In this lab we will learn how to send messages to users logged in to the same router.For this we need to create a telnet program on router and then create some users on router.After that we will login to router through different computer and with different users.And then we will send messages to all users logged into the router or to send a message to any particular user. (more…)
Archive for the ‘Network Security’ Category
Tags: dhcp security, dhcp security lab, dhcp snooping attacks, dhcp snooping prevention
Today in this article i am going to discuss about DHCP SNOOPING attacks by hackers.Here in this article i will show you how DHCP SNOOPING Occurs and how to stop such attacks.But before you learn how to stop dhcp snooping attacks i will love to brief about DHCP SNOOPING ATTACK.
It is a type of hacking attack in which ip address will be provided to client machine by any unkown DHCP Server or Unauthenticated DHCP machine.
The unknown DHCP server can be run by any hacker or any intruders(company employee).If it happens your machines in the network will have ip address provided by some unknown person and he/she can easily know the details of your client PC using this and this can turn in to a disaster.
The most frequent affect of DHCP SNOOPING is that your all machine say computers can’t communicate with each other,because few gets ip from original dhcp server and few from hackers server who is using a different network.
Tags: port security configuration, port security tutorial, switch security, switchport
In this article we will learn how to provide port security to cisco switches.As we all know bydeafult switches ports are on and hence there is always a risk that some intruders or someone evil minded in your department who is in physicaly in touch of your switches can do something harmful or disaster.By using port security a network admin can bind port with device mac-addresses and hence no any other device can be now connected on that port.In this way we can put a limit that only an authorised device can access the port.
Here in this article i will mention how to configure port security on cisco switches step wise. (more…)