EIGRP – Various Packet Types

 EIGRP, Networking  Comments Off on EIGRP – Various Packet Types
Dec 132022
 
EIGRP - Various Packet Types

In this third post in our EIGRP series, let’s consider the various packet types used and their purpose. Altogether, we encounter five packet types in EIGRP that are used to establish adjacencies and share routing information. The packet types include: Hello, Acknowledgment, Update, Query and Reply. Some of the EIGRP Read More

EIGRP Routing Protocol – Primer

 EIGRP  Comments Off on EIGRP Routing Protocol – Primer
Dec 132022
 
EIGRP Routing Protocol – Primer

In our last post, we took a look at a basic EIGRP configuration. Now we’ll take a step back and consider some of the essential features of EIGRP. EIGRP is a Cisco-proprietary dynamic routing protocol that debuted in 1992. Although Cisco attempted to make it an open standard protocol a Read More

How to Configure Basic EIGRP

 EIGRP  Comments Off on How to Configure Basic EIGRP
Dec 012022
 
How to Configure Basic EIGRP

In this lab, we’ll do a basic configuration of EIGRP and then run a bunch of verify commands. We’ll finish off with a ping test to verify end-to-end connectivity between the PCs. This time the lab is being done on Packet Tracer instead of GNS3. Packet Tracer is easier to Read More

Secure File Deletion on Ubuntu

 Linux, Security  Comments Off on Secure File Deletion on Ubuntu
Nov 072022
 

In an age of rampant security attacks, safeguarding data is paramount. After all, data is the new Kohinoor for organizations of all sizes in the modern era. secure-delete is one of the command line tools available for Ubuntu and its derivatives like Linux Mint to securely erase data. Secure file and Read More

How to Configure EIGRP Named Mode Authentication

 EIGRP, Networking, Security  Comments Off on How to Configure EIGRP Named Mode Authentication
Sep 282022
 
How to Configure EIGRP Named Mode Authentication

In this lab, we’ll configure authentication when running EIGRP in named mode. While classic mode EIGRP offers only MD5 authentication, named mode EIGRP offers both MD5 and HMAC-SHA-256 authentication. HMAC-SHA-256 authentication is, of course, the more secure version. By the way, we can configure authentication between two routers with one Read More

How to Configure DMVPN

 Networking, Security  Comments Off on How to Configure DMVPN
Sep 232022
 
How to Configure DMVPN

Dynamic Multipoint Virtual Private Network (DMVPN) owes its popularity to two primary reasons: scalability and simplicity of configuration. In large organizations with lots of branches, configuring dozens of point-to-point VPN tunnels is an error-prone and cumbersome exercise. So Cisco introduced the DMVPN technology nearly two decades ago. DMVPN finds favor Read More

 Posted by at 5:17 pm  Tagged with: