BreteaVladFirewall configuration using OPNSense for my Ubuntu serverFirstly, I would like to start with the motive behind this article. I had the idea of configuring my opnsense firewall from a video on…Sep 17
Ravan_PanjaliyevLayer 2 attacks & Mitigation techniquesLayer 2, also known as the Data Link Layer, handles the transmission of data frames between directly connected network nodes, using MAC…Mar 22
CP4rrotCisco Packet Tracer — P2P and VLAN ExerciseThis write up will most likely talk about the implementation on how to make P2P network and VLAN using a Cisco Packet Tracer. I will also…Aug 28Aug 28
Sethu GSUnderstanding VLANs (Virtual Local Area Networks) | Sethu on MediumVirtual Local Area Networks role in networking | CCNA | JNCIAAug 28Aug 28
BreteaVladFirewall configuration using OPNSense for my Ubuntu serverFirstly, I would like to start with the motive behind this article. I had the idea of configuring my opnsense firewall from a video on…Sep 17
Ravan_PanjaliyevLayer 2 attacks & Mitigation techniquesLayer 2, also known as the Data Link Layer, handles the transmission of data frames between directly connected network nodes, using MAC…Mar 22
CP4rrotCisco Packet Tracer — P2P and VLAN ExerciseThis write up will most likely talk about the implementation on how to make P2P network and VLAN using a Cisco Packet Tracer. I will also…Aug 28
Sethu GSUnderstanding VLANs (Virtual Local Area Networks) | Sethu on MediumVirtual Local Area Networks role in networking | CCNA | JNCIAAug 28
Edgar C FrancisWhat is VTP Pruning? How to configure Cisco VTP pruning?VTP pruning is used to improve the allocation and use of network bandwidth by reducing unnecessary traffic flood for example broadcast…Nov 24, 2023
Sethu GSUnderstanding VLAN Interfaces (SVIs — Switch Virtual Interfaces) | Sethu on MediumLayer-3 VLAN Interfaces (SVIs — Switch Virtual Interfaces) | CCNA | JCNAAug 24