Configuring SSH ON Cisco Devices
Define a hostname and domain name for device for identify device when access it with ssh and Generate a key for encrypting data in SSH Tunnel: Router(config)#ip domain-name home.local Router(config)#hostname…
Amir Hossein Eshaghi
Define a hostname and domain name for device for identify device when access it with ssh and Generate a key for encrypting data in SSH Tunnel: Router(config)#ip domain-name home.local Router(config)#hostname…
Step-by-Step Guide to Configuring Site-to-Site VPN on Cisco Routers
In the begining we have to install a DHCP relay agent; Which I use (dhcp-helper) but there is another package called dhcp3-relay. Dhcp-helper is much smaller than dhcp3-relay package and…
Unlock precise time synchronization in your network by configuring Cisco device as an NTP server. Follow these steps to ensure accurate timekeeping
Using SSH for backup In this example, we make a backup copy of the files in the remote_serious_files folder located on the server and place them in our system as…
#aptitute install samba To start, no changes are needed in the config file, it is enough to define a password for the service: #smbpasswd -a [Username] /etc/samba/smb.conf interfaces = 192.168.1.0/24…
How to Prevent Brute Force Attacks
Is an squid event analyzer, Which we can view user requests, the amount of visits and the bandwidth used. /etc/srg/srg.conf log file "var/log/squid3/access.log" #the location of squid's events output_dir "/var/www/srg_reports"…
To enable event logging, the following points should be considered: Setting the logging level for events. Security of transferring log files from the device to the server and secure storage…