Quantcast
Channel: NIL – Network Information Library
Browsing all 44 articles
Browse latest View live

STUN server na debiane

STUN – Simple Traversal of UDP through NATs (RFC 3489) STUN je to protokol umožňujúci prechod cez NAT v tzv. near-end implementácii, pomocou ktorej nie je potrebné meniť nastavenie SIP Servera, po...

View Article



Sip over NAT

If you use the article, please cite me:SIP over NAT [SIP cez NAT] / Pavel Segeč. In: Journal of Information, Control and Management Systems. - ISSN 1336-1716. - Vol. 7, No. 1 (2009), p....

View Article

Builiding RTPproxy server 1.2.1 from GIT on debian lenny

As the result of the testing, the rtpproxy 1.2.1 builded using git is faulted, see the end of the article or article about kamamilio nat traversal with rtpproxy. The article describe how to install the...

View Article

Configuring NAT traversal using Kamailio 3.1 and the Rtpproxy server

This article continues on series of articles about the Kamailio 3.1.x SIP proxy server deployed on the debian lenny and its features. In previous articles we have focused on:1) installing clear...

View Article

Image may be NSFW.
Clik here to view.

Riešenie NAT pre SIP OpenSER server

Riešenie NAT pre SIP OpenSER server Testovaná topológia:    Použitý SIP server pri testovaní: OpenSER  Použitý softphone: X-lite 4  read more

View Article


Enabling USB Wi-Fi dongle adapter on VirtualBox VM

When we have Wi-Fi adapter in our PC, we may use it as a network interface of VM, but the VM will recognize it just… The post Enabling USB Wi-Fi dongle adapter on VirtualBox VM appeared first on NIL -...

View Article

Making a QEMU ASA 8.4 for GNS3 in Win10

By Peter Hadač This article is all about how to prepare ASA 8.4 in GNS3 simulation (on Windows 10, but compatible with other OS )… The post Making a QEMU ASA 8.4 for GNS3 in Win10 appeared first on NIL...

View Article

SIP clients – security features analysis

Table provides the overview of security features of nine analysed open-source SIP clients (some sources call them the RTC communicator). Source: P. Segeč, M. Moravčík,… The post SIP clients – security...

View Article


Tools for a quick SIP diagnostics – ngrep, sipgrep and sngrep

Sometimes there is a need for simple and quick analysis of a SIP server and its call functions. Of course, we should use the well-known… The post Tools for a quick SIP diagnostics – ngrep, sipgrep and...

View Article


OpenVAS/GVM installation and configuration from source code

Author: Martin Dvorsky Greenbone Vulnerability Manager (formerly OpenVAS) is the most popular open source vulnerability scanner.In this tutorial we will install, configure and prepare GVM… The post...

View Article

KIS 2019 network dataset

KIS 2019 network dataset Authors : Jana Uramová, Tomáš Mokoš, Patrik Rodina, Peter Seemann, Miroslav Kohútik This article describes the KIS 2019 network dataset. If… The post KIS 2019 network dataset...

View Article

Installing full Linux from Windows on USB with persistent storage

This guide will describe how to install a full Linux OS on an USB flash disk with permanent storage feature, i.e. the system does not… The post Installing full Linux from Windows on USB with persistent...

View Article

Elasticsearch cluster upgrade

Elasticsearch cluster upgrade from 5.5.1 to 6.8.1 Author : Miroslav Kohútik Operating System : Ubuntu 16.04 In this guide we will show you how to… The post Elasticsearch cluster upgrade appeared first...

View Article


Netacad – message “You did not complete all requirements”

My students received the message “You did not complete all requirements” even though they are set to “Pass”. It is an Netacad issue. The instructor… The post Netacad – message “You did not complete all...

View Article

List of network simulators and virtualization tools

The page provides summarized and updated (2020) overview of simulation and virtualization tools suitable for the practice of networking teachers or researchers. The post List of network simulators and...

View Article


Network traffic dataset anonymization

Network traffic dataset anonymization Author: Miroslav Kohútik Sometimes you may need to provide PCAP files to third-party organizations or perhaps, in our case, publish a… The post Network traffic...

View Article

Network traffic dataset PCAP anonymization

Network traffic dataset PCAP anonymization Author: Miroslav Kohútik Sometimes you may need to provide PCAP files to third-party organizations or perhaps, in our case, publish… The post Network traffic...

View Article


Configruration L2TP over IPsec

Configuration of L2TP over IPsec tunnel connection with Cisco router as a server and MikroTik router as a client. Configuration of Cisco server Now we… The post Configruration L2TP over IPsec appeared...

View Article

VLC – SAP problem – the playlist is empty

Our ISP provider (SANET) offers an IPTV service, where the list of TV/radio programs is offered using SAP multicast at IPv4 address of 233.10.47.10. However,… The post VLC – SAP problem – the playlist...

View Article

Adjust microphone volume in Windows 10

When others can hear you silently, you can boost microphone volume level. We have to mention, that this option is not available on every microphone,… The post Adjust microphone volume in Windows 10...

View Article
Browsing all 44 articles
Browse latest View live


Latest Images