Live Chat Software by Kayako
RSS Feed
Knowledgebase
 

The DIRECT PARALLEL CONNECTION MONITOR UTILITY is a useful application that provides useful information about the LPT ports on the computer its run on, plus information about the connection, I/O mode (4-bit, 8-bit, ECP, EPP), the parallel port types,...
Fastest search engine, many search filters,ability of search simultaneously on several masks, ability of bypass in search of some computers (For example, slow or very big servers), search on resources with limited access rights (Which require usernam...
This 3Com Daemon a very popular and useful application. It contains a FTP, TFTP and SYSLOG server but also a TFTP client. Its simple interface allows you to switch between FTP, TFTP server or client with the click of a button.
One of the first port scanners available many years ago. Fast, small and easy to use, with ability to select the first and last port you wish to scan.
This article covers basic and advanced configuration of Cisco Catalyst Layer 3 switches such as the Cisco Catalyst 3560G, 3560E, 3560-X, 3750, 3750E, 3750-X, 3850 and 4500 series, and extends to include the configuration of additional features consider...
This article aims to explain the configuration required for a Cisco 880W series router (e.g Cisco 887W, Cisco 886W, Cisco 881W, Cisco 888W, etc), in order to setup the integrated Cisco access point with multiple encrypted SSIDs, each SSID belonging to ...
GRE TUNNELS are very common amongst VPN implementations thanks to their simplicity and ease of configuration. With broadcasting and multicasting support, as opposed to pure IPSec VPNs, they tend to be the number one engineers' choice, especially when r...
Cisco is well known for its routers and switches. I must admit they are very good quality products and once they are up and running, you can pretty much forget about them because they rarely fail. We are going to focus on routers here since that's th...
Introduction One of the greatest perhaps features of Cisco routers is that most commands used in the IOS software they run on, are identical across multiple platforms. For example, commands for configuring a gigabit ethernet interface on a Cisco 2821 ...
Password recovery is a fairly frequently used procedure for administrators and engineers. Even though we usually stack our passwords in some word, excel or text file, it's very easy to forget to update them when changes occur. The end result is you fin...
Remote VPN access is an extremely popular service amongst Cisco routers and ASA Firewalls. The flexibility of having remote access to our corporate network and its resources literally from anywhere in the world, has proven extremely useful and in many ...
This article serves as an extension to our popular Cisco VPN topics covered here on Firewall.cx. While we've covered Site to Site IPSec VPN Tunnel Between Cisco Routers [1] (using static public IP addresses), we will now take a look on how to configure...
Our Web SSL VPN [1] article written back in 2011 introduced this new wave of VPN services. This article extends the topic by covering the installation and configuration of Cisco's SSL AnyConnect VPN for Cisco IOS Routers. Web SSL VPN delivers the fo...
NAT [1] (Network Address Translation [2]) is a method that allows the translation (modification) of IP addresses while packets/datagrams are traversing the network. Dynamic NAT enables multiple internal hosts access to the Internet by assigning each ho...
NAT (Network Address Translation) is a method that allows the translation (modification) of IP addresses while packets/datagrams are traversing the network. NAT Overload, also known as PAT (Port Address Translation) is essentially NAT with the added fe...
Network Time Protocol (NTP) is a vital service not only for Cisco devices but almost every network device. Any computer-based device needs to be accurately synchronised with a reliable time source such as an NTP server. When it comes to Cisco router...
GENERIC ROUTING ENCAPSULATION (GRE) is a tunneling protocol developed by Cisco that allows the encapsulation of a wide variety of network layer protocols inside point-to-point links. A GRE TUNNEL is used when packets need to be sent from one network...
The Point to Point Tunneling Protocol (PPTP) is a network protocol used to create VPN tunnels between public networks. These VPN tunnels are encrypted from one end to the other and allow the secure transfer of data between them. PPTP is usually impleme...
Site-to-Site IPSec VPN Tunnels are used to allow the secure transmission of data, voice and video between two sites (e.g offices or branches). The VPN tunnel is created over the Internet public network and encrypted using a number of advanced encryptio...
In today's network environment, redundancy is one of the most important aspects, whether its on the LAN side or on the WAN side. In this topic we will be covering WAN redundancy with multiple WAN links terminating on a single router. The best and si...
