Category: NETWORKING

This section contains the post related to networking.

CHECK-MK Tricks

Warning bei “unmonitored Services” In Wato: Host & Service Parameters > suchst nach “discovery” > Regel “Periodic Service Discovery” > Create new Rule in “Main Directory” oder wo immer es für dich passend ist....

Useful Tricks and Tips ( Know-How )

Disable IPv6 on Linux Here’s how to disable the protocol on a Red Hat-based system: Open a terminal window.Change to the root user.Issue the command sysctl -w net.ipv6.conf.all.disable_ipv6=1Issue the command sysctl -w net.ipv6.conf.default.disable_ipv6=1 To...

Setup HAProxy as Load Balancer

In my previous post, I have explained about Nginx and HAProxy. We have also seen, where HAProxy wins over Nginx in the field of advanced load balancing. HAProxy ( High Availability Proxy), a fast...

Securing Amazon EC2 Instances

Amazon EC2 can be interpreted as the fully managed virtual machines in the cloud. Once your resource leaves the internal secured premise of your company, it gets automatically vulnerable to external threads and virus....

MPLS or IPsec VPN:

Virtual Private Network (VPN) is a connection method used to add security and privacy to private and public networks. Because of strong encryption, data traveling over VPN is not visible. In lay terms, the...

Multiprotocol Label Switching (MPLS)

It is a protocol for routing traffic within a telecommunications network, as data travels from one network node to the next. MPLs can provide applications including VPNs and Quality of Service (QoS). MPLs allows...

MAC Flooding & Port Security

What is MAC Flooding? In computer networking, a media access control attack or MAC flooding is a technique employed to compromise the security of network switches. The attack works by forcing legitimate MAC table contents out of the switch and forcing a unicast...

error: Content is protected !!