Inderdeep Singh ılılılı

Author Archives: Inderdeep Singh ılılılı

Introduction to Uni-Directional Link Detection (UDLD) Protocol

Today I am going to talk about another protocol named as UDLD Uni-Directional Link Detection protocol in details with the different modes used in UDLD.

Before I will start with the UDLD protocol, I would like to tell you guys that we have our own youtube channel for various network videos that can further help you guys to study further. I will going to add many more videos soon on the channel, Please subscribe to the channel for the study network related videos.

Subscribe us on Youtube: http://y2u.be/-5cF6JaNO68 


Thanks for your huge support to our Youtube Channel and the Twitter account. Now let's talk about the UDLD protocol in details now.

Fig 1.1- UDLD Protocol Tx and Rx
What is the UDLD protocol and where we are using this protocol ?
UDLD is a Layer 2 protocol that works with the Layer 1 protocols to determine the physical status of a link. In Layer 1, auto negotiation takes care of physical signalling and fault detection. UDLD performs tasks that auto negotiation cannot perform, such as detecting the identities of neighbors and shutting down misconnected LAN ports. 

Fig 1.2- UDLD Protocol

Switching Basics : STP Root Bridge Election Procedure

Today I am going to talk about the STP (Spanning tree) Root bridge selection procedure. It is one of the most important topic in the Switching and you guys should know about it. I am taking the case where we have three different switches with the MAC addresses and i will talk about how these switches communicate with each other to finally get the root bridge.

Before I will start with the Root bridge in the STP switched network, I would like to tell you guys that we have our own youtube channel for various network videos that can further help you guys to study further. I will going to add many more videos soon on the channel, Please subscribe to the channel for the study network related videos.

Subscribe us on Youtube: http://y2u.be/-5cF6JaNO68 

What is the purpose of the Root Bridge ?
The idea is to have all the communication from source to destination from the root bridge so that we can avoid the loop in the switched LAN network. So before starting the communication in the switched network we need to setup a root bridge.

Spanning-tree election occurs when a switch Continue reading

Introduction to Multi-Chassis Link Aggregation

Today I am going to talk about another technology named as Multi-Chassis Link Aggregation which is generally used is many of the vendors like Juniper, Arista Networks and so on. Here in this article I am going to have discussion with respect to Arista Networks.

As i said, before i will start with the Multi-Chassis Link Aggregation, I would like to tell you guys that we have our own youtube channel for various network videos that can further help you guys to study further. I will going to add many more videos soon on the channel, Please subscribe to the channel for the study network related videos.

Subscribe us on Youtube: http://y2u.be/-5cF6JaNO68 

Now the question is what is Multi-Chassis Link Aggregation ?
A multi-chassis link aggregation group (MLAG) is a pair of links that terminate on two cooperating switches and appear as an ordinary link aggregation group (LAG). The cooperating switches are MLAG peer switches and communicate through an interface called a peer link. 

While the peer link’s primary purpose is exchanging MLAG control information between peer switches, it also carries data traffic from devices that are attached to only one MLAG peer and Continue reading

Introduction to Multi-chassis EtherChannel(MEC) in Cisco Switches

Today I am going to talk about the technology used in the enterprise or the datacenter environment for various vendors in the market. Starting from the Multi-chassis EtherChannel (MEC), Multi-chassis EtherChannel is generally used in the Cisco technology with the VSS.

Before I start with the Multichassis EtherChannel, I would like to tell you guys that we have our own youtube channel for various network videos that can further help you guys to study further. I will going to add many more videos soon on the channel, Please subscribe to the channel for the study network related videos.

Subscribe us on Youtube: http://y2u.be/-5cF6JaNO68 

Multi-Chassis EtherChannel
 Multi-chassis EtherChannel (MEC) is a Layer 2 multipathing technology. This form of EtherChannel  allows a connected node to terminate the EtherChannel across the two physical Cisco Catalyst 6500/6800 Series Switches that make up the VSS leading to creating simplified loop-free Layer 2 topology. 

