Ethernet is a part of wired computer networking technologies that are mostly used in LAN, MAN and WAN. It was industrially introduced in 1980 and firstly standardized in 1983 as IEEE 802.3. Ethernet DIX Header This Header is owned by DIX (Digital, Intel and Xerox) (Ethernet DIX) This header is used at layer 2 for […]
Earlier, we discussed the AAA framework and products available to provide AAA service. We know that protocols are essential to achieve communication between devices. So, today we are going to shed light on the protocols used between the device and the AAA server and how exactly they work. Several protocols can be used by the […]
All switches that are a component of the ACI fabric are managed and automated provisioned through the APIC. Multiple ACI fabrics may exist within the same data center, and each ACI fabric may have its own APIC cluster and Cisco Nexus 9000 Series switches. Each switch must be registered with the individual APIC cluster that […]
Before moving forward to see how traffic flows in the ACI environment let’s have a look at a few terminologies which are required to understand the traffic flow. What Are Endpoints? Endpoints are the devices/host which is connected to the fabric. In ACI endpoint can be represented by MAC or IP with /32 masks. There […]
Data management, simple access and sharing of the pool of resources have been transformed with the help of cloud computing solutions. As the data is being transferred to the cloud, disasters are prone to mishappenings and for that, a cloud disaster recovery plan or cloud DR plan is important to make sure that no data […]
Microsoft Azure is frequently linked to big businesses with an international presence. Although 95% of Fortune 500 firms employ Azure, many small and medium-sized enterprises in a variety of sectors, including manufacturing, government, healthcare, financial services, and retail, have already found that Azure can help them meet their goals. What Exactly Is Microsoft Azure? A […]
With the rise of the Wireless Technological domain in the world, Is it the sole purpose of the Access points (APs) to just connect the devices to the world of the Internet? With every technology breaking the shackles of being kept bound by wires and roaming around free by being wireless The roles and responsibilities […]
In this blog, we are going to discuss the IS-IS protocol which is widely used in large ISP domains. You can also refer to the LISP understanding that is used in SD-Access as a control plane. The IS-IS protocol stands for “Intermediate System to Intermediate System”. The following section will be covered in this blog: […]
A Layer-3 virtualization technology called Virtual Routing and Forwarding (VRF) is used to virtualize routing tables so that numerous routing tables can coexist and function simultaneously in a single hardware router. Layer-3 direct routing is possible between any two devices in the same VRF; however, it is not possible to reach a device in another […]
Network security is an essential part of an IT infrastructure. So is remote access administration. It is usually enforced in the form of a centralized access mechanism. Such a framework takes care of three key components of network access – Authentication, Authorization, and Accounting, or AAA. AAA is a security framework that controls user access […]