Palo Alto: Top Picks
Palo Alto Networks
Complete Guide: Configuring IPSec VPN between Pal…
This article will show you how to configure an IPSec VPN tunnel between a Palo Alto firewall (all PANOS versions) and Meraki MX security appliance. O…
Palo Alto Networks
Palo Alto Firewall Application-based Policy Enfor…
Our previous article examined the benefits of Palo Alto Networks Firewall Single Pass Parallel Processing (SP3) architecture and how its combine with…
Palo Alto Networks
How to Manually Download, Import & Install PAN-OS…
This article provides comprehensive guidance on the manual processes involved in downloading, uploading, and installing (import) any PAN-OS version o…
Palo Alto Networks
How to Register a Palo Alto Firewall and Activate…
This article explains how to register and activate your Palo Alto Firewall Appliance to obtain technical support, RMA hardware replacement, product u…
Featured Subcategories:
SD-WAN & SASE Articles:
SASE & SD-WAN Networks
Complete Guide to SD-WAN. Technology Benefits, SD…
SD-WAN is the answer for enterprises and organizations seeking to consolidate network functions and services while at the same time simplify their WA…
SASE & SD-WAN Networks
SD-WAN is the Emerging, Evolving Solution for the…
A lot has changed in how people work during the past twenty years. Co-working spaces, mobility, and the cloud now are common. Businesses are spread o…
SASE & SD-WAN Networks
SASE and VPNs: Reconsidering your Mobile Remote A…
The Virtual Private Network (VPN) has become the go to security solution for keeping communications between networks and endpoints secure. After all…
SASE & SD-WAN Networks
Converged SASE Backbone – How Leading SASE Provid…
Global connectivity is top of mind for many IT teams at organizations of all sizes. We are currently in the middle of a dramatic shift in business an…
F5 Networks:
Network Protocol & Firewall Analyzers:
Network Protocol Analyzers
How to Detect P2P (peer-to-peer) File Sharing, To…
Peer-to-Peer file sharing traffic has become a very large problem for many organizations as users engage in illegal (most times) file sharing process…
ManageEngine Firewall Analyzer
Master Your Firewall: 6 Expert-Backed Steps to Bo…
In today’s evolving threat landscape, firewall audits are more than just a best practice—they're a critical line of defense. Regular audits ensure yo…
Network Protocol Analyzers
Advanced Network Protocol Analyzer Review: Colaso…
Firewall.cx has covered Colasoft Capsa several times in the past, but its constant improvements make it well worth revisiting. Since the last review…
Network Protocol Analyzers
How to Perform TCP SYN Flood DoS Attack & Detect…
This article will help you understand TCP SYN Flood Attacks, show how to perform a SYN Flood Attack (DoS attack) using Kali Linux & hping3 and co…
Wi-Fi Key Generator
Follow Firewall.cx
Cisco Password Crack
Decrypt Cisco Type-7 Passwords on the fly!
Web Vulnerability Application Scanners & VPN Services
Web Application Vulnerability Scanners
Everything You Need to Know About SQL Injection Attack…
SQL Injection Attacks are one of the most popular attacks against web servers, websites and web applications. A fairly popular website can expect to recei…
Web Application Vulnerability Scanners
Acunetix v13 Release Introduces Groundbreaking Innovat…
The newest release of the Acunetix Web Vulnerability Scanner further improves performance and premieres best-of-breed technologies.
Acunetix, the pioneer…
Web Application Vulnerability Scanners
Web Application Vulnerabilities – Benefits of Automate…
This article examines the differences between logical and technical web application vulnerabilities which tends to be a very confusing topic especially fo…
Web Application Vulnerability Scanners
Acunetix Enterprise: Find Website - Web Application Vu…
Security researchers disagree about the percentage of vulnerable websites, but most concur that it’s way too high. Despite their long history, attackers c…







