Tutorial
Physical Layer
Data Link layer
Network Layer
Routing Algorithm
Transport Layer
Application Layer
Network Security
Misc
- Router
- OSI vs TCP/IP
- TCP vs UDP
- Transmission Control Protocol
- TCP port
- IPv4 vs IPv6
- ARP Packet Format
- ARP Table
- Working of ARP
- FTP Client
- FTP Commands
- FTP Server
- I2C Protocol
- Sliding Window Protocol
- SPI Protocol
- IP
- ARP Commands
- ARP
- Address Resolution Protocol
- ARP and its types
- TCP Retransmission
- CAN protocol
- HTTP Status Codes
- HTTP vs HTTPS
- RIP Protocol
- UDP Protocol
- ICMP Protocol
- MQTT protocol
- OSPF Protocol
- Stop and Wait Protocol
- IMAP Protocol
- POP Protocol
- CIFS
- DAS
- DIMM
- iSCSI
- NAS (Network Attached Storage)
- NFS
- NVMe
- SAN
- Border Gateway Protocol
- Go-Back-N ARQ
- RJ Cable
- Difference between Connection-Oriented and Connectionless Service
- CDMA vs. GSM
- What is MAC Address
- Modem vs. Router
- Switch Vs. Router
- USB 2.0 vs 3.0
- Difference between CSMA CA and CSMA CD
- Multiple access protocol- ALOHA, CSMA, CSMA/CA and CSMA/CD
- URI vs URL
- IMAP vs. POP3
- SSH Meaning| SSH Protocol
- UTP vs STP
- Status Code 400
- MIME Protocol
- IP address
- proxy server
- How to set up and use a proxy server
- network security
- WWW is based on which model
- Proxy Server List
- Fundamentals of Computer Networking
- IP Address Format and Table
- Bus topology and Ring topology
- Bus topology and Star topology
- Circuit Switching and Packet switching?
- Difference between star and ring topology
- Difference between Router and Bridge
- TCP Connection Termination
- Image Steganography
- Network Neutrality
- Onion Routing
- Adaptive security appliance (ASA) features
- Relabel-to-front Algorithm
- Types of Server Virtualization in Computer Network
- Access Lists (ACL)
- What is a proxy server and how does it work
- Digital Subscriber Line (DSL)
- Operating system based Virtualization
- Context based Access Control (CBAC)
- Cristian's Algorithm
- Service Set Identifier (SSID)
- Voice over Internet Protocol (VoIP)
- Challenge Response Authentication Mechanism (CRAM)
- Extended Access List
- Li-fi vs. Wi-fi
- Reflexive Access List
- Synchronous Optical Network (SONET)
- Wifi protected access (WPA)
- Wifi Protected Setup (WPS)
- Standard Access List
- Time Access List
- What is 3D Internet
- 4G Mobile Communication Technology
- Types of Wireless Transmission Media
- Best Computer Networking Courses
- Data Representation
- Network Criteria
- Classful vs Classless addressing
- Difference between BOOTP and RARP in Computer Networking
- What is AGP (Accelerated Graphics Port)
- Advantages and Disadvantages of Satellite Communication
- External IP Address
- Asynchronous Transfer Mode (ATM)
- Types of Authentication Protocols
- What is a CISCO Packet Tracer
- BOOTP work
- Subnetting in Computer Networks
- Mesh Topology Advantages and Disadvantages
- Ring Topology Advantages and Disadvantages
- Star Topology Advantages and Disadvantages
- Tree Topology Advantages and Disadvantages
- Zigbee Technology-The smart home protocol
- Network Layer in OSI Model
- Physical Layer in OSI Model
- Data Link Layer in OSI Model
- Internet explorer shortcut keys
- Network Layer Security | SSL Protocols
- Presentation Layer in OSI Model
- Session Layer in OSI Model
- SUBNET MASK
- Transport Layer Security | Secure Socket Layer (SSL) and SSL Architecture
- Functions, Advantages and Disadvantages of Network Layer
- Protocols in Noiseless and Noisy Channel
- Advantages and Disadvantages of Mesh Topology
- Cloud Networking - Managing and Optimizing Cloud-Based Networks
- Collision Domain and Broadcast Domain
- Count to Infinity Problem in Distance Vector Routing
- Difference Between Go-Back-N and Selective Repeat Protocol
- Difference between Stop and Wait, GoBackN, and Selective Repeat
- Network Function Virtualization (NFV): transforming Network Architecture with Virtualized Functions
- Network-Layer Security | IPSec Modes
- Next - Prev Network-Layer Security | IPSec Protocols and Services
- Ping vs Traceroute
- Software Defined Networking (SDN): Benefits and Challenges of Network Virtualization
- Software Defined Networking (SDN) vs. Network Function Virtualization (NFV)
- Virtual Circuits vs Datagram Networks
- BlueSmack Attack in Wireless Networks
- Bluesnarfing Attack in Wireless Networks
- Direct Sequence Spread Spectrum
- Warchalking in Wireless Networks
- WEP (Wired Equivalent Privacy)
- Wireless security encryption
- Wireless Security in an Enterprise
- Quantum Networking
- Network Automation
- Difference between MSS and MTU
- What is MTU
- Mesh Networks: A decentralized and Self-Organizing Approach to Networking
- What is Autonomous System
- What is MSS
- Cyber security & Software security
- Information security & Network security.
