Tech Corner / Network Security

Must-Have Port Security: Simple but Efficient Layer 2 Protection

Must-Have Port Security: Simple but Efficient Layer 2 Protection

A switch port is the main entrance into a network and should have adequate security to combat potential threats. A large network could have thousands of access ports distributed across a campus or building. Are all your ports, used and unused, protected from unauthorized access?

Read Story

Telnet Versus SSH: How SSH Works and Why It's Better

Telnet Versus SSH: How SSH Works and Why It's Better

A Pew Research Center survey found that 54% of U.S. employees prefer working from home. Additionally, the current trends suggest that a hybrid or 100% remote work model will become a standard over the next few years. This model has meant that businesses have had to create remote conne …

Read Story

NGFWs: Fortinet FortiGate vs. Juniper SRX Series Services Gateways

NGFWs: Fortinet FortiGate vs. Juniper SRX Series Services Gateways

Software-Defined Wide Area Networks (SD-WAN) have grown tremendously due to their quick and easy multi-cloud access, higher bandwidth capacity, and high-speed application performance. All these benefits are crucial for the success of any business. However, network security is a vital …

Read Story

A Must-Have Guide - Risk-Free: Protect Against VLAN and STP Attacks

A Must-Have Guide - Risk-Free: Protect Against VLAN and STP Attacks

Securing the network is one of the most important tasks every engineer must consider to provide a safe networking environment. Although this task mainly focuses on protecting the network from outside attacks, such as from the internet, it also involves protection against less threaten …

Read Story

The Ultimate Guide to DHCP Spoofing and Starvation Attacks

What Are DHCP Spoofing and Starvation Attacks? A detailed overview

A Dynamic Host Configuration Protocol (DHCP) in a network is a common approach to allocating IP information dynamically to clients as they shift from one network to another within an enterprise.

Read Story

How Cisco Firepower Helps You Get The Most Out Of Your ASA 5500 Firewall

Cisco ASA 5500 Firewall Features and Benefits

The rapid change in the business landscape--especially in 2020 and 2021--transformed applications and provisioning environments. Your employees and users can now use recent technologies like microservices, containers, and APIs to align themselves with the pace of business changes.

Read Story

Cisco ASA Firewall Active/Standby Configuration Guide (Part 2 – Deployment)

Cisco ASA Firewall Active/Standby Configuration Guide (Part 2 – Deployment)

Welcome to Part 2 of the Cisco Adaptive Security Appliance (ASA) firewall active/standby configuration guide! In this article, we will focus on the deployment of the Cisco ASA firewall. The active/standby feature, as discussed in Part 1 of this series, has one simple goal: to provide …

Read Story

Cisco ASA Firewall Active/Standby Configuration Guide (Part 1 – Overview)

Cisco ASA Firewall Active/Standby Configuration Guide (Part 1 - Overview)

A firewall is a primary device that is used to provide security features in a network, although other complimentary devices such as an Intrusion Prevention System (IPS), Cisco Email Security Appliance (ESA), Cisco Web Security Appliance (WSA), and Cisco Identity Services Engine (ISE) …

Read Story

Subscribe by email