Extended Access Control lists are a group of conditions that are wrapped together by a particular name or number. The conditions used in this group are the number. And these conditions are used to avoid traffic on routes. Through these ...
Snabay Networking Latest Articles
Difference between CSMA/CA and CSMA/CD | Carrier Sense Multiple Access

CSMA is full-formed as Carrier Sense Multiple Access and it is a protocol that controls the data packets access between the transmitter and receiver. It prevents the data packets from loss and maintains the data integrity. It has been further ...
How to Configure/ Modify/Edit Named Access Control List on Router

In this article, we are discussing how to edit a named access control list on the router. Access control lists are a group of conditions that are wrapped together by a particular name or number. The conditions used in this ...
VLAN Trunking Protocol (VTP)

VLAN Trunking Protocol (VTP) The article defined and described in the section is the VLAN (Virtual Local Area Network) trunking protocol (VTP). What is a VLAN trunking protocol (VTP)? What are its uses? All of these questions are answered in ...
Introduction to link-state routing protocol

The complete routing path of a network in a router that runs the protocol called link-state routing protocol can be maintained by the link-state routing protocol. The information about the router is created by each of the router that runs ...
What are Spanning Tree Bridge Priority and Bridge ID Values

Before we learning about the Spanning Tree Bridge Priority and Bridge ID Values, we all should have a deep knowledge about what is spanning tree and why it is used?. The Broadcast storms and the switching loops in layer 2 ...
Extended Access Control List (ACL), TCP and UDP Port Numbers and Names

As we all know that extended access control lists are used to filter the traffic present in the network. And in previous sections, we have discussed different types of access control lists and how to create and configure all those ...
WHAT IS SWITCH MANAGEMENT VLAN AND HOW TO CONFIGURE MANAGEMENT VLAN

Before entering into switch management VLAN, we have to know about VLAN. Now, what is VLAN? VLAN stands for Virtual Local Area Network. That means VLAN is a smaller network that is contained within the normal network. Network security can ...
How to Change Spanning Tree Bridge Root Priority value and what is Extended System ID

In this article I am going to discuss about How to Change Spanning Tree Bridge Root Priority value and what is Extended System ID so keep reading this article till the end. Before we knowing about the changing of the ...
How to Configure Access Control List for VTY lines (TELNET and SSH)

This article describes the creation and Configure Access Control Lists (ACLs) using telnet and ssh connection. Access control lists are a group of conditions that are wrapped together by a particular name or number. The conditions used in this group ...