Network Advanced

子カテゴリー

NW Security

Mechanism of outgoing e-mail address impersonation [Mailsploit] ~ Basic e-mail anti-spoof technology SMTP AUTH, DKIM, SPF / SenderID overview (merit · demerit) Commentary and relation with this attack-

What is Mailsploit? Mailsploit is an att...
NW Security

Illustrate: WPA2’s vulnerability [KRACK] and Sequence of 4 way handshake

Logic that can be decrypted with KRACK I...
NW Security

Man in the Middle attack (Channel-based MitM) in Wireless LAN

Man in the Middle attack of Wi-Fi The vu...
NW Security

Illustrate: Differences between [Specter] & [Meltdown] (Memory Protection & KPTI mechanism)

Introduction In this article "process" a...
NW Security

Illustrate : CPU vulnerabilities [Spectre], [Meltdown] and Speculative Execution (Branch Prediction, Out of Order Execution)

Overview and scope of influence of Spect...
MPLS-VPN

Configuration of MPLS-VPN (Super Backbone and Sham-Link)

I will introduce of the example of confi...
MPLS-VPN

MPLS-VPN (MP-BGP) Details

MP-BGP Route information in can be trans...
MPLS-VPN

MPLS-VPN Overview

The router of the description in the bas...
MPLS-VPN

MPLS basic#5 TTL Propagation

The TTL Propagation, when transferring M...
MPLS-VPN

MPLS basic#4 PHP (Penultimate Hop Popping)

PHP The PHP and stands for Penultimate H...
MPLS-VPN

MPLS basic#3 FIB table / LFIB table

FIB table In border router between MPLS ...
MPLS-VPN

MPLS basic#2 label exchange and LIB table

In front of the label exchange, by each ...
MPLS-VPN

MPLS basic#1 LDP Behavior

MPLS network needs to exchange not only ...
MPLS-VPN

About MPLS

MPLS (Multi-Protocol Label Switching) is...
Ethernet OAM

What is Ethernet OAM?

What is OAM? OAM stands for Operations, ...
OSPF

Right condition for exchange the router by OSPF

Right condition for exchange the router ...
OSPF

Features of multi-access topology

In multi-access topologies such as broad...
OSPF

Condition of OSPF neighbor establishment (2WAY)

What is 2WAY OSPF routers in the same se...