This article shows how to configure, setup and verify site-to-site IPSec VPN tunnel between Cisco routers. Understand IPSec VPNs, including ISAKMP Phase, parameters, Transform sets, data encryption, crypto maps, check VPN Tunnel crypto status and much more. Full set of commands and diagrams included.
http://www.firewall.cx/cisco-technical-knowledgebase/cisco-routers/867-cisco-router-site-to-site-ipsec-vpn.htmlSunday, April 29, 2012
Thursday, April 26, 2012
Installation of a Cisco Catalyst 4507R-E switch
This article describes that installation of a Cisco Catalyst 4507R-E switch, including two Supervisor Engines II (WS-X4013+) and a 48 port Gigabit PoE module (WS-X4548-GB-RJ45V). We've included a number of detailed pictures showing the whole installation procedure and features supported by the switch.
http://www.firewall.cx/cisco-technical-knowledgebase/cisco-switches/340-cisco-switches-catalyst-4507r-e.htmlForcing Your Cisco Catalyst Switch To Use 3rd Party SFP Modules
This article shows how to configure your Cisco Catalyst switch 2960G, 3560G, 3750G, 4507R to use 3rd party SFPs. Learn the secret CLI commands required, to maximise your catalyst switch's compatibility with 3rd party sfp's. Discover where 3rd party SFPs can be used without hesitation.
http://www.firewall.cx/cisco-technical-knowledgebase/cisco-switches/866-cisco-switches-3rd-party-sfp.htmlTuesday, April 24, 2012
Analysing The IP Routing Process - Step-by-Step Analysis
This article explains the IP Routing process with the help of detailed diagrams. We examine step-by-step how a packet is created, sent to a gateway (router) and routed outside the local network. Ethernet, MAC Addresses, ARP, RARP, DNS, ICMP, TCP and other protocol roles are analysed in the example provided.
http://www.firewall.cx/networking-topics/routing/181-routing-process.htmlMonday, April 23, 2012
Cisco Type 7 Password Decrypt / Decoder / Cracker Tool
Using Cisco type 7 passwords is no longer recommend by Cisco as they can easily be cracked using the right tools. To prove this, Firewall.cx has created an online password decrypt tool that allows any network administrator/engineer quickly decode all Cisco type 7 passwords. For security reasons, passwords decrypted are not stored on our systems.
http://www.firewall.cx/general-topics-reviews/cisco-cracker.htmlSunday, April 22, 2012
How To Secure Your Cisco Router Using Cisco AutoSecure Feature
This article covers the Cisco AutoSecure feature and explains how it can be used to properly secure your Cisco router(s) using Cisco's recommended security practices.
http://www.firewall.cx/cisco-technical-knowledgebase/cisco-routers/865-how-to-secure-your-cisco-router-using-cisco-autosecure-feature.htmlFriday, April 20, 2012
Analysing TCP Header Options
This article tackles the Options section within the TCP Header. Sections covered include: Maximum Segment Size, Improving performance with Window Scaling, Selective Acknowledgements, Timestamps, Nop and much more. All topics include detailed diagrams and examples.
http://www.firewall.cx/networking-topics/protocols/tcp/138-tcp-options.htmlTuesday, April 17, 2012
Connecting & Configuring SPA8000 with UC500, 520, 540, 560 & CallManager Express (CCME) - Lost Cost ATA Analog Ports
This article shows how the Cisco SPA8000 can connect with Cisco CallManager Express CCME & UC500 series (UC520, UC540 & UC560), to provide cheap alternative FXS Analog ports. Included are full instructions, commands, diagrams and necessary firmware upgrades.
http://www.firewall.cx/cisco-technical-knowledgebase/cisco-voice/864-cisco-voice-uc500-ccme-spa8000.htmlMonday, April 16, 2012
How To Upgrade Cisco - Linksys SPA8000 Firmware
This article shows how to upgrade the Cisco Linksys SPA8000 firmware and includes detailed screenshots and step-by-step instructions.
