This blog is a continuation of the What is Wi-Fi Heatmap and Wireless Parameters Series. In Part 1, we discussed Heatmaps and basic Wireless Parameters. In the second part, we will continue with the first steps to a Wi-Fi network Design and considerations. Wi-Fi Design Wi-Fi design is the process of taking your business requirements […]
Have you forgotten the network administrator password for the Cisco Nexus switch? If so, this tutorial can show you other ways to get it back. But before you begin the password recovery procedure, you should be informed of the following: What to Do If a Device Has Two Supervisor Modules If a device has two […]
In this blog, we are going to discuss the WLC discovery process and the configuration steps for a WLC HA SSO pair in SD-Access (SDA). You can also refer to Basic Concepts of SD-Access Wireless. The following section will be covered in this Blog: Steps for WLC Discovery via DNAC Steps for WLC HA SSO […]
Have you ever noticed that Wi-Fi Speeds can vary depending on where you are standing at the location? When you have to send an important mail or browse the web, but slow Wi-Fi connection. You can easily identify and fixed by Wi-Fi heatmap analysis. In This blog, we will know about Wi-Fi Heatmaps and wireless […]
The SD-Access solution is made possible by a combination of Cisco DNA Center, the Identity Services Engine (ISE), and fabric-enabled wired and wireless device platforms. The elements of a fabric site are created using wired and wireless device platforms. A fabric site is a node with its own control plane and edge node. A fabric-mode […]
Cisco ACI (Application Centric Infrastructure) was a game-changing Software-Defined Networking (SDN) solution for data centers when it was released in 2013. Over time, there has been a critical requirement for networking companies to have an effective networking device setup approach. Cisco ACI addresses the demand for networking systems to be simple, which has become a […]
What is an SSRF attack? When a web application fetches a remote resource without validating the URL provided by the user, an SSRF fault occurs. Even when secured by a firewall, VPN, or another sort of network access control list, it permits an attacker to force the program to send a forged request to an […]
In the last blog, we discussed STP and how it works, types of topology change, and their effect on the network. In this, we will explain what different mechanisms are to protect STP. Types of mechanisms to protect STP are as follows: – Root Guard Loop Guard BPDU Guard BPDU Filter UDLD Root Guard It […]
In my previous blog, we learned about the BGP neighbourship states and attributes and in this blog, we will learn about EIGRP. EIGRP stands for Enhanced interior gateway routing protocol also known as open standard protocol. It is an IGP protocol and advanced distance routing protocol. Its hello time is 5 sec, hold time is […]
Session Hijacking Session hijacking can be done when a user session is hijacked by the hacker when he is currently logged in and lose control of the session, then the hacker can easily steal their personal data, bank details whenever a user starts a session and log in into bank websites. While hijacking a session […]