Category: Security
Network security consists of the provisions made in an underlying computer
network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access and consistent and continuous monitoring and measurement of its effectiveness (or lack) combined together.
How to configure time-based ACL on Cisco router
1. Create time period Cisco-Router# Cisco-router(config)# time-range WEB-time Cisco-router(config-time-range)# periodic Monday friday 8:00 to 17:00 Cisco-router(config-time-range)# periodic Saturday 8:00 to 12:00 2. Create ACL…
How to configure conditional ACL is called Lock & Key
This is a sample configuration for conditional ACL is often called Lock & Key. By the authenticating, router will allow traffic for certain time. Host…
How to allow Traceroute and TraceRT on Access-list(ACL)
Here is the sample configuration to allow traceroute(Unix or Network devices) and tracert(MS Windows) "TraceRoute" commands of Unix and Cisco devices send UDP packets, while…
Security Warning – Exposed WAN Link Identity by reverse lookup
If someone knows what is your IP address of WAN link, if someone knows what ISP you are currently using, if someone knows where your…
[Cisco] How to configure Dyanmic Access List with time-range
Tweet This daynamic access-list is not commonly used, but it is good to know. Below scenario indicated once a client get authrized by telnet login…
How to configure Pix 515 for connecting PDM
This is a quick guide for configuring Cisco PIX 515 which is discontinued model. Even though Cisco PIX 515 is kinds of old model, it…
How to configure Pix 515 for connecting PDM
This is a quick guide for configuring Cisco PIX 515 which is discontinued model. Even though Cisco PIX 515 is kinds of old model, it…
How to install free TACACS+ on Ubuntu
Tweet Here is the simple steps to install free TACACS+ application. 1. Download TACACS+ 2. Install Free TACACS+ on Ubuntu 3. Configure tac_plus.conf 4. Testing…
Modifying Huge ACL & prefix- list ?
Tweet Probably, there are multiple way to achieve your goal. Here is one of simple way that I knew and used in my work. (using…
How to setup FreeRADIUS server?
Tweet Here is a simple documentation how to setup FreeRADIUS server. It’s written by Korean. http://www.ibm.com/developerworks/kr/library/l-radius/
Preventing Security Attacks from all OSI 7 Layer
Tweet Let’s quickly look what kinds of Security Attacks on OSI 7 Layer. Layer 7. Application /6. Presentation/5. Session Layer – Virus, Warms, Tro-hourse, Buffer…
How to hide an access-list applied?
Tweet Sometime, you even don’t want to reply ICMP unreachable message response back to requester. It’s very simple. Here is how you do it. (Assume…
Recent Comments