Summary Routes To Null0 & The Protocols That Love Them

Introduction     OK, so the title of this blog sounds like a really geeky version of “The Jerry Springer Show” but it’s all in good fun!  When doing route … Continue Reading →


Fun With Distance-Vector Routing & Frame-Relay

Introduction   It is important to understand how our different IGP’s work when running over frame-relay. In particular, it is important to understand how things work when dealing with frame-relay … Continue Reading →


The Three Pillars Of Network Security

Introduction When dealing with network security, pretty much everything you learn about comes down to three basic principles.  If you gain a thorough understanding of these principles, I guarantee your … Continue Reading →


Understanding Spanning-Tree Port-Priority

Introduction Today we are going to take a quick look at the spanning-tree port-priority and understand how it really works with regards to influencing what ports are blocking and which … Continue Reading →


Going Deep With DHCP Snooping

  Introduction DHCP snooping is a layer 2 security feature we can configure on our Catalyst switches that helps mitigate a number of different DHCP based network attacks. The basic … Continue Reading →