Blog Category
Search Result :
Total Result Found: 5 Out Of 15
Syslog Server 101
Introduction Syslog is a protocol that allows a host to send event notification messages across IP networks to event message collectors – also known as Syslog Servers or Syslog Daemons. In other words, a host or a device can be configured in such a way that it generates a Syslog Message and forwards it to…
Read More...Port Security – Lesson and Lab
Port security is the primary method to protect yourself from MAC spoofing and CAM table overflow attacks. We won't cover these topics here but we will cover port security theory and configuration. It's covered in exams from CompTIA Network+, Security+, Cisco CCNA and many others. Port Security Overview Port security is a dynamic Cisco Catalyst…
Read More...Network Security Design
This blog will cover the following topics: Network Attacks and Countermeasures Security Policy Mechanisms Cisco SAFE Blueprint Security Management Network designers will often be faced with the situation in which security might be the number one priority for the customer, even above the cost factor. Cisco has retired their design exams now so please consider…
Read More...SSL VPN
SSL VPN and VPN Technologies As defined in RFC 2828, a Virtual Private Network (VPN) is: A restricted-use, logical (i.e., artificial or simulated) computer network that is constructed from the system resources of a relatively public, physical (i.e., real) network (such as the Internet), often by using encryption (located at hosts or gateways), and often…
Read More...Prevent STP Attacks
Spanning-Tree Protocol (STP) Attacks The Spanning-Tree Protocol (STP) is used in redundantly connected Layer 2 networks to prevent loops by placing interfaces or ports in either a blocking or a forwarding state. Because STP is a core component and requirement of the CCNA certification, this section will not be covered in detail. Instead, this section…
Read More...