What is an SSRF attack? When a web application fetches a remote resource without validating the URL provided by the user, an SSRF fault occurs. Even when secured by a firewall, VPN, or another sort of network access control list, it permits an attacker to force the program to send a forged request to an […]
In this article, we are going to discuss how Policy Based Routing (PBR) works with IP SLA. Apart from this blog, I have written other technology blogs that you can read when you click here. What is PBR? PBR stands for Policy Based Routing. It is used to overrule the routing table. The overrule means, […]
In my previous blog, we learned about the BGP neighbourship states and attributes and in this blog, we will learn about EIGRP. EIGRP stands for Enhanced interior gateway routing protocol also known as open standard protocol. It is an IGP protocol and advanced distance routing protocol. Its hello time is 5 sec, hold time is […]
What is Traceroute? Traceroute is the tool that network engineers use to troubleshoot the networks, now if we talk about, what does it do?? So, as its name suggests, the main purpose of a traceroute is to trace the path from source to destination, that is how many hops are coming in between the source […]
In this blog, we will see the importance of Threat Grid and what are the different types of interfaces in this appliance. Threat Grid (TG) is a Sandbox appliance that is very important for the network. Importance of Threat Grid (TG) A Cisco Threat Grid appliance provides safe and highly secure on-premises advanced malware analysis, […]
Cisco DNA Center has many features, out of them one feature is called ‘LAN Automation’ which I like the most. DNA-Center is designed to automatically discover and configure our underlay network that is called LAN automation in the SDA environment. LAN automation brings up the LAN network automatically starting from seed and peer devices. This […]
Hello friends, this is the 2nd part of the Cisco NIPS Day 1 Configuration Guide, if you have not gone through my first part of this blog then you must check that first. In the end, I will share some OEM-related links as well for you, so you can overcome your all doubts and will […]
What is the blacklisting of an IP? A blacklist is a list of suspicious or malicious entities that should be denied access or running rights on a network or system. The blacklisting of IP addresses is a common occurrence on today’s internet. Most of us have encountered networking attacks in one form or another, ranging […]
Hi guys, in this series of blogs, we will talk about different FortiGate HA protocols. FortiGate has different HA protocols FGCP and FGSP. In this blog, we will understand more about FGSP protocol i.e FortiGate Session Life Support Protocol. FGSP was introduced in Fortios 5.0 and above to overcome the HA restrictions over asymmetric traffic, TCP, UDP, […]
What Is Routing? Routing is a process by which we are selecting the path between one or more networks. Routing selects the path for internet Protocol (IP) packets when they are traveling from source to destination. These routing decisions are made by a spatial type of device which is known as a router, or we […]