Category Archives: Network Troubleshooting

What is Syslog? Syslog Explained.

System Message Logging – SYSLOG Modern network devices have advanced from simple transmitting of messages (email.documents, multimedia etc), network devices like Cisco routers and switches provide the features for network administrators to reading system messages from their internal buffer about network situation at a particular time. The way do this is by using Syslog server. Cisco network devices (Routers… Read More »

Features of a Secure VPN

What are Features of a Secure VPN? VPNs use advanced encryption techniques and tunneling to permit organizations to establish secure, end-to-end, private network connections over the Internet. The basis of a secure VPN is data confidentiality, data integrity, and authentication: i  .   Data confidentiality – The common network security concern is protecting data from hackers. Data confidentiality aims at… Read More »

Ways To Migrate To IPv6 Explained

Before now, most networks; if not all, runs on IPv4 infrastructure, especially if your network is using old routers and switches. To upgrade your network to be IPv6 compliant, one or two strategies listed below can be used to implement this process on your network. 1. Dual Stacking: This method of migration enables a network to run both IPv4… Read More »

How to Apply ACLs on Interfaces Examples

On this page we describe how IP access control lists (ACLs) can filter network traffic. It also contains brief descriptions of the IP ACL types, feature availability, and an example of use in a network. We going to Configure standard access-list according to a given set of conditions. Instructions: 1. Hosts on Router R3 should not be able to access… Read More »

Troubleshooting VTP: Server as Client error and Solution

Accidentally Set Server Switch as VTP Client Solution. Mistake happens,  As a network administrator you can mistakenly configure operating mode of the server switch as VTP client. Only Server switches can create, delete, and modify VLANs. By reconfiguring the sever switch to VTP client mode, you lose all ability to create, delete, and manage VLANs within your network environment,… Read More »

What is Cisco Discovery Protocol – CDP? Explained with Examples

Cisco discovery protocol is a layer 2 protocol (OSI) that operates between Cisco devices such as Router and switches. CDP displays information about the directly connected devices such as device ID, Platform, connected interface, IOS versions, and layer 3 IP address. We use the network topology below as an example Topology Configuration HQ#config t HQ(config)#interface fa0/0 HQ(config-if)#ip address… Read More »

What are Common Network Security Threats?

Three common factors emerges when dealing with network security, these are vulnerability, threat, and attack. Vulnerabilities An experienced hacker knows that every network or device has a certain degree of vulnerability or weakness, and they take advantages of each security weakness or loophole to exploit the network.  A  Computer network hackers work round the clock in search of unsecured… Read More »

Configuring Extended ACLs Examples

Lets look at how to configure an extended access list to enable users on a network  browse secure and insecure websites. Firstly,  consider if the traffic you want to filter is going in or out. Access to websites on the Internet is traffic going out, receiving e-mails from the Internet is traffic coming in. Applying extended ACL on… Read More »

What is Denial of Service? Explained with Examples

DoS attack prevents authorized users from using network services by consuming system resources. Most times DoS attack is regarded as trivial but in a sense it is a consequentially threat. DoS can cause potential damage to networks. Not only are they easy to execute, but its among the most difficult to eliminate. DoS attacks deserve special attention from… Read More »

Troubleshooting Access Point Misplacement Error and Solution

Identify Problems with Access Point Misplacement. You may have experienced a WLAN that just did not seem to perform like it should. Perhaps you keep losing connection with an access point, or your data rates are much slower than they should be. You may even have done a quick move around the environment to confirm that you could actually see… Read More »