Spanning Tree Protocol

Spanning Tree Protocol

The spanning tree protocol or the STP is the protocol used to resolve and eliminate the loops when there are multiple switches in a network with redundant paths. When there are multiple paths between the network switches, and any destination has more than one…
VLAN Configuration

VLAN Configuration

In continuation of my last tutorial on VLAN, let's now proceed further to VLAN Configuration. I am using the Cisco packet tracer to configure VLAN on Cisco switches. I will cover this article in several blogs, i.e., Configure VLAN in Switches, Router on a…
Access cisco device with SSH

Secure access to Devices with SSH

SSH(Secure Shell) is a secure way to access the Network Devices. SSH provides secure access to the network device, unlike Telnet. It is encrypted to provide security whereas the Telnet sends un-encrypted data over the Network. Both SSH and Telnet uses the VTY lines…
Access cisco device through telnet

Access Router through Telnet

Connect the router through Telnet To Access router from the telnet , you have to configure VTY lines. First, let's find out why you need to access the router through Telnet . Then we will find out how to connect the router through Telnet.…