IPSec protocol

Introduction to IPSec protocol The IP packet contains the data in plain text form, which means anyone watching the IP packets passes by can actually access them and can read and write their content. In 1995, IETF (Internet Engineering Taskforce) published its security-based mechanism related to IPSec to provide security at the IP level. The goal behind IPSec is to

Read More

Limit wireless bandwidth (Evillimiter)

Evillimiter : Tool that Limits Bandwidth of Devices on the Same Network Without Access. Evillimiter is a free and open source monitoring tool that can limit bandwidth usage for devices connected to LAN. Evillimiter runs on Linux and Windows, and can work without admin access to the network. How to Install… git clone https://github.com/bitbrute/evillimiter.gitcd evillimitersudo python3 setup.py install Now, you’ll

Read More

Juniper Networks

Juniper Networks is an information technology and computer networking products multinational company. Founded in 1996, the company is headquartered in Sunnyvale. California Opened in the USA. This company is a company that produces and sells network products called Internet Protocol. Juniper’s Product include the T-Series; M-Series; E-Series; MX-Series and J-Series Router Series Ethernal Switches (EX-Series); Session and Resource Control Appliances,

Read More

VOICE VLAN (Cisco Note)

Voice Vlan -Voice VLAN feature enables access ports to carry IP voice traffic from an IP Phone -switch can connect to IP Phone to carry IP voice traffic -The Cisco IP Phone contains an integrated three-port 10/100 switch Voice VLAN-Configuration Vlan 10= Data Vlan 20=VOICE Switch(config)#vlan 10 Switch(config-vlan)#name DATA Switch(config-vlan)#exit Switch(config)#vlan 10 Switch(config-vlan)#name VOICE Switch(config-vlan)#exit Simple Voice VLAN Configuration Switch(config)#int

Read More

Trunking Protocols (Cisco Note)

A trunk port is a type of connection on a switch that is used to connect a guest virtual machine that is VLAN aware. Generally, all frames that flow through this port are VLAN tagged. The exception to this is when a trunk port is granted access to the untagged VLAN set (native VLAN ID). ISL (Inter-switch Link) *It’s a

Read More

VLAN (CISCO Note)

VLAN (Virtual Lan) VLAN = Broadcast Domain = Logical Network (Subnet) * separating network * flexible *security -Layer 2 Security -Divides one single Broadcast domain into Multiple broadcast domains. -Default VLAN is VLAN one. You can create vlan 2 to 1001. -Can be configure on manageable SW. Benefits of VLAN * Limit the number ot broadcast*Better performance*Security Note:: Work based

Read More

Install Open VPN in Linux

* What is a VPN? A VPN (virtual private network) is the easiest and most effective way for people to protect their internet traffic and keep their identities private online. As you connect to a secure VPN server, your internet traffic goes through an encrypted tunnel that nobody can see into, including hackers, governments, and your internet service provider. Photo credit

Read More

About Layer 3 Switches

Well ….. Layer 3 Switch. What? Switches are endless? How is it? Which is not? There are many types of switches. Wouldn’t it be nice to know all of them? As technology advances, so do devices. Similarly, a Layer 3 switch has many advantages over a Layer 2 switch. In fact, the Layer 3 Switch is a high-performance computer networking

Read More

About Address Resolution Protocol (ARP)

This time it’s about ARP. About ARP, the meaning is short. His answer is very simple. Here is a simple step-by-step answer below. It is not wrong to say that ARP is a service. Well … OK. It (ARP) is a member of the Internet Layer 3 layer. Let me tell you about a very simple network type (2). These

Read More