SATELLITE NAME: SES 4 (NSS 14) STATUS: active POSITION: 22° W (22° W) LAUNCH DATE: 14-Feb-2012 ORBIT: GEO EXPECTED LIFETIME: 15+ yrs. Europe Middle East Ku-band beam
Most Cisco engineers are aware of the classic Password-Recovery service Cisco equipment have. If the device's credentials are lost, then performing the Password-Recovery procedure will effectively provide full access to the device's configuration. B...
This article shows how to CONFIGURE AND SETUP SSH for REMOTE MANAGEMENT of CISCO IOS ROUTERS. We'll show you HOW TO CHECK IF SSH IS SUPPORTED by your IOS VERSION, how to enable it, GENERATE AN RSA KEY for your router and finally configure SSH AS THE PR...
This program allows you to send pings to preselected hosts and monitor the response time. Works well for situations where you need to make sure a machine is online and hasn't crashed. Easy to setup and configure. Definitely worth downloading!
Chances are we've all needed to UPGRADE our CISCO'S DEVICE IOS SOFTWARE at some point. While UPGRADING THE IOS SOFTWARE on a Cisco device is considered to be a fairly simple process, it can turn out to be a VERY STRESSFUL and DESTRUCTIVE PROCESS if som...
HOW DO I DECODE A CSR? In order to decode a CSR on your own machine using OpenSSL, use the following command: openssl req -in server.csr -noout -text
HOW DO I GENERATE A CSR AND PRIVATE KEY? You need to generate a CSR and private key on the server that the certificate will be used on. You can find instructions in your server documentation or try the instructions from one of these certificate author...
If you're tired of setting up SPAN sessions [1] to CAPTURE NETWORK TRAFFIC TRANSITING YOUR NETWORK and CISCO ROUTER, it's time to start using CISCO'S EMBEDDED PACKET CAPTURE (EPC), available from IOS 12.4.20T and above. We will show you HOW TO CONFIGUR...
DHCP (Dynamic Host Configuration Protocol) is the protocol used by network devices (such as PCs, network printers, etc) to automatically obtain correct network parameters so they can access network and Internet resources such as IP Address, Default Gat...
The DNS protocol is used to resolve FQDN (Fully Qualified Domain Names) to IP addresses around the world. This allows us to successfully find and connect to Internet websites and services no matter where they are. Its usefulness, however, doesn't stop ...
Hosting your own webserver or email server would normaly require a static IP address from your ISP. This ensures that your services are always reachable using the same IP address or domain name. If you had a domain name, e.g Firewall.cx, you would t...
Router-on-a-stick is a term frequently used to describe a setup up that consists of a router and switch connected using one Ethernet link configured as an 802.1q trunk link. In this setup, the switch is configured with multiple VLANs and the router per...
Setting up a Windows VPDN connection is a required task in order to connect to a remote network. In previous articles we covered the set up of a VPDN - PPTP server on a Cisco router. Click here [1] to find out how to setup a PPTP (VPDN) server on a Cis...
Our previous article shows how to perform a password recovery on the Cisco Catalyst switches [1]. This article will now explain how to DISABLE or ENABLE the CISCO PASSWORD RECOVERY SERVICE allowing network engineers and administrators to further SECURE...
Our previous article covered how to fix the Cisco Configuration Professional display/window problem [1] where the CCP application is displayed in about one third of the browser's window. Users looking for Cisco's CCP will be happy to know that it is av...
Cisco Configuration Professional (CCP) is Cisco's latest GUI administration tool used to administer Cisco routers. CCP is basically the next step up from the popular Security Device Manager or SDM. Users seeking more information on SDM's installation c...
In our article Cisco VPN Client Configuration - Setup for IOS Router [1] we explained how to setup up a Cisco IOS router to support Cisco IPSec VPN clients, allowing remote users to securely connect to the company network and access the available resou...
In today's complex network environments securing your network routers can be a daunting task, especially when there are so many CLI commands and parameters with different security implications for your Cisco router device. Thankfully, since Cisco IO...
iDirect x1 Indoor Image 13.0.1.2 (Egypt HUB)
A very powerfull and easy to use network application. It will scan a preselected subnet for active hosts and then send SNMP queries to get as much information as possible. This works well with Windows NT/2000 servers, Cisco routers and generally anyt...
