The Firewall means a device/system/software. We use it to secure a trusted network from an untrusted network. We defined policies on the firewall to allow the trusted traffic or to stop unauthorized access.Now, the firewall is not used only to allow and disallow the traffic, it also comes with multiple features of filtering Network Devices, […]
CUCM is the heart of Cisco Collaboration. The server which integrates with all servers for signaling and is accountable for registrations of almost all devices should be in good health. A good plan to check health is very important. How to check? What to check specifically? What is alarming? Need not worry, the information below […]
What is SDA? SDA stands for software-defined network it is the transformation of the traditional campus area network; it gives much new functionality which traditional network was lacking. It makes it possible to design and build networks by decoupling the control and forwarding planes. It works on the approach of Software-Defined Networking (SDN) network architecture […]
Data Centers are in news again and this time it is Microsoft’s Data Center and this time it is bigger than that time when a submarine-like data center was submerged in the sea by the researchers. The submerged rack is sunken in special engineered fluid in Microsoft Data Center situated in Quincy, Washington. This has […]
Knowing tcpdump is an essential skill that will come in handy for any System Administrator, Network Engineer, and security professional. Tcpdump is an immensely powerful command-line interface packet sniffer. It must be launched as root or with superuser rights because of its use of the promiscuous mode or to be sure to have sufficient privileges […]
Database Replication plays a wide role if you have a call manager cluster environment. It should function properly to provide uninterrupted services to the users. How to check the DB Replication status of your Call Manager Cluster? At first, we will have to run command Check the output and verify if Cluster Replication State contains […]
CISCO ISE Introduction: CISCO Identity Services Engine is a prominent NAC and identity grounded solution from cisco which provides a solution to streamline security policy management, reduce operating costs, and dispenses a single network access policy plan all over the organization amalgamating multiple services. It is a type of policy platform that permits you to […]
Why Should You Need To Know About CISCO ACI? For a very long period, Data Center Industry has been using the legacy 3 Tier Data Center Network Architecture. These legacy networks were mostly network-centric. Today, traditions have mostly changed and over the last few years, the industry saw big data centers moving towards Software Defined […]
To understand various load balancing methods, we will first know about the servers i.e., virtual server and a real server. This will help us to decide which load-balancing method will be most preferable in the network and then according to services, we can apply a suitable load balancing method for each virtual server. What is […]
Have you ever stumbled upon a VxRail deployment and you do not have a systematic approach on how to install a VxRail cluster? Do not worry we have got you covered! VxRail deployments can be very daunting if pre-requisites are not met properly. VxRail cluster is a Hyper-Converged Infrastructure that can be built with at […]