NetPrepare Blogs





Aug. 21, 2025
Your Image

 Carl AbouJawdeh  

Traceroute

The traceroute command offers many options to customise its behaviour, such as using different protocols (UDP, ICMP, TCP), disabling DNS lookups, adjusting the number of probes per hop...
These options help troubleshoot network connectivity issues and diagnose firewalls or other network policies.

June 3, 2024
Your Image

 Carl AbouJawdeh  

DHCP Snooping

Mastering DHCP Snooping: Enhance Your Network Security

Oct. 12, 2023
Your Image

 Carl AbouJawdeh  

OpenSSL cheatsheet

OpenSSL is a versatile open-source library that primarily deals with secure communications.
In this blog we will show you:
Generate private and public keys.
Create certificate signing requests.
Sign certificates with a CA or self-sign.
Check, extract, and encrypt key pairs.

Sept. 26, 2023
Your Image

 Carl AbouJawdeh  

Securing Your Network Access with 802.1X

In our increasingly connected world, the security of our networks has never been more critical knowing who is on your network and what machines they are using is the foundational step towards ensuring a secure and well-managed environment.

Jan. 15, 2024
Your Image

 Carl AbouJawdeh  

Automate Meraki Device Renaming

Efficiently renaming your Meraki devices without manual hassle. Learn how to use a Python script and a CSV file to streamline the renaming process, saving you time and effort

May 31, 2023
Your Image

 Carl AbouJawdeh  

802.1x EAP peap and EAP tls

802.1x authentication is a security protocol that provides an efficient and reliable means of controlling network access. In this doc, we will review EAP PEAP and EAP TLS.