Category Archives blog

Layer 2 Etherchannels, like any protocol, have their pro's and con's. Using layer 2 extends Spanning Tree Protocol (STP) over the Etherchannel, which can have adverse effects if you're not careful. Take for example the following topology crudely drawn in paint. SW1 is the STP  root bridge because it has the lowest bridge ID priority, so ports fa0/1 - 3 are designated…

Whilst the CCNA Security exam recommends disabling CDP in the production environment, I felt it didn't really explain in depth why it's a good idea. I mean sure, they mention that information about the device is leaked, but what information exactly is leaked? I ran a wireshark capture to find out!     I think the above screenshot of the CDP message explains it…

I'll start off by noting that I failed the 640-554 exam late last month. I found there was quite a bit of content which I either didn't cover as much as I thought I'd need to, or the material I used to study didn't cover the knowledge as deep as I needed. After knuckling down and studying into the topics…

There's a document which I found online recently on how to effectively report a fault to programmers which I found could be used when reporting almost any fault. Here's a brief snippet from the article which I found interesting.   There are a lot of things you might do when an error or bug comes up. Many of them make…

Close