Networking

6 Articles
ICTKB_IMG

Network Packet Broker

A Network Packet Broker (NPB) resides between taps and SPAN ports. They can access network data and sophisticated security and monitoring tools that typically reside in data centers. NPB’s do just what their name says: they break network packet...

ICTKB_IMG

Shadow IT : Definition, Risk & Mitigation

Shadow IT is the use of information technology systems, devices, software, applications, and services without explicit IT department approval. It has grown exponentially in recent years with the adoption of cloud-based applications and...

ICTKB_IMG

SD-WAN vs. MPLS

SD-WAN (Software-Defined Wide Area Network) and MPLS (Multiprotocol Label Switching) are both types of networking technology used to connect remote networks, but they have some key differences. Multiprotocol Label Switching (MPLS) is a technology...

ICTKB_IMG

Let’s understand DMZ – Demilitarized Zone

A DMZ  or demilitarized zone is a perimeter network that protects and adds an extra layer of security to an organization’s internal local-area network from untrusted traffic. The purpose of a DMZ is to add an additional layer of security to...

ICTKB_IMG

Firewall types (Network based Vs Host based)

Nowadays protecting IT assets is most important and critical part for anyone. A “Firewall” is one of the most popular computer and network security devices that professionals use to protect their enterprise IT assets and networks. Just like a...

ICTKB_IMG

IP Subnet Cheat sheet

Struggling when you have to work on CIDR, Subnet mask and IP’s for CIDR? Look at below sheet for your convenience. Bookmark this fast. CIDR Subnet Mask No. of IP’s /32 255.255.255.255 1 /31 255.255.255.254 2 /30 255.255.255.252 4 /29...

Our site uses cookies. By using this site, you agree to the Privacy Policy and Terms of Use.