
Notes – Types of VPN
PPTP
This is the most common and widely used VPN protocol. They enable authorized remote users to connect to the VPN network using their existing Internet connection and then log on to the VPN using password authentication. It also doesn’t provide encryption and it relies on PPP protocol to do this.

How-to change SSH port number in RHEL-7
SSH is a networking protocol used for accessing the CLI(shell) remotely with applications. In RHEL7, ssh will be by default running as a daemon service called sshd in port 22. In this blog i want to show you how to secure the ports of SSH by changing it. Read More

Notes – Active Directory | Domain | Domain Controller
Active Directory It is a Microsoft based service which provides Centralized Database for the domain. The database is called NTDS. Domain A Collection of Users, Computers, Groups, Servers and other network resource use common NTDS Database in an organization. This organization is called as Domain. Domain Controller A computer running with Active Directory Services that Read More

Backdoor in BGP
This article help you to understand how Backdoor option works in BGP. Generally, Backdoor is a term which technically describes – Bypassing security mechanism to access a Resources. But in BGP it refers to a different thing. Before understanding the BGP Backdoor, We need to understand some Routing Concept and Protocols. BGP is a routing protocol Read More
Difference Between Object Based NAT and Table Based NAT in Checkpoint
This article discusses about the difference between the 2 type of NAT which can be configured in the checkpoint firewall. NAT is a idea of translating IP address in the IP packet and mainly used to provide communication between Private network to Public network. This NAT can be configured in so many devices i.e. router, Read More

Managing the Check Point Firewall Rule Base
These are the fields that manage the rules for the Firewall security policy. No. : Rule number in the Firewall Rule Base. Implied rules do not have a number. Hits : Number of connections that match this rule. Name : Name that the system administrator gives this rule. Source Network : Object that starts the Read More
Virtual Machine Migration in Hyper-V
Hyper-V role migration involves moving the virtual machines, virtual networks, and all the associated settings from one physical computer to another physical computer in the enterprise. The process supports moving from a server running Hyper-V in Windows Server 2012 to a server running Hyper-V in Windows Server 2012 R2. The Hyper-V role does not depend on any other roles. Read More
DHCP Scope Spliting
This step-by-step guide contains an introduction to using DHCP with a split scope on a secondary server, with delay, and instructions for setting up a test lab using two DHCP servers and one DHCP client. Requirements of DHCP Scope Splitting. Read More

Private VLAN in Cisco
To divide broadcast domain we know there is a concept called VLAN. But if we are using Private VLAN we can isolate each ports connected to users in the same VLAN and still they can communicate to there up-link. Read More
Calendar
M | T | W | T | F | S | S |
---|---|---|---|---|---|---|
1 | 2 | 3 | ||||
4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 | 16 | 17 |
18 | 19 | 20 | 21 | 22 | 23 | 24 |
25 | 26 | 27 | 28 | 29 | 30 | 31 |