Roadmap

Series

Vendor-Agnostic Networking

70 posts covering everything a network engineer needs—from how devices communicate to how automation is reshaping the field. Structured around CCNA 200-301 objectives, built on open standards.

  1. Firewalls and Intrusion Prevention Systems

    A firewall decides what traffic is allowed. An IPS decides what traffic is safe. They answer different questions — and most networks need both.

  2. Access Points, Controllers, and Endpoints

    Wireless networking adds a layer of infrastructure most wired engineers overlook. Access points, WLCs, and the endpoints connecting to them each play a specific role in getting frames off the air.

  3. Servers and Power over Ethernet

    Servers are the destinations most traffic is ultimately heading for. PoE is how the network itself powers the devices attached to it — from phones to cameras to access points.

  4. Network Topologies: Two-Tier, Three-Tier, and Spine-Leaf

    How you connect devices to each other determines how traffic flows, where bottlenecks form, and how much the network costs to run. Two-tier, three-tier, and spine-leaf each solve different problems at different scales.

  5. WAN, SOHO, and Cloud Architectures

    Not every network is a data center. WANs connect geographically distributed sites, SOHO setups pack enterprise features into a single device, and cloud architectures extend both models across infrastructure you don't own.

  6. Physical Cabling: Fiber, Copper, and Connections

    Before any packet moves, electrons or photons have to travel down a cable. The type of cable determines the distance, speed, and interference characteristics of every link in your network.

  7. Interface and Cable Issues: Collisions, Duplex, and Speed

    A link that's up isn't necessarily a link that works. Duplex mismatches, speed mismatches, and cable faults are silent performance killers that show up in interface counters — if you know where to look.

  8. TCP vs. UDP

    TCP guarantees delivery. UDP doesn't. That single design decision shapes every protocol built on top of them — and knowing when each is appropriate is foundational to understanding how applications use the network.

  9. IPv4 Addressing and Subnetting — Part 1: The Fundamentals

    Every device on an IP network needs an address, and every address belongs to a subnet. Before you can subnet anything, you need to understand the binary math underneath the dotted-decimal notation.

  10. IPv4 Addressing and Subnetting — Part 2: Subnetting in Practice

    The math is one thing. Applying it under exam pressure — or in production — is another. This post works through subnetting systematically so it becomes a repeatable process, not a calculation to memorize.

  11. Private IPv4 Addressing and RFC 1918

    The internet would have run out of addresses decades ago without private addressing. RFC 1918 defines the ranges that never appear on the public internet — and NAT is what bridges the two worlds.

  12. IPv6 Addressing and Prefix Notation

    IPv6 addresses are 128 bits long, written in hexadecimal, and abbreviated in ways that look arbitrary until you understand the rules. The notation is the first thing to master before any IPv6 configuration makes sense.

  13. IPv6 Address Types: Unicast, Anycast, Multicast, and EUI-64

    IPv6 eliminated broadcast — but it didn't eliminate the need to reach groups of devices. Multicast replaces broadcast, anycast routes to the nearest instance, and EUI-64 generates interface IDs from MAC addresses.

  14. Verifying IP Parameters on Client Operating Systems

    When a device can't reach the network, the first step is confirming it actually has valid IP configuration. The commands differ across Windows, macOS, and Linux — but the information you're looking for is the same.

  15. Wireless Principles: Channels, SSID, RF, and Encryption

    Wi-Fi is radio — and radio is a shared medium. Channels, signal strength, interference, and encryption protocols aren't optional details. They determine whether your wireless network works or merely exists.

  16. Virtualization Fundamentals: VMs, Containers, and VRFs

    Virtualization lets you run multiple isolated environments on shared hardware. In networking, that concept extends from servers all the way down to the routing table itself — which is exactly what a VRF does.

  17. Switching Concepts: MAC Learning, Frame Switching, and Flooding

    A switch isn't magic — it's a device that builds a table of MAC addresses and uses it to make forwarding decisions. Understanding how that table is built, aged, and used explains almost every Layer 2 behavior you'll encounter.

