Standard Access Control lists (ACL) are a list of conditions that are used in the network to avoid traffic. The conditions are listed in numbers or names. And these conditions are used to avoid traffic on routes. Through these conditions, ...
Snabay Networking Latest Articles
Spanning Tree Protocol Example | RSTP Protocol in Networking | PDF

In this article, I am going to explain all the terms, concepts and working of Spanning Tree Protocol (STP) with the example, I have tried to clear all the concepts and doubts which usually rises in the Spanning Tree Protocol ...
Standard Named Access Control Lists Cisco | Named ACL Configuration

Standard Named Access Control lists are the list of conditions that are used in the network to avoid traffic. The conditions are listed in numbers or names. And these conditions are used to avoid traffic on routes. Through these conditions, ...
Difference between STP and RSTP Spanning Tree Protocol

Spanning tree protocol is a Layer 2 protocol that works on bridges and switches. The specification for spanning tree protocol is 802.1D and the main aim of this concept is when we have redundant paths in the network it avoids ...
What is Digital Certificate, Digital Signature

The Digital Certificate is a part of Cryptography that establishes communication between an end-user and a website. It is given to the public key holders to keep the count of the public keys in Asymmetric Encryption Cryptography and to make ...
Manual EtherChannel Configuration in Cisco Switches Using Channel mode “on”

The concept Manual EtherChannel Configuration is arrived from Cisco as a LAN switch-to-switch technique, which is port link aggregation technology dispenses fault-tolerant speed links between the servers, switches, and routers. EthernetChannel is a one-one relationship that connects only two devices. ...
What is DMZ (Demilitarized Zone) ?

Just like military powers fear an invasion from the enemies outside their point of control, big organizations and companies also face similar kinds of challenges when it comes to cybersecurity. A demilitarized zone in a political and geographical scenario means ...
What is Common Wireless Attack, Types of CWA

As the technology progresses, it is becoming hassle-free and the reason might be that it is going wireless and many businesses that depend on heavy use of technology is embracing this new change. The new startups that the millennial entrepreneurs ...
What is Null Interface in a Cisco Router | Configuration Example

The Null interface Router is a “bit bucket” p or can be considered as a “black hole “interface where all unwanted traffic is sent to be discarded. It is mostly used for filtering unwanted traffic because traffic can be discarded ...
Network Switch Functions | How Does a Network Switch Work?

Network Switch Functions is a part of the computer network system, network switches allow you to connect two devices on a Local Area Network (LAN). Also known as the Ethernet Switch, network switch operates at the data link layer of ...