What is Syslog? Syslog (System logging) is a Layer4 protocol for producing and sending log/event information from Cisco, Unix/Linux, and Windows Devices systems to a centralized log/event message collector called Syslog Server. Features of Syslog Below are some important features of Syslog: The purpose of Syslog is for logs/errors management Syslog belongs to Layer4 of OSI Model Syslog servers listen on UDP port 514 for messages Syslog is a client push model Syslog Logging Locations The following are the different locations Syslog messages can be sent to: Console line: This means that Syslog messages will be displayed Read More …
Blog
Syslog (System logging)
SPAN (Switch Port Analyzer)
What is SPAN? SPAN (Switch Port Analyzer) is a network protocol that collects and forwards switch traffic to the SPAN port for analysis. SPAN is also referred to as Port Mirroring or Port Monitoring. It can be enabled on both physical ports and VLANs. Attributes of SPAN (Switch Port Analyzer) The attributes of the Switch Port Analyzer are: All ports related to a given session (whether source or destination) must belong to the same VLAN. If you don’t specify any interface in the port monitor command then all other ports belonging to the same VLAN as the interface will Read More …
Cisco NetFlow
NetFlow is a network protocol designed by Cisco which is used for collecting IP traffic information and monitoring network flow. By analyzing NetFlow data, you can get a picture of network flow and volume. Traffic can be grouped and analyzed based on different criteria like interface, source IP, destination IP, IP protocol, source/destination TCP/UDP port and service type. Routers and switches that support NetFlow can collect IP traffic statistics as NetFlow records towards at least one NetFlow collector server that does the actual traffic analysis. Popular NetFlow Analyzer Software Popular NetFlow Analyzer Software Solutions are: SolarWinds NTA (NetFlow Traffic Read More …
Final Exam Cyber Security
Enter your email below & start this Final Exam Cyber Security.
OSPF (Open Shortest Path First)
What is OSPF? OSPF (Open Shortest Path First) is an open source dynamic routing protocol based on Link State Routing Algorithm for IP Networks. It has a Protocol Type/Class which is based on IP/Link-State. OSPF uses an Algorithm called SPF (Dijkstra) to determine the shortest path. It is an IGP (Interior Gateway Protocol) Type of protocol and it uses Cost (Bandwidth) as its metric value. OSPF has 5 no. of packet types and has an Admin Distance of 110. It has a Reference Bandwidth of 108 and has a defined Standard of IETF RFC2328 (OSPFv2), IETF RFC2740 (OSPFv3/IPv6) for OSPF Read More …
Static and Default Routing
Static and Default Routing are two types of routing in which the path selection is controlled manually by a network administrator. STATIC ROUTING “It is a type of fixed routing in which path selection and routing is controlled manually by a network admin”. Static routes have Admin Distance (AD) of 1. Path selection and routing is manually controlled by a network administrator in static routing. Static routes are always preferred over Dynamic routing protocols like OSPF/RIP/BGP. They consume less resources and less bandwidth intensive. Static Routes are not fault tolerant (paths are always fixed). Therefore, they are not practical for Read More …
How to Stay Anonymous (Cyber Security Quiz)
Test your Cyber Security knowledge and skills by practicing this free online quiz on How to Stay Anonymous Quiz. Protecting the organization & its assets from Cybersecurity attacks is critical these days. This how to stay anonymous quiz & related lectures will help you to improve your knowledge & skills on this topic. You might also be interested in our free Online Quizzes on all IT topics including Cisco CCNA, Cyber Security, Python Programming, Linux & Ethical Hacking: Free Online Quizzes (Best for Cisco CCNA, Huawei HCNA, N+) You can also view free study notes (Cheat Read More …
Crunch Wordlist generator (Kali Linux)
Crunch Wordlist generator is a tool which comes by default with Kali Linux. It can create a wordlist based on criteria you specify. The output from crunch can be sent to the screen, file, or to another program. The required parameters are: min-len The minimum length string you want crunch to start at. This option is required even for parameters that won’t use the value. max-len The maximum length string you want crunch to end at. This option is required even for parameters that won’t use the value. charset string You may specify character sets for crunch to use on Read More …
Kali Linux & its Tools (Cyber Security Quiz)
Protecting the organization & its assets from Cybersecurity attacks is critical these days. This kali linux tools quiz & related lecture will help you to improve your knowledge & skills on this topic. You might also be interested in our free Online Quizzes on all IT topics including Cisco CCNA, Cyber Security, Python Programming, Linux & Ethical Hacking: Free Online Quizzes (Best for Cisco CCNA, Huawei HCNA, N+) You can also view free study notes (Cheat sheets) for long term memory: Networkwalks Summary Cheatsheets Follow our Facebook Page & YouTube Channel for more updated Cheatsheets & Quizzes after Read More …
Clearing Logs (Cyber Security Quiz)
Test your Cyber Security knowledge and skills by practicing this free online quiz on Clearing Logs Quiz. Protecting the organization & its assets from Cybersecurity attacks is critical these days. This Clearing Logs quiz & related lecture will help you to improve your knowledge & skills on this topic. You might also be interested in our free Online Quizzes on all IT topics including Cisco CCNA, Cyber Security, Python Programming, Linux & Ethical Hacking: Free Online Quizzes (Best for Cisco CCNA, Huawei HCNA, N+) You can also view free study notes (Cheat sheets) for long term memory: Networkwalks Summary Read More …