Category: Cisco configurations
Latley we have been seeing in the security news of a newer type of attack called ” DNS amplification attack” or what was know as a SMURF attack How does it work ? The attack works when a attacker finds a open dns server that accpets look ups from outside its network (aka misconfiguration) and
Hello all, In this post I want to cover ways to mitigate against unauthorized devices connecting to a switch for instance in a public library or a internet cafe where the access switch can be access by the public just to set the stage for this example there is a internet cafe called bobs internet
Preventing unathorized devices from connecting to cisco switchRead More »
Hello all, Here is a little snippet of information on the importance of applying an access list to your edge router to IP blocks that are listed on the bogon list What is the bogon list? The bogon list is a list of ip subnets that are either invalid non routable ip blocks such as