Color Code Your Routers

I came across an interesting idea, what if you could color code your devices in command line? So such as if you were operating routers at a core level you could color code the CLI to the color red, and the branch routers green and etc. I wasn’t sure if this would possible but doing some searching through the internet I found a guy Ivan Pepelnjak who wrote how to do this  a couple years ago and wrote a couple books as well, check out his blog/website at there is tons of helpful information along with his original guide hereContinue reading “Color Code Your Routers”


The Beginnings of Layer Two Redundancy

In a perfect world we would never need redundancy on a network infrastructure, but as you know as well as I know we don’t live in a perfect world. Hardware will eventually fail, bottlenecks will appear, and the speed of our network will become slower when we max the bandwidth on links. So having redundancy in routers, connections, and having a hierarchy network is one of best choices to make when improving the efficiently of the network. But in the OSI model there is one layer that can’t have redundancy at least logically and that is Layer two of the OSI model. Continue reading “The Beginnings of Layer Two Redundancy”

Creating VLANs

Today this tutorial is going to be talking about creating VLANs (Virtual Local Area Networks) with a Cisco Catalyst switch. By creating a VLAN you are separating the network, why would you do this? There are some several reasons, like separating your production network from a guest network, and separating a test environment from a production network. This all adds security to your network. You can separate core critical network components from the rest of the production network for added security, easier troubleshooting along with separating or segmenting your network. This is breaking up the broadcast domains into smaller chucks, which will improve your network performance. Let’s get started! Continue reading “Creating VLANs”

Configuring Port Security

Today this tutorial is going to be talking about how to configure port security on a Cisco Catalyst switch. Port security is one of the first things you can do to keep your network secure from unauthorized access. Port security can restrict devices so only devices you allow are granted access to network resources. If and when an unauthorized device is connected to a port you can decide what you want the switch to do. Let’s get started! Continue reading “Configuring Port Security”