Category Archives blog

Suppose you have a remote site which connects back to your corporate headquarters via a site to site VPN between two Cisco routers. To ensure the VPN is only established between operating hours, a time based access list can be used. Using the 'time-range' command allows you to set a absolute or periodic time range. Absolute is very specific in…

When thinking about tunnelling, which is encapsulating one protocol with another and then transporting that encapsulated packet across a network, you'll soon see yourself seeing terminology such as Transport, Carrier and Passenger protocols. So what is what? The┬ápassenger┬áprotocol is the protocol you want to carry over a network that does not understand it (or you do not want the network…