I am reading a book called Interconnecting Cisco Network Devices, part 2 ICND2. In the book, it gives an example which I'm having a hard time grasping the concept. I've attached the example from the book. Could someone help me?
I am new to all of this and still learning about subnet mask. Thanks for your quick response. After reviewing your response, the only question I have is why or how did you know to use the mask 255.255.240.0 with 172.30.16.0 -> 172.30.31.0?
This document gives several answers on frequently asked questions for PFRv3 channel state behavior.
Q1: What are all the channel operational states from a BR (border role) perspective and what are the rules/conditions to be in each st...
The need was to reach an host inside a LAN through a VPN connection managed by the LAN gateway (Cisco 1921).
The LAN gateway performs NAT and there was a dedicate nat rule for the host i wanted to reach through VPN.
I couldn't connect to the hos...
We have 3 identical switches configured by someone else and would like to claim some of the Gigabit ports(G1/G2/G3/G4) for use on servers. When we try to change the wiring and configuration, we run in to connectivity issues. Attached is a des...