April 26, 2018

Category: Networking

FortiGate :: HA Routed Failover w/ Session Failover

A recent requirement that came up was for there to be a redundant pair of firewalls, which allowed for session failover, configuration synchronisation and also maintain different external IPs and seperate BGP peering. A niche request, but something that was supported with FortiGates. Below details some configuration examples to achieve this. Config and Session Sync […]

Cisco :: Add Licenses to Cisco IOS Switches

In this video, I run through the configurations required to add and activate licenses on your Cisco IOS switch. A Cisco Catalyst 3750-x switch with IOS 15.x is used for this demonstration along with a SolarWinds TFTP server.  

How to configure a Rotating, long term packet capture using Wireshark.

Introduction Wireshark is an awesome tool for troubleshooting network traffic. Although the Wireshark GUI is not designed for long term packet captures and left running would simply fill the hard drive of the server/pc running the program. Within Wireshark there is a tiny built in Windows command line tool called ‘dumpcap’ which at less than […]

How secure is IEEE802.1x?

I’m a huge fan of deploying “dot1x”.  With very little configuration (a Windows NPS server, a little group policy and some access switch commands) you can authenticate every device that connects to your network.  Unlike MAC based security, dot1x ensures that your devices must be successfully authenticated by a centralised RADIUS server before they are […]

Kali Linux :: CAM Table Overflow Attack Demonstration

As part of my on-going studying for the CCNA Security 210 – 260 certification I have been exploring different types of network attacks, one of which is CAM table overflow attacks. In this article I would like to share what I have learnt and provide a demonstration of the attack carried out in a lab […]

Demultiplexing And How It Works

In this article I will explain demultiplexing and how it works by walking through a .pcap file taken from the lab in the screenshot below. We will focus on the data flowing from PC1 and SW1 to R1’s ingress port. Demultiplexing (DEMUX) is the method in which the TCP/IP stack uses to determine if datagrams have […]

Exploring DHCP Requests

In this article I would like to explore DHCP requests so that we can understand what happens when a device sends a request to a DHCP server. Lets start by listing some important information about DHCP….. DHCP is the abbreviation for Dynamic Host Configuration Protocol DHCP uses UDP 67 & 68 – 67 – In a […]

Subscribe to SYNACK via Email