Articles
To read the articles in this section, simply click on the article title or read button on the far right (if visible).
Use the below filters to customise the number of articles displayed or search for specific title topics/keywords.
| Articles | |
|---|---|
| Read | |
| Read | |
| Read | |
| Read | |
| Read | |
|
Articles:
Network Switches & Bridges
| Read |
|
Articles:
Hubs & Repeaters
| Read |
|
Articles:
Securing Your Home Network
| Read |
|
Articles:
DoS & DDoS Attacks
| Read |
| Read | |
|
Articles:
Firewall Topologies
| Read |
|
Articles:
Controlling Broadcasts and Multicasts
| Read |
|
Articles:
Network Broadcast
| Read |
| Read | |
| Read | |
|
Articles:
Media Access Control - MAC Addresses
| Read |
|
Articles:
Network Data Transmission
| Read |
|
Articles:
LAN Network Topologies
| Read |
|
Articles:
Introduction To Networking
| Read |
Suggested Articles:
Network Fundamentals
Power over Ethernet - Understanding PoE Technolog...
Power over Ethernet (PoE) was invented by PowerDsine back in 1997 and the first power injector (Midspan) was installed in 1998! Many manufacturespart...
Network Cabling
10Base-T/2/5/F/35 - Ethernet
The 10Base-T UTP Ethernet and 10Base-2 Coax Ethernet were very popular in the early to mid 1990's when 100 Mbps network cards and hubs/switches were...
Network Address Translation - NAT
The Network Address Translation Table
After that simple and informative introduction to the NAT concept, it's time to find out more about how it works and this is where the NAT table come...
ICMP Protocol
ICMP Protocol - Part 6: Redirect Messages
The ICMP - Redirect Message is always sent from a gateway to the host and the example below will illustrate when this is used.
Putting it simply (be...
Featured Subcategories:
Netflow Articles:
Complete Guide to Netflow: How Netflow & its Comp...
This article will cover the basics of Netflow, including its use cases, Netflow supported devices, Netflow history, and variants. We’ll also dive int...
NetFlow Analyzer: Free Download, Step-by-Step Ins...
In our previous article we explained how a Netflow Analyzer can help you gain visibility into your user traffic, application traffic and data flows w...
Netflow vs SNMP. Two Different Approaches to Netw...
SNMP (Simple Network Management Protocol) and Netflow are both popular protocols with admins, prized for their ability to give visibility over the ne...
Netflow: Monitor Bandwidth & Network Utilization...
Monitoring network traffic & bandwidth usage via Netflow is mandatory for any type and size network. Gaining visibility into user traffic, applic...
All-in-one protection for Microsoft 365
FREE Hyper-V & VMware Backup
Enterprise-Class Cloud & Network Monitoring
Wi-Fi Key Generator
Network and Server Monitoring
Follow Firewall.cx
Cisco Password Crack
Decrypt Cisco Type-7 Passwords on the fly!
Bandwidth Monitor
Free PatchManager
Security Podcast
Firewall Analyzer
VLAN Networks
VLANs - Access & Trunk Links
If you've read our previous article The VLAN Concept - Introduction to VLANs then you should feel comfortable with terms such as 'VLAN', 'Stati...
VLAN Networks
VLAN Tagging - Understanding VLANs Ethernet Frames
We mentioned that Trunk Links are designed to pass frames (packets) from all VLANs, allowing us to connect multiple switches together and independently co...
VLAN Networks
Dynamic VLANs
Dynamic VLANs were introduced to grant the flexibility and complexity(!) that Static VLANs did not provide. Dynamic VLANs are quite rare because of their...
VLAN Networks
The VLAN Concept - Introduction to VLANs
We hear about them everywhere, vendors around the world are constantly trying to push them into every type of network and as a result, the Local Area Netw...
Routing
The IP Routing Process - Step-by-Step Analysis
We are going to analyse what happens when routing occurs on a network (IP routing process). When I was new to the networking area, I thought that all you...
Routing
Routing Information Protocol - RIP
Routing Information Protocol (RIP) is a distance-vector routing protocol that is commonly used in small to medium-sized networks. It is one of the o...
Routing
OSPF - Part 4: OSPF Neighbor States – OSPF Neighbor Fo...
This is the third article of our OSPF series which analyzes the different OSPF States routers go through during the OSPF discovery and neighbor forming pr...
Routing
Distance Vector Routing Protocols
Distance Vector routing protocols use frequent broadcasts (255.255.255.255 or FF:FF:FF:FF) of their entire routing table every 30 sec. on all their interf...
Cisco Routers
Cisco Router PPP Multilink Setup and Configuration
This article provides an in-depth explanation of PPP Multilink and shows how to configure a Cisco router to use PPP Multilink between two serial interface...
Virtualization & VM Backup
How to Fix VMware ESXi Virtual Machine 'Invalid Status'
In this article, we'll show you how to deal with VMs which are reported to have an Invalid Status as shown in the screenshot below. This is a common...
Windows Servers
How to Install Desktop Icons (Computer, User’s Files...
One of the first things IT Administrators and IT Managers notice after a fresh installation of Windows 2012 Server is that there are no Desktop Icons apar...
Network Protocol Analyzers
Improve Network Analysis Efficiency with Colasoft's Ca...
Troubleshooting network problems can be a very difficult and challenging task. While most IT engineers use a network analyzer to help solve network proble...