Cisco’s Multi-chassis EtherChannel (MCEC) solution addresses the need for inter-chassis redundancy mechanisms, where a carrier wants to “dual home” a device to two upstream points of attachment (PoAs) for redundancy 

Fig 1.1- Multi-Chassis Ether-Channel with DSLAM in MPLS and VPLS environment

Introduction to Client VPN

Today I am going to talk about another important topic as many of you already requested to write something on the Client VPN technology. Client VPN is a tunnelling protocol and you can say that client VPN service uses the L2TP tunneling protocol and can be deployed without any additional software on PCs, Macs, iOS devices, and Android devices, since all of these operating systems natively support L2TP VPN connections.

Before I will start with the Client VPN, I would like to tell you guys that we have our own youtube channel for various network videos that can further help you guys to study further. I will going to add many more videos soon on the channel, Please subscribe to the channel for the study network related videos.

Subscribe us on Youtube: http://y2u.be/-5cF6JaNO68 

As i told that it is tunnelling protocol and i wrote some of the articles earlier on the various protocols like DMVPN, IPSEC and other. Please go through the below link to understand these as well if you want to have a look on that.

Introduction to Metro Ethernet

Today I am going to talk about Metro Ethernet. There are lot of people who wants to understand what actually metro ethernet services are and why we are taking these kinds of services. We will come up with your queries one by one and will also describe in this article why service providers are providing metro ethernet services to the customers.

Before I will start with the information on Metro Ethernet, I would like to tell you guys that we have our own youtube channel for various network videos that can further help you guys to study further. I will going to add many more videos soon on the channel, Please subscribe to the channel for the study network related videos.

Subscribe us on Youtube: http://y2u.be/-5cF6JaNO68 

Background
Metro Ethernet services are now offered by a wide range of service providers. Some providers have extended Ethernet services beyond the metropolitan area and across the wide area. Thousands of subscribers already use Ethernet services and their numbers are growing rapidly. These subscribers have been attracted by the benefits of Ethernet services.

Ethernet services are provided over a standard, widely available and well-understood Ethernet interface. Virtually all networking Continue reading

The Concept of Switch Virtual Interface – SVI

Today I am going to talk about the most widely used to have the interaction between the two VLANs in the switched network apart from router on stick. The topic is SVI- Switch Virtual Interface. As many of the enterprises prefer SVI instead of using the Router on Stick way of communicating the VLANs in the switched network.

Before i started with SVI- Switch Virtual Interface followed by the configuration part, I would like to tell you guys that we have our own youtube channel for various network videos that can further help you guys to study further. I will going to add many more videos soon on the channel, Please subscribe to the channel for the study network related videos.

Subscribe us on Youtube: http://y2u.be/0c4lMYVp9go

What is the requirement of the SVI in the Switched Networks ?
With SVIs the switch will use virtual Layer 3 interface to route traffic to other Layer 3 interface thus eliminating the need for a physical router.

In the switched networks, the switches send traffic only to hosts within the same broadcast domain (Single VLAN) and routers handled traffic between different broadcast domains (Different VLANs). This meant that network devices in different broadcast domains Continue reading

Configuring InterVLAN Routing- Router on Stick

Today I am going to talk about the configurational part of the Inter-VLAN scenario with the Router on stick which is used earlier in many of the enterprise LAN networks to have the inter-VLAN communication through the Router.

Most of the Routing and Switching experts already knew how to configure the Router on Stick configuration in order to have the inter-VLAN communications. Although now a days enterprises uses SVI instead if Router on stick as SVI is the better way to have the communication on the Core Switches.

Before i started with one of the scenario of the Inter-VLAN router on stick followed by the configuration part, I would like to tell you guys that we have our own youtube channel for various network videos that can further help you guys to study further. I will going to add many more videos soon on the channel, Please subscribe to the channel for the study network related videos.

