Tag Archives: acl

Network Access Attacks Explained with Examples.

What Are Network Access Attacks? Technology is forever evolving, and so is hacking! It might come as a surprise to many that, as one wakes up in the morning and prepares for work, gets to the office, and spends nine to twelve hours working; the same way a professional hacker spends all day modifying hacking techniques and looking… Read More »

Network Security with Cisco Routers.

How to Secure Your Network with Cisco Routers Before we look at how to secure Cisco routers, let’s briefly summarise the role routers play in network security The Role of Routers in Network Security As you must know, routers are used for forwarding traffic between different networks based on Layer 3 IP addresses and provide access to network… Read More »

Point-to-Point Protocol -PPP Explained with Examples.

What is PPP? A point-to-point connection is the most common type of WAN connection. PPP connections are used to connect LANs to service provider WANs and to connect LAN segments within an organization network. A LAN-to-WAN point-to-point connection is also referred to as a serial connection or leased-line connection because the lines are leased from a carrier (usually a telephone company)… Read More »

Configuring Extended ACLs Examples.

What Is Extended ACLs? Extended Access Control Lists (ACLs) are an advanced feature used in network devices like Cisco routers and switches to provide a stricter level of control over network traffic than standard ACLs. While standard ACLs filter traffic based solely on the source IP address, extended ACLs can filter based on multiple criteria, including: Source and… Read More »