{"id":2656,"date":"2018-11-27T11:27:21","date_gmt":"2018-11-27T11:27:21","guid":{"rendered":"http:\/\/www.mtin.net\/blog\/some-basic-cisco-router-terminology\/"},"modified":"2018-11-27T11:27:21","modified_gmt":"2018-11-27T11:27:21","slug":"some-basic-cisco-router-terminology","status":"publish","type":"post","link":"http:\/\/www.mtin.net\/blog\/some-basic-cisco-router-terminology\/","title":{"rendered":"Some basic Cisco router terminology"},"content":{"rendered":"<p>For those of you not so familiar with routers<\/p>\n<p><a href=\"https:\/\/ccnaeducation.com\/lan-and-wan-interfaces-in-router\/\">https:\/\/ccnaeducation.com\/lan-and-wan-interfaces-in-router\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>For those of you not so familiar with routers https:\/\/ccnaeducation.com\/lan-and-wan-interfaces-in-router\/<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[526,67,17,2],"tags":[19,669,334],"jetpack_publicize_connections":[],"aioseo_notices":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p6VLMf-GQ","jetpack-related-posts":[{"id":3427,"url":"http:\/\/www.mtin.net\/blog\/router-vulnerability-roundup-for-april-2019\/","url_meta":{"origin":2656,"position":0},"title":"Router Vulnerability roundup for April 2019","author":"j2sw","date":"April 25, 2019","format":false,"excerpt":"https:\/\/www.zdnet.com\/article\/cisco-warns-over-critical-router-flaw\/ Cisco has disclosed 29 new vulnerabilities and is warning customers using its ASR 9000 Series Aggregation Services Routers to install an update to address a critical flaw that can be exploited remotely without user credentials. https:\/\/securityintelligence.com\/buffer-overflow-vulnerability-in-tp-link-routers-can-allow-remote-attackers-to-take-control\/ Buffer Overflow Vulnerability in TP-Link Routers Can Allow Remote Attackers to Take Control","rel":"","context":"In &quot;cisco&quot;","block_context":{"text":"cisco","link":"http:\/\/www.mtin.net\/blog\/category\/cisco\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.mtin.net\/blog\/wp-content\/uploads\/2019\/04\/encryption-head-640x353-2.jpg?fit=640%2C353&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":2105,"url":"http:\/\/www.mtin.net\/blog\/my-home-lab-testing-ground\/","url_meta":{"origin":2656,"position":1},"title":"My Home Lab\/Testing ground","author":"j2sw","date":"February 18, 2018","format":false,"excerpt":"A few days ago, my buddy, Greg Sowell posted his Mobile Home Lab. I figured I would show off the rack in my home office. This is a mixture of gear that powers the basic network for the network in my home and for testing, blog posts, support, and videos\\.\u2026","rel":"","context":"In &quot;cisco&quot;","block_context":{"text":"cisco","link":"http:\/\/www.mtin.net\/blog\/category\/cisco\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.mtin.net\/blog\/wp-content\/uploads\/2018\/02\/IMG_3522.jpg?fit=900%2C1200&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.mtin.net\/blog\/wp-content\/uploads\/2018\/02\/IMG_3522.jpg?fit=900%2C1200&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.mtin.net\/blog\/wp-content\/uploads\/2018\/02\/IMG_3522.jpg?fit=900%2C1200&resize=700%2C400 2x"},"classes":[]},{"id":443,"url":"http:\/\/www.mtin.net\/blog\/how-does-bgp-select-which-route\/","url_meta":{"origin":2656,"position":2},"title":"How does BGP select which route?","author":"j2sw","date":"November 26, 2015","format":false,"excerpt":"BGP can be a complex and almost mystical protocol. For those of you who are trying to determine how BGP selects which route here is your guide. Before we get into it a couple of things to keep in mind. First, BGP is not a multipath routing protocol. This is\u2026","rel":"","context":"In &quot;BGP&quot;","block_context":{"text":"BGP","link":"http:\/\/www.mtin.net\/blog\/category\/networking\/bgp\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":47,"url":"http:\/\/www.mtin.net\/blog\/mikrotik-chains-explained\/","url_meta":{"origin":2656,"position":3},"title":"Mikrotik Chains Explained","author":"j2sw","date":"March 31, 2014","format":false,"excerpt":"What the wiki says: input\u00a0- used to process packets entering the router through one of the interfaces with the destination IP address which is one of the router's addresses. Packets passing through the router are not processed against the rules of the input chain (DST address of the router) forward\u00a0-\u2026","rel":"","context":"In &quot;Mikrotik&quot;","block_context":{"text":"Mikrotik","link":"http:\/\/www.mtin.net\/blog\/category\/mikrotik\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1450,"url":"http:\/\/www.mtin.net\/blog\/learningm-certifications-and-the-xisp\/","url_meta":{"origin":2656,"position":4},"title":"Learning, certifications and the xISP","author":"j2sw","date":"December 12, 2016","format":false,"excerpt":"One of the\u00a0most asked questions which comes up in the xISP world is \"How do I learn this stuff?\". \u00a0 Depending on who you ask this could be a lengthy answer or a simple one sentence answer. \u00a0Before we answer the question, let's dive into why the answer is complicated.\u2026","rel":"","context":"In &quot;Bitlomat&quot;","block_context":{"text":"Bitlomat","link":"http:\/\/www.mtin.net\/blog\/category\/bitlomat\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2972,"url":"http:\/\/www.mtin.net\/blog\/optical-networking-cisco-and-verizon\/","url_meta":{"origin":2656,"position":5},"title":"Optical Networking &#8211; Cisco and Verizon","author":"j2sw","date":"March 16, 2019","format":false,"excerpt":"Cisco and Verizon to Demonstrate the Benefit of Multi-Haul Transport https:\/\/ciscocentral.blogspot.com\/2019\/02\/cisco-and-verizon-to-demonstrate.html \u00a0","rel":"","context":"In &quot;cisco&quot;","block_context":{"text":"cisco","link":"http:\/\/www.mtin.net\/blog\/category\/cisco\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"http:\/\/www.mtin.net\/blog\/wp-json\/wp\/v2\/posts\/2656"}],"collection":[{"href":"http:\/\/www.mtin.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.mtin.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.mtin.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.mtin.net\/blog\/wp-json\/wp\/v2\/comments?post=2656"}],"version-history":[{"count":1,"href":"http:\/\/www.mtin.net\/blog\/wp-json\/wp\/v2\/posts\/2656\/revisions"}],"predecessor-version":[{"id":3570,"href":"http:\/\/www.mtin.net\/blog\/wp-json\/wp\/v2\/posts\/2656\/revisions\/3570"}],"wp:attachment":[{"href":"http:\/\/www.mtin.net\/blog\/wp-json\/wp\/v2\/media?parent=2656"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.mtin.net\/blog\/wp-json\/wp\/v2\/categories?post=2656"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.mtin.net\/blog\/wp-json\/wp\/v2\/tags?post=2656"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}