Category: Articles

21

Jan2014
The routing table is created over time as updates are sent by the Routing Protocol.  The example below shows a simulation of how a routing protocol would converge. Each Router has it’s directly connected routes associated with its interfaces, white background with cost = direct.  These networks were configured by network ... Read More
January 21, 2014Praveen Bahethi

19

Jan2014

What is Routing?

Imagine having to travel in Paris, France, from the Vendome to the Eiffel Tower. This path would require us to use a map and review the streets and turns we would take. In networking, packets don't get a map and aren't smart enough to review the path ahead of time. ... Read More
January 19, 2014Praveen Bahethi

16

Jan2014
INSIDE interface int vlan 1 nameif inside security-level 100 ip address 10.1.1.1 255.255.255.0 OUTSIDE interface interface Vlan 666 nameif outside security-level 0 ip address 1.1.1.1 255.255.255.248 DMZ interface interface vlan 300 nameif dmz security-level 50 ip address 172.16.1.1 255.255.255.0 ### <-PREVIOUS How to configure ASA security levels? NEXT-> What is NAT?  
January 16, 2014Praveen Bahethi

16

Jan2014
ASA Security Levels are used to define how traffic initiated from one interface is allowed to return from another interface.  Higher level security interfaces can initiate traffic to a lower level without an access list.  Any traffic returning from a higher level initiated communications are allowed to pass thru from lower ... Read More
January 16, 2014Praveen Bahethi