Month: March 2012

IRC – Internet Relay Chat Protocol

Internet Relay Chat protocol is introduced in order to use for chat. Online users can perform synchronized text messaging with its help. In point of fact, users involved in chatting are required to install software at both receiver and sender sides that will perform the functions of decoding and putting on view the data by means of the IRC protocol, for example Pidgin.

IRC - Internet Relay Chat Protocol

| Continue Reading.. |

Firewall – Defending Networks

In network security today, a firewall may be a software or hardware that makes a barrier between our internal network and untrusted external network. You can look at the firewall as a set of related programs that enforce an access control policy between two or more networks.

firewallThe name “firewall” is very strange, it has been originally used to describe the segment that separated the engine compartment from the interior of an automobile. In the networking world firewall is the first line of defense and the technology that will allow us to segment the network in physically separate subnetworks.

| Continue Reading.. |

Secure the switch – best steps

switch security Cisco devices have many features that are good for something but they can be easily exploited. You must know that the Internet is full of people that want to exploit your network for different or no reasons. We will show you the best ways for thinking ahead and securing the layer 2 of the network – the switches. Let’s start…

| Continue Reading.. |

LDAP – Lightweight Directory Access Protocol

Lightweight Directory Access Protocol

The purpose of LDAP introduction was to supply a directory service offering protocol. That protocol is active on a layer, resting on top of the TCP/IP stack. Its mechanism is available for the connection, searching, and modification of the Internet directories. Actually, Lightweight Directory Access Protocol (a directory service) is consisted on the client-server representation. The main job of that protocol is to the facilitate right of entry to an accessible directory.

| Continue Reading.. |

PVLAN configuration

Private VLAN – PVLAN configuration needs to be started by defining any secondary VLANs that are needed for isolation. Secondary VLAN  can be isolated or community VLAN.

Switch(config)# vlan 4
Switch(config-vlan)# private-vlan community
Switch(config)# vlan 5
Switch(config-vlan)# private-vlan community
Switch(config)# vlan 6
Switch(config-vlan)# private-vlan isolated

private VLAN - PVLAN configure

| Continue Reading.. |