  18. VLANs: What They Are and Why They Matter

    Without VLANs, every device on a switch shares the same broadcast domain. VLANs carve that domain into isolated segments — separating traffic logically without buying more hardware.

  19. VLAN Configuration: Access Ports, Voice VLANs, and Defaults

    Knowing what a VLAN is and knowing how to configure one are different skills. Access ports, voice VLANs, and the default VLAN each have behaviours that will surprise you if you haven't seen them before.

  20. Inter-VLAN Routing

    VLANs isolate traffic — which means devices on different VLANs can't communicate by default. Inter-VLAN routing is what puts a router (or a Layer 3 switch) between those segments to allow controlled communication.

  21. Trunk Ports, 802.1Q, and Native VLANs

    Access ports carry one VLAN. Trunk ports carry many — tagged with 802.1Q headers so the receiving device knows which VLAN each frame belongs to. The native VLAN is the one exception, and it's the source of more misconfigurations than it should be.

  22. Layer 2 Discovery: CDP and LLDP

    You can map a network by tracing cables — or you can let the devices tell you what's connected to them. CDP and LLDP are the protocols that do exactly that, and they're invaluable for both troubleshooting and documentation.

  23. EtherChannel and LACP

    A single uplink between switches is a bottleneck and a single point of failure. EtherChannel bundles multiple physical links into one logical link — multiplying bandwidth and providing redundancy without Spanning Tree blocking half your ports.

  24. Spanning Tree Protocol — Part 1: Why Loops Are Bad

    Ethernet has no TTL field. A broadcast loop doesn't decay — it grows until it consumes every bit of bandwidth on every switch in the network. Spanning Tree Protocol exists to prevent that from happening.

  25. Spanning Tree Protocol — Part 2: Rapid PVST+, PortFast, and Guards

    Classic STP converges in up to 50 seconds — an eternity when a host is waiting to get online. Rapid PVST+ cuts that to seconds. PortFast and BPDU Guard protect the ports where convergence time matters most.

  26. Cisco Wireless Architectures and AP Modes

    Not all access points are equal. Autonomous APs manage themselves. Lightweight APs offload intelligence to a controller. FlexConnect bridges both models. The architecture you choose determines how the network behaves when the WAN goes down.

  27. WLAN Physical Infrastructure: APs, WLCs, and Ports

    Wireless networks have more physical moving parts than they appear to. The access point is just the radio — behind it is a wired infrastructure of switches, uplink ports, and controllers that makes the wireless network possible.

  28. Network Device Management Access: SSH, HTTPS, TACACS+, RADIUS

    Every network device needs a way to be managed — and every management channel is an attack surface. SSH, HTTPS, TACACS+, and RADIUS are the protocols that control who gets in and what they can do.

  29. Wireless LAN GUI Configuration

    Most wireless LAN controllers ship with a web interface. Knowing how to navigate it — creating WLANs, assigning security policies, mapping to interface groups — is a practical skill the CCNA exam tests directly.

  30. The Routing Table: Components and How to Read One

    Every forwarding decision a router makes starts with a lookup in the routing table. The output of show ip route tells you the network prefix, the source of the route, the metric, and the next hop — if you know how to read it.

  31. Administrative Distance, Metrics, and Gateway of Last Resort

    When two routing protocols disagree on how to reach the same network, the router needs a tiebreaker. Administrative distance is that tiebreaker. Metrics break ties within a single protocol. The gateway of last resort catches everything else.

  32. How Routers Make Forwarding Decisions

    Longest prefix match. That's the core algorithm. Everything else — the routing table, administrative distance, metrics — exists to populate the table that longest-prefix match runs against.

  33. Static Routing — Part 1: Default, Network, and Host Routes

    Before dynamic routing protocols, there were static routes — and they're still the right tool when the topology is simple and stable. Default routes, network routes, and host routes each serve a different purpose.

  34. Static Routing — Part 2: Floating Statics and IPv6

    A floating static route sits dormant until the primary path fails. It's one of the simplest forms of route redundancy — and understanding it sets the stage for more sophisticated failover mechanisms.

