Quantcast
Channel: ACL – Network technologies and trends
Browsing all 6 articles
Browse latest View live

Understanding Ternary Content Addressable Memory (TCAM)

  We all know in Cisco Catalyst Multilayer Switches the matching process of the Access Control list is done at hardware level. In order to do this processing the Ternary Content Addressable Memory...

View Article


Ten top popular and paying Cisco Certifications-part2

In my previous post we came to know five of the top ten Cisco Certifications which are not only popular but also they yield high remuneration. In this post we will discover the other five Cisco...

View Article


Image may be NSFW.
Clik here to view.

Resequence the access-list!

When it comes to modifying Access lists in Cisco IOS devices most of us remove the ACL’s from the Cisco Router and then edit the entries in a note, and then paste back the modified ACL to the...

View Article

Image may be NSFW.
Clik here to view.

How to configure Site-to-Site IPSec VPN on Cisco Routers? – Series 1

IPSec is the protocol one can use to establish a Site-to-Site VPN , as it is widely used because its an open standard protocol which offers secure and encrypted communication over the public internet...

View Article

Image may be NSFW.
Clik here to view.

How to configure Site-to-Site IPSec VPN on Cisco Routers? – Series 2

In my previous post we talked briefly about IPSec. We will be using the below topology for our set up. The whole topology was built using Cisco VIRL , in the above example we will built a Site-to-Site...

View Article


What is an error “Subtype:Encrypt Result:Drop” in Cisco ASA Firewalls?

After building a site to site VPN tunnel between Cisco ASA and any other firewall or router, often the tunnel is tested using the packet-tracer command in Cisco ASA firewall. While running a packet...

View Article
Browsing all 6 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>