Category Archives: Network Security

Border Gateway Protocol Explained with Examples.

What Is Border Gateway Protocol? BGP is a complex, advanced distance routing protocol. It can best be described as Exterior Gateway Protocol (EGP). It’s been referred to in many quarters as the ‘big dog’ protocol of the internet. BGP exchanges routing information between Autonomous Systems (ASs). Unlike Interior routing protocols such as RIP, EIGRP, and OSPF that run inside a company’s network,… Read More »

Extended ACLs Explained with Examples

What are Extended ACLs? Extended Access Control Lists (ACLs) are an advanced security feature used in network devices like routers and switches to provide a finer level of control over network traffic than standard ACLs. While standard ACLs filter traffic based solely on the source IP address, extended ACLs can filter based on multiple criteria, including: Source and… Read More »

Dynamic Trunking Protocol (DTP) Explained.

What Is Dynamic Trunking Protocol (DTP) The Dynamic Trunking Protocol (DTP) is a Cisco proprietary protocol that is automatically enabled on Catalyst 2960 and Catalyst 3560 Series switches. DTP is used to negotiate to form a trunk link between two or more Cisco devices before actually forming the trunk connection. The main benefit of DTP is to increase… Read More »

DHCPv6 Autoconfiguration Explained.

What Is DHCPv6  Autoconfiguration? DHCPv6 is a network protocol that works pretty much the same as DHCP in IPv4. It is used to assign IP addresses and prefixes to IPv6 hosts on a network. This is also known as a stateful autoconfiguration. How DHCPv6 Works. DHCPv6 works in two ways; Stateful and Stateless Address Autoconfiguration (SLAAC). Stateless Address Autoconfiguration (SLAAC) SLACC requires no… Read More »