Category Archives blog

NOC to Network Engineering Working in a NOC styled position is what I was used to for the previous 2 years, as well as 2 years on a help desk. A Network call/ticket comes in, I solve said issue either on the phone or shortly after, and it's done. Quick and simple. This is not the case with Engineering. I…

Layer 2 Etherchannels, like any protocol, have their pro's and con's. Using layer 2 extends Spanning Tree Protocol (STP) over the Etherchannel, which can have adverse effects if you're not careful. Take for example the following topology crudely drawn in paint. SW1 is the STP  root bridge because it has the lowest bridge ID priority, so ports fa0/1 - 3 are designated…

Whilst the CCNA Security exam recommends disabling CDP in the production environment, I felt it didn't really explain in depth why it's a good idea. I mean sure, they mention that information about the device is leaked, but what information exactly is leaked? I ran a wireshark capture to find out!     I think the above screenshot of the CDP message explains it…

I'll start off by noting that I failed the 640-554 exam late last month. I found there was quite a bit of content which I either didn't cover as much as I thought I'd need to, or the material I used to study didn't cover the knowledge as deep as I needed. After knuckling down and studying into the topics…