- Security Engineer & Security Architect
- Protection Methods for Network Security
- Trusted Systems in Network Security
- What are Authentication Tokens in Network security
- Cookies in Network Security
- Intruders in Network Security
- Network Security Toolkit (NST) in virtual box
- Pivoting-Moving Inside a Network
- Security Environment in Computer Networks
- Voice Biometric technique in Network Security
- Advantages and Disadvantages of Conventional Testing
- Difference between Kerberos and LDAP
- Cyber security and Information Security
- GraphQL Attacks and Security
- Application Layer in OSI Model
- Applications of Remote Sensing
- Seven Layers of IT Security
- What is Ad Hoc TCP
- What is Server Name Indication(SNI)
Adaptive security appliance (ASA) features
A firewall is a type of network security system that responds to incoming or outgoing packets according to preset rules based on their IP address and port number. Adaptive Security Appliance is what Cisco calls its firewall (ASA).
There are a number of models in the Cisco ASA 5500 series, including the Cisco ASA 5505, Cisco ASA 5510, Cisco ASA 5515-X, Cisco ASA 5520, Cisco ASA 5525-X, Cisco ASA 5540, Cisco ASA 5550, Cisco ASA 5555-X, and Cisco ASA 5585-X.
Adaptive Security Appliance (ASA) is a Cisco security product that combines basic firewall functionality with VPN support, antivirus protection, and a number of other features. The following are some ASA features:
- Packet filtering: It is the straightforward process of filtering an incoming or outgoing packet based on the rules set forth in the ACL that has been configured for the device. It includes a number of allowable or prohibited conditions. No other rule is matched and the matched rule is executed if the traffic satisfies one of the rules.
- Stateful filtering: If a packet is generated from a higher security level to a lower security level by default, ASA performs stateful tracking of the packet. TCP and UDP reply traffic will by default be allowed and will be able to, for example, telnet the other device in Lower security level if the traffic is initiated by the devices in Higher security levels for lower security levels device (as destination). This is due to stateful inspection being enabled by default, which maintains a stateful database (in which an entry about the source and destination device information such as IP address, port numbers are maintained).
- Routing support -Static routing, default routing, and dynamic routing protocols like EIGRP, OSPF, and RIP are all supported by the ASA.
- ASA's transparent firewall has two modes of operation:
- Routed mode: In this mode, the ASA functions as a layer 3 device (router hop) and requires that its interface have two distinct IP addresses, which translates to two distinct subnets.
- Transparent mode: In this mode, ASA operates at layer 2 and requires only a single IP address to manage ASA-related tasks because both the internal and external interfaces serve as a bridge.
- Support for AAA services is provided by ASA either through a local database or a third-party server like ACS (Access Control Server).
- VPN support - ASA supports SSL-based and policy-based VPNs such as point-to-point IPsec VPNs (including site-to-site VPN and remote access VPNs).
- IPv6 support - ASA (new versions) supports static and dynamic IPv6 routing.
- VPN load balancing is a Cisco ASA feature that is proprietary to Cisco. A number of ASA units can simultaneously share a number of clients.
- Stateful failover - ASA supports a pair of Cisco ASA devices for high availability. The other ASA device will continue operating normally even if one of the ASA fails. When stateful failover is enabled, the active unit continuously transmits backup device connection state data. The new active unit has access to the same connection information following the failover.
- With Cisco ASA's clustering feature, we can set up multiple ASA devices as a single logical device. There can be a maximum of 8 cohesive units in the cluster. High throughput and redundancy are both produced as a result of this.
- Advanced Malware Protection (AMP) - Cisco ASA supports Next-Generation firewall features that can provide advanced malware protection in a single device by combining traditional firewall features with NGFW features.
- MPF, or the Modular Policy Framework, is used to specify policies for various traffic flows. In order to use advanced firewall features like QoS, Policing, prioritising, etc., it is used in ASA.
In order to use MPF, we define the Class-map to identify the type of traffic, the Policy-map to determine what actions, such as prioritising, should be taken, and the Service-Policy to determine where they should be used.