Posts

What is Dynamic Multipoint VPN? DMVPN Configuration

Image
Many people who use networked connections that may include transmitting and receiving sensitive data are familiar with VPNs (or Virtual Private Networks). Dynamic Multiple VPN, such as Cisco DMVPN, encrypts transmitted data in the same way that a traditional VPN does. They do so, however, in a manner that ensures the security of communications between branch offices in particular. It does this with a centralised design that makes deployments across the whole IT scope of the company easy to execute and maintain.   ON THIS PAGE: What is Dynamic Multipoint VPN? DMVPN Configuration What exactly is DMVPN? DMVPN Advantages Getting a Glimpse of Dynamic Multipoint VPN (DMVPN) Components of DMVPN Phases of the DMVPN Network Architecture with Hubs and Spokes Step 1: Set up the Cisco DMVPN Hub Step 2: Configure Cisco DMVPN Remote 2 and Remote 3 Setting up Remote 3 IPSec Configuration (Step 3) Remote 2 and Remote 3 ...

Hundreds of millions of PCs are affected by a Dell driver flaw.

Image
ON THIS PAGE: Hundreds of millions of PCs are affected by a Dell driver flaw. Dell is releasing a patch for 380 versions from 2009 onwards.   Dell is releasing a patch for 380 versions from 2009 onwards.[ps2id id='Dell is releasing a patch for 380 versions from 2009 onwards.' target=''/] A Dell Huge problem. News, gear, PCs, weakness, kernel-level, protection, Dell, fix, personal computing, drivers are all listed in this post. In this photo illustration taken on October 12, 2015 in the Manhattan borough of New York, a Dell logo is seen on the front of a screen. Dell Inc announced on Monday that it has agreed to acquire EMC Corp, a data storage provider, for $67 billion in a record technology transaction that would bring two mature firms together to form an enterprise technology powerhouse. According to security researchers at Sentinel Labs, Dell has been publishing a firmware upgrade driver since 2009 that includes "five high severity...

Using network feature virtualization to mitigate DDoS attacks

Image
DDoS assaults are more than an inconvenience; they halt activities and result in substantial direct and indirect expenses for those that are impacted. Every day, over 23,000 DDoS attacks are registered, leaving businesses with disrupted online services. New Zealand's Stock Exchange (NZX) was recently struck by a massive DDoS assault for four days in a row, resulting in a stock market shutdown that prevented several people from trading. https://www.youtube.com/watch?v=E6t_jrk3LUs Ways to Prevent DDoS Attack DDoS Though DDoS attacks like the one in New Zealand don't directly threaten communication service providers (CSPs), CSP systems are collateral damage when attacks move through their networks on their way to their intended victims. Due to failures of routers, servers, and other network components, bursts of excessive DDoS traffic will prevent service distribution and also result in high infrastructure costs. For both CSPs and bu...

What Is a Virtual Private Network (VPN) and why you should use it ?

Image
  ON THIS PAGE: What Is a Virtual Private Network (VPN) and why you should use it ?   What Does (and Cannot) It Do? Why we want to use a VPN? Story and Evolution about VPN CONCLUSIONS     What Does (and Cannot) It Do?[ps2id id='What Does (and Cannot) It Do?' target=''/] VPN (virtual private network) services provide a secure, encrypted connection between your device and a VPN server located elsewhere. Anyone who wants to wrap their data in an extra layer of privacy and protection, particularly when connecting to public Wi-Fi networks, should invest in that form of safe link. A VPN , on the other hand, isn't a silver bullet for Internet survival, and it won't render you invisible online. A virtual private network ( VPN ) is a piece of software that hides the data in a virtual tunnel while masking your identity. Between your computer and a server somewhere in the world, a safe, encrypted link is established. ...

Complete List of Windows Server Versions and Timeline

Image
Microsoft has been building client operating systems since 1985, when Windows 1.01 was introduced. The first server, however, did not arrive until 1993, with the advent of New Technology (NT). Since then, 14 different versions have been created (the most recent version accessible at the time of writing is Windows Server 2022). Windows Servers are used for enterprise-level management, data storage, applications, and communications. Administrators may utilize this category of operating systems to implement and enforce policies while also strengthening their network's security architecture. In this article, we will look at the many Windows Server versions, the distinct features they each provided, and the order in which they were released. Table of contents Windows Server Timeline Windows Server History Windows Server NT Versions Windows NT Server 3.1 Windows NT Server 3.5 Windows NT Server 3.51 Windows NT Server 4.0 Rebranded...

What Is The Difference Between TCP/IP And The OSI Seven-Layer Network Model?

Image
The OSI and TCP/IP networking models are compared and contrasted. The Internet is made possible through network-to-network links. The "network layer" of the Internet communications process is where these connections are made by passing data packets back and forth across various networks. The network layer is layer 3 in the seven-layer OSI model (shown below). The Internet Protocol (IP), along with many additional protocols for routing, testing, and encryption, is one of the primary protocols used at this layer.   ON THIS PAGE: What Is The Difference Between TCP/IP And The OSI Seven-Layer Network Model? What exactly is a network? What takes place at the network layer? What exactly is a packet? The OSI Model (Open Systems Initiative) TCP/IP (Transmission Control Protocol/Internet Protocol) What are the benefits of using the OSI model? The OSI model's drawbacks In conclusion Bibliography   As...

Using Python to script Cisco routers + how to connnect 60.000 Routers

Image
If you want to using Python on your Cisco Router , you definelly need to check this Procedure and how Cisco Router Works, after this assay on the next step you will find how to use python script on your cisco routers!     Using Python to script Cisco routers + how to connnect 60.000 Routers How To Configure 60000 Routers A Visual Script using Python Why would you utilize it ?   How To Configure 60000 Routers[ps2id id='How To Configure 60000 Routers' target=''/] how to connnect 60.000 Routers In this brief essay I want to share an application with you which has been created as a solution to a real life situation. Recently I have been engaged in projects where I had to setup a very big number of Cisco routers and switches. There are of course strong and robust management systems to handle this task, but in these circumstances their participation were not an option for numerous reasons. Nevertheless, I h...