banner
Skip to content

Professional lab configurations for engineers

MPLS L3 VPN

mpls-l3vpn-lab

MPLS L3VPN is a type of PE-based L3VPN technology for service provider VPN solutions. It uses BGP to advertise VPN routes and uses MPLS to forward VPN packets across service provider backbones. Download MPLS L3 VPN lab MPLS L3VPN provides flexible networking modes, excellent scalability, and convenient support for MPLS QoS and MPLS TE. The…

Read More

IS-IS vs OSPF ( IS-IS Lab)

IS IS stands for Intermediate System to Intermediate System. ISIS is a routing protocol for Internet Protocol  Network Download the Lab How ISIS works ISIS is designed to move information efficiently within a computer network, a group of physically connected computers or similar devices. It accomplishes this by determining the best route for data through a packet switching network. Breaf History The IS-IS protocol…

Read More

PAgP, LACP redundancy in 3-Tier Architecture..

Basics: PAgP, LACP redundancy in 3-Tier Architecture, Collapsed Cored, HSRP, GRE tunneling of VOIP DHCP server, Layer 3 Switch routing. Download the Lab Protocols; PAgP Protocol configs LACP protocols Redudancy in 3 Tier Architecture, Collapsed core HSRP GRE Tunneling remote DHCP Underlay Routing Protocols Overlay Routing Protocol Layer 3 VOIP – H.323, SCCP, RTP, SIP…

Read More

OSPF AREAS

OSPF first version was invented in 1989 by IETF, and later quickly replaced by OSPFv2 in 1991. It was developed as one of IGPs. It uses LSR algorithm, operating within a single autonomous System (AS) In this information, I share the OSPF network topology diagram. I also include a Lab for download that is more…

Read More

GRE-Tunneling Lab

Generic routing encapsulation (GRE) provides a private path for transporting packets through an otherwise public network by encapsulating (or tunneling) the packets. GRE tunneling is accomplished through tunnel endpoints that encapsulate or de-encapsulate traffic. Download the revised Lab

Read More

Web Design & Development

We help, as much or as little as you’d like, with perfecting every aspect of your website. Customize your site with a unique domain and email address. Receive a FREE domain, customizable theme, and more. Receive 24/7 expert support for any questions or problems. Handle loads of traffic with a reliable, cloud-powered platform. Upgrade as…

Read More

Voice Over Internet Protocol

Last Mile Connectivity Provisioning of managed physical access circuits, e.g. DSL and/or ADSL, fiber, Metro Ethernet or wireless, from customer premises to closest point-of-presence on our core network; enabling customers to use our converged voice and data offerings. get service

Read More

NETWORK SEURITY POLICIES

A network security policy delineates guidelines for computer network access, determines policy enforcement, and lays out the architecture of the organization’s network security environment and defines how the security policies are implemented throughout the network architecture. …request for services

Read More