Odd Behavior of Protected Switchports

I ran into an interesting issue recently, which was caused by use of the switchport protected command…. So I use a pair of Cisco 2960-8TC-L switches at home, for both my home network and lab. A few months back I ran a bunch of ethernet cabling within my house,…

Migrating IP Addressing Schemes

Back a few months ago, I wrote a bit about why it is important to have a good design for IP addressing schemes (part 1 and part 2). As a brief refresher, the situation I found myself in was an environment where practically everything was assigned a 10.x.x.…

Port Security: Worth the effort?

Port Security. Always seems like one of those things covered in Cisco exams, yet how many businesses actually use it? For those that aren’t implementing it, should they? Or is it too much of a headache? So the concept of port security is fairly simple – We want…

Virtual Networking Contexts

I really want to take a moment to talk about how wonderful VRFs/firewall contexts really are. Both technologies essentially allow a network administrator to spin up a virtualized, isolated instance of a network device. I’ll be honest and say that I hadn’t had the chance…

The Argument for Standardized Configurations

There are quite a few things that you don’t realize how great they are until you don’t have them anymore. For me, one of those things was standard guidelines for device configurations. At my last job, documented standards were extremely important – we had them for…