Basically, port security is used to protect our LAN interface from the attacker. The attacker may be anyone in the organization or outside. You can allow mac addresses manually You can change or allow the maximum number of the mac address. If you do not configure manually, in that condition switch will allow the first […]
VLAN hopping is a type of attack where the attacker sends traffic from one VLAN to another VLAN. An attacker can then steal passwords or other protected information and install viruses or corrupt, modify, or delete critical data. How VLAN Hopping Attack is Performed? VLAN hopping attack can be performed in two different ways: – […]
VTP stands for VLAN Trunking Protocol. It is a Cisco proprietary protocol that is present at layer 2. VLAN is used to transfer VLAN information from one switch to another switch and also to centralized VLAN management. It uses multicast mac address 0100. 0ccc.cccc for VTP updates (CDP, VTP, UDLD). HOW MANY TYPES OF VTP […]
Understanding the VDOMS? Virtual domains (VDOMS) are a way to divide physical FortiGate devices into multiple Logical devices with different configurations. Each logical device can have completely different configurations, routes, NAT, and users. By default, every FortiGate device is in default VDOM “root”. All the configuration of the FortiGate device is saved in “root” VDOM. […]
What is a Linux NFS server? Network File Sharing (NFS) is a protocol that allows you to share directories and files with other Linux clients over a network. Shared directories are typically created on a file server, running the NFS server component. Users add files to them, which are then shared with other users who […]
We all have heard the phrase “Sharing is Caring” but not in the case of your digital information which is to be kept personal. You don’t share your bank details, passwords, name, DOB, address, and other details with an unknown person. The hacker is that unknown person who plants himself in the middle of the […]
Host Intrusion Prevention System solutions protect the computer against known and unknown malicious attacks. In case of attempted major changes by a hacker or malware, HIPS blocks the action and alerts the user so an appropriate decision about what to do can be made. This helps to keep your system secure without having to rely […]
What is FTP? File transfer protocol is used to transfer the files between two systems over a TCP/IP network, it uses port numbers 20 & 21, the users that have been granted access to transfer or receive the files in the File transfer protocol server. Using an FTP client we also can download, upload, delete, […]
In this article, we are going to discuss the VSS feature which is a Cisco proprietary. The following topics will be covered in this blog: What is VSS? Benefits of VSS How VSS works? What is VSS? VSS stands for Virtual Switching System. It is used to create one logical switch by combining two physical […]
In today’s time, big corporate companies pay a lot on network security appliances to get the best security for their network, but the small business companies overlook it or may not use it in a better way. Introducing this blog to get the best security for your corporate network whether it is small or large. […]