Author: Huzefa

Notes – Types of VPN


This is the most common and widely used VPN protocol. They enable authorized remote users to connect to the VPN network using their existing Internet connection and then log on to the VPN using password authentication. It also doesn’t provide encryption and it relies on PPP protocol to do this.  Read More

Notes – Active Directory | Domain | Domain Controller

Active Directory It is a Microsoft based service which provides Centralized Database for the domain. The database is called NTDS. Domain A Collection of Users, Computers, Groups, Servers  and other network resource use common NTDS Database in an organization. This organization is called as Domain. Domain Controller A computer running with Active Directory Services that Read More

Managing the Check Point Firewall Rule Base

These are the fields that manage the rules for the Firewall security policy. No.  : Rule number in the Firewall Rule Base. Implied rules do not have a number. Hits : Number of connections that match this rule. Name : Name that the system administrator gives this rule. Source Network : Object that starts the Read More

Virtual Machine Migration in Hyper-V

Hyper-V role migration involves moving the virtual machines, virtual networks, and all the associated settings from one physical computer to another physical computer in the enterprise. The process supports moving from a server running Hyper-V in Windows Server 2012 to a server running Hyper-V in Windows Server 2012 R2. The Hyper-V role does not depend on any other roles. Read More

DHCP Scope Spliting

This step-by-step guide contains an introduction to using DHCP with a split scope on a secondary server, with delay, and instructions for setting up a test lab using two DHCP servers and one DHCP client. Requirements of DHCP Scope Splitting. Read More