Vishwajeet Rathore
11 Answers
Why Dynamic ARP inspection is performed?
author
DAI is preformed to mitigate "man in the middle attack" mainly. This feature on switch makes sure that ARP request is coming from the same ip address and same mac address on particular port according ...
What is port-based authentication?
author
It is a process for authenticating, authorizing and accounting user dynamically, who is joining the network with wired connection its is done with the AAA server setup using 802.1X protocol for end d...
What commands display the routing table on the local computer?
author
command to check route table on windows is "route print" command for linux is "sudo route -n"
How to do Configuration of Site to Site VPN with RSA Signature IOS CA?
author
In our topology R1 and R3 are VPN peers, having PC1 and PC2 as end client which are going to communicate with each other using secure tunnel and R2 is the router, routing only public IP address.   ...
Switch and router works on full duplex or half duplex?
author
Cisco router's and switch's interfaces have the capability to work at full duplex as well as half duplex. By default interface works on auto negotiation mode, which negotiate duplex and speed...
What is the different between MSS and MTU?
author
MSS is a OSI Layer-4 data size (in bytes) any segment can carry which doesn't include transport layer's headers where as MTU is a OSI Layer-3 IP packet size (in bytes) which can be transmitt...
What is tcp md5 signature?please elaborate with one example?
author
TCP MD5 signature: This MD5 signature is a MD5 hash function of following values. 1. TCP Pseudo-header (which consist of some properties from tcp header and ipv4-header) 2. TCP  header (excluding op...
How to configure SSH on cisco ASA?
author
    ASA(config)#domain-name cisco with this command we define domain-name to be used when generating crypto keys. ASA(config)#crypto key generate rsa label cisco modulus 1024 with this command ...
How to configure Site to Site VPN with Pre Shared Key? Please give Step by Step Commands Tutorial?
author
Site to site on Router using pre-share keys with IKE Version-1   Topology used is following: Commands with explanation: On Router of SITE-A: First thing we do is make IPsec phase-1 configurati...
How to configure Time Range Access Control List (ACL)?
author
Time Based Access Control List: Time based ACL are just like normal Extended ACL but in this we define time-range which defines duration for which ACL is going to work. To configure these ACL we need ...