A typical IoT attack looks like this: the device connects to a malicious Internet resource directly or through its own VPN, downloads and installs malicious code on itself, after which it begins to be either part of a large bot farm for attacks on third-party resources and use as a resident proxy, or simply spies on your network, trying to intercept anythat data, pull information from open resources or harm in any other way. It is not difficult to protect your network from possible IoT attacks.

Let's talk about the advantages of IPv6-based segment routing technology, which displaces LDP tag allocation and network resource reservation protocols, RSVP on the example of a 10-gigabit router for small businesses and consider how FlexE technology helps to maintain a guaranteed bandwidth level for customers.


This is a 28-port switch, in which 4 ports are gigabit optics for Uplink, and the remaining 24 ports are 1-gigabit RJ45 PoE with a total power budget of 370 watts, and each of these ports can work both in 802.3af mode (up to 15.4 watts) and and in the mode 802.at (up to 30 watts). When integrating into the project, some features of this switch should be taken into account.

Not so long ago, Human Security revealed an entire shadow network associated with infected devices and malicious applications. Infected were not only Android TV set-top boxes, but also tablet PCs, wearable devices and even cars. Some IoT devices may even be infected with viruses or Trojans already at the stage of their production or sale, and since it is impossible to imagine a modern company without IoT today, it is important to properly protect your network.

Switch stacking technology allows you to combine several physical switches into one virtual switch, combining their switching matrices and simplifying port management from a single stack web interface. One of the most popular functions of the stack is to combine ports from different switches into common lagging groups to get a fault-tolerant network that can withstand the breakdown of N-(N-1) switches. I want to draw attention to the fact that modern Zyxel combines support the connection of up to 8 servings per package. So if 7 out of 8 switches can appear in your network - but well, the network continues to work.

Choosing the right solution for building a firewall becomes key for businesses and individuals who want to protect their networks from security threats, configure more complex network settings and effectively manage traffic. In this post, we will compare pfSense with OPNsense, including their functions and differences, to help you make an informed choice to protect your network.

Zyxel reasoned this way: if the L3 functionality is already determined only by the firmware, 99% choose an access switch for the sake of port density, PoE, VLAN, Multicast, and less often for static routing, then here's the base model XMG1930, which is generally L2, but slightly L3. And if your network requires advanced L3 functions, then all this is also there, just buy the appropriate license and get the core-level functionality. You can do this at any time, even when buying a device, even after a year, if necessary.

This L3 layer switch has 4 x 10-Gigabit SFP+ slots, 1-Gigabit PoE+ ports for the main fleet of devices, NVR/VoIP optimized interface, support for Nebula cloud service and multi-Gigabit PoE+ ports for Wi-Fi 6 access points. That is, Zyxel has added a maximum of functions to make it the most versatile.

What will happen to your network if the Iron Curtain suddenly falls, and the Global Internet turns into something sovereign and all cross-border channels are blocked? Let's simulate this situation and tell you how to unsign the device from Nebula without Internet access.