Posts

Showing posts from October, 2020

How to use 802.1X protocol to solve network internal loopholes

Image
Today we will consolidate the concept and application of the 802.1X protocol. In traditional corporate networks, it is generally believed that the corporate intranet is safe, and threats mainly come from outsiders. But in fact, the internal loopholes in the network damage the network more seriously. In addition, internal employees lack security awareness and malicious software such as various plug-ins, spyware, and Trojan horse programs will unknowingly be downloaded to the computer and spread on the corporate intranet, creating serious security risks. With the continuous escalation of security challenges, traditional security measures alone are no longer enough. You should consider starting with the security control of the terminal connected to the network, and the security status of the terminal and the network. 802.1x is mainly based on Client/Server access control and authentication protocol. It is mainly used to restrict unauthorized users from accessing the LAN/WLAN network throu

Learn network port mirroring technology in 3 minutes

Today we come to understand the network port mirroring technology. Port mirroring is to copy the packets of the specified port (source port), VLAN (source VLAN) or CPU (source CPU) to other ports (destination ports). The destination port will be connected to the data monitoring device, and the user will use these data to monitor The device analyzes the packets copied to the destination port for network monitoring and troubleshooting. Without seriously affecting the normal throughput of the source port, the network traffic can be monitored and analyzed through the mirror port. Source port: It is the monitored port, and the user can monitor and analyze the packets passing through the port. Source VLAN: It is the VLAN to be monitored. Users can monitor and analyze the packets passing through all ports of this VLAN. Source CPU: The CPU on the monitored board. The user can monitor and analyze the packets passing through the CPU. Destination port: It can also be called a monitoring port. Thi