What is the blacklisting of an IP? A blacklist is a list of suspicious or malicious entities that should be denied access or running rights on a network or system. The blacklisting of IP addresses is a common occurrence on today’s internet. Most of us have encountered networking attacks in one form or another, ranging […]
In this blog, you will see about the necessary config. of NIPS 8350 (Network Intrusion Prevention System). We will give you point-to-point information, will not complicate this by going into deep theories. We will keep it technical for your better understanding. We are using hardened operating system Cisco Sourcefire NIPS-8350 physical device in this blog […]
In this blog, we will discuss the fundamentals of Firewall services introduced in CentOS named FirewallD. Firewalld provides a way to configure dynamic firewall rules in Linux that can be applied instantly, without the need for firewall restart and it supports D-BUS and zone concepts which mark configures easy. It comes with an extremely powerful […]
As we learn in the last blog Multicasts with PIM DM (Protocol Independent Dense Mode) in this blog we will learn why we need Sparse Mode in PIM. To understand this, we require PIM Dense mode disadvantages. One of the big disadvantages of Multicast DM is, multicast stream sends (Flood) to all PIM enables routers […]
In this blog, we are going to talk about VSS and tell you how to configure the VSS in the live environment. We will see the prerequisite and limitations for configuring VSS first and then will come up with the VSS configuration. The following topics will be covered in this blog: Prerequisite for configuring VSS […]
What Is Nac? Network access control (NAC) is a solution that supports network visibility, access management through policy enforcement on devices and users of a corporate network. Why Do We Need Nac? In organizations now we have exponential growth of mobile devices and the endpoint that accessing their network and then they bring the security […]
What is SPAN? SPAN stands for switchport analyzer .it is also called port mirroring. To analyze network traffic passing through the port by using span. How do SPAN works? It will send a copy of the traffic to another port on the switch. Span monitors received or sent (both) traffic on one or more source […]
STP is a Layer 2 protocol that makes a loop-free network topology by blocking the redundant path. STP elects the root bridge, and it will decide which port will be in forwarding and blocking state. A switch that has the lowest bridge-id will become a root bridge. Priority is a decimal number, ranging from 0-65535. […]
It is called link aggregation. It is used to aggregate multiple physical links into a single logical link. That logical link is called a port channel. What are the requirements of Etherchannel? Duplex must match. The speed must match. Etherchannel standard must match. Trunk allowed VLAN list must match. Native VLAN must match. Tunk encapsulation […]
Hi guys, in this series of blogs, we will talk about different FortiGate HA protocols. FortiGate has different HA protocols FGCP and FGSP. In this blog, we will understand more about FGSP protocol i.e FortiGate Session Life Support Protocol. FGSP was introduced in Fortios 5.0 and above to overcome the HA restrictions over asymmetric traffic, TCP, UDP, […]