Skip to main content

Contact Firewall.cx

Articles That Might Interest:

Cisco Switches
Our previous article shows how to perform a password recovery on the Cisco Catalyst switches. This article will now explain how to disable or enable the Cisco password recovery service allowing netwo…
Network Fundamentals
Network Switches are the evolution of Hubs and Repeaters, and enable the creation of networks by connecting multiple devices together. They are critical components in computer networking and are used…
Network Fundamentals
Multicast is a communication method used in computer networking where data is sent from a single sender to a group of destination devices. In this method, the sender sends the data packet to a speci…
Linux - Unix
The db.192.168.0 zone data file is the second file we need to create and configure for our BIND DNS server. As outlined in the DNS-BIND Introduction, this file's purpose is to provide the IP Address…
Spanning Tree Protocol (STP)
One of the most used terms in network is LAN (Local Area Network). It’s a form of network that we encounter in our daily lives, at home, at work, study, and in various other areas of life. Unless wor…
Network Fundamentals
In today's world, securing your home network is more important than ever. With the increasing number of cyberattacks, data breaches, and online frauds, protecting your home network from potential thr…
OpManager - Network Monitoring & Management
As technology evolves, so do our networks. Today's sprawling network infrastructures are intricate ecosystems, demanding more from IT teams than ever before.  Configuration management, complianc…
Windows Servers
DNS is used for translating host names to IP addresses and the reverse, for both private and public networks (i.e.: the Internet). DNS does this by using records stored in its database. On the Intern…
Routing
Distance Vector, Link State RIP, IGRP, EIGRP, OSPF Routing protocols were created for routers. These protocols have been designed to allow the exchange of routing tables, or known networks, betwee…
Linux - Unix
This article covers the main TCP/IP network configuration files used by Linux to configure various network services of the system such as IP Address, Default Gateway, Name servers - DNS, hostname and…
Cisco Routers
Remote VPN access is an extremely popular service amongst Cisco routers and ASA Firewalls. The flexibility of having remote access to our corporate network and its resources literally from anywhere i…
Network Cabling
The 100Base-TX (sometimes referred to 100Base-T) cable was until 2010 perhaps the most popular cable around since it has actually replaced the older 10Base-T and 10Base-2 (Coaxial). The 100Base-TX ca…

Cybersecurity Framework Update

2026 Cybersecurity Essentials Framework Update

Enterprise-Class Cloud & Network Monitoring

Enterprise Class Cloud & Network Monitoring - Free Download

Bandwidth Monitor

Zoho Netflow Analyzer Free Download

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Network and Server Monitoring

Network and Server Monitoring

Follow Firewall.cx

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Free PatchManager

Free PatchManager

Firewall Analyzer

zoho firewall analyzer