Contact Firewall.cx
Articles That Might Interest:
Subnetting
IP Subnetting - Part 1: The Basic Concepts
When we subnet a network, we basically split it into smaller networks. For example, when a set of IP Addresses is given to a company, e.g 254 they might want to "break" (the correct term is "partitio…
Cisco Switches
Spanning Tree BPDU Guard and Errdisable Interface…
Running Spanning Tree Protocol (STP) in a large network environment can be a challenging task especially when features/enhancements such as BPDU Filter and BPDU Guard need to be configured to help ST…
Windows Servers
Easy, Fast & Reliable Hyper-V & VMware Backup wit…
As more companies around the world adopt the virtualization technology to increase efficiency and productivity, Microsoft’s Hyper-V virtualization platform is continuously gaining ground in the globa…
Cisco Switches
Discover Features & Capabilities - Cisco Catalyst…
There’s a new switch around the block and its name is Catalyst 3850 – Cisco’s latest addition to its successful Catalyst series switches. The Cisco Catalyst 3850 is no ordinary switch – it’s fully st…
VLAN Networks
Dynamic VLANs
Dynamic VLANs were introduced to grant the flexibility and complexity(!) that Static VLANs did not provide. Dynamic VLANs are quite rare because of their requirements and initial administrative overh…
Routing
OSPF - Part 6: OSPF LSA Types - Purpose and Funct…
Our previous article explained the purpose of Link State Update (LSU) packets and examined the Link State Advertisement (LSA) information contained within LSU packets. We also saw the most common LSA…
Network Protocol Analyzers
Detect Brute-Force Attacks with nChronos Network…
Brute-force attacks are commonly known attack methods by which hackers try to get access to restricted accounts and data using an exhaustive list/database of usernames and passwords. Brute-force atta…
Network Protocols
Trivial File Transport Protocol - TFTP
TFTP is a file transport protocol and its name suggests it's something close to the FTP protocol (File Transfer Protocol), which is true .. to a degree. TFTP isn't very popular because it's not reall…
Cisco Services & Technologies
Troubleshooting Cisco VPN Client Windows 7 - How…
This article shows how to fix the Cisco VPN Reason 442: Failed to enable Virtual Adapter error on the Windows 7 (32bit or 64bit) operating system. If you are a Windows 7 user, it's most likely you've…
Windows Workstations (XP, 7, 8, 10, 11)
How To Change & Configure An IP Address or Set to…
Not many users are aware that Windows 7 provides more than one way to configure a workstation’s network adaptor IP address or force it to obtain an IP address from a DHCP server. While the most popul…
Virtualization & VM Backup
The Backup Bible. A Free Complete Guide to Disast…
The Free Backup Bible Complete Edition written by backup expert and Microsoft MVP Eric Siron, is comprised of 200+ pages of actionable content divided into 3 core parts, including 11 customizable tem…
OpManager - Network Monitoring & Management
Preparing and Managing your Network for the Remot…
Times have changed now and HOME is the new office. Now, everyone works at their comfort and in fact online all throught the day and night. This mandates the IT infrastructure to be up and running 24/…
Wi-Fi Key Generator
Follow Firewall.cx
Cisco Password Crack
Decrypt Cisco Type-7 Passwords on the fly!







