GRE Tunnel Tutorial
GRE stands for Generic Routing Encapsulation, which is a very simple form of tunneling. With GRE we can easily create a virtual link between routers and allow them to be directly connected, even if...
View ArticleGRE Tunnel Lab
In this lab we will configure GRE Tunnel between R1 & R2. Notice that in the topology below, R1 & R2 are not directly connect to each other. They are connected through R3 only. Basic interface...
View ArticleAAA TACACS+ and RADIUS Tutorial
Nowadays, security plays an important role in a company. Without any security solution implementation on our network, a user can simply “plug and play” into our network. The user may simple pick up a...
View ArticleAAA Questions
Question 1 Question 2 Explanation TACACS+ is an AAA protocol developed by Cisco. TACACS+ separates the authentication, authorization, and accounting steps. This architecture allows for separate...
View ArticleDNS Questions
Question 1 Explanation All DNS servers fall into one of four categories: Recursive resolvers, root nameservers, TLD nameservers, and authoritative nameservers. In a typical DNS lookup (when there is no...
View ArticleCCNA Access List Sim
Question Answer and Explanation Note: If you are not sure about Access-list, please read my Access-list tutorial. You can also download this sim to practice (open with Packet Tracer) here:...
View ArticleOSPF Neighbor Sim
Question The topology below is running OSPF. You are required to troubleshoot and resolve the OSPF issues between the various routers. Use the appropriate show commands to troubleshoot the issues....
View ArticleCCNAv3 – New Questions 3
Question 1 Which symbol in the APIC-EM Path Trace tool output indicates that an ACL is present and might deny packets? A. B. C. D. Answer: C Explanation Icon means “there are ACLs that permit the...
View ArticleSTP Root Port Election Tutorial
In this tutorial we will learn in detail how Spanning Tree Protocol (STP) elect root port after choosing a root bridge. Root port is the port that is closest to the root bridge, which means it is the...
View ArticleShare your new CCNA Experience
The new CCNA 200-301 is going to come to replace the old CCNA 200-125 exam (the last day to take CCNA 200-125 exam is February 23, 2020) so we create the “Share your new CCNA Experience” for everyone...
View ArticlePrivacy-Policy
All of the articles on 9tut.com are copyright its respective owner. You are allowed to use them anywhere with a link back to its original article on this site.
View ArticleWe want to write more!
Dear our readers, First we really want to say thanks to all who are reading 9tut.com. Thank for the time you spent with us, your comments and opinions. Our team had a conversation about 9tut.com. We...
View ArticleCCNAv7 (2020) – New Questions
Note: Although some of the topics like EIGRP, DTP, VTP are not included in the new CCNA 200-301 syllabus but you should learn them too. =========================== Drag Drop Questions...
View ArticleLayer 2 Threats and Security Features
In this tutorial, we will learn about Layer 2 threats include DHCP Spoofing, VLAN Hopping and ARP Attack and how to use security features (DHCP snooping, VACL, Dynamic ARP Inspection) to mitigate them....
View ArticleMiscellaneous Questions
Question 1 Question 2 Question 3 Question 4 Explanation Weighted Random Early Detection (WRED) is just a congestion avoidance mechanism. WRED drops packets selectively based on IP precedence. Edge...
View ArticleDrag Drop Questions
Question 1 Explanation The focus of Ansible is to be streamlined and fast, and to require no node agent installation. Thus, Ansible performs all functions over SSH. Ansible is built on Python, in...
View ArticleAutomation Questions
Question 1 Explanation JSON data is written as name/value pairs. A name/value pair consists of a field name (in double quotes), followed by a colon, followed by a value: “name”:”Mark” JSON can use...
View ArticleDNA Center Questions
Question 1 Question 2 Explanation Cisco DNA Center offers 360-degree extensibility through four distinct types of platform capabilities: + Intent-based APIs leverage the controller and enable business...
View ArticleSDN Questions
Question 1 Question 2 Explanation The Southbound API is used to communicate with network devices. Question 3 Question 4 Explanation OpenFlow is a well-known southbound API. OpenFlow defines the way...
View ArticleWireless Questions
Question 1 Explanation Many routers provide WPA2-PSK (TKIP), WPA2-PSK (AES), and WPA2-PSK (TKIP/AES) as options. TKIP is actually an older encryption protocol introduced with WPA to replace the...
View Article