
Ctrl + a -> Moves cursor to the beginning of line.


This tutorial includes 2 downloadable pkt files which you can access here: Download files for Packet TracerĪll files used in this tutorial can be viewed and downloaded here.

If some of these terms seem foreign, spend some time researching them and at least know their basic purpose in a network before proceeding.Īn extensive in-depth knowledge is not required to at least start configuring and see how these protocols work in action. Firewall configuration – DMZ setup with static routes.This design strategy is a perfect example of significantly increasing security through network segmentation. Think of Internal and DMZ together as being our private network.
