Let us imagine that you go to the management console and see: “Attention! All your files have been encrypted!” - What are your first steps in responding to an attack?
Read More »Quick VPN Installation Guide on Your Router
With so many hacks and data breaches taking place every day, maintaining certain levels of security is important. That’s why having a VPN is key.
Read More »Routing for Bitcoin and Cryptocurrency: how it works and its security threats
As long as you have not been in a bunker for the past 9 years, then you have probably heard of “Bitcoin” and probably other forms of cryptocurrency like Ethereum (ETH), Litecoin (LTC), and Bitcoin Cash (BCH). But what is bitcoin and why is there so much noise about it? …
Read More »AAA on the Cisco ASA
From my experience as a Network Security Engineer, I have worked on many Cisco projects involving AAA on the routers but not so many that involve AAA on the Cisco ASA. I find that a bit weird considering that the Cisco ASA is the real security device. I wonder if …
Read More »How to configure Remotely Triggered Black Hole routing to protect from DDOS attacks (with bonus)
Remotely triggered black hole routing is a technique that can be used to protect from DDoS attacks. It has the ability to drop undesirable traffic before it enters the protected network. This article explains how it works and how it can be configured to protect your network. What is a DDoS …
Read More »9 Types of Software Defined Network attacks and how to protect from them
It is a fact, corporations are looking towards Software Defined Networks (SDN), but something keeps troubling their peace of mind…their network security. Software defined network attacks are unfortunately a reality nowadays, so let’s see how they try to breach into the network. Many things have been said about the ability …
Read More »F5 Load Balancer
F5 load balancers are very important devices for distributing and balancing application and network traffic across servers. That is done in order to increase system capacity, with a fast and seamless delivery of packets. We can divide load balancer appliance in general into two main categories. 1 – Transport layer load balancer …
Read More »Cisco ASA as DHCP Server with Multiple Internal LANs
This article describes the configuration of an interesting network scenario that is applicable in many real world situations, mainly in small to medium networks. We have three different internal LAN networks which host user computers and other IT infrastructure (servers, network printers etc). We want to separate the three internal …
Read More »Time–Based Access Control Lists
As you probably know, access control lists (ACLs in further text) are a means of providing firewall protection. Except the basic division on standard and extended ACLs, we distinguish between time-based, reflexive ACLs, turbo ACLs, and many other. The focus of this article are time-based ACLs, when should you use …
Read More »IP TTL Security : Why and How?
TTL (Time-To-Live) is a field in the IPv4 header. TTL field is of 8 bits and so it can take a maximum value of 255. When a sender sends out a packet, it sets the TTL value (usually as 64) in the IP header. Each router that receives this packet, …
Read More »