Cyber Security and Network Administration

Cipher

A Practical Guide to IPv6

IPv6 has been around for decades now. The reasons for it are well known; IPv4 simply does not have enough address space to accommodate the modern internet. A quick recap - an IPv4 address is 32 bits, which equates to roughly 4.3 billion unique addresses.

Continue reading...
Cipher

Wireshark Display Filters

This is a list of Wireless display filters for various functions. I am adding to it all the time. Filter for most standards and protocols just with the name, for example: Wireshark supports thousands of standard names. DNS Description Filter Query dns.qry.name contains google QoS…

Continue reading...
Cipher

Routing Protocols

Routing is the key to moving data between networks in the most efficient way. For it to be successful, routers need to know how to get to multiple destinations, so they can send a packet down the correct path. If you think of a data…

Continue reading...
Cipher

Spanning Tree Protocol (STP)

Redundancy is the key to a happy life. Never put all your eggs in one basket, relying on a single piece of equipment to keep users online. This includes network cables and switches. If all the traffic has to get back to the core of…

Continue reading...
Cipher

Quality of Service (QoS)

Picture a four lane motorway, but one lane has been cordoned off and marked β€˜emergency services only’. The remaining three lanes can have a traffic jam, but ambulances and fire trucks will always get through. That’s Quality of Service, or QoS. Traffic is prioritised and…

Continue reading...