Practical Networking .net
chat

Looking for Reviewers for my Practical TLS course

I am beginning the process of recording my Practical TLS course. It is one of the most requested classes from the Course Survey. The course is a deep dive on TLS and SSL, the protocols which secure the Internet. The course will take anyone with any amount of exposure to SSL/TLS and make them a […]

video

Supernetting, IP Aggregation, and IP Summarization

Supernetting is something like the inverse of Subnetting. With Subnetting, you take one Network and divide it into multiple sub-networks (subnets). With Supernetting, you are doing the opposite: you take multiple subnets and aggregating them into a single Network. Supernetting is synonymous to the terms IP Aggregation and IP Summarization. Often, training explicitly on Supernetting […]

post

Upcoming Live Streams: IP Aggregation and SuperNetting – 5/13 & 5/15

Last week I did my first live stream! I discussed how to do VLSM problems using only a pen and paper. In the Subnetting Mastery video series, I showed you how to solve VLSM problems using a big table mapping out the networks you are assigning. This was intentional to teach VLSM conceptually. But in […]

post

Networking Fundamentals: How data moves through the Internet

I started recording a new video series covering How Data moves through the Internet. The intent of this first set of videos is to serve as the first Module of a new course I’m developing discussing Networking Fundamentals. The full course will give anyone looking to start a career in Networking the foundation they need […]

post

Local Broadcast vs Directed Broadcast

Two types of Broadcast IP addresses exist: the Local Broadcast IP address and the Directed Broadcast IP address. In the current networking world, they mostly serve the same function. But one of them contains an additionally piece of functionality. In this article we’ll clearly illustrate both concepts, and show you their functionality. We’re going to […]

post

Access Control Lists (ACLs)

Access Control Lists, or ACLs, are a tool that is used to define traffic on Cisco routers. By themselves, they merely identify a particular set of traffic. How you apply the ACL then determines what occurs to that traffic. For instance, if you apply an ACL to… … an interface? Matched traffic is allowed through […]

video

ACLs… Closer to the Source or the Destination?

The final video in the ACL video series answers the age old question: Where should you apply ACLs? Specifically, we’re going to look at the ideas of applying ACLs closest to the source or closest to the destination; and in what cases you should do either, or neither. The specific subjects and timestamps for what […]

video

Applying ACLs to Interfaces

In Part 7 of the video series on Access Control Lists we finally apply access lists to an Interface. In Video 1 we discussed that an ACL is simply a tool used to identify traffic on a Cisco Router. We discussed that what an ACL does is a result of how you apply it. In […]

video

IPv6 Access Lists

In Part 6 of the video series on Access Lists we look at the syntax and configuration of IPv6 ACLs. This video picks up where we left off and is a direct follow up to the five videos before it. The core of this video simply shows you how IPv6 ACLs are just a little […]