Possible bugs/limitations encountered in Cisco's RIP implementation
Default route origination not working reliably. Automatic summarization turned on causes major networks to be propagated throughout the RIP domain with a metric of 1. Using RIPv2 on NBMA hub-and-spoke...
View ArticleConfiguration of the RIPv2 authentication
In this article I will configure, debug and shows the process of RIPv2 authentication. Authentication methods Plain text MD5 Note 1: When using plain text authentication mode, make sure that the...
View ArticleConfiguring complex dynamic ACL (Lock-and-Key)
In this article I will configure dynamic complex ACL (Lock and Key). This technique is described during CCNA4 Exploration. About Lock and Key Description from the cisco webread more
View ArticleCisco Catalyst 2960 switch IOS recovery
Sometimes in my lab happens that students delete IOS of the switch from its flash. Unfortunately switches does not have rommon to realize quick IOS recovery over tftp. Only one way is over Xmodem. Cat...
View ArticleDHCP configuration using SDM
The flash animation explains how to configure DHCP server on a cisco router using the SDM. Where to find and how to install the SDM is described in this article.
View ArticleConfiguring reflexive ACL (IP session filtering)
In this article I will configure reflexive ACL. This technique is described during CCNA4 Exploration, and I'm using it during the lab exercises. About Reflexive ACL (IP session filtering) Description...
View ArticleHow to find a right server - nslookup and dig dns command line tools
A simple comparison of the nslookup command, the Microsoft DNS tool, and dig, the linux/win based command alternative. read more
View ArticleLoki - L3 packet generation and manipulation tool
Notes: Loki is a Python based framework implementing many packet generation and attack modules for Layer 3 protocols, including BGP, LDP, OSPF, VRRP and quite a few others.Web: read more
View ArticleVTP (+DTP) security threat - myth or fact?
There is some confusion and misunderstanding regarding VTP (VLAN Trunking Protocol)+DTP (Dynamic Trunking Protocol) and this article will hopefully make it all clear. Most of the confusion comes from...
View ArticleSTP - Loop itself with BPDUfilter
We investigate a special topology condition, where a switch is connected itself on ports Faa0/1 and Fa0/2, and one of the port has BPDUFilter feature applied (i.e. simulating STP is switched off)....
View ArticleEnabling USB Wi-Fi dongle adapter on VirtualBox VM
When we have Wi-Fi adapter in our PC, we may use it as a network interface of VM, but the VM will recognize it just… The post Enabling USB Wi-Fi dongle adapter on VirtualBox VM appeared first on NIL -...
View ArticleMaking a QEMU ASA 8.4 for GNS3 in Win10
By Peter Hadač This article is all about how to prepare ASA 8.4 in GNS3 simulation (on Windows 10, but compatible with other OS )… The post Making a QEMU ASA 8.4 for GNS3 in Win10 appeared first on NIL...
View ArticleSIP clients – security features analysis
Table provides the overview of security features of nine analysed open-source SIP clients (some sources call them the RTC communicator). Source: P. Segeč, M. Moravčík,… The post SIP clients – security...
View ArticleTools for a quick SIP diagnostics – ngrep, sipgrep and sngrep
Sometimes there is a need for simple and quick analysis of a SIP server and its call functions. Of course, we should use the well-known… The post Tools for a quick SIP diagnostics – ngrep, sipgrep and...
View ArticleOpenVAS/GVM installation and configuration from source code
Author: Martin Dvorsky Greenbone Vulnerability Manager (formerly OpenVAS) is the most popular open source vulnerability scanner.In this tutorial we will install, configure and prepare GVM… The post...
View ArticleKIS 2019 network dataset
KIS 2019 network dataset Authors : Jana Uramová, Tomáš Mokoš, Patrik Rodina, Peter Seemann, Miroslav Kohútik This article describes the KIS 2019 network dataset. If… The post KIS 2019 network dataset...
View ArticleInstalling full Linux from Windows on USB with persistent storage
This guide will describe how to install a full Linux OS on an USB flash disk with permanent storage feature, i.e. the system does not… The post Installing full Linux from Windows on USB with persistent...
View ArticleElasticsearch cluster upgrade
Elasticsearch cluster upgrade from 5.5.1 to 6.8.1 Author : Miroslav Kohútik Operating System : Ubuntu 16.04 In this guide we will show you how to… The post Elasticsearch cluster upgrade appeared first...
View ArticleNetacad – message “You did not complete all requirements”
My students received the message “You did not complete all requirements” even though they are set to “Pass”. It is an Netacad issue. The instructor… The post Netacad – message “You did not complete all...
View ArticleList of network simulators and virtualization tools
The page provides summarized and updated (2020) overview of simulation and virtualization tools suitable for the practice of networking teachers or researchers. The post List of network simulators and...
View Article
More Pages to Explore .....