IP Tools contains a bunch of features which make it an awesome "all in one" program. It will display connections to your workstation, allow NetBios resolution, ping scan IP's, port scan, traceroute, finger, telnet, monitor IP and a few more. It's qui...
Iperf is an extremely useful tool that allows an engineer or administrator test their LAN, WAN or Wi-Fi links and discover problems, delays, packet loss, measure jitter, maximum bandwidth and much more. Detailed instructions on how to use Iperf/Jperf ...
LANScan is a network monitoring and diagnostic tool. Designed with the typical PC user in mind, LANScan can obtain valuable information regarding network performance, utilization, and faults without the technical jargon found with most products. It tak...
mylive chat Application download for Windows
This article shows how to RESET A PASSWORD on a CISCO CATALYST 3750-X (stacked or single unit) and CISCO CATALYST 3560-X switch without losing its startup configuration. The CISCO PASSWORD RECOVERY PROCEDURE involves interrupting the switch's normal bo...
When working with Cisco equipment that has multiple ip interfaces, a common problem engineers are faced with is trying to successfully tftp to or from the Cisco device. This issue is usually encountered when the Cisco device (router or multi-layer swit...
In previous articles, we showed how it is possible to configure a Cisco router [1] or Catalyst switch [2] to provide DHCP server services to network clients. Everything usually works without a problem, however there are times when the CISCO DHCP SERVER...
PUTTY 32-BIT V 0.70 (PORTABLE) PUTTY 64-BIT V 0.70 (PORTABLE) PUTTY 64-BIT V 0.70 (INSTALLER) WINSCP-5.13.2 (INSTALLER)
This port scanner can be used to scan subnets for ping replies, do hostname lookups, scan selected ports and even adjust the scanning speed. It also has a great interface.
A neat program which contains a TFTP server & client in one ! Upon installation you can choose if you wish to install both client and server or just one of them. A very handy program particularly if you require a TFTP client and server.
A Small TFTP server. Not bad, its small and easy to install. Good solution for a urgent 'any-type' tftp server.
The smallest TFTP server we have ever come across. If your short on bandwidth or require a quick download, then this is for you! Features supported include selection of directory the server will store/read files from, interfaces/ip address to list...
The Point-to-Point Protocol is one of the most popular protocols around used by engineers, ISPs and companies around the globe for authentication of remote users margin-left: auto; margin-right: auto;" title="Troubleshooting Cisco Router PPP Negotiati...
This article provides an in-depth explanation of PPP Multilink and shows how to configure a Cisco router to use PPP Multilink between two serial interfaces (WIC-1T). We'll show you the commands that are required for the configuration, plus how to ensur...
This article focuses on VLAN Security and its implementation within the business network environment. We provide tips and Cisco CLI commands that will help you upgrade your VLAN network security. Even though many Administrators and IT Managers are a...
VSAT Internet Service - General Q: WHAT IS \"SHARED BANDWIDTH\"? A: Shared bandwidth is network service that is not dedicated to a single customer. For instance, if the customer purchases service of 1024kbit download by 128kbit upload ...
WHAT DOES A CSR LOOK LIKE? Most CSRs are created in the Base-64 encoded PEM format. This format includes the "-----BEGIN CERTIFICATE REQUEST-----" and "-----END CERTIFICATE REQUEST-----" lines at the begining and end of the CSR. A PEM format CSR can b...
WHAT IS A CSR? A CSR or Certificate Signing request is a block of encoded text that is given to a Certificate Authority when applying for an SSL Certificate. It is usually generated on the server where the certificate will be installed and contains inf...
WHAT IS A CSR/PRIVATE KEY'S BIT LENGTH? The bit-length of a CSR and private key pair determine how easily the key can be cracked using brute force methods. As of 2016, a key size of less than 2048 bits is considered weak and could potentially be broke...
WHAT IS CONTAINED IN A CSR? NAME EXPLANATION EXAMPLES Common Name The fully qualified domain name (FQDN) of your server. This must match exactly what you type in your web browser or you will receive a name mismatch error. *.google.com ma...
Most popular articles 
 
Newest articles 
 
Help Desk Software by Kayako