<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>IPRAN Archives - Network Solution</title>
	<atom:link href="https://blog.network-solution.net/category/ipran/feed/" rel="self" type="application/rss+xml" />
	<link>https://blog.network-solution.net/category/ipran/</link>
	<description></description>
	<lastBuildDate>Tue, 01 Jun 2021 18:10:49 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.7</generator>

<image>
	<url>https://blog.network-solution.net/wp-content/uploads/2021/06/favicon.ico</url>
	<title>IPRAN Archives - Network Solution</title>
	<link>https://blog.network-solution.net/category/ipran/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">88039135</site>	<item>
		<title>IPv6 lab for CCNA 200-301</title>
		<link>https://blog.network-solution.net/ipv6-lab-for-ccna-200-301/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=ipv6-lab-for-ccna-200-301</link>
					<comments>https://blog.network-solution.net/ipv6-lab-for-ccna-200-301/#respond</comments>
		
		<dc:creator><![CDATA[mammoura]]></dc:creator>
		<pubDate>Tue, 01 Jun 2021 18:06:55 +0000</pubDate>
				<category><![CDATA[CCNA 200-301]]></category>
		<category><![CDATA[IPRAN]]></category>
		<category><![CDATA[CCNA]]></category>
		<category><![CDATA[cisco packet tracer]]></category>
		<category><![CDATA[IPv6]]></category>
		<guid isPermaLink="false">https://blog.network-solution.net/?p=628</guid>

					<description><![CDATA[<p>Download the topology from here IPv6 lab tasks: Enable IPv6 globally on each router Enable IPv6 under the interfaces Configure DHCPv6 server Check how to enable IPv6 on the switch from here Configure the routers as below: &#160;R1 – R2&#160;&#160; Gi0/0&#160;&#160; 2001:AAAA:BBBB:CCCC::/64 eui-64&#160; à Gi 0/0 &#160;&#160;2001:AAAA:BBBB:CCCC:1234:1234:1234:1234/64 R2—R3 Gi0/1&#160; 2001:BBBB:AAAA:AAAA:1111:1111:1111:1111/64&#160; è Gi0/1 autoconfig R3 local &#8230; </p>
<p>The post <a href="https://blog.network-solution.net/ipv6-lab-for-ccna-200-301/">IPv6 lab for CCNA 200-301</a> appeared first on <a href="https://blog.network-solution.net">Network Solution</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.network-solution.net/ipv6-lab-for-ccna-200-301/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">628</post-id>	</item>
		<item>
		<title>What is SDN?</title>
		<link>https://blog.network-solution.net/what-is-sdn/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=what-is-sdn</link>
					<comments>https://blog.network-solution.net/what-is-sdn/#respond</comments>
		
		<dc:creator><![CDATA[mammoura]]></dc:creator>
		<pubDate>Mon, 28 Sep 2020 08:21:24 +0000</pubDate>
				<category><![CDATA[IPRAN]]></category>
		<guid isPermaLink="false">https://blog.network-solution.net/?p=613</guid>

					<description><![CDATA[<p>The idea of programmability is the basis for the most precise definition of what SDN is: technology that separates the control plane management of network devices from the underlying data plane that forwards network traffic. IDC broadens that definition of SDN by stating: “Datacenter SDN architectures feature software-defined overlays or controllers that are abstracted from &#8230; </p>
<p>The post <a href="https://blog.network-solution.net/what-is-sdn/">What is SDN?</a> appeared first on <a href="https://blog.network-solution.net">Network Solution</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.network-solution.net/what-is-sdn/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">613</post-id>	</item>
		<item>
		<title>Do you know what is SD-WAN (Software-defined WAN)?</title>
		<link>https://blog.network-solution.net/software-defined-wide-area-network/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=software-defined-wide-area-network</link>
					<comments>https://blog.network-solution.net/software-defined-wide-area-network/#respond</comments>
		
		<dc:creator><![CDATA[mammoura]]></dc:creator>
		<pubDate>Mon, 28 Sep 2020 08:10:56 +0000</pubDate>
				<category><![CDATA[IPRAN]]></category>
		<category><![CDATA[SD-WAN]]></category>
		<category><![CDATA[WAN]]></category>
		<guid isPermaLink="false">https://blog.network-solution.net/?p=603</guid>

					<description><![CDATA[<p>SD-WAN is an acronym for software-defined networking in a wide area network (WAN). SD-WAN simplifies the management and operation of a WAN by decoupling the networking hardware from its control mechanism. This concept is similar to how software-defined networking implements virtualization technology to improve data center management and operation. A key application is to allow companies to build higher-performance WANs using lower-cost and commercially &#8230; </p>
<p>The post <a href="https://blog.network-solution.net/software-defined-wide-area-network/">Do you know what is SD-WAN (Software-defined WAN)?</a> appeared first on <a href="https://blog.network-solution.net">Network Solution</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.network-solution.net/software-defined-wide-area-network/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">603</post-id>	</item>
		<item>
		<title>IPTime FBB Solution Configuration Guide &#8211; Part 1</title>
		<link>https://blog.network-solution.net/iptime-fbb-solution/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=iptime-fbb-solution</link>
					<comments>https://blog.network-solution.net/iptime-fbb-solution/#comments</comments>
		
