Network Security

Network security consists of the policies adopted to prevent and monitor authorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, and covers a variety of computer networks; conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access.

Share tech news, updates, or what's on your mind.

Sign up to Post

Hi All,

My company Scenario:

I have connected the branch office to main office using VPN.

Main office is running under domain environment and using a Watch guard as a firewall.
Branch office is running in a work group environment and using a Billion VPN Wi Fi router.

VPN has been set up between Watchguard Firewall (XTM26) and Billion Wifi Router (Bi Pac 8920nz)

VPN is working fine. I am able to take remote of all the computers located in to the branch office using "Microsoft Remote Desktop" from the main office.  


I am not able to ping any of the branch office computers. I can ping branch office wifi router and network printer only. What could be the reason?
Prep for the ITIL® Foundation Certification Exam
LVL 11
Prep for the ITIL® Foundation Certification Exam

December’s Course of the Month is now available! Enroll to learn ITIL® Foundation best practices for delivering IT services effectively and efficiently.

First timer here with a Sonicwall Soho wireless. I want to integrate it into a network where currently Verizon FIOS is providing Internet connectivity to one Server and three Windows 10 Pro workstations. Server is the only DC.

I'm almost certain the Verizon router's IP is dynamic, but will check when onsite.

I am thinking that the Sonicwall appliance should be set up physically where I run a CAT5 from the Verizon Router's LAN port to the WAN port on the Sonicwall, and then from the Sonicwall's LAN port to the switch.

Is this correct implementation? Any insight would be greatly appreciated.

Verizon Actiontech RouterMI424WR
Sonicwall SOhO Wireless-N
DellServer 2008 set up as DC
3 Windows 10 Workstations
Hi  all, please help me on this.
in the palo alto monitoring I see the ip is allowed by policy but the session end reason showing" tcp-rst-fromclient" means pls advice me this is the issue causing due to firewall denying or dropping traffic or issue on the client end.
hi all got an snmp alert received an hp spectrum which polls &  captures  snmp logs from all network devices within our network.a week earlier seen alert polled by hp spectrum showing management agent lost on Palo Alto passive firewall device ,no alert for active device but as verified the passive device status is up & able to reach all snmp poll servers but the alert still stays generally which will be cleared automatically as temp fix. verifying both the active passive snmp configurations observed no changes or different .can help what else need to be checked on these palo alto devices further which causing this alert.
Our Solarwinds admin guy said he can't set up rules unless a sample event is sent to solarwinds.

We have about 70 events from an app : so far the apps team only could get someone to login/logoff
to simulate once such event but for the other 69 events, need to do reboot etc which they can't
unless there's downtime.

Attached is the full list of snmp events our apps team gave to me.

I'm wondering :

a) what exactly our solarwinds admin is expecting or hinders him from creating rules?  He's
    elusive & extremely busy (ie no time to show me)

b) are there free tools like snmpwalk etc which I could trigger sample events?

I'm sure Cisco devices & Windows events which are currently sent to the solarwinds will
go through the same process to be monitored but really doubt the network chaps will
send the 100+ Cisco event types to Solarwinds for them to be monitored.
Is cisco umbrella professional [openDNS] a replacement of anti malware, or is it still needed something like anti malwarebytes
Hello All,
I'm working toward my CCNA security and I'm using GNS3 for labbing, everything seems to be working fine but for some reason the connection between my ASA and my local PC is very sporadic, it connects and disconnects on its own for no reason or that's what it seems like and its very frustrating, I've attached my topology.
My Local network is on a 192.168.1.x subnet, the cloud in the topology is representing my local pc.
I can ping from the G/0 interface of the ASA and I can also ping the my local router at
My Local pc is which is on the same subnet but it doesn't always work, my pc's IP/MAC is in the arp table of the ASA and everything matches, I have no firewall enabled on my pc and no AV. Any help would be appreciated..
Is it possible to stop/disable tacacs on a member of a Cisco ACS cluster? I would like our reporting and monitoring server to NOT be able to respond to tacacs requests. Is it possible to stop that? What is the process?

Is it possible to make this disablement persistent so that if this ACS cluster member reboots, tacacs remains disabled when it comes back up?
We decided not to spend that  60k/year on external consultants services to do scanning for rogue AP/SSIDs.

I noticed the consultant run a software tool on their laptop.  Any tool that could give a decent PDF report
certifying there's no rogue Wifi AP around will be most welcome.   Need something easy to use
Asked by a client that has contractors working for him and want to monitor their work is is a safe software.
Independent Software Vendors: We Want Your Opinion
Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Just  bought  Samsung Galaxy Tab S2 9,7 without Android 7.0 installed. Not I can't connector to my PC over wifi using Windows/Samba  connection.
File Expert hangs while trying to connector.
My old tablet with Android 4.4.2 connects  flawless.
Any suggestions?
Last month Marc Laliberte, WatchGuard’s Senior Threat Analyst, contributed reviewed the three major email authentication anti-phishing technology standards: SPF, DKIM, and DMARC. Learn more in part 2 of the series originally posted in Cyber Defense Magazine.
I have been using SonicWall for years. Never really thrilled with their support (primarily a language barrier until recently) but their content filtering seems to be problematic. I spend more time on the phone with them trying to keep it running correctly than it is worth.

