Tech Corner / Routing Protocols (2)

The Essentials of ARP Protocol & How To Protect Against Spoofing Attacks

The Essential Guide To Protect Against ARP Spoofing Attacks

No matter how strong your security measures are, there is an attacker working to get through them. Treating this as inevitable is key to keeping your data safe and secure. In our two-part packet delivery process blogs here and here we learned a switch is involved in ARP routing. This …

Read Story

Learn the Packet Delivery Process (Host-to-Host Communication) - Pt. 2

Learn the Packet Delivery Process (Host-to-Host Communication) - Pt. 2

In every network, data packets are exchanged among hosts through numerous networking devices along the traffic path, such as switches, routers, and firewalls among other devices, so you can comfortably perform your daily tasks. Although the traffic transfer happens instantly, the host …

Read Story

Learn the Packet Delivery Process (Default Gateway and ARP) - Pt. 1

Learn the Packet Delivery Process (Default Gateway and ARP) - Pt. 1

For everyday network communications and using various business and entertainment applications, a vast amount of data packets is exchanged between networking devices. However, the host-to-host delivery either in the same network or between different networks is not a simple process and …

Read Story

Exploring Routing Functions and the Purpose of the Routing Table

Exploring Routing Functions and the Purpose of the Routing Table

For everyday network operations and proper exchange of data throughout the enterprise environment, routing functionality must be implemented on Layer 3 devices. This functionality is usually performed on routers, although it can also be provided by other devices such as firewalls and …

Read Story

Why Is BGP the King of Routing Protocols?

Why Is BGP the King of Routing Protocols - a brief overview

Routers must be aware of all networks within the enterprise premises and the available routes to reach them to provide full network connectivity. For that purpose, routing protocols are used such as OSPF, EIGRP, or RIP, to dynamically exchange information and perform appropriate recal …

Read Story

What Is a GRE Tunnel and How Do You Configure One?

What Is a GRE Tunnel and How Do You Configure One?

Generic Routing Encapsulation (GRE) is a tunneling protocol for exchanging encapsulated data packets over an established tunnel. In other words, GRE creates a virtual point-to-point link between two devices in separate networks that need to communicate with each other.` The whole proc …

Read Story

Back to the Basics: Is Static or Dynamic Routing Better?

The TL;DR of this question: Neither. They're just different. Read on to learn when to use each routing solution. Routers are an essential piece of hardware in networks. They preserve the knowledge of the network topology and use that information to forward packets to each destination. …

Read Story

OSPF Configuration (Pt. 2) – Misc. Features and Multi-Area Configuration

OSPF Configuration Guide (Part 2) – Misc. Features and Multi-Area Configuration

OSPF can be implemented by using two different approaches, single-area or multi-area deployment. In a single-area design, all routers are part of the same area and are an appropriate option for small networks. Let’s not forget that in such a scenario many link-state advertisements (LS …

Read Story

Subscribe by email