Skip to main content

Contact Firewall.cx

Articles That Might Interest:

Network Protocols
In the networking and communications area, a protocol is the formal specification that defines the procedures that must be followed when transmitting or receiving data. Protocols define the format, t…
Network Fundamentals
In this section we are going to talk about the different ways a firewall can be set up. Depending on your needs, you can have a very simple firewall setup which will provide enough protection for you…
Virtualization & VM Backup
In this article we will cover the differences between VMware ESXi, vSphere and vCenter while also explain the features supported by each vSphere edition: vSphere Standard, Enterprise plus and Plantiu…
IP Protocol
This article explains the 'Network-ID' and 'Host-ID' concept found in IP addressing and subnetting. We analyse the structure of IP addresses and network classes and show their Network-IDs and Host-ID…
OpManager - Network Monitoring & Management
The hybrid work culture has resulted in workforces increasingly using their mobile devices for work, further adding to the complexity of ensuring security across all endpoints within organizations…
Cisco Wireless
This article explains how the Cisco 1240 series access point can be setup to provide support for multiple SSID, each SSID assigned to a separate VLAN.  This type of configuration is id…
Cisco Switches
The SG500 series Cisco switches are the next step up from the already popular SG300 Layer-3 switches. Cisco introduced the SG Small Business series switches to compete against DELL’s and HP’s offerin…
Cisco Firewalls
In late 2014, Cisco announced the new licensing model for the latest AnyConnect Secure Mobility client v4.x. With this new version, Cisco introduced a number of new features, but also simplified the…
Cisco Switches
There’s a new switch around the block and its name is Catalyst 3850 – Cisco’s latest addition to its successful Catalyst series switches. The Cisco Catalyst 3850 is no ordinary switch – it’s fully st…
Routing
We are going to analyse what happens when routing occurs on a network (IP routing process). When I was new to the networking area, I thought that all you needed was the IP Address of the machine you…
ManageEngine Firewall Analyzer
In today’s evolving threat landscape, firewall audits are more than just a best practice—they're a critical line of defense. Regular audits ensure your firewall configurations are aligned with organi…
Windows Workstations (XP, 7, 8, 10, 11)
This article shows you how to see hiddeen files and folders in Windows 7. Windows 7 hides important system files so that normally, you do not see them while exploring your computer. The reason behin…

All-in-one protection for Microsoft 365

All-in-one protection for Microsoft 365

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Enterprise-Class Cloud & Network Monitoring

Enterprise Class Cloud & Network Monitoring - Free Download

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Network and Server Monitoring

Network and Server Monitoring

Follow Firewall.cx

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Zoho Netflow Analyzer Free Download

Free PatchManager

Free PatchManager

Security Podcast

Hornet-Security-The-Swarm-Podcast

Firewall Analyzer

zoho firewall analyzer