Category: Networking

Reset A Lost Admin Password On A Fortigate.

Taken From: The Fortinet Cookbook Periodically a situation arises where the FortiGate needs to be accessed or the admin account’s password needs to be changed but no one with the existing password is available.  If a physical access to the device is possible and with a few other tools, the password can be reset. Warning: This […]

Read more
Taylor / 0
Port Security on Aruba Switches

Configuring Port Security Functionality  The port security functionality will be configured as part of the port level security configuration. This profile can be attached to the interface.  Configuring RA Guard Functionality   RA Guard functionality can be enabled at the port level. Configure the RA guard as part of the port level security configuration and attach to […]

Read more
Taylor / 0
Throwback Thursday: Networking “5,4,3” Rule…

Back in the day there was an old rule we called the “543” rule. The 5-4-3 rule divides the network into two types of physical segments: populated (user) segments, and unpopulated (link) segments. User segments have users’ systems connected to them. Link segments are used to connect the network’s repeaters together. The rule mandates that […]

Read more
Taylor / 0
Setting Up SNMP on Juniper Switches

This is a pretty easy process, but is critical for the long term management of our networking infrastructure. In order to setup SNMP on the Junipers, these are the steps that must be followed. Use the information contained within this tutorial as well so that all devices have the same SNMP settings. Log into the […]

Read more
Taylor / 0
Configuring LLDP for Cisco & Juniper Switches

The Link Layer Discovery Protocol is a vendor-neutral link layer protocol in the Internet Protocol Suite used by network devices for advertising their identity, capabilities, and neighbors on an IEEE 802 local area network, principally wired Ethernet. Ideally, this is great to use to make sure that switches are talking to each other prior to […]

Read more
Taylor / 0
Adding a DHCP Scope to a Juniper Switch

Using the information below, we will setup DHCP on the Juniper QFX5110. This tutorial is assuming that you have already setup VLAN’s and assigned them to whichever port. We will assume that the port in this instance is VLAN 152. VLAN ID: 152 VLAN Name: AGENCY-DHCP VLAN IP: 10.10.152.1/24 Log into the switch VIA SSH/Console/Telnet/etc… Once logged in, enter […]

Read more
Taylor / 0
Switch Security Facts

The following table lists switch features that can be implemented to increase network security:  Feature  Description  Virtual LAN (VLAN) A virtual LAN (VLAN) is a logical grouping of computers based on switch port.  VLAN membership is configured by assigning a switch port to a VLAN. A switch can have multiple VLANs configured on it, but each switch […]

Read more
Taylor / 0
Firewall Facts

A firewall is a device or software running on a device that inspects network traffic and allows or blocks traffic based on a set of rules.  A network-based firewall inspects traffic as it flows between networks. For example, you can install a network-based firewall on the edge of your private network that connects to the Internet to protect against […]

Read more
Taylor / 0
VPN Facts

A Virtual Private Network (VPN) is a remote access connection that uses encryption to securely send data over an untrusted network. By using a VPN you can take advantage of an existing Internet connection to securely communicate between devices.  A VPN provides an alternative to:   WAN connections.  Connections using telephone lines and a remote access server.  VPNs […]

Read more
Taylor / 0
IPSec Facts

IP Security (IPSec) provides secure data transmission over unprotected TCP/IP networks such as the Internet. IPSec operates on OSI layer 3, the network layer. It provides mutual authentication, integrity, nonrepudiation and confidentiality.  IPSec includes two protocols:  Protocol  Function  Authentication Header (AH)  AH provides authenticity, non-repudiation, and integrity. AH:  Does not provide confidentiality because the data in the packet […]

Read more
Taylor / 0