Total Result Found: 5 Out Of 15

Aug 12th 2021

Syslog Server 101

Introduction Syslog is a protocol that allows a host to send event notification messages across IP networks to event message collectors – also known as Syslog Servers or Syslog Daemons. In other words, a host or a device can be configured in such a way that it generates a Syslog Message and forwards it to…

Read More...
syslog server
Aug 31st 2021

Port Security – Lesson and Lab

Port security is the primary method to protect yourself from MAC spoofing and CAM table overflow attacks. We won't cover these topics here but we will cover port security theory and configuration. It's covered in exams from CompTIA Network+, Security+, Cisco CCNA and many others. Port Security Overview Port security is a dynamic Cisco Catalyst…

Read More...
port security
Oct 26th 2021

Network Security Design

This blog will cover the following topics: Network Attacks and Countermeasures Security Policy Mechanisms Cisco SAFE Blueprint Security Management Network designers will often be faced with the situation in which security might be the number one priority for the customer, even above the cost factor. Cisco has retired their design exams now so please consider…

Read More...
Network Security Design
Dec 02nd 2021

SSL VPN

SSL VPN and VPN Technologies As defined in RFC 2828, a Virtual Private Network (VPN) is: A restricted-use, logical (i.e., artificial or simulated) computer network that is constructed from the system resources of a relatively public, physical (i.e., real) network (such as the Internet), often by using encryption (located at hosts or gateways), and often…

Read More...
ssl vpn
Dec 05th 2021

Prevent STP Attacks

Spanning-Tree Protocol (STP) Attacks The Spanning-Tree Protocol (STP) is used in redundantly connected Layer 2 networks to prevent loops by placing interfaces or ports in either a blocking or a forwarding state. Because STP is a core component and requirement of the CCNA certification, this section will not be covered in detail. Instead, this section…

Read More...
stp attacks