Skip to main content

Articles

To read the articles in this section, simply click on the article title or read button on the far right (if visible).

Use the below filters to customise the number of articles displayed or search for specific title topics/keywords.

Suggested Articles:

Supernetting & CIDR

What is Supernetting (Route Summarization) & Ho...

Supernetting is the opposite of of subnetting, and is also known as route aggregation or CIDR (Classless Inter-Domain Routing). Supernetting is a t...
Ethernet Protocol, CSMA/CD, Collisions

Propagation Delay

You may know that the minimum frame size in an Ethernet network is 64 bytes or 512 bits, including the 32 bit CRC. You may also know that the maxim...
Network Fundamentals

Multicast - Understand How IP Multicast Works

Multicast is a communication method used in computer networking where data is sent from a single sender to a group of destination devices. In this...
Network Protocols

File Transfer Protocol - FTP

File transfer is among the most frequently used TCP/IP applications and it accounts for a lot of the network traffic on the Internet. Various stand...

Featured Subcategories:

Netflow Articles:

NetFlow Analyzer: Free Download, Step-by-Step I...

In our previous article we explained how a Netflow Analyzer can help you gain visibility into your user traffic, application traffic and data flows...

Netflow vs SNMP. Two Different Approaches to Ne...

SNMP (Simple Network Management Protocol) and Netflow are both popular protocols with admins, prized for their ability to give visibility over the ...

Netflow: Monitor Bandwidth & Network Utilizatio...

Monitoring network traffic & bandwidth usage via Netflow is mandatory for any type and size network. Gaining visibility into user traffic, appl...

Complete Guide to Netflow: How Netflow & its Co...

This article will cover the basics of Netflow, including its use cases, Netflow supported devices, Netflow history, and variants. We’ll also dive i...

Your IP address:

3.146.152.99

All-in-one protection for Microsoft 365

All-in-one protection for Microsoft 365

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Follow Firewall.cx

Network and Server Monitoring

Network and Server Monitoring

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Bandwidth Monitor

Free PatchManager

Free PatchManager

EventLog Analyzer

ManageEngine Eventlog Analyzer

Firewall Analyzer

zoho firewall analyzer

Security Podcast

Hornet-Security-The-Swarm-Podcast


VLAN Networks

VTP Introduction & Modes

The invention of VLANs was very much welcomed by all engineers and administrators, allowing them to extend, redesign and segment their existing network ...
VLAN Networks

VLAN InterSwitch Link (ISL) Protocol Analysis

Deciding whether to use ISL or IEEE 802.1q to power your trunk links can be quite confusing if you cannot identify the advantages and disadvantages of e...
VLAN Networks

Comparing Traditional Flat & VLAN Networks

Designing and building a network is not a simple job. VLANs are no exception to this rule, in fact they require a more sophisticated approach because of...
VLAN Networks

The VLAN Concept - Introduction to VLANs

We hear about them everywhere, vendors around the world are constantly trying to push them into every type of network and as a result, the Local Area Ne...

Routing

Link State Routing Protocols

Link State routing protocols do not view networks in terms of adjacent routers and hop counts, but they build a comprehensive view of the overall networ...
Routing

OSPF - Part 4: OSPF Neighbor States – OSPF Neighbor ...

This is the third article of our OSPF series which analyzes the different OSPF States routers go through during the OSPF discovery and neighbor forming ...
Routing

Enhanced Interior Gateway Routing Protocol - EIGRP

Enhanced Interior Gateway Routing Protocol (EIGRP), similar to IGRP, is a Cisco proprietary routing protocol that is used to exchange routing informatio...
Routing

OSPF - Part 6: OSPF LSA Types - Purpose and Function...

Our previous article explained the purpose of Link State Update (LSU) packets and examined the Link State Advertisement (LSA) information contained with...

Windows Servers

Active Directory Tombstone Lifetime Modification

Tombstone is a container object that contains the deleted objects from Active Directory. Actually when an object is deleted from Active Directory, it is...
Cisco Routers

Cisco Router PPP Multilink Setup and Configuration

This article provides an in-depth explanation of PPP Multilink and shows how to configure a Cisco router to use PPP Multilink between two serial interfa...
Windows Servers

The Importance of a Comprehensive Backup Strategy fo...

People and companies usually adopt a backup strategy suited to the needs of their working environment. As such, there is no absolute right or wrong meth...
Cisco Routers

How To Configure ISDN Internet Dialup On A Cisco Router

Some time ago, when broadband and ADSL wasn't available, analog and digital (ISDN) modems were the only way to connect to the Internet. Even though toda...