Guest Access Overview Getting concise information on the multiple modes of Guest Access on ISE can be a bit of a challenge as there is a lot of information out there. This blog will provide a concise and simple-to-understand summary of the different modes available, their nuances and help you choose which will be most […]
Cisco UCS stands for Unified Computing System. It is an integrated computing infrastructure with intent-based management to accelerate and automate the deployment of all your compute infrastructure, including cloud computing and virtualization, bare-metal and scale-out workloads, and analytics, as well as edge computing that supports remote locations. This blog provides you an overview of the […]
User Principal Name (UPN) for service discovery is used by Jabber for Windows. The client who entered windows using domain credentials will not be prompted for credentials in Jabber until not connected to a network. There are scenarios wherein some customers do not have the same login details for jabber as they have on Windows […]
Covid -19 brought a temporary halt to seamless workflow and made people shift their work from home and to places that are safe. The travel was cut down to a minimum and working from home was an initial challenge. There was a good side too like being comfortable while working and giving more hours of […]
What is CAPEX Model?Any procurement with the upfront investment is known as capital expenditure or CAPEX Model. Ideally, large enterprises, Multinational companies, Government organizations opt for the CAPEX model for complete ownership, cost-saving benefits, and reduced operational expenditure. What is OPEX Model?Any software services or infrastructure resources subscription without upfront investment is known as operational […]
In the High Availability SSO configuration, there are two WLC (Wireless LAN Controller) at the site, at a time only one WLC will be active, and the other will be in standby mode. All configurations can only do on the Active Wireless controller, and it will share the mirror copy to the standby wireless controller […]
We have read about Docker, its terminologies, advantages, and how one can install Docker in the previous blog. In this blog, we are going to continue with Docker and see what containers are and how to install them and how we can use Docker via GUI. In this blog, we will tell you: What are […]
In the previous blog, we have got an idea about the viruses, the types, and the use of Antivirus to protect endpoints of our IT environment. Whereas, in this blog, we will talk about the best Antivirus solution for an organization. Before moving to the solution, we should talk about the problem of why securing […]
In this part 2 of this blog series, we will cover 2nd pillar of the Cisco DNA Centre workflow that is “POLICY”. Have you read the CISCO DNA CENTER WORKFLOW, the first blog of this series? Preface For security reasons, we use Cisco Identity Services Engine (ISE). In SD-Access environment. This integrates with Cisco DNA Center […]
Companies are stepping up their game and migrating their data to the cloud as the cloud gives various benefits to access the data and consolidations to the user. Whereas some companies still want to follow the old school methods and want to keep their data on the premises; they might have their reasons. If we […]