Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By

Topics

Show Filters
Result Filters:

1014 Results Found

Results per page: 10 40 80

Static Routing

Article | July 14, 2009

You may have noticed that it’s the dynamic routing protocols that get all the glory. Since I like rooting (routing?) for the underdog, let’s talk about static routes! As you may recall, a router has three methods for learning a route. A route can appear in the routi...

Calculating VoIP Bandwidth

Article | July 08, 2009

When integrating a Voice over IP (VoIP) system into an existing network it is very important to have a good understanding of how much bandwidth is utilized for each call on the network. For most people, just starting out the bandwidth calculations can be a very daunt...

E.164 – The modern dial plan

Article | July 02, 2009

When we are addressing Voice over IP we need to remember that essentially we would like to reach customers over the PSTN or SS7 network. The only avenue to date to do this, is by using something called the telephone number. However, that number has undergone some cha...

Access Control Lists (ACLs) – Part 6

Article | June 23, 2009

As you may recall, we can use extended IP ACLs to filter packets based on source address, destination address, transport layer protocols, and other options, as follows: access-list 106 permit tcp host 1.2.3.4 host 5.6.7.8 eq telnet For a packet to be permitted by...

Access Control Lists (ACLs) – Part 5

Article | June 19, 2009

Having discussed general ACL rules and syntax, let’s now turn to the differences between standard and extended ACLs. As you might recall, numbered ACLs fall into several ranges: 1 – 99: Standard IP 100 – 199: Extended IP 1300 - 1999: Standard IP (expanded rang...

Printing PowerPoint Slides with Notes

Article | June 11, 2009

If you create presentations using the notes feature in PowerPoint, you probably have found yourself wanting to print multiple slides on one page (handouts) with the notes associated with those slides displayed on the same page. This layout can often help you better p...

Telnet vs SSH

Article | June 10, 2009

In our last blog series we discussed multiple access commands that can be configured on a router or a switch. These commands included cosmetic commands such as logging synchronous and exec-timeout that can be configured on the console port. We also discussed configur...

Telepresence Bandwidth Requirements

Article | June 08, 2009

Telepresence is a set of technologies that allow video conferencing in such a way that the user feels as if they are actually at the remote site. Cisco sells a variety of platforms in the telepresence space supporting up to three 65” high definition video displays,...

Configuring Terminal Access Banners

Article | June 04, 2009

In my last post we discussed basic terminal access. The commands that I reviewed were for accessing the console port or vty lines of a Cisco router or switch. Network administrators should configure banners for legal and liability purposes. Now, we will see how to co...

Basic Cisco Terminal Access

Article | June 02, 2009

Cisco Switches and Routers running the Internet Operating System (IOS) have many things in common. Configuring these devices of course, is a skill that is sharpened the more you touch the device. During this post, our discussion will primarily focus on the basic comm...