The loopback interface is the virtual interface that is always available and ready to be used, it is not mandatory that it will be tied with 127.0.0.1 it an interface like any other interface that could have its own IP ...
Snabay Networking Latest Articles
What is a Subinterface in a Cisco Router
A Subinterface is a virtual interface that is created by dividing one physical interface into many logical interfaces, the subinterface uses the parent physical interface in order to send and receive messages like Fast Ethernet 0/0.1 is the subinterface Fast ...
Advantages and Disadvantages of Network Address Translation (NAT)
As the name suggests Network Address Translation (NAT) is nothing but it is a process of converting local IP addresses into the global IP addresses and global IP addresses into the local IP addresses. In the 1990s the number of ...
Leading Network Protocol Analyzer (Sniffer) Products
As a part of the network administration, Network Protocol Analyzer is one of the best tools and mechanisms that will help you in keeping your network and computer system safe from hackers and the cyberattacks carried out by them in ...
What is Etherchannel in Cisco Switches and Routers
The concept EtherChannel has arrived from Cisco as a LAN switch-to-switch technique, which is port link aggregation technology dispenses fault-tolerant speed links between the servers, switches, and routers. EthernetChannel is the one-one relationship that connects only two devices. The basic ...
Spanning Tree Protocol | STP Network with Examples
The start of the article is not about spanning tree protocol but regarding spanning tree. Why do we even should consider and perceive a spanning tree? Because the name of the protocol itself suggested us to check out. Then, what ...
Native Virtual Local Area Network | Native VLAN
The article written in this section defines and briefly describes the Native VLAN (Virtual Local Area Network) used in the network. Before discussing the topic Native VLAN let’s recollect the topics related to the one going to discuss. The discussed ...
How to Configure Extended Access Control List (ACL) | Configure Extended ACL
In this section, briefly explains the creation and configuration of an extended access control lists. Before discussing the topic lets defines extended access control lists. The extended access control list is used to control network traffic. The port number, protocol, ...
Introduction to Network Protocol Analyzer (Sniffers)
Known by many other names such as Network Analyzer, Protocol Analyzer, and Packet Analyzer, Network Protocol Analyzer is an important sniffing tool in the network administration. Without it your network management is incomplete. It comes in the form of both ...
Leading Intrusion Detection System (IDS) Products
As the technology advances towards it is prime, we are facing the challenge of securing it from being used wrong. The biggest concern today is preventing hackers from accessing the network and devices they no rights to. But it’s easier ...