Category Archives: IP Access Control Lists

QOS: Congestion Management Tools Explained.

QOS: Understanding QoS MARKING The term marking refers to a type of QoS tool that classifies packets based on their header contents and then marks the message by changing some bits in specific header fields. This means that the QoS tool changes one or more header fields, setting a value in the header. How QOS marking works… Traditionally,… Read More »

Quality Of Service – QOS – Explained with Example.

What Is QoS? Quality of Service (QoS) in networking refers to the management of network resources to ensure the best performance of specific types of data transmission. The primary goal of QoS is to provide priority, including dedicated bandwidth, controlled jitter and congestion, and improved loss situations. It’s used to guarantee a certain level of a network service’s… Read More »

Router-on-a-stick Inter-VLAN Routing Explained with Examples.

What is Router-on-a-stick Inter-VLAN Routing? Router-on-a-stick is a type of router configuration method in which a single physical interface manages traffic between multiple VLANs on a network. The router interface has to be configured to operate as a trunk link connected to a switch port (SW1) and enabled in trunk mode. The router receives VLAN-tagged traffic on the… Read More »

Network Access Attacks Explained with Examples.

What Are Network Access Attacks? Technology is forever evolving, and so is hacking! It might come as a surprise to many that, as one wakes up in the morning and prepares for work, gets to the office, and spends nine to twelve hours working; the same way a professional hacker spends all day modifying hacking techniques and looking… Read More »

Port Redirection Attack – Explained with Examples.

What is a Port Redirection Attack? A port redirection attack is another type of attack based on trust exploitation. The attacker uses a compromised host to gain access through a firewall that would otherwise be blocked. Port redirection attacks allow hackers to bypass security restrictions by redirecting network traffic through a compromised host. This technique is used to access network… Read More »