Skip to content

Professional lab configurations for engineers

mpls-l3vpn-lab

MPLS L3 VPN

By musungur | March 26, 2022

MPLS L3VPN is a type of PE-based L3VPN technology for service provider VPN solutions. It uses BGP to advertise VPN routes and uses MPLS to forward VPN packets across service provider backbones.Download MPLS L3 VPN lab MPLS L3VPN provides flexible networking modes, excellent scalability, and convenient support for MPLS QoS and MPLS TE.The MPLS L3VPN…

IS-IS vs OSPF ( IS-IS Lab)

By musungur | March 23, 2022

IS IS stands for Intermediate System to Intermediate System. ISIS is a routing protocol for Internet Protocol  Network Download the Lab How ISIS works ISIS is designed to move information efficiently within a computer network, a group of physically connected computers or similar devices. It accomplishes this by determining the best route for data through a packet switching network. Breaf History The IS-IS protocol…

PAgP, LACP redundancy in 3-Tier Architecture..

By musungur | March 20, 2022

Basics: PAgP, LACP redundancy in 3-Tier Architecture, Collapsed Cored, HSRP, GRE tunneling of VOIP DHCP server, Layer 3 Switch routing. Download the Lab Protocols; PAgP Protocol configs LACP protocols Redudancy in 3 Tier Architecture, Collapsed core HSRP GRE Tunneling remote DHCP Underlay Routing Protocols Overlay Routing Protocol Layer 3 VOIP – H.323, SCCP, RTP, SIP…

OSPF AREAS

By musungur | March 19, 2022

OSPF first version was invented in 1989 by IETF, and later quickly replaced by OSPFv2 in 1991. It was developed as one of IGPs. It uses LSR algorithm, operating within a single autonomous System (AS) In this information, I share the OSPF network topology diagram. I also include a Lab for download that is more…

GRE-Tunneling Lab

By musungur | March 16, 2022

Generic routing encapsulation (GRE) provides a private path for transporting packets through an otherwise public network by encapsulating (or tunneling) the packets. GRE tunneling is accomplished through tunnel endpoints that encapsulate or de-encapsulate traffic. Download the revised Lab

Web Design & Development

By musungur | February 25, 2022

We help, as much or as little as you’d like, with perfecting every aspect of your website. Customize your site with a unique domain and email address. Receive a FREE domain, customizable theme, and more. Receive 24/7 expert support for any questions or problems. Handle loads of traffic with a reliable, cloud-powered platform. Upgrade as…

Voice Over Internet Protocol

By musungur | February 25, 2022

Last Mile Connectivity Provisioning of managed physical access circuits, e.g. DSL and/or ADSL, fiber, Metro Ethernet or wireless, from customer premises to closest point-of-presence on our core network; enabling customers to use our converged voice and data offerings. get service

Network Management

By musungur | February 16, 2022

NETWORK SEURITY POLICIES

By musungur | February 11, 2022

A network security policy delineates guidelines for computer network access, determines policy enforcement, and lays out the architecture of the organization’s network security environment and defines how the security policies are implemented throughout the network architecture. …request for services