  35. OSPF — Part 1: Why We Need Dynamic Routing

    Static routes don't adapt. Add a link, remove a router, or reroute a circuit — and someone has to manually update every affected device. Dynamic routing protocols like OSPF exist to make the network respond to change on its own.

  36. OSPF — Part 2: Neighbor Adjacencies and Router ID

    OSPF routers don't just exchange routes — they build adjacencies. The router ID is how each OSPF speaker identifies itself, and the adjacency formation process determines what topology information gets exchanged.

  37. OSPF — Part 3: Network Types — Point-to-Point and Broadcast

    OSPF behaves differently depending on the network type of the interface. Broadcast networks elect a DR and BDR. Point-to-point networks skip that process entirely. The difference matters for how adjacencies form and how LSAs propagate.

  38. OSPF — Part 4: Single-Area Configuration and Verification

    Understanding OSPF conceptually is one thing. Configuring it and verifying that adjacencies formed, routes are being exchanged, and the topology is correct is where the knowledge becomes operational.

  39. First Hop Redundancy Protocols: HSRP, VRRP, and GLBP

    Every host on a subnet points to a single default gateway. If that router fails, the host loses connectivity — unless a first hop redundancy protocol is in place to make a standby router take over transparently.

  40. NAT: Static NAT, Dynamic NAT, and PAT

    Network Address Translation hides private address space behind a public one. Static NAT maps one-to-one. Dynamic NAT maps from a pool. PAT — the version nearly everyone uses — maps many private addresses to a single public IP using port numbers.

  41. NTP: Time Synchronization in Networks

    Accurate timestamps aren't cosmetic. They're how you correlate logs across devices, how certificates validate, and how authentication protocols like Kerberos work at all. NTP is the protocol that keeps every clock in sync.

  42. DHCP and DNS: How Devices Get Addresses and Names

    When a device joins a network, it needs an IP address and a way to resolve names. DHCP handles the first problem. DNS handles the second. Together they're the reason you can type a hostname instead of memorizing an IP.

  43. DHCP Configuration: Clients, Servers, and Relay Agents

    DHCP discover messages are broadcasts — and routers don't forward broadcasts. A DHCP relay agent solves this by forwarding the request to a centralized server on behalf of a remote subnet.

  44. SNMP: Monitoring Network Devices

    You can't manage what you can't measure. SNMP is the protocol that lets network management systems poll devices for interface counters, CPU utilization, memory usage, and anything else stored in the MIB.

  45. Syslog: Facilities, Severity Levels, and Centralized Logging

    Every network device generates log messages — and by default, most of them go nowhere useful. Syslog is the standard for collecting those messages, and the severity level system is how you filter signal from noise.

  46. QoS Fundamentals: Classification, Marking, Queuing, and Shaping

    When a link is congested, something has to wait. QoS is the set of tools that decides what waits — and for how long. Classification identifies traffic, marking tags it, queuing orders it, and shaping controls when it leaves.

  47. SSH Configuration for Remote Access

    Telnet sends credentials in plaintext. SSH encrypts the entire session. Configuring SSH on a Cisco device is a small amount of work that eliminates an entirely unnecessary category of risk.

  48. TFTP and FTP: File Transfer in Network Operations

    Network engineers transfer files constantly — IOS images, configuration backups, licensing files. TFTP is the lightweight option for trusted environments. FTP adds authentication. Knowing both is a practical operational skill.

  49. Security Concepts: Threats, Vulnerabilities, Exploits, and Mitigations

    A threat is a potential harm. A vulnerability is a weakness that can be exploited. An exploit is the mechanism. Understanding the relationships between these terms is the foundation of every security conversation you'll have.

  50. Security Program Elements: Awareness, Training, and Physical Controls

    Technology controls are only part of a security program. The most sophisticated firewall can be bypassed by someone who holds a door open for a stranger. Security awareness, training, and physical controls address the human and physical layers.

  51. Device Access Control: Local Passwords and Line Security

    Every Cisco device ships with no passwords configured. That's a starting point, not an acceptable state. Configuring console, VTY, and enable passwords is the baseline that every managed device needs before it goes on the network.