http://www.firewall.cx/cisco-technical-knowledgebase/cisco-voice/863-cisco-voice-spa8000-upgrade.htmlMedia Access Control - MAC Addresses
This article explains the usage of MAC Addresses in the network. We also analyse how MAC addresses are created, how they are used and cover the functions they serve.
http://www.firewall.cx/networking-topics/general-networking/105-mac-addresses.htmlThursday, April 12, 2012
Book Review: Automating vSphere with VMware vCentre Orchestrator
To begin with, we were impressed with the informal style of the writer’s delivery. Sometimes this makes or breaks a book’s popularity. Virtualisation is no mean subject, and it can become confusing at times. But the writer’s style has ensured that the content is presented in a very lucid way without compromising the reader’s ability to grasp the matter. Core technical books can become a chore to read through, thanks to a writer’s inability to explain things in a simple way. This cannot be said for this book, which is a welcome change.
http://www.firewall.cx/general-topics-reviews/book-reviews.html?task=view&id=33&catid=137Tuesday, April 10, 2012
IP Multicast - Understand How Multicast Works
This article analyses Multicast within a LAN. Topics covered extensively include: basic Multicast theory, Ethernet multicasting, IP multicasting & mapping IP multicasting to Ethernet multicasting
http://www.firewall.cx/networking-topics/general-networking/107.htmlMonday, April 9, 2012
Cisco SmartCare Service
This article describes the new revolutionary Cisco Smart Care. We cover installation, upgrade and configuration of the appliance and setup via the Smart Care portal. We also take a look at the discovery and inventory process of the Cisco devices to be covered under the Smart Care contract.
http://www.firewall.cx/cisco-technical-knowledgebase/cisco-services-tech/348-cisco-smartcare-intro.htmlFriday, April 6, 2012
Power over Ethernet - Understanding PoE Technology, PoE Options & Power Requirements
Understand the Power over Ethernet Technology and how your network devices can benefit from this technology. We also examine the IEEE 802.3af standard and various PoE Class devices. Understand the Power Requirements of Attached Devices, Cable specifications often neglected plus a lot more useful information for any network engineer or IT Manager.
http://www.firewall.cx/networking-topics/general-networking/841-networking-power-over-ethernet.htmlWednesday, April 4, 2012
Configuring Policy-Based Routing (PBR) with IP SLA Tracking - Auto Redirecting Traffic
How to configure Policy-Based Routing (PBR) with IP SLA Tracking to redirect traffic and provide automatic fail-over. Learn how Cisco PBR and traffic classification works, and how to combine it with IP SLA to provide automatic fail-over protection.
http://www.firewall.cx/cisco-technical-knowledgebase/cisco-routers/861-cisco-router-pbr-ipsla-auto-redirect.htmlTuesday, April 3, 2012
WEB SSL VPN - The Next Wave Of Secure VPN Services
Web SSL VPN is the next generation of VPN Services. This article explains what exactly Web VPN Services are, how they are implemented and what are the advantages over classic VPN solutions.
http://www.firewall.cx/cisco-technical-knowledgebase/cisco-services-tech/342-cisco-web-vpn.htmlMonday, April 2, 2012
Product Review - GFI LanGuard Network Security Scanner 2011
Our comprehensive review shows what GFI's trusted LanGuard network scanner and patch management product is all about. A stable and enterprise-ready contender worthy of serious consideration by small and medium-sized companies everywhere.
http://www.firewall.cx/general-topics-reviews/hot-product-reviews/859-reviews-gfi-languard-2011.htmlUnderstanding MPLS IP VPNs, Security Attacks and VPN Encryption
MPLS IP VPN. We explain what MPLS networks are and how they work. Learn about MPLS VPN networks, its implementation and security threats. This article also touches on ATM (DSL) IP VPN Networks.
http://www.firewall.cx/networking-topics/wan-technologies/821-mpls-ip-vpn-security.html