Routing – Page 4 – POFTUT

Category: Routing

0

Introduction To Pfsense Router and Its Features

Checkpoint, Palo Alto, Cisco ACS and others, all of them are enterprise, popular and good firewalls. But all of them requires some price to pay. Are there any free alternative to these enterprise firewalls? Yes there are a lot but most of them is not a competitor for them. Pfsense is the most advanced, powerful, popular alternative to these firewalls. Pfsense is not too much advanced like them but provides...

1

Linux Ip Command With Examples- Network Management

Linux network stack provides a lot of network related features like a commercial network router or switch. There are different tools and ways to manage these advanced features. In this tutorial we will look ip tool set which is new generation tool designed to manage Linux network configuration. Show IP Address IP address is the number used in the network to access a host.

OR

As we see same command...

1

ifconfig Command – Linux Network Management With Examples

ifconfig command is very old and popular tool used to manage Linux, Unix, Bsd systems network. Current this command alternative is IP tools commands but ifconfig popularity remains. Ifconfig command can create interface, network address, link or interface up , link or interface down etc. We will look in this tutorial popular features and usage examples of Linux ifconfig command. View All Network Configuration Generally the first step after connecting...

0

What is Network Address Translation (NAT)?

In corporate networks or internet works on dominantly on IP protocol. IP protocols have two versions. Most popular default one is IPv4 and other next generation by not so widespread version is IPv6. IPv6 have a lot of advantages against IPv4 but as you know changing and infrastructure through world wide is not so easy job. Now our question is what is Network Address Translation simply NAT. NAT Example In...

1

Compare TCP vs UDP Protocols , Differences and Similarities

Networks are used to transmit data over the world. There is a lot of network protocols in use. But most known and used protocols are IP,TCP,UDP. IP lives different flat but TCP and UDP tries to live same flat. So they operate same network layer but what is different between UDP and TCP. Why should I use TCP or not use? Same questions can be asked for UDP too. In...

0

“No Route To Host” Error And Solution

While trying to ping or connect a remote host I can an error “no route to host”. How can I debug this error and solve it? As we know IP networks are constructed hop by hop which means there are different intermediate routers transmit packets between two remote hosts. These routers decides the route to the destination according to their routing tables. If destination route do not exists in the...

0

How To Get Mac Addresses Of Hosts With Nmap?

Nmap is very useful tool. I is used by penetration testers mainly but from operation perspective it is used by system administrators too. Nmap have a lot of different features. Mac related feature can be used to get mac addressees of the hosts in the same network segment. I can be used to get remote systems mac addresses but snmp should be enabled in remote systems. Get Mac Address Of...

0

How To Install Gns3 To Fedora?

Gns3 very useful tool to simulate real networks and systems. In the first days of its Gns3 was simple Cisco IOS image emulator. But recent years its development has gained momentum. This made Gns3 a multi platform, flexible real world simulator. Gns3 supports systems like Cisco, Juniper, Palo Alto, Pfsense, Docker etc. In this tutorial we will look how to install Gns3 to the Fedora 64 bit. Get Gns3 Installation...

0

How Configure Cisco For Logging?

Hi, collecting logs are important. In my daily job I am working with logs about a lot of systems like WMware , Application ,Linux,windows,Cisco ,checkpoint, pfSense. Logs provides info about the system, application etc. Security incident management systems heavily rely on logs. Example Log Logs consist of date system name and event detail like

Here Aug  1 05:39:30.992 is date info, %LINK-3-UPDOWN is subsystem info which says the log is...

0

Introduction To Squid

Hi today we will look most famous proxy in the world. Yes you guest it right it is squid. Proxy is an intermediate system that manages communication between two systems. In web applications http proxy is mostly used type. The client makes request to the proxy and then proxy makes the request to the server behalf of the client. So we may think that why we need intermediary system for...

Enjoy this blog? Please spread the word :)