Does anyone else use SonicWall for content filtering and in your opinion is it easy to keep running? Any comments about sonic wall in general?
Hello we're attempting to force users to log into Store Front using either their CAC or PKI Certs.  Reading the below article

Under Smart Cards, it says "you configure Citrix Receiver for Windows for pass-through authentication and enable domain pass-through authentication to StoreFront."  is there a way to centrally configure Citrix Receiver, or does this have to happen locally on users machines?  Our domain has only user accounts, the only machines are our servers.
Having trouble with workstations running a new software program that uses a SQL DB on an SBS 2011 server (Medtech32 Medical Software.)
Disabling the Server's Firewall allows it to run on the workstations.  I've added the Firewall rules to the Server as stated by Medtech but it still doesn't connect.  Any ideas?
The ports as per their docs are:
TCP Port 3050  on internal LAN/WAN
UDP Port 300 on internal LAN/WAN

We have an SFTP setup and have a client that wants to know what protocols/hashing algos/encryption we allow.  I found this info, I'm not sure if this is good... should any of these be disabled?  Any insight would be helpful.


[root@clientsftp ~]# ssh -Q cipher
[root@clientsftp ~]# ssh -Q mac
[root@clientsftp ~]# ssh -Q kex

Open in new window

Where and how can I see Azure password policy?  Or is it all based on AD password policy?
Hello EE,

Our VPN firewall prevents ipV6 (blocks) so our Visual Studio debugger is failing to connect.
I wonder if anyone knows of a way in Visual Studio to turn off ipV6 and only use IPv4.
Server is Windows 2012 R2. Clients are Windows 10.

VPN is a Watchguard SSL VPN. Users are connected on fast VDSL connections.

When Offline Files is enabled, users connecting via the VPN can no longer see any folders other than those already synchronised. File explorer shows the computer working in offline mode.

I have checked the network location, and this shows 'domain' as expected.

It appears that when connected to the VPN, Windows is perfectly happy to authenticate against the network, browse network shares it's never seen before, there are no speed issues, etc, but the minute offline files is enabled, Windows (file explorer only) thinks the computer is offline.

There is no GPO set to describe the slow speed threshold, so the default of 500kbps should be true. The connection is operating nearer 80Mbps.

I've set a GPO "Computer Configuration > Policies > Administrative Templates > Network > Offline Files > Configure slow-link mode" to disabled, which seems to have resolved the issue.

However, I'm more concerned that Windows believes the computer to be offline when it isn't, and I wonder if there's a firewall issue I should be aware of?

Any pointers?
A Cyber Security RX to Protect Your Organization
A Cyber Security RX to Protect Your Organization

Join us on December 13th for a webinar to learn how medical providers can defend against malware with a cyber security "Rx" that supports a healthy technology adoption plan for every healthcare organization.

i have 4 networks connected to firewall and all routed and working fine

now i need to stop 2 networks communicating with each other

need a simple way.
 I have a Windows 2008 server (domain joined). As you can see in the events listed below, unknown user account 'beuser' has successfully logged in to Terminal server from IP address Network Address: using Port#      50227 with Workstation Name "ШУРА-ПК".
 Clearly this user name BEUSER does not exist in Active Directory. When I run IP Trace, It says: Continent:      Europe (EU) Country:      Latvia and we don't have any computer user living outside US.

 How is it possible for anyone to log in wit this user account?
 Is the port# 50227 is designed to accept BEUSER?

 I have Linksys Router that does NAT and port forwarding and I run Backup Exec software on the Domain Controller.

 Can you help?

An account was successfully logged on.

      Security ID:            NULL SID
      Account Name:            -
      Account Domain:            -
      Logon ID:            0x0

Logon Type:                  3

New Logon:
      Security ID:            Domain_Name\BEUser
      Account Name:            BEUser
      Account Domain:            NHECO
      Logon ID:            0x147e7e
      Logon GUID:            {00000000-0000-0000-0000-000000000000}

Process Information:
      Process ID:            0x0
      Process Name:            -

Network Information:
      Workstation Name:      ШУРА-ПК
      Source Network Address:      -
      Source Port:            -

Detailed Authentication Information:
      Logon Process:            NtLmSsp
      Authentication Package:      NTLM
      Transited Services:      -
      Package Name (NTLM only):      NTLM V2
      Key Length:            128
We are building a horizon View environment and we need 2FA.  Of course, we are looking at RSA and we are looking at Radius, but I was tasked with finding out what others are using.

I recently ran across DUO and wanted to know if anyone has had any experience with it.

I would appreciate feedback on what 2FA people are using with VIEW and what they like and dislike.

Our company are using Palo Alto Firewall ,we received the critical alert "Top 5 attackers" and the source is from one of the application server. What does it mean and what should I do .Please advice.Thanks
I am trying to create a policy to enable/block specific traffic that my T30-W is handling. I haven't been able to find a good answer as to what each column in the Traffic Monitor means.
Hi Guys

I need to find a way to allow the network to be reached from – networks. Given little documentation, I need the help to allow for communication between the networks, trying to achieve the below (sorry, I know it is sketchy) >>> PING >>>> >>> PING >>>> >>> PING >>>> >>> PING >>>>

The below is .conf file I pulled from our OpenSwan 2.2.6, this .conf file is for our network (the network is similar)
conn ifly-pen
You can see, the leftsubnets allows for communication to the network from the network. However, in the network, when I ping the IP address I get no response, see Ping.png and Tracert.png
Our OpenSwan IP is and it is a VM in AWS, you can see the above is routing through the (on the network, router), through to the but then goes …

Network Security

Network security consists of the policies adopted to prevent and monitor authorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, and covers a variety of computer networks; conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access.