I. Security Fundamentals a. Why Needed? i. A closed network allows no connection to a public network; although security is still an issue due to a majority of attacks coming from inside networks today Read More
Hello to all our faithful blog readers, I hope this post find you very well, and enjoying your studies! Read More
Answers for Part II So the answers to the exciting tasks at hand.... There was a good amount of activity surrounding answers submitted for the contest!  It was good to see that many people interested in them!  Now, it's time to go through the answers and stretch the imagination a bit!  Be prepared for some stretching as well! One quick thing to point out before we get started, there was a question asked about why /24 routes won't have a ".255" as the fourth octet.  This really depends on how we... Read More
I know, I know...  I promised this a while back, after I did the first part.  Sorry 'bout that! So we've played around a bit with the access-list idea and some binary matching.  So let's expand our brains even further! I will start out by telling everyone that I am NOT picking on or otherwise attempting to insult any CCNA's out there by comparing methodology to what is learned in CCNA.  The idea being that there are basic and advanced ways to learn things. When we all first learned fractions,... Read More
Prior to the support of prefix-lists in the IOS advanced filtering for BGP needed to be done using extended ACLs.  The syntax for using extended ACLs is shown below: Read More
Hi Brian, Read More

Subscribe to INE Blog Updates

New Blog Posts!