The Networking world is being bombarded by so many “new” technologies that it is difficult to keep up with them all, from Software Defined Networking (SDN) to Network Function Virtualization (NFV) and now Software-Defined Wide Area Network (SD-WAN). At the center of all these technologies is a focus on software …
Read More »Open Networking from theory to practice
In this article, we will be discussing Open Networking and try to dissect what the “open” in Open Networking really means. We will also be looking at different real-life products and solutions that fit the Open Networking model. Finally, we will look at a practical lab example of Open Networking. …
Read More »IPv6 Migration from IPv4: a Practical Guide (with bonus)
The Internet was initially designed to support end-to-end connectivity i.e. every device/host on the Internet should be able to “talk” to every other device directly like in a peer to peer model. As such, when the Internet was conceived and IPv4 was chosen (and IPv6 was not even an idea!) …
Read More »How to Configure HSRP on a Cisco Router (with GNS3 lab)
Hot Standby Routing Protocol or HSRP, is a Cisco proprietary protocol that allows two or more routers to work together to represent a single IP address for a particular network. HSRP, as well as Virtual Route Redundancy Protocol (VRRP) are considered high-availability network services that allow for almost immediate fail …
Read More »How to configure Remotely Triggered Black Hole routing to protect from DDOS attacks (with bonus)
Remotely triggered black hole routing is a technique that can be used to protect from DDoS attacks. It has the ability to drop undesirable traffic before it enters the protected network. This article explains how it works and how it can be configured to protect your network. What is a DDoS …
Read More »9 Types of Software Defined Network attacks and how to protect from them
It is a fact, corporations are looking towards Software Defined Networks (SDN), but something keeps troubling their peace of mind…their network security. Software defined network attacks are unfortunately a reality nowadays, so let’s see how they try to breach into the network. Many things have been said about the ability …
Read More »NAT on Cisco ASA (with GNS3 config)
In this article, we will be looking at Network Address Translation (NAT) on the Cisco ASA. I will assume the readers of this article know what NAT and the Cisco ASA are, so I will just give an overview. In the simplest form, the Adaptive Security Appliance (ASA) is Cisco’s …
Read More »F5 Load Balancer
F5 load balancers are very important devices for distributing and balancing application and network traffic across servers. That is done in order to increase system capacity, with a fast and seamless delivery of packets. We can divide load balancer appliance in general into two main categories. 1 – Transport layer load balancer …
Read More »The 4 Steps to pass Cisco Certification Exams
To give yourself the best chance of passing Cisco Certification Exams, all you need is: Study material Study tools Learning technique(s) Time With these four things on your side you’re putting yourself in the best position to pass the exam. Let me elaborate on each of these points and why I feel they’re so …
Read More »Wi-Fi Network Common Problems and Resolutions
The Wi-Fi is slow is a common complaint in the network world. Poor performance on a Wi-Fi network has many different causes, some of which include: Access Points using legacy data rates such as 1 and 2 Mbps Too many devices transmitting on the same channel Accesso Points transmitting too …
Read More »