Inderdeep Singh ılılılı

Author Archives: Inderdeep Singh ılılılı

Cisco Launches Catalyst 9300 series Switches

Today I am going to talk about the new launch of Cisco. Cisco Launches Catalyst switches in 9000 series and they are not Nexus. If you are confused that it is catalyst switches or Nexus Switches, well It is not Nexus Series it is pure Catalyst switches after Cisco Catalyst 6800 switches.

New Launch : Cisco 9300 series switches and these switches are not Nexus switches in case you are confused.

In addition to all the earlier switches, Cisco take a step ahead from other vendors by adding Cisco 9300, Cisco 9400 and Cisco 9500 Switches in their portfolio. These switches are excellent with the high end capabilities and has many new features added. With the help of these high end switches you can granularly expand your network at core, distribution and access layers and with these switches you will have a leverage of cloud based or Next generation solutions.

Cisco already have the following switches in their portfolio and these switches are

  • Cisco 2960 Series
  • Cisco 3650 Series
  • cisco 3750 Series
  • Cisco 3850 Series
  • Cisco 4500 Series
  • Cisco catalyst 6500 series
  • Cisco catalyst 6800 series

With the existing models as shown above, Cisco launches three new catalyst switches series Continue reading

Understanding DHCP Snooping and Basic Configurations : Cisco, Juniper and Huawei

Today I am going to talk about the DHCP Snooping concept in this article. There are lot of queries on DHCP Snooping where people want to understand why it has been used in the enterprise network. Some of the questions i will put here.

What is DHCP Snooping?
What is the different between Trusted and un-trusted hosts, Servers and Ports ?
How DHCP Snooping works ?

These are the basic questions on DHCP Snooping, let me take you guys through it.

DHCP Snooping is a feature which told you about the traffic sources and that can be trusted traffic sources or untrusted traffic sources. DHCP snooping ensures that DHCP clients obtain IP addresses from authorised DHCP servers and records mappings between IP addresses and MAC addresses of DHCP clients, preventing DHCP attacks on the network.Trusted sources can be the sources which you already allow in your network but untrusted sources will be an attack. To prevent such types of attacks in the network you can have the DHCP snooping feature which will filters messages and rate-limits traffic from untrusted sources.

If you have a network which includes switches, routers and firewalls all these sources are trusted source as they are Continue reading

Cisco Routers Sample BGP Configurations : Quick and Easy

Today I am going to talk about the configurations of BGP on Cisco Routers. I will explain some of the terms which we are going to use in the configurations. Please let me know if you guys required any specific configuration in BGP or you can share the design with us so that we can create the configurations accordingly.

Sometimes if it difficult to set up a BGP configurations in the lab or in the live environment, so here in this article i am just posting the sample configurations which will help you guys to configure BGP in you labs or in the live environment. There is no relevance of this configuration with any of the live networks. All IPs taken in the configuration is just a sample IP addresses taken.

BGP is a wide routing protocol which is used on to connect the WAN links between two different AS. AS stands for autonomous systems. Below is a sample BGP topology and is not relevant what sample configurations shared with you in the below article.

Fig 1.1- Sample BGP Topology


We have two kinds of BGP sessions; one is iBGP which is internal BGP and other is eBGP which Continue reading

Switching Basics : Private VLANs

Today I am going to talk about “Private VLANs”. By using Private VLANs you can restrict the specific port from the network and it can only communicate with the uplink port with which it connects.

We have two kind of VLANs; One is Primary VLAN and other is Secondary VLANs. Primary VLANs is a type of VLAN which is used to forward frames downstream to all Secondary VLANs.while Secondary VLANs are further divided in to the 2 types and these types are :

Isolated VLANs : 
As name suggested, it is isolated from all the port except the ports in the Primary VLAN or you can say the isolated VLAN port can only talk with the uplink port and will be isolated from the other ports in the network.

Community VLANs:
As name suggest. if two ports are in the community they can talk to each other and talk to the uplink port as well but not able to talk to the other members of the VLANs. They are restricted to have a communication with the isolated VLANs in the network.

Fig 1.1- Private VLANs

Most common question what i am thinking now;

If two different Ports Continue reading
1 3 4 5