This post will describe how NAT works. The reason for doing a blog post on NAT is twofold. There is a lack of good documents out there describing NAT and I want to do some learning for myself as well.
OSPF is one of the protocols where the details are very important. It has lots of bits and pieces to make it run in a proper way. I have described the forwarding address in an earlier post and this time
We start out with a basic topopology of 3 routers. R2 and R3 will peer to each others loopback. I have setup OSPF for full reachability in the network. First we test connectivity.
R2#ping 22.214.171.124 so lo0
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 126.96.36.199, timeout is 2 seconds:
Packet sent with a source address of 188.8.131.52
Success rate is 100 percent (5/5), round-trip min/avg/max = 40/53/80 ms
There is connectivity. We setup the
I’m back from London and it’s been a great experience. Many readers are interested in what the bootcamp is like. It is a big investment to go for so it is understandable that you want to know if it will
So we have the first 5 days completed now and it is time for some relaxing in the weekend and a bit of labbing as well. So far it has been great. Brian Dennis is both a great teacher and
Hey guys, On sunday I’m leaving for London. I’m attending INEs 10 day bootcamp. Hopefully this will be the next step in my studies. I hope to learn a lot and to meet a few new buddies as well. I’m
Earlier I have done some posts on route redistribution and on route filtering in different protocols. I wanted to expand on this by showing different ways we can tag and do filtering with route-maps when doing route redistribution. We start
This site just hit 100 000 visitors! I have been blogging for roughly 2 years now and I never expected the site to grow to the size that it has today. Unfortunately I don’t have the CCIE yet but I
I was discussing the other day with someone on IRC about a RIP issue he had. Apparently he had RIP request packets coming in and then all routers were responding with response packets with full routing table. It seemed like
This is an interesting fact I just found out. When we configure MD5 authentication for RIP they key-ID and key-string must match, this is well known. But what happens if we actually configure the wrong key-ID? Take a look at