Need to know
Threats in Borderless Networks
After completing this topic, you should be able to categorize threats to borderless networks.
PPP authentication. PAP vs CHAP
Describe PAP and CHAP authentication and configure CHAP authentication for PPP.
EIGRP features in IPv6
After completing this topic, you should be able to enter the commands to create an EIGRP routing process for IPv6.
Spanning Tree Protocol Explained
Recognize how the spanning-tree algorithm elects a root bridge and root port, elects a designated port.
In this lesson, we are going to demonstrate the configuration of the Routing Information Protocol - RIPv2.
Exploring the Network Routing Process
Here we are exploring the packet routing process from the router's point of view!