Contact Firewall.cx
Articles That Might Interest:
VLAN Networks
Dynamic VLANs
Dynamic VLANs were introduced to grant the flexibility and complexity(!) that Static VLANs did not provide. Dynamic VLANs are quite rare because of their requirements and initial administrative overh…
Network Fundamentals
LAN Network Topologies
Network topologies can take a bit of time to understand when you're all new to this kind of cool stuff, but it's very important to fully understand them as they are key elements to understanding and…
Cisco Routers
Cisco GRE and IPSec - GRE over IPSec - Selecting…
GRE Tunnels are very common amongst VPN implementations thanks to their simplicity and ease of configuration. With broadcasting and multicasting support, as opposed to pure IPSec VPNs, they tend to b…
Cisco Routers
How To Secure Your Cisco Router Using Cisco AutoS…
In today’s complex network environments securing your network routers can be a daunting task, especially when there are so many CLI commands and parameters with different security implications for yo…
SASE & SD-WAN Networks
How To Secure Your SD-WAN. Comparing DIY, Managed…
With so much enterprise network traffic now destined for the cloud, backhauling traffic across an expensive MPLS connection to a data center to apply security policy no longer makes sense. Software-d…
VLAN Networks
VTP Introduction & Modes
The invention of VLANs was very much welcomed by all engineers and administrators, allowing them to extend, redesign and segment their existing network with minimal costs, while at the same time maki…
Network Protocols
IPSec - Internet Protocol Security
IPSec is one of the new buzz words these days in the networking security area. It's becoming very popular and also a standard in most operating systems. Windows 2000 fully supports IPSec and that's m…
Windows Workstations (XP, 7, 8, 10, 11)
The Importance of Windows Hosts File - How to Use…
This article explains how the Windows operating system makes use of the popular Host file, where it is located for various operating systems, how it can be used to manipulate DNS lookups and redirect…
Network Fundamentals
Network Switches & Bridges
Network Switches are the evolution of Hubs and Repeaters, and enable the creation of networks by connecting multiple devices together. They are critical components in computer networking and are used…
Linux - Unix
Implementing Virtual Servers and Load Balancing C…
What is Server Virtualization?
Server virtualization is the process of apportioning a physical server into several smaller virtual servers. During server virtualization, the resources of the ser…
SASE & SD-WAN Networks
SD-WAN is the Emerging, Evolving Solution for the…
A lot has changed in how people work during the past twenty years. Co-working spaces, mobility, and the cloud now are common. Businesses are spread out and branch offices are empowered.
This new fun…
Web Application Vulnerability Scanners
How to Test for SQL Injection Attacks & Vulnerabi…
SQL injection vulnerabilities have held the first spot on the OWASP Top 10 list for quite some time. This is due to the fact that they are both still widespread and can lead to very serious consequen…
Wi-Fi Key Generator
Follow Firewall.cx
Cisco Password Crack
Decrypt Cisco Type-7 Passwords on the fly!







