{"id":246,"date":"2025-12-30T23:25:52","date_gmt":"2025-12-30T23:25:52","guid":{"rendered":"https:\/\/networkingnotebook.com\/?page_id=246"},"modified":"2026-02-11T09:25:20","modified_gmt":"2026-02-11T09:25:20","slug":"quick-links","status":"publish","type":"page","link":"https:\/\/networkingnotebook.com\/?page_id=246","title":{"rendered":"Blog Index"},"content":{"rendered":"<form role=\"search\" method=\"get\" action=\"https:\/\/networkingnotebook.com\/\" class=\"wp-block-search__button-outside wp-block-search__text-button wp-block-search\"    ><label class=\"wp-block-search__label\" for=\"wp-block-search__input-1\" >Search<\/label><div class=\"wp-block-search__inside-wrapper\" ><input class=\"wp-block-search__input\" id=\"wp-block-search__input-1\" placeholder=\"\" value=\"\" type=\"search\" name=\"s\" required \/><button aria-label=\"Search\" class=\"wp-block-search__button wp-element-button\" type=\"submit\" >Search<\/button><\/div><\/form>\n\n<ul class=\"wp-block-latest-posts__list wp-block-latest-posts\"><li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=967\">SSH Encryption<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=959\">Syslog Monitoring Locations<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=944\">Syslog<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=926\">SNMP Security<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=918\">SNMP Read\/Write Operations<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=911\">SNMP<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=908\">DHCP Release\/Renew<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=905\">DHCP Relay Agent<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=900\">DHCP DORA Process<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=868\">DNS<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=865\">ACL<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=858\">IPv6: DAD<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=854\">IPv6: NDP<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=845\">Solicited Node Multicast<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=841\">IPv6 Header<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=836\">Presentation Layer (OSI)<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=827\">EUI-64<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=821\">Multicast Scopes<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=809\">IPv6 Address Types (ULA,LLA,GUA)<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=795\">Unicast, Broadcast, Multicast and Anycast<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=788\">IPv6 Address Breakdown (GUA)<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=780\">Loopback Interface<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=776\">UDP<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=773\">TCP Retransmissions<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=770\">TCP Flow Control<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=739\">TCP<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=730\">Multiplexing<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=706\">FHRP: GLBP<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=702\">FHRP: HSRP<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=699\">FHRP: VRRP<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=684\">Serial Interfaces<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=670\">OSPF LSA Types<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=625\">OSPF Network Types<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=622\">OSPF Timers<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=619\">OSPF DR\/BDR<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=604\">OSPF Neighbor States<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=600\">OSPF Message Types<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=593\">OSPF Routers<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=590\">OSPF Areas<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=583\">Floating Static Route<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=580\">EIGRP<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=574\">RIP<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=556\">AD and Metrics<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=550\">Dynamic vs Static<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=546\">Etherchannel<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=539\">RSTP<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=534\">STP Additional Features<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=531\">STP Port States<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=526\">STP Timers<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=523\">STP Root Bridge and Port Roles<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=518\">STP<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=513\">Native VLAN<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=508\">DTP\/VTP<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=495\">InterVLAN<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=491\">VLAN Tagging<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=488\">VLANs<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=449\">Classful vs CIDR<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=445\">Life of a Packet<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=437\">Default Gateway\/Default Route<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=433\">Connected\/Local Routes<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=428\">IPv4 Header<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=424\">Subnet Mask<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=421\">IPv4 and Binary<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=412\">Input and Output Errors<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=404\">Encapsulation\/Decapsulation<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=399\">Ethernet Frame<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=396\">Cisco CLI &#8211; User vs Privilege<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=393\">Auto-negotiation\/FLP<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=390\">CSMA\/CD<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=289\">Straight-Through vs Crossover Cables<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=280\">Cables: Copper vs Fiber<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=270\">Network Devices<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=254\">The OSI and TCP\/IP Model<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=228\">DAI Optional Checks and Rate Limiting<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=220\">What is DAI?<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=154\">What is ARP?<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/networkingnotebook.com\/?p=65\">Welcome to Networking Notebook<\/a><\/li>\n<\/ul>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-246","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/networkingnotebook.com\/index.php?rest_route=\/wp\/v2\/pages\/246","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/networkingnotebook.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/networkingnotebook.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/networkingnotebook.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/networkingnotebook.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=246"}],"version-history":[{"count":4,"href":"https:\/\/networkingnotebook.com\/index.php?rest_route=\/wp\/v2\/pages\/246\/revisions"}],"predecessor-version":[{"id":664,"href":"https:\/\/networkingnotebook.com\/index.php?rest_route=\/wp\/v2\/pages\/246\/revisions\/664"}],"wp:attachment":[{"href":"https:\/\/networkingnotebook.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=246"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}