Tag Archives: ccna200 300

IP Routing Protocols Explained.

What are IP Routing Protocols? A routing protocol is a set of rule(s) or standards that determines how routers on a network communicate and exchange information with each other, enabling them to select the best routes to a remote network. Each router has priority knowledge only of networks attached to it directly. Routers running routing protocol share this… Read More »

Reflexive ACLs Explained with Examples.

What are Reflexive ACLs? Reflexive ACLS also known as IP-Session-Filtering ACLs is used to allow traffic sessions from a source network while denying IP traffic for sessions coming from outside the network. It allows a network administrator to dynamically enable a network filtering router to manage session traffic. The router examines the outbound traffic and when it sees… Read More »

Understanding Man in the Middle Attacks. Explained with Examples.

What is a Man in the Middle Attack? A man-in-the-middle (MITM) attack is carried out by intruders who successfully position themselves between two legitimate hosts. The attacker can enable normal communication between hosts while altering the conversation between them. The attacker can intercept and modify data exchanged between the two hosts, allowing them to steal sensitive information such… Read More »

Network Monitoring Tools.

What are the Ways to Monitor your Computer Network? Monitoring the network can be a tedious task, especially when it’s a large one. As a network administrator, you have to ensure that your computer network systems are running smoothly and that no outages occur on your watch. Keeping a constant eye on your network helps to increase the… Read More »