• Best VPN Service

    Top VPNs that Unlock Netflix, provide Secure Torrenting, Strong Encryption, Fast Downloads, DNS Leak Protection, Identity Protection and have Cheap VPN prices.

    read more

    Hyper-V Concepts

    It's time to get familiar with Hyper-V Virtualization, virtual servers, virtual switches, virtual CPUs, virtual deployment infrastructure (VDI) and more.
    Read more

Hot Downloads

Major Cisco Certification Changes - New Cisco CCNA, CCNP Enterprise, Specialist, DevNet and more from Feb. 2020

Posted in Other Articles

new cisco certification paths Feb 2020Cisco announced a major update to their CCNA, CCNP and CCIE certification program at Cisco Live last week, with the changes happening on the 24th  February 2020.

 

CCNA and CCENT Certification

The 10 current CCNA tracks (CCNA Routing and Switching, CCNA Cloud, CCNA Collaboration, CCNA Cyber Ops, CCNA Data Center, CCNA Industrial, CCNA Security, CCNA Service Provider, CCNA Wireless and CCNA Design) are being retired and replaced with a single ‘CCNA’ certification. The new CCNA exam combines most of the information on the current CCNA Routing and Switching with additional wireless, security and network automation content.

A new Cisco Certified DevNet Associate certification is also being released to satisfy the increasing demand in this area.

The current CCENT certification is being retired. There hasn’t been an official announcement from Cisco yet but rumours are saying that we might be seeing new ‘Foundations’ certifications which will focus on content from the retiring CCNA tracks.

CCNP Certification

Different technology tracks remain at the CCNP level. CCNP Routing and Switching, CCNP Design and CCNP Wireless are being consolidated into the new CCNP Enterprise, and CCNP Cloud is being retired. A new Cisco Certified DevNet Professional certification is also being released.

Only two exams will be required to achieve each CCNP certification – a Core and a Concentration exam. Being CCNA certified will no longer be a prerequisite for the CCNP certification.

If you pass any CCNP level exams before February 24 2020, you’ll receive badging for corresponding new exams and credit toward the new CCNP certification.

new cisco certification roadmap 2020

Click to Enlarge

CCIE Certification

The format of the CCIE remains largely the same, with a written and lab exam required to achieve the certification. The CCNP Core exam will be used as the CCIE Written exam though, there will no longer be a separate written exam at the CCIE level. Automation and Network Programmability are being added to the exams for every track.

All certifications will be valid for 3 years under the new program so you will no longer need to recertify CCIE every 2 years.

How the Changes Affect You

If you’re currently studying for any Cisco certification the advice from Cisco is to keep going. If you pass before the cutover your certification will remain valid for 3 years from the date you certify. If you pass some but not all CCNP level exams before the change you can receive credit towards the new certifications.

We've added a few resources to which you can turn to an obtain additional information:

The Flackbox blog has a comprehensive video and text post covering all the changes.

The official Cisco certification page is here.

NetFlow Analyzer: Free Download, Step-by-Step Installation, Configuration & Optimization Windows - Linux

Posted in Netflow

netflow analyzer trafficIn our previous article we explained how a Netflow Analyzer can help you gain visibility into your user traffic, application traffic and data flows while at the same time analyze traffic patterns, detect unusual traffic, verify bandwidth availability, detect Quality of Service (QoS) problems and a lot more.

In this article we will introduce Network Analyzer - a bandwidth and traffic analysis tool that helps you monitor the bandwidth utilization in your network and analyze the who, when, what of your network traffic. It uses flow technology to give you real time visibility into your network and supports all major flow formats such us netflow, sflow, jflow, IPFIX, and appflow.

Network Analyzer helps you to drill down into interface level details to discover traffic patterns and monitor device performance, recognize and classify Non-Standard Apps that hog your network bandwidth, and detect security threats. Using a network bandwidth monitoring tool like NetFlow Analyzer allows you to monitor all these critical parameters in real-time.

netflow analyzer download

Here is what we'll be covering in this article:

Easy Installation

NetFlow Analyzer is available for Windows and Linux platforms. For information on supported versions and other specifications, look up System Requirements.

Installing NetFlow Analyzer

Windows:

  1. Download  NetFlow Analyzer for Windows
  2. Double-click it to start installation. Follow the instructions as they appear on screen to install NetFlow Analyzer on to your machine successfully. NetFlow Analyzer supports both, PostgreSQL and MSSQL as database. Select the desired database and click Next.

Linux:

  1. Download NetFlow Analyzer for Linux
  2. Assign execute permission using the command: chmod a+x ManageEngine_NetFlowAnalyzer_xxxx.bin where ManageEngine_NetFlowAnalyzer_xxxx is the name of the downloaded BIN file.
  3. Execute the following command: ./ManageEngine_NetFlowAnalyzer_xxxx.bin

Note: During installation if you get an error message stating that the temp folder does not have enough space, try executing this command with the -is:tempdiroption parameter where is the absolute path of an existing directory:

./ManageEngine_NetFlowAnalyzer_xxxx.bin -is:tempdir

For non-x11 machines, use the following command:

./ManageEngine_NetFlowAnalyzer_xxxx.bin -console

Follow the instructions as they appear on the screen to install NetFlow Analyzer on to your machine successfully.

Once you have successfully installed NetFlow Analyzer, start the NetFlow Analyzer server by following the steps below.

Advanced Web Application Vulnerability Scanner: Now with Network Security Scanning

Posted in Web Application Vulnerability Scanners

Network security scanning is now possible on all versions of Acunetix Web Vulnerability Scanner, making this much easier and much more efficient to run both web security scans and network security scans at the same time. This is possible thanks to the seamless integration of Acunetix with the powerful OpenVAS security solution. There are many advantages of running network security scans in Acunetix - Click here to find out more.

