A Crash Course in Cisco ASA Modular Policy Framework
by PivIT Global on Apr 25, 2023 7:06:00 AM
Besides operating as a stateful packet filtering firewall where all sessions are stored in a state table, Cisco ASA appliance can also function as an application firewall. This allows for performing deep packet application inspections based on which network engineers can assign approp …
Your Handy Guide to Configuring ACLs on Cisco ASA
by PivIT Global on Mar 16, 2023 7:02:00 AM
Controlling internal communications within enterprise networks is one of the essential tasks that network engineers need to do.
Everything You Need to Know About Distribute and Prefix Lists
by PivIT Global on Feb 22, 2023 7:01:00 AM
Communications within networks heavily depend on dynamic routing protocols, their features, and the benefits they bring to enterprises.
Here’s Why It’s So Important to Secure the Control Plane
by PivIT Global on Feb 16, 2023 7:03:00 AM
In a perfect world, every network engineer would know the architecture of network devices like the back of their hand. They would also understand its hardware and software-based behavior.
A Complete Guide to Access Control Lists: Types and Creation Methods
by PivIT Global on Aug 25, 2022 7:03:00 AM
In enterprise environments, controlling communications between different segments within a network is crucial for providing sufficient policy-based access and protecting the network from unauthorized use. For example, you may want certain users to have different levels of access to th …
Your Ultimate NAT Configuration Guide for Cisco IOS – Pt. 2
by PivIT Global on Aug 23, 2022 7:01:00 AM
Internet Protocol Version 4 (IPv4) uses a 32-bit address space, which allows for a limit of 4,294,967,296 addresses. However, the initial design of IPv4 did not factor in the rapid growth of the internet. Because of the scarcity of IPv4 addresses, many organizations implemented NAT to …
Configure Network Security Using an ACL in SVI Environments
by Darin Knobbe on Aug 13, 2020 1:45:00 PM
Network security is as important now than ever with data getting bigger and more precious. As network security helps businesses reduce the risk of data theft and disturbance in production network operations, it is key to understand your security environment. An access control list (AC …