in this blog we talk about the general idea about using and IDS or IPS. let’s recall that IDS/IPS stands for intrusion detection and prevention systems. We give examples of implementations of ve...
Introduction Dans cet article nous discutons de la fonction de base d’un WAF ou pare-feu d’applications web. Comme son nom l’indique il s’agit de sécuriser l’application, plus précisemment l’acc...
Comment récupérer une certaine information d’un fichier de configuration (routeur IOS de Cisco par exemple) et la mettre dans un fichier Excel en vue d’un traitement plus avancé. Ce traite...
Let’s put into play AS-Override feature in BGP: see when it applies and how it works. First, AS-Override feature applies to sites that have the same AS number but are linked by another different...
TPC stands for Transmit Power Control. It’s a one of Cisco RRM, Radio Resources Management, techniques that are aimed at tackling interference, cross and co-channel, in Wlan networks. RRM: TPC, C...
In this post we’ll discuss the motivation and a basic operation of an MPLS network. In the first part, we’ll introduce this protocol and our setup (using GNS3) that put it into play. We...