Year: 2019

Infographic on thwarting cybercriminals in 2025 with icons for early warning systems, vulnerability databases, sharing cyber intelligence, ISM standards, and new laws and regulations.
Cyber Security September 12, 2019

Thwarting Cybercriminals: Master Key Measures and Strategies for Cybersecurity Enthusiasts in 2025

As a cybersecurity and networking expert with extensive experience in securing enterprise environments, I’ve seen firsthand how cybercriminals evolve their tactics. Thwarting cybercriminals isn’t easy, but companies, governments, and organizations are taking proactive steps to limit and discourage these threats. In this article, we’ll explore key actions and measures, updated for 2025, with practical insights […]
Asad Ijaz Read More
Infographic of network security showing a hacker targeting WAN/LAN router, users on laptops, and defenses like shield, badge, and firewall bricks
Cyber Security September 12, 2019

Cyber Security Threats and Defenses: A Comprehensive Guide for 2025

Cyber security threats are a growing concern worldwide, escalating with AI and ransomware in 2025. Individuals and organizations rely on networks, making intrusions devastating. Computer networks are necessary for everyday activities, and both individuals and organizations depend on their computers and networks. Intrusion to these computers by an illegal person can result in a network […]
Asad Ijaz Read More
Infographic showing Cisco router VTY access control using Telnet/SSH and ACLs. Includes a centered title, configuration steps, and a network diagram with PC0 denied and PC1 permitted access to router R3.
CCNA September 11, 2019

How to Configure Standard ACLs to Secure VTY Ports

All Cisco routers and switches do not allow remote access by default via terminal programs like PuTTY or Tera Term. Remote connectivity options include Telnet (VTY Port) or SSH. SSH provides encrypted sessions and is strongly recommended by Cisco for remote administration due to Telnet’s vulnerabilities. Prerequisites for CCNA/CCNP Students However, if your router’s Cisco […]
Asad Ijaz Read More
Infographic illustrating ACL statistics with a table showing permit and deny statements, matches, and explanations, featuring a laptop and router with permit and deny arrows
CCNA September 10, 2019

ACL Statistics in Cisco Networks: Monitoring Matches with show access-lists

Access Control Lists (ACLs) are essential for filtering traffic in Cisco networks. For CCNA students, understanding statistics helps verify if rules are working as intended. CCNP candidates should note how stats aid in troubleshooting complex setups like multi-interface ACLs. After an ACL has been configured and applied to an interface, it can block or permit […]
Asad Ijaz Read More
Infographic showing three steps to edit standard ACLs: sequence numbers, router config commands, and named ACL examples in Cisco networking.
CCNA September 10, 2019

How to Edit Standard ACLs

Network administrators sometimes want to edit standard ACLs. As you know, each new entry you add to the Access Control List (ACL) appears at the bottom of the list, and the router assigns a sequence number to that entry automatically. Standard ACL statements are added to running-config files, but there is no built-in way to […]
Asad Ijaz Read More
Diagram illustrating standard ACL configuration with a router blocking traffic from host 192.168.2.2 to network 192.168.4.0/24.
CCNA September 9, 2019

How to Configure standard ACLs

Standard ACLs permit or deny traffic based on source addresses. They differentiate routes on a network using the IP address. The port and destination of the packet are not evaluated. Standard ACLs only contain a list of addresses or address ranges and a statement as to whether access to or from that address is permitted […]
Asad Ijaz Read More
Diagram of TCP three-way handshake process showing SYN, SYN-ACK, and ACK exchanges between two hosts for connection establishment.
CCNA September 2, 2019

Understanding TCP Three-Way Handshake: A Comprehensive Guide (Updated 2025)

In networking, the TCP three-way handshake (often called a “TCP conversation”) establishes reliable connections, which is crucial for Access Control Lists (ACLs) to filter traffic effectively. ACLs manage inbound and outbound traffic based on IP addresses, ports, and TCP flags. This article explains TCP fundamentals before diving into ACL integration, helping CCNA students grasp transport […]
Asad Ijaz Read More
Diagram and configuration commands for setting up OSPFv3 on a network.
CCNA September 1, 2019

How to Configure OSPFv3: Complete Guide (Updated 2025)

Figure 1 shows the reference topology for configuring OSPFv3. You can also see the commands for configuring OSPFv3 for IPv6 unicast and link-local addresses on the interfaces of Router1. As identified in the referenced topology, assume that Router2, Router3, and Router4 interfaces have already been configured with the global IPv6 and link-local addresses. This topology […]
Asad Ijaz Read More
Illustration of interconnected routers demonstrating link-local IPv6 address concept
CCNA September 1, 2019

What is a Link-Local IPv6 Address – Exclusive Introduction

Routers configured with dynamic routing protocols such as OSPF or EIGRP must send and receive routing protocol messages with their directly connected neighbors. The routers exchange messages between neighbors on the same subnet. These messages are always sent from the router’s source IPv4 address. Link-local IPv6 addresses are perfect for this purpose. The address also […]
Asad Ijaz Read More
nfographic comparing similarities and differences between OSPFv2 and OSPFv3 routing protocols, including link-state features, metrics, areas, packet types, router ID, advertised routes, multicast addresses, authentication, and LSA types.
CCNA September 1, 2019

OSPFv2 vs OSPFv3: Key Differences and Similarities

OSPFv3 is a routing protocol for IPv6, just as OSPFv2 is for IPv4. While both share core principles, there are vital differences in their operation. OSPFv3 serves as the IPv6 equivalent to OSPFv2 for exchanging prefixes, making it essential for modern networks handling dual-stack environments. In IPv6, the network address is referred to as the […]
Asad Ijaz Read More
Forum