Practical Networking .net
video

Named ACL Syntax

Part 4 of the video series on Access Control Lists picks apart the syntax required to configure a Named Access List. In the video, we will continue where we left off in the prior videos by re-configuring the Numbered ACL as a Named ACL. You’ll see just how similar the syntax is between Numbered ACLs […]

video

Numbered ACL Configuration

In Part 3 of the series on ACLs, we go through a live demonstration of the configuration of various Numbered ACL statements. We’ll use the syntax we learned in the prior video to create access list entries to match specific packets. In doing so, we’ll get to talk through some important concepts — the implicit […]

video

Numbered ACL Syntax

Part 2 of the video series on Access Control List picks apart the syntax for configuring Numbered ACL. We’ll step through each field in the command of a Numbered ACL and explain the ins and outs of what they mean and how they work. Specifically, we’ll cover these items: 0:00 – Start / Review of […]

video

What are Access Control Lists?

I’m releasing a new video series which will unpack Access Control Lists in detail. The first video in the series answers the question: What are Access Control Lists (ACLs)? In this video I teach the following concepts: 0:00 Intro 0:21 What are Access Lists? 0:41 What are various applications of Access Lists? 1:34 Topology and […]

post

Cisco IP SLA — Using a Cisco Router to generate traffic

Recently, I got a chance to play around with some features of Cisco IP SLA and wanted to share a few things I learned. Namely, how to use a Cisco Router to generate mock traffic for testing. In the past, I had only used this feature to send a few pings to test connectivity and/or […]

post

Classful vs CIDR vs FLSM vs VLSM

These four terms all refer to somewhat overlapping concepts. As a result, some confusion has surfaced about what each of these terms actually mean, and how they differ from each other. That is what this article is going to pick apart. These four terms can be broken up into two sets of two terms: Classful […]

video

FLSM and VLSM – Part 1

After many requests to extend the Subnetting Mastery video series, I am adding an appendix which will cover Fixed Length Subnet Masks (FLSM) and Variable Length Subnet Masks (VLSM). This is Part 1, which teaches how to answer questions of this variety: If you start with a /18, what size sub-network would you need to […]

post

Voice VLAN – Auxiliary VLAN

The terms Voice VLAN or Auxiliary VLAN typically mean the same thing: They are a feature which allows an access port — which normally only accepts untagged traffic for a single VLAN — to also accept tagged traffic for a second VLAN. But that is merely the “what”, and if you were simply looking for […]