OSPF, VRRP and quite a few others. Web: https://www.c0decafe.de/loki.html http://www.ernw.de/content/e6/e180/e1561/Blackhat2010_ERNW_Loki_ger.pdf http://www.ernw.de/content/e6/e180/index_eng.html http://www.packetstan.com/2011/02/running-loki-on-backtrack-4-r2.html
Sometimes in my lab happens that students delete IOS of the switch from its flash. Unfortunately switches does not have rommon to realize quick IOS recovery over tftp. Only one way is over Xmodem. To speed up the process of…
In this article I will configure, debug and shows the process of RIPv2 authentication. Authentication methods Plain text MD5 Note 1: When using plain text authentication mode, make sure that the following parameters are matching on neighboring routers…
The default configuration for the switch allows an end user with physical access to the switch to recover from a lost password by interrupting the boot process during power-on and by entering a new password. These recovery procedures require…
Latest comments
Favourite categories
Login to Network Information Library Žilina!
© 2025 NIL Žilina