Subscribe us on Youtube: http://y2u.be/0c4lMYVp9go

Thanks who already subscribed to our Youtube Channel. We will soon going to have so many videos on the networking basics, essentials and advance case studies in order to educate everybody in the networking space. Once again Continue reading

Core Switching : Juniper EX8200 Vs Cisco 6800

Today I am going to talk about the Core switching where I am taking two vendors and compare the features between them. Here in the specific switch in the Core we can have two different models for which we are comparing the features. The two Switches are Juniper EX8200 and Cisco 6800 Core switches

Before I start with the models one by one,I would like to tell you guys that we have our own youtube channel for various network videos that can further help you guys to study further. I will going to add many more videos soon on the channel, Please subscribe to the channel for the study network related videos
Subscribe us on Youtube: http://y2u.be/0c4lMYVp9go

So if you are going to compare the switches, both switches are excellent with the high capacity backplane and has so many features. Although Cisco come up with the other model Cisco catalyst 9K which is newly in the market and has huge impact to other vendors.

I already wrote some of the articles on Cisco Catalyst 9K and you can go through the articles below
Cisco Catalyst 9500 Switch - A Fixed Chassis Core Switch
Why Cisco Catalyst 9K is so Continue reading

BGP Attribute : AIGP-BGP Accumulative IGP

Today I am going to talk about the BGP attribute called as BGP AIGP or so called Accumulated IGP which is now a days used to find the best path in the BGP protocol. 

Now Before i start with the BGP AIGP attribute, I would like to tell you guys that we have our own youtube channel for various network videos that can further help you guys to study further. I will going to add many more videos soon on the channel, Please subscribe to the channel for the study network related videos


Subscribe us on Youtube: http://y2u.be/0c4lMYVp9go

Now the question is why it is introduced in the BGP after so long ?
The Reason is facing day to day issues when enterprises or service providers come up with the multiple, contiguous BGP AS's in their network and want to handle by single administrator. The expectation is to have the best path from two different AS which is controlled by Single administrator domain. 

IEFT introduces the BGP attribute named as AIGP by which the BGP speakers can perform a best path-selection for a prefix based on IGP metric even if the nodes are in two different AS's.

What kind Continue reading

Switching Techniques: Root Guard Vs BPDU Guard

Today I am going to talk about the Root Guard and BPDU guard which is widely used in the switching LAN network with STP/RSTP protocol. Earlier i wrote about the RSTP in details which you can follow on the below mentioned link.

Rapid Spanning Tree Protocol and Configurations - RSTP

Now Before i start with the Root Guard and BPDU guard, I would like to tell you guys that we have our own youtube channel for various network videos that can further help you guys to study further. I will going to add many more videos soon on the channel, Please subscribe to the channel for the study network related videos

Subscribe us on Youtube: http://y2u.be/0c4lMYVp9go

Now let's talk about one by one in details, First let me talk about the Root Guard

Root guard
When we talk about the Root guard,If you have a port that is configured with root guard and it receives a superior BPDU it will move that specific vlan to a root inconsistent state which effectively means it will stop passing traffic to that vlan off that port.  Because of this you need to be very careful where you put the Continue reading

Rapid Spanning Tree Protocol and Configurations – RSTP

Today I am going to talk about the widely used protocol in the switching scenarios called as Rapid Spanning tree protocol. RSTP all you know that is a enhanced version of the STP (Spanning Tree Protocol) and is now used in many of the LAN networks there in enterprises.

Before we talk about RSTP further,  I would like to tell you guys that we have our own youtube channel for various network videos that can further help you guys to study further. I will going to add many more videos soon on the channel, Please subscribe to the channel for the study network related videos

Subscribe us on Youtube: http://y2u.be/0c4lMYVp9go

RSTP- Rapid Spanning Tree Protocol
Replacing the concept of 5 port states in STP, RSTP comes up with the 3 port states only and these port states are discarding, learning and forwarding. 

