In this article, we are going to discuss QoS & its significances. We will also discuss how QoS works. QoS stands for Quality of Service which is used to prioritize the traffic and reduce the packet loss, latency and manage lower jitter in our network environment. Before knowing how the user’s traffic gets prioritized while […]
IP header is information that is attached with an IP packet at the beginning of it. The information in the header is used to transmit the packet to the defined destination. It can be 20-60 bytes in length. Every component/field in the header has its own significance. Let’s go through each component one by one. […]
Hi, today we are going to resolve all your doubts about WSA (Web Security Appliance) AD integration. I assume that you already know about the WSA (Web Security Appliance) and its policies. AD integration uses for user authentication in WSA. We are sorry to say that, today, we are not covering the authentication part in […]
In this blog we’re going to learn how to migrate a certificate authority server, A Microsoft certificate authority server to be specific. But before we look into how to migrate certificate authority from one server to another. Let’s first see what is a certificate authority server and why do we need it? A certificate authority […]
Our goal as a Network Security Engineer is to be able to provide secure channels of communication over insecure networks. E.g. Internet. IPSEC is a framework or we can say a protocol suite that provides a secure tunnel between 2 nodes along with Confidentiality, Integrity, and Authentication. For E.g. There are 2 offices between which […]
An Active Directory network many contains several domains in a hierarchical fashion. All the resources are one domain are not directly available to be every other domain. A trust in Active Directory is a secure authentication communication between Domain and Forest. Trust enables you to grant access to the resource to users, groups, and computers […]
In this article, we will go deep dive into Cisco IP Phone Auto Registration for SIP Protocol. This is a very basic topic of which every VoIP personnel should be aware. This is also a very common topic for any VoIP interview being the most frequently asked question. This article will provide you deep-dive information […]
First Hop Redundancy Protocols (FHRP) use for first-hop fail-over at a gateway. In this blog, we will understand how to make High Availability our LAN traffic which moves to the first Hop gateway with the help of HSRP. How data will switch over when our active gateway router failure. There are three types of Redundancy […]
In the continuation of blogs on the topic StackWise Virtual, we bring the last blog of the series. We hope from the last two blogs Stackwise Virtual Technology and StackWise Virtual – Prerequisites and Restrictions, you have got an understanding of the StackWise Virtual benefits, architecture, components, prerequisites, and restrictions. Now when you have met […]
We have already covered the basic concept and traffic flow of MPLS in Part1 & Part2 of this blog series. In this blog we will discuss: Several Applications used in MPLS Prerequisite for Configuring MPLS How to Install & Activate MPLS License Several Applications used in MPLS The following applications are used in MPLS: MPLS […]