Category Archives: Network Security

DHCP Snooping Explained

WHAT IS DHCP SNOOPING? The Dynamic Host Configuration Protocol (DHCP) allocates IP addresses dynamically, it leases addresses to connected devices and the addresses can be reused when no longer needed. All connected Hosts and end devices that require IP addresses obtained through DHCP must communicate with a DHCP server across the LAN. DHCP snooping acts like a firewall… Read More »

What is Syslog? Syslog Explained.

System Message Logging – SYSLOG Modern network devices has advanced from simple transmitting of messages (email.documents, multimedia etc), network devices like Cisco routers and switches provides the features for network administrators to reading system messages from their internal buffer about  network situation at a particular time. The way do this is by using Syslog server. Cisco network devices (Routers… Read More »

PPP: What is CHAP? Explained with Examples

Challenge Handshake Authentication Protocol (CHAP) Challenge Handshake Authentication Protocol (CHAP) is more secure than PAP. It involves a three-way exchange of a shared secret. During link establishment, CHAP conducts periodic challenges to make sure that the remote host still has a valid password value. While PAP basically stops working once authentication is established, this leaves the network vulnerable to… Read More »

What is VPN? Features of a Secure VPN

What are Features of a Secure VPN? VPNs use advanced encryption techniques and tunneling to permit organizations to establish secure, end-to-end, private network connections over the Internet. The basis of a secure VPN is data confidentiality, data integrity, and authentication: i  .   Data confidentiality – The common network security concern is protecting data from hackers. Data confidentiality aims at… Read More »

Ways To Migrate To IPv6 Explained

Before now, most networks; if not all, runs on IPv4 infrastructure, especially if your network is using old routers and switches. To upgrade your network to be IPv6 compliant, one or two strategies listed below can be used to implement this process on your network. 1. Dual Stacking: This method of migration enables a network to run both IPv4… Read More »

What is IPv6? Explained with Examples

What is IPv6? IPv6 is the next generation of IP addressing or Internet Protocol. The previous version of IP addressing (IPv4) is depleted or near depletion. IPv6 was created by the Internet Engineering Task Force (IETF), a standards body, as a replacement to IPv4 in 1998. However, IPv6 is equipped with so much improved features and limitless opportunities… Read More »

What is BGP? Explained with Examples

Understanding Border Gateway Protocol (BGP) BGP is a complex, advanced distance Exterior Gateway Protocol (EGP), BGP exchange routing information between Autonomous Systems (ASs). Unlike Interior routing protocols such as RIP, EIGRP, and OSPF that run inside a company’s network, BGP uses a Best Path Selection Algorithm (BPSA) to choose and install the best routes into the router’s routing table.… Read More »

How to Apply ACLs on Interfaces Examples

On this page we describe how IP access control lists (ACLs) can filter network traffic. It also contains brief descriptions of the IP ACL types, feature availability, and an example of use in a network. We going to Configure standard access-list according to a given set of conditions. Instructions: 1. Hosts on Router R3 should not be able to access… Read More »

What is Extended ACLs? Explained with Examples

Extended Access Control Lists. Like Standard ACLs, extended ACLs check the source packet addresses, destination address, protocols and port numbers. Extended Access Control Lists (ACLs) provide a greater range of control and, therefore, an addition to your security solution. Extended ACLs provides for more precise traffic-filtering control, you can use extended ACLs numbered 100 to 199 and 2000… Read More »

What are Common Network Security Threats?

Three common factors emerges when dealing with network security, these are vulnerability, threat, and attack. Vulnerabilities An experienced hacker knows that every network or device has a certain degree of vulnerability or weakness, and they take advantages of each security weakness or loophole to exploit the network.  A  Computer network hackers work round the clock in search of unsecured… Read More »