Fig 1.1- STP Topology
STP has 5 states and these states are Blocking, Listening, Learning, Forwarding and Disabled where we replaced the blocking, listening and discarding with the discarding state in RSTP. Below is the table showing the states of the STP and RSTP

Fig 1.2- STP and RSTP Port States
Now the question is Continue reading

Load Balancers Comparisons: F5 Vs KEMP Vs Citrix

Today I am going to discuss about the comparison between the load balancers which are generally best with their features and also Gartner rated them high in their reports. Load Balancers are the basic and the important need of the Enterprise network now a days. Some of the them used as Local and some of them used as Global Load Balancers. 


Before we talk about Load balancers,  I would like to tell you guys that we have our own youtube channel for various network videos that can further help you guys to study further. I will going to add many more videos soon on the channel, Please subscribe to the channel for the study network related videos

Subscribe us on Youtube: http://y2u.be/0c4lMYVp9go

As per the Gartner report, F5 BIG-IP leads the magic quadrant in leaders with Citrix and KEMP is also gaining the speed in Challengers. Although we have many more vendors in the market of load balancers like Radware, A10 Networks, Brocade, Barracuda Networks, Cisco and Array Networks. F5 is leading the market with the best features and capable of doing a lot of best performance and security features as well. I will discuss the comparison at Continue reading

Introduction to OSPF NSSA Area

Today I am going to talk about the OSPF NSSA area as this is one of the most important topic and always been asked by the interviewers. I knew many of you are already aware if the OSPF NSSA area but it is important for the network engineers who started studying OSPF in details specially area types. OSPF is one of the widely used protocol in the enterprise network and there are so many enhancements done like to integrate with the IPv6 and OSPFv3.

Before we talk about OSPF NSSA area,  I would like to tell you guys that we have our own youtube channel for various network videos that can further help you guys to study further. I will going to add many more videos soon on the channel, Please subscribe to the channel for the study network related videos


Subscribe us on Youtube: http://y2u.be/0c4lMYVp9go

OSPF NSSA Area
NSSA stands for not-so-stubby area and is used in OSPF protocol. NSSA is to allow OSPF Stub areas to carry External routes which is the routes learned from other protocols like RIP, EIGRP or BGP and then redistribution into an NSSA area creates a special type of link-state advertisement (LSA) Continue reading

Basic Configuration for Cisco ASA 5505 Interfaces- Trunk Port

Today I am going to talk about the basic Cisco ASA configuration of trunk ports and also to make that Cisco asa with the failover link. We are putting two ASA where one is the primary one and another is the failover ASA in the DMZ zone. I already discuss on the Cisco ASA access port configurations. If you want to have a look on the configurations, please go through the below link as a reference
Basic Configuration for Cisco ASA 5505 Interfaces- Access Ports


Before we talk about these protocols,  I would like to tell you guys that we have our own youtube channel for various network videos that can further help you guys to study further. I will going to add many more videos soon on the channel, Please subscribe to the channel for the study network related videos

Subscribe us on Youtube: http://y2u.be/0c4lMYVp9go

Now let's talk about the basic Cisco ASA configuration for the trunk port. Below is the basic topology showing the Cisco ASA placed in the enterprise network. The configurations, IP addresses and topology shown here is only for the demo purposes and has no relevance with any of the enterprise networks.

Fig 1.1- Continue reading

Basic Configuration for Cisco ASA 5505 Interfaces- Access Ports

Today I am going to talk about the basic Cisco ASA configuration on the access ports and also to make that Cisco asa with the failover link. Later on i will come up with the configuration part of the Cisco asa with the trunk port configurations. We are putting two ASA where one is the primary one and another is the failover ASA in the DMZ zone.

Before we talk about these protocols,  I would like to tell you guys that we have our own youtube channel for various network videos that can further help you guys to study further. I will going to add many more videos soon on the channel, Please subscribe to the channel for the study network related videos

Subscribe us on Youtube: http://y2u.be/0c4lMYVp9go

Lets talk about the Cisco ASA configurations where we configures five VLAN interfaces, including the failover interface which is configured using the failover lan command. 
Fig 1.1- Cisco ASA 5505

Configuration Examples for ASA 5505 Interfaces
Here in the below example, we are taking VLAN 2, VLAN 3, VLAN 4 and VLAN 5 where VLAN 6 will be the failover link and after that all VLANs will be assigned to the Continue reading

Route Filtering Technique: IP Prefix Lists

Today I am going to talk about another route filtering protocol which is widely used in the BGO environment. IP prefix lists are generally used when we need to block or permit the block of the IP addresses in the network.

