Category Archives: Network Security

Quality Of Service QOS – Explained with Example

Understanding QoS The Provision of sufficient Quality of Service (QoS) across IP networks has become a necessary criterion in enterprise IT infrastructure of the future. It has been deemed a necessity especially for voice and the streaming of video over the network. Let us look at why the quality of service (QoS) is vital in today’s and future… Read More »

DHCP Snooping Explained

WHAT IS DHCP SNOOPING? The Dynamic Host Configuration Protocol (DHCP) allocates IP addresses dynamically, it leases addresses to connected devices and the addresses can be reused when no longer needed. All connected Hosts and end devices that require IP addresses obtained through DHCP must communicate with a DHCP server across the LAN. DHCP snooping acts like a firewall… Read More »

What is Syslog? Syslog Explained.

System Message Logging – SYSLOG Modern network devices have advanced from simple transmitting of messages (email.documents, multimedia etc), network devices like Cisco routers and switches provide the features for network administrators to reading system messages from their internal buffer about network situation at a particular time. The way do this is by using Syslog server. Cisco network devices (Routers… Read More »

PPP: What is CHAP? Explained with Examples

Challenge Handshake Authentication Protocol (CHAP) Challenge Handshake Authentication Protocol (CHAP) is more secure than PAP. It involves a three-way exchange of a shared secret. During link establishment, CHAP conducts periodic challenges to make sure that the remote host still has a valid password value. While PAP basically stops working once authentication is established, this leaves the network vulnerable to… Read More »

Features of a Secure VPN

What are Features of a Secure VPN? VPNs use advanced encryption techniques and tunneling to permit organizations to establish secure, end-to-end, private network connections over the Internet. The basis of a secure VPN is data confidentiality, data integrity, and authentication: i  .   Data confidentiality – The common network security concern is protecting data from hackers. Data confidentiality aims at… Read More »

Ways To Migrate To IPv6 Explained

Before now, most networks; if not all, runs on IPv4 infrastructure, especially if your network is using old routers and switches. To upgrade your network to be IPv6 compliant, one or two strategies listed below can be used to implement this process on your network. 1. Dual Stacking: This method of migration enables a network to run both IPv4… Read More »

What is IPv6? Explained with Examples

What is IPv6? IPv6 is the next generation of IP addressing or Internet Protocol. The previous version of IP addressing (IPv4) is depleted or near depletion. IPv6 was created by the Internet Engineering Task Force (IETF), a standards body, as a replacement to IPv4 in 1998. However, IPv6 is equipped with so much improved features and limitless opportunities… Read More »

What is BGP? Explained with Examples

Understanding Border Gateway Protocol (BGP) BGP is a complex, advanced distance Exterior Gateway Protocol (EGP), BGP exchange routing information between Autonomous Systems (ASs). Unlike Interior routing protocols such as RIP, EIGRP, and OSPF that run inside a company’s network, BGP uses a Best Path Selection Algorithm (BPSA) to choose and install the best routes into the router’s routing table.… Read More »

How to Apply ACLs on Interfaces Examples

On this page we describe how IP access control lists (ACLs) can filter network traffic. It also contains brief descriptions of the IP ACL types, feature availability, and an example of use in a network. We going to Configure standard access-list according to a given set of conditions. Instructions: 1. Hosts on Router R3 should not be able to access… Read More »

What is Extended ACLs? Explained with Examples

Extended Access Control Lists. Like Standard ACLs, extended ACLs check the source packet addresses, destination address, protocols and port numbers. Extended Access Control Lists (ACLs) provide a greater range of control and, therefore, an addition to your security solution. Extended ACLs provides for more precise traffic-filtering control, you can use extended ACLs numbered 100 to 199 and 2000… Read More »