Today, one of the attackers’ most widely used techniques is the Fileless Malware. Fileless Malware refers to malware that does not use a specific code or binary on the disk to execute and does not execute certain content on the disk, which is malicious code related to the attacker’s malware. Fileless Malware can take many […]
In this post, I am going to explain how the location-identity mapping database populates using Flood and Learn method. Consider the image below where VTEP01 takes the original ARP L2 frame from the HOST01 and then adds VXLAN header which includes L2VNI 20100 (think of it as an overlay L2 interface between VTEPs). VTEP01 will forward […]
Today, there are many defense types of equipment, techniques and tactics, tools, and laws that security organizations and engineers use. All of these are far from aimed at preventing attacks and threats, but the question always arises: Are the techniques and methods we use resistant to the attacks we want and can prevent them? We […]
Underlay Transport for VXLAN In the first section of our VXLAN course we talked about overlay, underlay, and some terminologies with this technology. By now, you know what an underlay is. Within our datacenter context the underlay is our Clos network which includes the leafs and spines and their interconnections. To get rid of STP, […]
Routing Information Protocol (RIP) Basic Description We can remember we configured a static route for VPC2 with 10.2.0.50 that said to the FW1 that if you want to go to that VPC2 forward lower to FW2, and then FW2 makes a routing decision because it is directly connected to that client. For example, if we […]
VXLAN Improvement to Datacenter Fabric In this section, I am going to talk about data center fabric journey and how Virtual eXtensible LAN emerged. I will start with STP, then vPC and PortChannel. I won’t talk about FabricPath. We will finally jump in to VXLAN in Clos networks. STP Drawbacks Let’s architect our Clos topologies […]
Static Routes In this post we are going to focus on the concept of the static route configuration on the firewall. The first thing that comes to our minds, when we see the static routes is that somebody has to configure that static route. Static routes are manual labor we have to implement on the […]
Lab Introduction It is undeniable that during a learning process it would be helpful if we could deal with the examples of real-life challenges in order to commit to memory and put them into practice. For practicing in the realm of data transmission network. They help to simulate and emulate the traffic flow, configurations, related […]
Loops Loops are very useful for automating repetitive tasks. when you want to run a series of commands repeatedly until a certain condition is reached. Type of loops: Simple For loop Range-based for loop C-Styled for loops Infinite for loop Simple For Loop: for var in word1 word2 … wordN do Statement(s) to be executed […]
Verify The Data Plane As our last test in previous post https://old.smenode.com/adding-a-default-route/ regarding the basic core functionality of the firewall. Let’s put a pc behind the firewall and make sure that pc has access out to the public internet as well. So in our topology: We will make sure the VPC123 has an ip address […]