Contact Firewall.cx
Articles That Might Interest:
Cisco Routers
Understanding MPLS IP VPNs, Security Attacks and…
What Are MPLS Networks?
Multi-Protocol Label Switching (MPLS) networks are the next-generation of networks designed to allow customers create end-to-end circuits across any type of transport m…
Windows Servers
Guide to Windows Server 2016 Hyper-V Hypervisor…
One of Windows Server 2016 highlights is the newer Hyper-V server that not only extends the hypervisor’s features and capabilities but also introduces a number of new enhancements and concepts that t…
Routing
OSPF - Part 4: OSPF Neighbor States – OSPF Neighb…
This is the third article of our OSPF series which analyzes the different OSPF States routers go through during the OSPF discovery and neighbor forming process. We analyze OSPF states (Init state, 2-…
Cisco Services & Technologies
How to Fix Cisco VPN Client Error 51 – Unable to…
Apple Mac OS X users are frequently faced with the Cisco VPN Client Error 51 - Unable to Communicate with the VPN Subsystem as shown in the screenshot below:
When this error is produced, users wil…
Palo Alto Networks
Configuring QoS on Palo Alto Firewalls: Class-bas…
This article’s purpose is to help you quickly master Palo Alto QoS concepts and learn to configure QoS on Palo Alto Firewalls in a simple and efficient way. QoS is considered a complicated topic howe…
Cisco Services & Technologies
Fix Cisco VPN Client Break After Windows 10 Anniv…
Windows 10 latest update 1607 code named Anniversary update promises to introduce a number of significant enhancements including breaking your trustworthy Cisco IPSec VPN client. After installing the…
Windows Workstations (XP, 7, 8, 10, 11)
The Importance of Windows Hosts File - How to Use…
This article explains how the Windows operating system makes use of the popular Host file, where it is located for various operating systems, how it can be used to manipulate DNS lookups and redirect…
SASE & SD-WAN Networks
WAN Optimization vs SD WAN Networks. Today’s Chal…
Enterprises have been successfully running WAN optimization appliances at their many distributed sites for years. The devices have done a good job of helping businesses squeeze as much capacity as po…
Windows Servers
Free Webinar: Migrating from Hyper-V to VMware
If your organization is planning to migration from a Hyper-V virtualization environment to VMware then this FREE webinar is just for you.
Aimed toward Hyper-V and VMware admins this webinar will cov…
TCP - UDP Protocol Analysis
Transmission Control Protocol - Part 3: The TCP H…
This article shows the TCP Header and Segment. We explain where the TCP Header and Segment are located in an Ethernet frame and also briefly view the available options in the TCP Header. Our easy-to-…
Linux - Unix
The Linux File System
A file system is nothing more than the way the computer stores and retrieves all your files. These files include your documents, programs, help files, games, music etc. In the Windows world we have t…
Linux - Unix
Advanced Linux Commands
Now that you're done learning some of the Basic Linux commands and how to use them to install Linux Software, it's time we showed you some of the other ways to work with Linux. Bear in mind that each…
Wi-Fi Key Generator
Follow Firewall.cx
Cisco Password Crack
Decrypt Cisco Type-7 Passwords on the fly!







