Skip to main content

Articles

To read the articles in this section, simply click on the article title or read button on the far right (if visible).

Use the below filters to customise the number of articles displayed or search for specific title topics/keywords.

Suggested Articles:

IP Protocol

IP Protocol - Part 2: The Internet Protocol (IP...

This article examines the Internet Protocol (IP) and its position within the OSI Model. We take a look at the IP Header and all fields contained wi...
Network Cabling

Fibre Optic Cables - Single-Mode Multi-Mode - A...

In this article, we'll talk about Fiber optic cables and how it has changed the design and implementation of network infrastructures, providing hig...
TCP - UDP Protocol Analysis

Transmission Control Protocol - Part 3: The TCP...

This article shows the TCP Header and Segment. We explain where the TCP Header and Segment are located in an Ethernet frame and also briefly view t...
Network Cabling

LPT Ports & Modes (SPP, EPP, ECP) - Parallel Di...

The Parallel Direct Connection is the second solution covering the transfer of data from one computer to another. The cable required is slightly mo...

Featured Subcategories:

Netflow Articles:

Netflow vs SNMP. Two Different Approaches to Ne...

SNMP (Simple Network Management Protocol) and Netflow are both popular protocols with admins, prized for their ability to give visibility over the ...

Netflow: Monitor Bandwidth & Network Utilizatio...

Monitoring network traffic & bandwidth usage via Netflow is mandatory for any type and size network. Gaining visibility into user traffic, appl...

Complete Guide to Netflow: How Netflow & its Co...

This article will cover the basics of Netflow, including its use cases, Netflow supported devices, Netflow history, and variants. We’ll also dive i...

NetFlow Analyzer: Free Download, Step-by-Step I...

In our previous article we explained how a Netflow Analyzer can help you gain visibility into your user traffic, application traffic and data flows...

Your IP address:

18.217.220.114

All-in-one protection for Microsoft 365

All-in-one protection for Microsoft 365

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Follow Firewall.cx

Network and Server Monitoring

Network and Server Monitoring

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Bandwidth Monitor

Free PatchManager

Free PatchManager

EventLog Analyzer

ManageEngine Eventlog Analyzer

Firewall Analyzer

zoho firewall analyzer

Security Podcast

Hornet-Security-The-Swarm-Podcast


VLAN Networks

The VLAN Concept - Introduction to VLANs

We hear about them everywhere, vendors around the world are constantly trying to push them into every type of network and as a result, the Local Area Ne...
VLAN Networks

Dynamic VLANs

Dynamic VLANs were introduced to grant the flexibility and complexity(!) that Static VLANs did not provide. Dynamic VLANs are quite rare because of thei...
VLAN Networks

VTP Protocol - In-Depth Analysis

The previous article introduced the VTP protocol, we examined how it can be used within a network, to help manage VLANs and ease the administrative over...
VLAN Networks

Static VLANs

VLANs are usually created by the network administrator, assigning each port of every switch to a VLAN. Depending on the network infrastructure and secur...

Routing

OSPF - Part 3: OSPF Adjacency & Neighbor Forming Pro...

This is the thrid article of our 6-part OSPF series (see below) that describes how OSPF routers perform neighbor relationship and adjacency. We’ll exami...
Routing

The IP Routing Process - Step-by-Step Analysis

We are going to analyse what happens when routing occurs on a network (IP routing process). When I was new to the networking area, I thought that all yo...
Routing

OSPF - Part 4: OSPF Neighbor States – OSPF Neighbor ...

This is the third article of our OSPF series which analyzes the different OSPF States routers go through during the OSPF discovery and neighbor forming ...
Routing

OSPF - Part 1: Introduction, OSPF Packet Structure, ...

Open Shortest Path First (OSPF) is a popular routing protocol developed for Internet Protocol (IP) networks by the Interior Gateway Protocol (IGP) worki...

Cisco Routers

Configuring Static Route Tracking using IP SLA (Basic)

In today's network environment, redundancy is one of the most important aspects, whether its on the LAN side or on the WAN side. In this topic we will b...
Windows Servers

How to Enable & Configure Shadow Copy for Shared Fol...

When you shadow copy a disk volume, you are actually generating a snapshot of the changes made to the folders and files within the disk volume at a cert...
Windows Servers

Configuring Local Group Policy for Windows 2003

Windows 2003 Group Policies allow the administrators to efficiently manage a group of people accessing a resource. Group policies can be used to control...
SASE & SD-WAN Networks

The Most Common Worst Networking Practices and How T...

In the rush to keep pace with the many challenges facing today’s organizations, all too often networking teams end up adopting practices and processes t...