Archive for the ‘Network Security’ Category

Let’s Learn how to setup a complete Lab for Network Security Training, Penetration Testing Training as well As CCNA Cyber Ops Training.
This setup is not only for network security But you can use this Lab setup for Ethical Hacking Training ,Cyber Security Training.
This will help you to understand the Real world scenario of network setup and Cyber Attacks.


I have Designed the whole Lab setup in a Pattern and in simple steps that will make your lab setup easy and user friendly.


In this tutorial we will learn how to configure EIGRP Authentication on cisco router using cisco packet tracer.This lab is based on EIGRP Authentication using MD5 hashing Algorithm.To encrypt every message the MD5 algorithm is used. EIGRP Authentication is configured to prevent the hackers from forming the EIGRP neighbor relationship with your router and advertising incorrect routing information.

You can Also Read:

Configuring OSPF MD5 authentication
OSPF Clear Text authentication Configuration Lab
RIP MD5 Authentication configuration Lab
RIP Clear Text Authentication Lab


This tutorial is all about NTP Authentication configuration on cisco perform this lab i have used cisco packet tracer Lab.To ensure that erroneous time information is not propagated throughout the network, NTP authentication can be configured. (more…)

In this lab we will learn how to send messages to users logged in to the same router.For this we need to create a telnet program on router and then create some users on router.After that we will login to router through different computer and with different users.And then we will send messages to all users logged into the router or to send a message to any particular user. (more…)

Today in this article i am going to discuss about DHCP SNOOPING attacks by hackers.Here in this article i will show you how DHCP SNOOPING Occurs and how to stop such attacks.But before you learn how to stop dhcp snooping attacks i will love to brief about DHCP SNOOPING ATTACK.

It is a type of  hacking attack in which ip address will be provided to client machine by any unkown DHCP Server or Unauthenticated DHCP machine.

The unknown DHCP server can be run by any hacker or any intruders(company employee).If it happens your machines in the network will have ip address provided by some unknown person and he/she can easily know the details of your client PC using this and this can turn in to a disaster.

The most frequent affect of DHCP SNOOPING is that your all machine say computers can’t communicate with each other,because few gets ip from original dhcp server and few from hackers server who is using a different network.


In this article we will learn how to provide port security to cisco switches.As we all know bydeafult switches ports are on and hence there is always a risk that some intruders or someone evil minded in your department who is in physicaly in touch of your switches can do something harmful or disaster.By using port security a network admin can bind port with device mac-addresses and hence no any other device can be now connected on that port.In this way we can put a limit that only an authorised device can access the port.

Here in this article i will mention how to configure port security on cisco switches step wise. (more…)