Category Archives: online security

Configuring Extended ACLs Examples.

What Is Extended ACLs? Extended Access Control Lists (ACLs) are an advanced feature used in network devices like Cisco routers and switches to provide a stricter level of control over network traffic than standard ACLs. While standard ACLs filter traffic based solely on the source IP address, extended ACLs can filter based on multiple criteria, including: Source and… Read More »

EIGRPv6 Explained with Examples.

What Is EIGRPv6? The Enhanced Interior Gateway Routing Protocol (EIGRP) for IPv6 – EIGRPv6.  EIGRP is an enhanced version of the IGRP developed by Cisco. EIGRP for IPv6 works in the same way as EIGRP IPv4 where they can be configured and managed separately. EIGRPv6 is still a distant-vector routing protocol with the same link-state features, The hello… Read More »

eBGP Explained with Examples.

What is eBGP? External Border Gateway Protocol (eBGP) is a BGP term or process used when referring to BGP peers or neighbours that are in a different Autonomous System and Number (ASN).In other words, eBGP is used to exchange route information between different autonomous systems. When only one link connects two autonomous systems, the IP addresses of the connected interfaces are… Read More »

Common Network Security Software.

If you are connected to the Internet through a Wired or Wireless network (USB, broadband Modem, or dial-up), most times you deeply rely on your computer and software for protection from viruses and other threats. If you are connected through a router, it might be able to help; because most routers are equipped with a firewall. This helps… Read More »

How To Secure Cisco Routers Explained with Examples

This page discusses the importance of setting strong passwords on Cisco routers to ward off intruders. the following are guidelines for creating passwords, suggests using passphrases, and outlines the two Cisco password protection schemes – Type 7 and type 5 encryption. It also offers command examples for password encryption and establishing minimum password length.