  52. Password Policy: Complexity, Management, and MFA Alternatives

    A password policy tells users what makes a good password. A password manager makes good passwords practical. MFA makes the password itself less important. The three work together — relying on any one of them alone is insufficient.

  53. VPNs — Part 1: IPsec Fundamentals

    A VPN creates an encrypted tunnel across an untrusted network. IPsec is the protocol suite that makes that tunnel cryptographically secure — defining how peers authenticate, how keys are exchanged, and how data is protected in transit.

  54. VPNs — Part 2: Remote Access vs. Site-to-Site

    Site-to-site VPNs connect fixed locations. Remote access VPNs connect individual users wherever they are. Both use IPsec — but the architecture, the configuration, and the operational model are meaningfully different.

  55. Access Control Lists — Part 1: Standard ACLs

    An access control list is a sequence of permit and deny statements the router evaluates top-to-bottom. Standard ACLs match on source IP only — which makes them simple, fast, and limited in what they can express.

  56. Access Control Lists — Part 2: Extended ACLs and Named ACLs

    Extended ACLs match on source IP, destination IP, protocol, and port — giving you precise control over exactly what traffic is permitted or denied. Named ACLs make complex policies readable and editable without renumbering.

  57. Layer 2 Security: DHCP Snooping, DAI, and Port Security

    Layer 2 attacks are particularly insidious because they happen below the level that most firewall policies operate. DHCP snooping, Dynamic ARP Inspection, and port security address three of the most common switch-level threats.

  58. AAA: Authentication, Authorization, and Accounting

    Who are you? What are you allowed to do? What did you do? Authentication, Authorization, and Accounting answer those three questions — and together they form the foundation of access control on every managed network device.

  59. Wireless Security Protocols: WPA, WPA2, and WPA3

    WEP was broken. WPA was a stopgap. WPA2 became the standard for over a decade. WPA3 fixes the weaknesses that remained. Understanding the evolution of wireless security protocols explains why the recommendations changed — and why they still matter.

  60. Configuring WLANs with WPA2 PSK

    Knowing which security protocol to use and knowing how to configure it on a WLC are different skills. This post walks through creating a WLAN with WPA2 PSK authentication from start to finish on a Cisco wireless LAN controller.

  61. How Automation Is Changing Network Management

    Configuring a hundred devices one CLI session at a time doesn't scale. Automation replaces repetitive manual work with code — and that shift changes not just the tools network engineers use, but the skills they need.

  62. Traditional Networks vs. Controller-Based Networking

    In a traditional network, every device makes its own decisions using distributed control planes. Controller-based networking centralizes those decisions. Understanding the architectural difference is the key to understanding SDN.

  63. SDN Architecture: Overlay, Underlay, Fabric, and API Planes

    Software-defined networking introduces vocabulary that can obscure more than it reveals. Overlay, underlay, fabric, northbound and southbound APIs — each term refers to a specific layer or interface in a well-defined architecture.

  64. AI and Machine Learning in Network Operations

    Networks generate enormous amounts of telemetry data. AI and machine learning are what make that data actionable — identifying anomalies, predicting failures, and automating responses faster than any human operator can.

  65. REST APIs: Authentication, CRUD, HTTP Verbs, and Data Encoding

    Modern network devices have APIs. Consuming those APIs — sending GET requests, parsing JSON responses, handling authentication — is now a baseline skill for network engineers who want to automate anything.

  66. Configuration Management: Ansible and Terraform

    Ansible and Terraform are the two tools most commonly used to automate network infrastructure. Ansible pushes configuration. Terraform declares and manages state. Understanding what each is designed for prevents using the wrong one for the job.

  67. JSON: Structure, Encoding, and Use in Network Automation

    JSON is the data format that most network APIs speak. Reading it, writing it, and parsing it programmatically are practical skills — and understanding its structure makes every REST API interaction less opaque.

Keyboard Shortcuts

Key Action
j Next section
k Previous section
n Next post
p Previous post
/ Open search
Cmd + K Command palette
Esc Close dialog / popover
? Show this help