Before we talk about these protocols,  I would like to tell you guys that we have our own youtube channel for various network videos that can further help you guys to study further. I will going to add many more videos soon on the channel, Please subscribe to the channel for the study network related videos


Subscribe us on Youtube: http://y2u.be/0c4lMYVp9go

Now Let's talk about the route filtering technique named as IP Prefix list. So IP Prefix list is the way to permit and deny the routes with the larger block size.

With the use of two keywords , ge and le we are going to deny or permit the IP Prefix block with the subnet mask. The prefix list is applied to inbound or outbound updates for specific peer by entering the prefix-list command in neighbor address-family mode. 

Prefix list information and counters are displayed in the output of the show ip prefix-list command. Prefix-list counters can Continue reading

Route Filtering Techniques : Access-lists, Route-map and Distribution-lists


Today I am going to talk about the various route filtering method we are using in our network. These can be Access-Lists, Route-map, Distribution-list and Prefix-Lists. They are the excellent way to filter out the routes but the way we are implementing is different. Many of you are aware of the access list like standard, extended and so on. I already wrote an article on the access-lists. Please go through the below link for the access-lists

Back to Basics : Access-Lists and Types

Before we talk about these protocols,  I would like to tell you guys that we have our own youtube channel for various network videos that can further help you guys to study further. I will going to add many more videos soon on the channel, Please subscribe to the channel for the study network related videos

Subscribe us on Youtube: http://y2u.be/0c4lMYVp9go

But now if we are talking about all these route filtering protocol, we will take one by one to explain how and what they filter out in the network

IP Access List Route Filtering
So let's talk about the ACL or so called access-lists. An access-list is basically a mechanism accepting certain input from Continue reading

Basic Configuration of OSPF Over non-Broadcast Networks ( NBMA)

Today I will talk about the basic set of configurations of OSPF NBMA network type over the non Broadcast networks. Many of you guys already aware of the NBMA network type in the OSPF network. 

Before we start with the OSFP NBMA configuration part, I would like to tell you guys that we have our own youtube channel for various network videos that can further help you guys to study further. I will going to add many more videos soon on the channel, Please subscribe to the channel for the study network related videos


Subscribe us on Youtube: http://y2u.be/0c4lMYVp9go

Lets have a Basic OSPF Network diagram for you guys, then we will come up with the diagram showing the routers connected in the OSPF via Frame-Relay network which will act as a NBMA OSPF network type.


Fig 1.1- OSPF Network Connected to other Campus Via NBMA Networks- Frame Relay

NBMA stands for Non-Broadcast Multiple Access where the network types X.25 and Frame Relay has no capability to support Broadcast traffic. Here in our example we will take Frame-Relay as a NBMA network which is connected via two routers 1 and 2. I defined these routers as Continue reading

Cisco Wireless Solution : Local Mode Vs Flex Connect

Today I will talk about the Wireless deployment modes and will discuss which and why to use that deployment mode in the your wireless network. 


Wireless Deployment :Local Mode
In local mode, an AP creates two CAPWAP tunnels to the WLC.  One is for management, the other is data traffic.  This behaviour is known as "centrally switched" because the data traffic is switched(bridged) from the AP to the controller where it is then routed by some routing device.
Locally switched means the traffic is terminated at the local switch adjacent to the access point. 

Fig 1.1- Local Mode behind Mesh Network

Its a good idea if you have traffic that the client is sending to the local site rather than it going via the controller and travelling over the WAN link twice say for file or print services

Wireless Deployment : Flex Mode
Flex Connect also known as HREAP by the old timers, allows data traffic to be switched locally and not go back to the controller.  It basically causes the AP to behave like an autonomous AP, but be managed by the WLC.  In this mode, the AP can still function even Continue reading
1 2 3 5