		<dc:creator><![CDATA[mammoura]]></dc:creator>
		<pubDate>Sat, 08 Sep 2018 17:41:10 +0000</pubDate>
				<category><![CDATA[IPRAN]]></category>
		<category><![CDATA[IPTime FBB Solution]]></category>
		<category><![CDATA[FBB Solution]]></category>
		<guid isPermaLink="false">http://blog.network-solution.net/?p=561</guid>

					<description><![CDATA[<p>IPTime FBB Solution Course Objectives Upon completion of IPTime FBB Solution course, you will be able to learn about: Service types supported by the FBB solution HSI service configuration VoIP service configuration IPTV service configuration Enterprise Internet service configuration Enterprise Interconnection service configuration Typical FBB Networking : The network FBB solution is an overall solution &#8230; </p>
<p>The post <a href="https://blog.network-solution.net/iptime-fbb-solution/">IPTime FBB Solution Configuration Guide &#8211; Part 1</a> appeared first on <a href="https://blog.network-solution.net">Network Solution</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.network-solution.net/iptime-fbb-solution/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">561</post-id>	</item>
		<item>
		<title>Firewall Overview</title>
		<link>https://blog.network-solution.net/firewall-overview/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=firewall-overview</link>
					<comments>https://blog.network-solution.net/firewall-overview/#comments</comments>
		
		<dc:creator><![CDATA[mammoura]]></dc:creator>
		<pubDate>Thu, 02 Aug 2018 09:53:46 +0000</pubDate>
				<category><![CDATA[IPRAN]]></category>
		<category><![CDATA[Firewall]]></category>
		<category><![CDATA[Firewall limitation]]></category>
		<category><![CDATA[Firewall Overview]]></category>
		<category><![CDATA[Functions of the Firewall]]></category>
		<guid isPermaLink="false">http://blog.network-solution.net/?p=497</guid>

					<description><![CDATA[<p>Introduction to the Firewall Currently, security threats on the Internet fall into the following types: Illegal use: Unauthorized users or users with illegal authority access network resources. For example, an attacker accesses network resources by using the accounts and passwords of authorized users. Denial of Service: A server prohibits authorized users to access network resources. &#8230; </p>
<p>The post <a href="https://blog.network-solution.net/firewall-overview/">Firewall Overview</a> appeared first on <a href="https://blog.network-solution.net">Network Solution</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.network-solution.net/firewall-overview/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">497</post-id>	</item>
		<item>
		<title>BGP Auto FRR</title>
		<link>https://blog.network-solution.net/bgp-auto-frr/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=bgp-auto-frr</link>
					<comments>https://blog.network-solution.net/bgp-auto-frr/#respond</comments>
		
		<dc:creator><![CDATA[mammoura]]></dc:creator>
		<pubDate>Wed, 20 Apr 2016 21:04:55 +0000</pubDate>
				<category><![CDATA[BGP]]></category>
		<category><![CDATA[BGP Auto FRR]]></category>
		<category><![CDATA[IPRAN]]></category>
		<guid isPermaLink="false">http://blog.network-solution.net/?p=476</guid>

					<description><![CDATA[<p>As a protection measure against faults over links, BGP Auto Fast Reroute (FRR) is applicable to networks with primary and backup links. With BGP Auto FRR, traffic can be switched between two BGP peers or next hops within sub-seconds. With BGP Auto FRR, if a peer has multiple routes with the same prefix that are &#8230; </p>
<p>The post <a href="https://blog.network-solution.net/bgp-auto-frr/">BGP Auto FRR</a> appeared first on <a href="https://blog.network-solution.net">Network Solution</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.network-solution.net/bgp-auto-frr/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">476</post-id>	</item>
		<item>
		<title>Principles of Traffic Policing</title>
		<link>https://blog.network-solution.net/principles-of-traffic-policing/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=principles-of-traffic-policing</link>
					<comments>https://blog.network-solution.net/principles-of-traffic-policing/#respond</comments>
		
		<dc:creator><![CDATA[mammoura]]></dc:creator>
		<pubDate>Thu, 14 Jan 2016 22:24:08 +0000</pubDate>
				<category><![CDATA[IPRAN]]></category>
		<category><![CDATA[Traffic Policing]]></category>
		<guid isPermaLink="false">http://blog.network-solution.net/?p=393</guid>

