Tag Archives: security

PPP – Challenge Handshake Authentication Protocol Explained with Examples.

What Is Challenge Handshake Authentication Protocol (CHAP)? Challenge Handshake Authentication Protocol (CHAP) is a protocol used in network security for the validation of a user’s identity.It is primarily used to authenticate a user or a network host to an authenticating entity, such as a server.CHAP is commonly used in Point-to-Point Protocol (PPP) connections, which are often found in… Read More »

QOS: Congestion Management Tools Explained.

QOS: Understanding QoS MARKING The term marking refers to a type of QoS tool that classifies packets based on their header contents and then marks the message by changing some bits in specific header fields. This means that the QoS tool changes one or more header fields, setting a value in the header. How QOS marking works… Traditionally,… Read More »

RIP Routing Loop Explained.

Split Horizon, Route Poisoning and Holddown Explained. Split Horizon RIP as a distance vector protocol is also susceptible to routing loops (network problem which enables a data packet to continually be routed through the same routers over and over. The data packets continue to be routed within the network in an endless circle.). Split horizon is one of… Read More »

Network Access Attacks Explained with Examples.

What Are Network Access Attacks? Technology is forever evolving, and so is hacking! It might come as a surprise to many that, as one wakes up in the morning and prepares for work, gets to the office, and spends nine to twelve hours working; the same way a professional hacker spends all day modifying hacking techniques and looking… Read More »

Network Management Troubleshooting Tools: Syslog.

Network management tools such as Syslog and SNMP are very valuable tools to enable you to monitor the health of your network devices if properly configured. If these tools have been misconfigured, you will not be able to gather the information you need while troubleshooting specific events or be notified of the time and date an event has occurred. Therefore, you need… Read More »