adsense (1) application (2) architecture (4) asm (4) automatisation (2) backbone (1) cef (1) cisco (6) cloud (1) command (5) controller (1) cost (6) coverage (2) debug (9) distance (6) fiber (1) gns3 (1) google (1) hpe (1) http (1) igmp (5) igp (7) internet (2) ip (2) ipv6 (1) label (1) ldp (1) logique (2) loop (5) lsp (1) mac (3) meraki (1) model (2) mpls (3) mroute (4) multicast (5) nat (1) ndp (2) network (3) next-hop (5) osi (5) pat (1) pim (4) poisoning (6) projet (2) qos (1) radio (3) rib (5) rip (5) route (6) router (5) routing (14) rpf (4) rrm (3) security (3) show (5) simulation (2) solution (2) split-horizon (5) sql (1) ssm (4) static (6) stp (2) summarization (5) switching (1) tcp/ip (1) telecom (1) template (1) traffic engineering (1) translation (1) travail (2) vpn (2) vrf (2) wifi (4) wlan (2)

  • EIGRP over a vNET trunk
    In this blog we’ll explore the operation of IGP interior routing protocol EIGRP over vNET trunks (another way to say networking trunking similar to vlan trunks used in L2 network by switches to trunks multiple traffics from different vlans into the same physical link) little introduction New IOS release 15.x introduced Easy Virtual Network (EVN)
  • At the begining, … it was not DMVPN!
    The simplest way to interconnect 3 or more routers in the same broadcast domain (and the same subnet) is by attaching them to a switch (or hub) in the same vlan. In case they’re separated by long distances, an ISP may be required to put them together. From a network access perspective, they could be
  • Vlan propagation and Cisco FabricPath
    In this post, we explore the operation of Cisco FabricPath (FP) and more specifically Vlan information propagation in this fabric in comparison with other platforms: Catalyst for example from the same vendor. The case is to learn how the switches that are part of the LAN network learn about and support Vlan operation: is there
  • Static routing with intermediate address in Checkpoint firewall
    Static routing is supported by CKP (Checkpoint firewalls or gateways). Let’s recall that a static route defines a destination subnet or network and the way to reach it: the outgoing interface on the gateway, a connected nexthop ip address… whatif we configure this static routing using an intermediate address: an address of a nexthop that
  • Setup a Check Point Lab using VirtualBox and GNS3 on Windows
    In this lab we implement a basic security architecture to demonstrate the operation of a firewall cluster to protect our network. Our “security domain” is segmented into four zones: Our security topology is compound by two security gateways (SG) that are managed by a single security manager server (SM). The SG gateways (firewall) are in
September 2025
M T W T F S S
1234567
891011121314
15161718192021
22232425262728
2930  
Copied!