					<description><![CDATA[<p>Process of Traffic Policing In traffic policing, the Committed Access Rate (CAR) is used to control traffic. Packets are first classified according to pre-defined matching rules. Packets that conform to the specified rate limit are forwarded directly, whereas packets that exceed the specified rate limit are dropped or have their priorities re-marked before being retransmitted. &#8230; </p>
<p>The post <a href="https://blog.network-solution.net/principles-of-traffic-policing/">Principles of Traffic Policing</a> appeared first on <a href="https://blog.network-solution.net">Network Solution</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.network-solution.net/principles-of-traffic-policing/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">393</post-id>	</item>
		<item>
		<title>Example for Configuring Inter-AS Seamless MPLS+HVPN</title>
		<link>https://blog.network-solution.net/configuring-inter-as-seamless-mplshvpn/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=configuring-inter-as-seamless-mplshvpn</link>
					<comments>https://blog.network-solution.net/configuring-inter-as-seamless-mplshvpn/#respond</comments>
		
		<dc:creator><![CDATA[mammoura]]></dc:creator>
		<pubDate>Tue, 29 Dec 2015 08:32:54 +0000</pubDate>
				<category><![CDATA[Configuring Inter-AS Seamless MPLS+HVPN]]></category>
		<category><![CDATA[Inter-AS Seamless MPLS+HVPN]]></category>
		<category><![CDATA[IPRAN]]></category>
		<category><![CDATA[Seamless MPLS+HVPN]]></category>
		<guid isPermaLink="false">http://blog.network-solution.net/?p=364</guid>

					<description><![CDATA[<p>In the inter-AS seamless MPLS+HVPN networking, an HVPN connection between a CSG and AGG is established, and an inter-AS seamless MPLS LSP between an AGG and MASG is established. The inter-AS seamless MPLS+HVPN networking obtains the collective advantages of the inter-AS seamless MPLS network and HVPN. Networking Requirements In Figure 1, the access and aggregation layers &#8230; </p>
<p>The post <a href="https://blog.network-solution.net/configuring-inter-as-seamless-mplshvpn/">Example for Configuring Inter-AS Seamless MPLS+HVPN</a> appeared first on <a href="https://blog.network-solution.net">Network Solution</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.network-solution.net/configuring-inter-as-seamless-mplshvpn/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">364</post-id>	</item>
		<item>
		<title>Example for Configuring Inter-AS Seamless MPLS</title>
		<link>https://blog.network-solution.net/example-for-configuring-inter-as-seamless-mpls/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=example-for-configuring-inter-as-seamless-mpls</link>
					<comments>https://blog.network-solution.net/example-for-configuring-inter-as-seamless-mpls/#respond</comments>
		
		<dc:creator><![CDATA[mammoura]]></dc:creator>
		<pubDate>Mon, 07 Dec 2015 18:18:58 +0000</pubDate>
				<category><![CDATA[IPRAN]]></category>
		<guid isPermaLink="false">http://blog.network-solution.net/?p=361</guid>

					<description><![CDATA[<p>When the access and aggregation layers belong to one AS, and the core layer belongs to another AS, inter-AS seamless MPLS can be configured to implement the service connectivity between a NodeB and an MME or SGW. Networking Requirements In&#160;Figure 1, the access and aggregation layers belong to one AS, and the core layer belongs &#8230; </p>
<p>The post <a href="https://blog.network-solution.net/example-for-configuring-inter-as-seamless-mpls/">Example for Configuring Inter-AS Seamless MPLS</a> appeared first on <a href="https://blog.network-solution.net">Network Solution</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.network-solution.net/example-for-configuring-inter-as-seamless-mpls/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">361</post-id>	</item>
		<item>
		<title>ATM Services over IPRAN</title>
		<link>https://blog.network-solution.net/atm-services-over-ipran/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=atm-services-over-ipran</link>
					<comments>https://blog.network-solution.net/atm-services-over-ipran/#respond</comments>
		
		<dc:creator><![CDATA[mammoura]]></dc:creator>
		<pubDate>Sat, 17 Oct 2015 16:01:24 +0000</pubDate>
				<category><![CDATA[ATM Services over IPRAN]]></category>
		<category><![CDATA[IPRAN]]></category>
		<category><![CDATA[IPRAN Services]]></category>
		<guid isPermaLink="false">http://blog.network-solution.net/?p=330</guid>

					<description><![CDATA[<p>Here is how the TDM services working over IPRAN :</p>
<p>The post <a href="https://blog.network-solution.net/atm-services-over-ipran/">ATM Services over IPRAN</a> appeared first on <a href="https://blog.network-solution.net">Network Solution</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.network-solution.net/atm-services-over-ipran/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">330</post-id>	</item>
	</channel>
</rss>
