In this blog, we talk about the general idea about using and IDS or IPS. let’s recall that IDS/IPS stands for intrusion detection and prevention systems. We give examples of implementations of v...
Introduction Dans cet article nous discutons de la fonction de base d’un WAF ou pare-feu d’applications web. Comme son nom l’indique il s’agit de sécuriser l’application, plus précisemment l’acc...
Dans cet article, nous essayons d’automatiser le traitement de configurations de routeurs dans un classeur Excel. Introduction Comment récupérer une certaine information d’un fichier de co...
Let’s put into play AS-Override feature in BGP: see when it applies and how it works. Introduction First, AS-Override feature applies to sites that have the same AS number but are linked by anot...
TPC stands for Transmit Power Control. It’s a one of Cisco RRM, Radio Resources Management, techniques that are aimed at tackling interference, cross and co-channel, in Wlan networks. RRM: TPC, C...
In this post, we’ll discuss the motivation and a basic operation of an MPLS network. In the first part, we’ll introduce this protocol and our setup (using GNS3) that put it into play. We&#...






