How do we do encryption and authentication in L2TP?
No Answer is Posted For this Question
Be the First to Post Answer
Can Anybody tell me if I wanna block all MP3,video sites from cisco 2600 router,how shall i proceed with ACL's?? Please post the steps for the following alonge with detail. Thanks to you all ..appriciated
Which protocol is used for booting diskless workstations? A.) IP B.) ARP C.) RARP D.) TCP E.) SNMP
Which frame has a Type field to identify the upper-layer protocol? A.) 802.3 B.) 802.2 C.) 802.5 D.) Ethernet_II
Given the configuration example: interface ethernet0 ipx network 4a ipx access-group 800 out interface ethernet1 ipx network 3d interface ethernet2 ipx network tc access-list 800 permit 3d 4a Which action result from implementing this configuration? a-Traffic from network 3d for network 4a will be forwarded out e0 b-IPX network 5c will not receive any traffic c-Traffic from network 3d, destined for network 4a, will be forwarded out e2 d-Traffic from network 3d for network 3d will be forwarded out e0
How to crimping cat cable without using crimping and any tool...........?
Can you explain static and dynamic tunnels?
What is the network brouter?
What is ad in ccna?
The following is partial output from a routing table ; '192.168.10.0 [100/1300] via 10.1.0.1, 00:00:23, Ethernet1' Which routing protocol is being used? (assuming defaults have not been changed) A.) OSPF B.) RIP C.) BGP D.) IGRP
How we can find ASBR Router, we have no authentication to enter router?
How many reserve ports?
What is the ieee standard for wireless networking?