Hello everyone, we are back with the second part on email security and will be continuing the next 5 email security practices that are to be followed. Before starting, let me share a story with you. My friend’s iPhone 12 got stolen (imagine the pain!). He went home and logged into his Apple id and […]
Cisco Video Surveillance Solution is a part of Cisco’s Connected Safety and Security solution portfolio. Cisco Video Surveillance solution is a smart surveillance solution from Cisco which can easily integrate with IP cameras, encoders, sensors, etc. from multiple leading OEMs. It also offers to apply analytical assessment of video feeds sent by cameras and then […]
In this blog, we provide an understanding of the UCS Manager and its configuration. Cisco UCS is a data center computing solution composed of computing hardware, virtualization software, switching, switching fabric, and management software. Cisco UCS Manager implements policy-based management of the server and the networking resources. Network, storage, and server administrators all create service […]
Our goal as a Network Security Engineer is to be able to provide security of communication and restrict access from insecure networks. E.g. Internet. We use Firewall very commonly to restrict unwanted communication between various private networks and public networks. Cisco offers an NGFW Solution called Cisco Firepower Threat Defense. In this blog, we will […]
Multicast is the combination of Multi and Cast. Multi means more than one and cast means streaming data (Packets) from the Source to Destination. PIM stands for Protocol Independent Multicast; this is one of the types of multicasts. In this blog, we will understand the basics of Multicasting with PIM with (DM)Dense Mode, and cover […]
What Is Routing? Routing is a process by which we are selecting the path between one or more networks. Routing selects the path for internet Protocol (IP) packets when they are traveling from source to destination. These routing decisions are made by a spatial type of device which is known as a router, or we […]
Push notifications are very dramatic I must say, they shove each mail in your face no matter if it is important to mail or not. Even the ones which we don’t require flash on our mobile screens begging to be opened. This gives an opportunity to those sneaky emails who want to get into our […]
Basically, port security is used to protect our LAN interface from the attacker. The attacker may be anyone in the organization or outside. You can allow mac addresses manually You can change or allow the maximum number of the mac address. If you do not configure manually, in that condition switch will allow the first […]
VLAN hopping is a type of attack where the attacker sends traffic from one VLAN to another VLAN. An attacker can then steal passwords or other protected information and install viruses or corrupt, modify, or delete critical data. How VLAN Hopping Attack is Performed? VLAN hopping attack can be performed in two different ways: – […]
VTP stands for VLAN Trunking Protocol. It is a Cisco proprietary protocol that is present at layer 2. VLAN is used to transfer VLAN information from one switch to another switch and also to centralized VLAN management. It uses multicast mac address 0100. 0ccc.cccc for VTP updates (CDP, VTP, UDLD). HOW MANY TYPES OF VTP […]