Practical Networking .net

Looking for Reviewers for my Practical TLS course

I am beginning the process of recording my Practical TLS course. It is one of the most requested classes from the Course Survey. The course is a deep dive on TLS and SSL, the protocols which secure the Internet. The course will take anyone with any amount of exposure to SSL/TLS and make them a […]


Networking Fundamentals: How data moves through the Internet

I started recording a new video series covering How Data moves through the Internet. The intent of this first set of videos is to serve as the first Module of a new course I’m developing discussing Networking Fundamentals. The full course will give anyone looking to start a career in Networking the foundation they need […]


Local Broadcast vs Directed Broadcast

Two types of Broadcast IP addresses exist: the Local Broadcast IP address and the Directed Broadcast IP address. In the current networking world, they mostly serve the same function. But one of them contains an additionally piece of functionality. In this article we’ll clearly illustrate both concepts, and show you their functionality. We’re going to […]


Access Control Lists (ACLs)

Access Control Lists, or ACLs, are a tool that is used to define traffic on Cisco routers. By themselves, they merely identify a particular set of traffic. How you apply the ACL then determines what occurs to that traffic. For instance, if you apply an ACL to… … an interface? Matched traffic is allowed through […]


ACLs… Closer to the Source or the Destination?

The final video in the ACL video series answers the age old question: Where should you apply ACLs? Specifically, we’re going to look at the ideas of applying ACLs closest to the source or closest to the destination; and in what cases you should do either, or neither. The specific subjects and timestamps for what […]


Applying ACLs to Interfaces

In Part 7 of the video series on Access Control Lists we finally apply access lists to an Interface. In Video 1 we discussed that an ACL is simply a tool used to identify traffic on a Cisco Router. We discussed that what an ACL does is a result of how you apply it. In […]


IPv6 Access Lists

In Part 6 of the video series on Access Lists we look at the syntax and configuration of IPv6 ACLs. This video picks up where we left off and is a direct follow up to the five videos before it. The core of this video simply shows you how IPv6 ACLs are just a little […]


Named ACL Configuration

Part 5 of the video series on Access Control Lists is a demonstration of the configuration of Named ACLs. We begin by re-configuring the Numbered ACL from Part 3 as a Named ACL in order to show you the similarities between the syntax of Named ACLs and Numbered ACLs. Then we step through and demonstration […]