Vi ste ovdje
Overview/Description
This course starts with a review of VLAN and trunk technology. Understanding how VLANs and trunks operate and which protocols are associated with them is important for configuring, verifying, and troubleshooting VLANs and trunks on Cisco access switches. This course also addresses some of the common reasons that port connectivity, VLAN configuration, and trunk establishment can fail. It describes what information to look for to identify the source of the problem and determine how to solve it. Switched networks introduce redundancy, so an STP loop-avoidance mechanism is...
Overview/Description
Cisco VPN solutions provide an Internet-based WAN infrastructure for connecting branch offices, home offices, business partner sites, and remote telecommuters to all or portions of a company network. With cost-effective, high-bandwidth Internet connectivity that is secured by encrypted VPN tunnels, you can reduce WAN bandwidth costs while increasing connectivity speeds. This course describes the benefits of VPN implementation. GRE is a tunneling protocol that can encapsulate a wide variety of protocol packet types inside IP tunnels, creating a virtual point-to-point link...
Overview/Description
As an enterprise grows beyond a single location, it needs to interconnect LANs in various locations using a WAN. There are several technologies that are involved in the functioning of WANs, including hardware devices and software functions. This course describes the functions and characteristics of WANs and contrasts them with LANs. The course also explores how WANs relate to the OSI reference model in their design and function and which major hardware components are typically used in WAN environments. One of the most common types of WAN connection is the point-to-point...
- ‹‹
- 20 od 20