News

Step 1: Assign a name to a switch. Step 2: Secure access to the console line. Step 3: Verify that console access is secured. Exit privileged mode to verify that the console port password is in effect.
You must use four supported Cisco switches of the same model with the same NX-OS version and licensing. The MetroCluster configuration requires four switches. The ...
Many administrators forget—or don't even realize—that they can configure Dynamic Host Configuration Protocol (DHCP) on Cisco IOS routers and switches. David Davis discusses the pros and cons of this ...
Two of the most common forms of network address translation (NAT) are dynamic port address translation (PAT) and static NAT. PAT is the many-to-one form of NAT implemented in many small office and ...
Nutter helps a reader with a new Catalyst switch and a handful of Macs I just converted my company over to a Cisco Catalyst 6509 core switch. Several weeks after the fact I found out that there are a ...
Most IT pros know that using Telnet to manage routers, switches, and firewalls is not exactly a security best practice. Instead, the accepted alternative to Telnet's lack of security is Secure Shell ...
Most IT pros realize that using Telnet to manage routers, switches, and firewalls is insecure. Transmitted in clear text across a network, Telnet traffic basically publicizes any login usernames and ...