Skip to main content

Contact Firewall.cx

Articles That Might Interest:

Web Application Vulnerability Scanners
The newest release of the Acunetix Web Vulnerability Scanner further improves performance and premieres best-of-breed technologies. Acunetix, the pioneer in automated web application security softwa…
Cisco Routers
This article provides an in-depth explanation of PPP Multilink and shows how to configure a Cisco router to use PPP Multilink between two serial interfaces (WIC-1T). We'll show you the commands that…
VLAN Networks
VTP (VLAN Trunking Protocol) pruning is a feature that is used in Cisco switches to reduce unnecessary traffic in VLAN (Virtual Local Area Network) trunks. When VTP pruning is enabled on a trunk, the…
Cisco Wireless
Cisco Wireless Controllers (WLC) support the configuration of Link Aggregation (IEEE 802.3ad - LAG) which bundles the controller ports into a single port channel. This helps simplify the configuratio…
Cisco Firewalls
This article explains how to configure a Cisco Firepower 2100 series device to operate in Appliance mode. We’ll show you how to switch from Platform mode to Appliance mode and how the device will aut…
Windows Servers
NIC Teaming, also known as Windows Load Balancing or Failover (LBFO), is an extremely useful feature supported by Windows Server 2012 that allows the aggregation of multiple network interface cards t…
Network Fundamentals
A MAC address, or Media Access Control address, is a unique identifier assigned to a network interface controller (NIC) for use as a network address in communications within a network segment. It i…
OpManager - Network Monitoring & Management
Work transformation is not 'one and done,'" says  IDC's vice president, Holly Muscolino. Most enterprises understand that a hybrid workforce is the future, but they are finding the transformatio…
Windows Servers
With Windows 2016 Server already making its way into data centers Windows 2016 Server Licensing is becoming a very hot topic. Windows 2016 Server is jam-packed with a number of advanced features incl…
Web Application Vulnerability Scanners
Acunetix has refreshed its online web and network vulnerability scanner, Acunetix Online, with a massive update. The new Acunetix Online now incorporates all the features found in its on premise offe…
Cisco Routers
In today’s complex network environments securing your network routers can be a daunting task, especially when there are so many CLI commands and parameters with different security implications for yo…
Spanning Tree Protocol (STP)
Spanning Tree Protocol, Rapid STP port costs and port states are an essential part of the STP algorithm that affect how STP decides to forward or block a port leading to the Root Bridge. In our prev…

All-in-one protection for Microsoft 365

All-in-one protection for Microsoft 365

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Enterprise-Class Cloud & Network Monitoring

Enterprise Class Cloud & Network Monitoring - Free Download

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Network and Server Monitoring

Network and Server Monitoring

Follow Firewall.cx

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Zoho Netflow Analyzer Free Download

Free PatchManager

Free PatchManager

Security Podcast

Hornet-Security-The-Swarm-Podcast

Firewall Analyzer

zoho firewall analyzer