Skip to main content

Network Fundamentals: Top Picks

Network Fundamentals

Controlling Broadcasts and Multicasts

The first step in controlling broadcast and multicast traffic is to identify which devices are involved in a broadcast or multicast storm. The foll...
Network Fundamentals

LAN Network Topologies

Network topologies can take a bit of time to understand when you're all new to this kind of cool stuff, but it's very important to fully understand...
Network Fundamentals

Securing Your Home Network

In today's world, securing your home network is more important than ever. With the increasing number of cyberattacks, data breaches, and online fra...
Network Fundamentals

Firewall Topologies

In this section we are going to talk about the different ways a firewall can be set up. Depending on your needs, you can have a very simple firewal...

Featured Subcategories:

Netflow Articles:

Netflow

NetFlow Analyzer: Free Download, Step-by-Step I...

In our previous article we explained how a Netflow Analyzer can help you gain visibility into your user traffic, application traffic and data flows...
Netflow

Netflow: Monitor Bandwidth & Network Utilizatio...

Monitoring network traffic & bandwidth usage via Netflow is mandatory for any type and size network. Gaining visibility into user traffic, appl...
Netflow

Netflow vs SNMP. Two Different Approaches to Ne...

SNMP (Simple Network Management Protocol) and Netflow are both popular protocols with admins, prized for their ability to give visibility over the ...
Netflow

Complete Guide to Netflow: How Netflow & its Co...

This article will cover the basics of Netflow, including its use cases, Netflow supported devices, Netflow history, and variants. We’ll also dive i...

Network Protocols:

Subnetting

IP Subnetting - Part 2: Subnet Masks & Their Ef...

There are a few different ways to approach subnetting and it can get confusing because of the complexity of some subnets and the flexibility they o...
TCP - UDP Protocol Analysis

TCP Header Anaylsis - Section 3: TCP Header Len...

The third field under close examination is the TCP Header length. There really isn't that much to say about the Header length other than to explain...
TCP - UDP Protocol Analysis

Transmission Control Protocol - Part 4: In-Dept...

This article is an introduction to the 7-page TCP Header analysis section that follows. We briefly view each section of the TCP Header and then mov...
Supernetting & CIDR

The Supernetting / CIDR Chart

This articles build upon our previous pages covering  what is Supernetting (Route Summarization) & How Supernets Work and Supernetting In-...
Domain Name System (DNS)

The DNS Protocol - Part 2: DNS Queries & Resolu...

This section will help you understand how the DNS queries work on the Internet and your home network. There are two ways to use the domain name sys...
TCP - UDP Protocol Analysis

TCP Header Anaylsis - Section 2: TCP Sequence &...

This page will closely examine the Sequence and Acknowledgement numbers. The very purpose of their existence is related directly to the fact that t...
TCP - UDP Protocol Analysis

TCP Header Anaylsis - Section 5: TCP Window Siz...

Our fifth section contains some very interesting fields that are used by the TCP transport protocol. We see how TCP helps control how much data is ...
Supernetting & CIDR

What is Supernetting (Route Summarization) & Ho...

Supernetting is the opposite of of subnetting, and is also known as route aggregation or CIDR (Classless Inter-Domain Routing). Supernetting is a t...

STP/ICMP Protocols:

ICMP Protocol

ICMP Protocol - Part 4: Destination Unreachable...

The 'ICMP Destination unreachable' message is quite interesting, because it doesn't actually contain one message, but infact six! This means that t...
ICMP Protocol

ICMP Protocol - Part 6: Redirect Messages

The ICMP - Redirect Message is always sent from a gateway to the host and the example below will illustrate when this is used. Putting it simply (...
ICMP Protocol

ICMP Protocol - Part 2: Echo / Echo Reply (Ping...

As mentioned in the previous page, an Echo is simply what we networking engineers call a 'ping'. The Echo Reply is, as most would guess,  the ...
Spanning Tree Protocol (STP)

Spanning Tree Protocol – Part 2: Rapid STP Port...

Spanning Tree Protocol, Rapid STP port costs and port states are an essential part of the STP algorithm that affect how STP decides to forward or b...

Your IP address:

18.222.163.31

All-in-one protection for Microsoft 365

All-in-one protection for Microsoft 365

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Follow Firewall.cx

Network and Server Monitoring

Network and Server Monitoring

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Bandwidth Monitor

Free PatchManager

Free PatchManager

EventLog Analyzer

ManageEngine Eventlog Analyzer

Firewall Analyzer

zoho firewall analyzer

Security Podcast

Hornet-Security-The-Swarm-Podcast


VLAN Networks

VTP Introduction & Modes

The invention of VLANs was very much welcomed by all engineers and administrators, allowing them to extend, redesign and segment their existing network ...
VLAN Networks

VLANs - Access & Trunk Links

If you've read our previous article The VLAN Concept - Introduction to VLANs  then you should feel comfortable with terms such as 'VLAN', 'Sta...
VLAN Networks

The VLAN Concept - Introduction to VLANs

We hear about them everywhere, vendors around the world are constantly trying to push them into every type of network and as a result, the Local Area Ne...
VLAN Networks

VTP Protocol - In-Depth Analysis

The previous article introduced the VTP protocol, we examined how it can be used within a network, to help manage VLANs and ease the administrative over...

Routing

Distance Vector Routing Protocols

Distance Vector routing protocols use frequent broadcasts (255.255.255.255 or FF:FF:FF:FF) of their entire routing table every 30 sec. on all their inte...
Routing

Interior Gateway Protocol - IGRP

IGRP (Interior Gateway Routing Protocol) is a Cisco proprietary distance-vector routing protocol used in enterprise networks to exchange routing informa...
Routing

Link State Routing Protocols

Link State routing protocols do not view networks in terms of adjacent routers and hop counts, but they build a comprehensive view of the overall networ...
Routing

Enhanced Interior Gateway Routing Protocol - EIGRP

Enhanced Interior Gateway Routing Protocol (EIGRP), similar to IGRP, is a Cisco proprietary routing protocol that is used to exchange routing informatio...

Network Address Translation - NAT

Dynamic NAT - Part 1

Dynamic NAT is the second NAT mode we're going to talk about. Dynamic NAT, like Static NAT, is not that common in smaller networks but you'll find it us...
Network Address Translation - NAT

Dynamic NAT - Part 2

Our previous article, Dynamic NAT - Part 1, covered the basic idea of Dynamic Network Address Translation. We are now going to take a closer look at the...
Network Address Translation - NAT

The Network Address Translation Table

After that simple and informative introduction to the NAT concept, it's time to find out more about how it works and this is where the NAT table comes i...
Network Address Translation - NAT

Network Address Translation (NAT) Overload - Part 2

In our previous article, Network Address Translation (NAT) Overload - Part 1, we explained what NAT Overload is and how it works. This page deals with t...