Additional features supported by the latest version include:

  • Full support for IPv6
  • Improved usage of machine resources
  • Added support for Selenium scripts as import files
  • Multiple vulnerability checks for SAP
  • Unauthorized access detection for Redis and Memcached
  • Source code disclosure for Ruby and Python

For those interested, Acunetix is available as a free download.

Netflow: Monitor Bandwidth & Network Utilization. Detect LAN, WAN, Wi-Fi Bottlenecks, Unusual Traffic Patterns, Problems and more

Posted in Netflow

netflow analyzer introMonitoring network traffic & bandwidth usage via Netflow is mandatory for any type and size network. Gaining visibility into user traffic, application traffic and data flows allows network engineers, administrators and security specialists detect bottlenecksnetwork congestion, unusual traffic patterns, monitor SLA agreements with providers, verify bandwidth availability, detect Quality of Service (QoS) issues, Wi-Fi Network monitoring, plus much more.

Here’s what we’ve got covered in this article:

 

Netflow: Discovering & Monitoring Your Network Traffic

Netflow is a network protocol developed by Cisco used to collect IP traffic information and monitoring network traffic. It’s used and supported in almost any network and has become the de-factor industry standard.

Other vendors support similar flow technologies, here are a few examples:

  • HP/3Com, Dell and Netgear: s-flow
  • Juniper: Jflow
  • Ericsson: Rflow
  • Alcatel-Lucent: Cflow
  • Huawei: NetStream

IT infrastructure has become much more sophisticated in the last decade and equally complicated. With the market growing every day, customer expectations are higher than ever. Networks are no more limited within a firewall. Now it extends to public and private clouds, and SaaS. This makes it more important for network admins to ensure faster connectivity between the user, and the public and private clouds or data centres.

The primary objective of bandwidth analysis is to monitor the performance of your network, and this can include different types of bandwidth utilization such as application traffic, wireless network, Wide Area Network (WAN) or Local Area Network (LAN) utilization, etc., where every device, service, and individual user is competing for their share of bandwidth. While the immediate solution for traffic congestion could be increasing your bandwidth capacity, the challenge is in realizing if your enterprise even requires that extra bandwidth. And in case you find yourself unable to provide sufficient bandwidth to users based on their needs or unable to control non-business traffic, you are not alone.

Network admins cannot manually keep track of everything going on in your network 24x7, and according to reports and surveys conducted by Packeteers, at least sixty to seventy percent of network managers don’t know what is traversing their networks. Your network is prone to various attacks, and congestions or spikes in your network could be caused by internal or external threats that can vary from DDoS attacks to your own business-critical applications.

As we can appreciate, it is extremely important the network tools used are capable of providing enough information and visibility so we can monitor, identify and troubleshoot effectively and efficiently as possible.

A common question is what capabilities should the bandwidth monitoring tool provide?

Important Features in a Netflow Monitoring Tool: Visibility

How To Secure Your SD-WAN. Comparing DIY, Managed SD-WAN and SD-WAN Cloud Services

Posted in SD-WAN

how to secure your sd-wanWith so much enterprise network traffic now destined for the cloud, backhauling traffic across an expensive MPLS connection to a data center to apply security policy no longer makes sense. Software-defined WANs (SD-WAN) promise lower transport costs with direct, higher-performing connections to cloud and Internet resources. But what are the security implications of moving traffic off of private MPLS VPNs and onto public broadband links?

This article tackles the above and many more questions around enterprise WAN network connectivity options and the different type of SD-WAN network implementations along with their advantages and disadvantages.

Here’s what we’ve got covered for you:

Directly connecting branch offices to the cloud increases your exposure to malware and Internet-borne attacks, expanding your attack surface across many sites. If not adequately addressed, these risks could outweigh the cost and performance benefits of SD-WAN. Let’s take a look at the SD-WAN options for securing your sites.

SD-WAN Deployment Options

There are a few SD-WAN options available. Each requires a different approach to branch security:

  • Do it yourself (DIY): It’s possible to build and manage your own SD-WAN by deploying firewalling and unified threat management (UTM) capabilities yourself at each branch site. You can install separate physical appliances for each type of security you need or run the security tasks as virtual network functions (VNFs) in software. VNFs usually run in a special CPE appliance, but it may also be possible to run the VNFs in your branch router, depending on which router vendor you use.
  • Telco managed SD-WAN services: This option mirrors the DIY approach above; however, a telco resells the needed SD-WAN appliances and software to you and manages the installation on your behalf. The SD-WAN setup is the same but lightens the load on your IT staff and reduces the need for specialized SD-WAN skill sets in-house.
  • SD-WAN as a cloud service (“SD-WANaaS”) from a software-defined carrier (SDC): With this option, most SD-WAN functions run as a distributed, multi-tenant software stack in a global, private cloud maintained by your SDC. The provider integrates multiple levels of security into the network in the cloud, and your traffic traverses the SDC provider’s own IP backbone, avoiding the risk and best-effort performance challenges of the public Internet.

Let’s take a closer look at each approach.

CCENT/CCNA

Cisco Routers

  • SSL WebVPN
  • Securing Routers
  • Policy Based Routing
  • Router on-a-Stick

VPN Security

  • Understand DMVPN
  • GRE/IPSec Configuration
  • Site-to-Site IPSec VPN
  • IPSec Modes

Cisco Help

  • VPN Client Windows 8
  • VPN Client Windows 7
  • CCP Display Problem
  • Cisco Support App.

Windows 2012

  • New Features
  • Licensing
  • Hyper-V / VDI
  • Install Hyper-V

Linux

  • File Permissions
  • Webmin
  • Groups - Users
  • Samba Setup