Remove Firewall Remove Port Remove Server
article thumbnail

What is a TCP Port: Different Between TCP and UDP Ports

NW Kings

Understanding TCP ports is essential for managing network traffic and ensuring effective communication. But what is a TCP port? This blog will delve into what a TCP port is, how it works, its significance in networking, and the different types of ports, including well-known and dynamic ports. What is a TCP Port?

article thumbnail

Basic configurations on Cisco ASA Firewall - Part 2

The Network DNA

Basic configurations on Cisco ASA Firewall - Part 2 As a part of the understanding on the basics of Cisco ASA firewalls, these are some of the commands used to configure Cisco ASA firewall in real scenario. Cisco ASA in a Network Configuring DHCP, AAA, and SSH NDNA-ASA(config)# dhcpd address 10.10.10.3-10.10.10.100 255.255.255.0

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Basic configurations on Cisco ASA Firewall - Part 1

The Network DNA

Basic configurations on Cisco ASA Firewall - Part 1 As a part of the understanding on the basics of Cisco ASA firewalls, these are some of the commands used to configure Cisco ASA firewall in real scenario. Cisco ASA Firewall in a Network What is Cisco ASA Firewall? 255.255.255.0 inside Continue Reading.

article thumbnail

Which SSE Can Replace the Physical Datacenter Firewalls?

CATO Networks

But only a few can securely cloudify the datacenter firewall. This is because datacenter firewalls dont just address the need for secure Internet access, which is the main SSE capability. In this blog post, we explore which capabilities a datacenter firewall-replacing SSE needs to have. Download the White Paper 3.

article thumbnail

Gathering, Understanding, and Using Traffic Telemetry for Network Observability

Kentik

This can be done through a variety of techniques, such as using network taps, port mirroring, or software probes. Port mirroring Another method for gathering traffic telemetry is port mirroring, which replicates (mirrors) the network traffic on a switch or router to a monitoring device. Detect and alert on non-encrypted traffic.

Network 111
article thumbnail

User authentication failure using FreeRADIUS and dot1x

Network Engineering

Objectives Install FreeRADIUS on CentOS(steam 9) to perform Cisco device authentication Perform dot1x authentication on all ports of the switch Perform authentication by connecting a laptop to the switch CentOS(203.230.7.2) - Cisco 2960 Switch(203.230.7.254) - Cisco 2800 Series Router(gig0/0 : 203.230.7.1, 255.255.255.0 255.255.255.0

Port 52
article thumbnail

How to find applications with NetFlow

Kentik

You can also learn about the protocols in use, the ports being used, the top interfaces, etc. Source port for UDP or TCP, 0 for other protocols. Destination port for UDP or TCP, type and code for ICMP, or 0 for other protocols. Don’t rely on ports. It’s pretty much impossible to block HTTP and HTTPS ports at the firewall.