DHCP (Dynamic Host Configuration Protocol) The Dynamic Host Configuration Protocol is commonly known as DHCP. DHCP is a network management protocol. It is used for assigning the IP address automatically. The DHCP server is also assigned other network configurations at the same time like subnet mask, default gateway, DNS IP Normally in any network assigning […]
In this article, we are going to discuss how Policy Based Routing (PBR) works with IP SLA. Apart from this blog, I have written other technology blogs that you can read when you click here. What is PBR? PBR stands for Policy Based Routing. It is used to overrule the routing table. The overrule means, […]
The agenda of this blog is to try to understand Steganography Basics, its diverse types, and some tools so that you can do the hands-on practice. What is Steganography? It is a practice of hiding messages in plain sight. It is a Greek word that means Stegano → “covered” & Graphia → “writing”. It is […]
In this blog first, we will introduce FXOS and then study upgrading FXOS. FXOS: Firepower Extensible Operating System The Firepower Extensible Operating System (FXOS) is the operating system for the Firepower 4100 on the supervisor. The Firepower Chassis Manager is a GUI-based management feature right out of the box to manage Firepower FXOS. The Firepower […]
In this blog, we will see how Cisco IOS routers can be used as a firewall by adding Modular Policy Framework (MPF), which is by default enabled in the ASA firewall. An organization that cannot afford a hardware firewall device can use it as an alternative. These firewall features can be implemented on Cisco IOS […]
As we discussed in our previous blog our boss gave a task to Update the Linux machine and Install Apache Server. The machine was to place in Air Gaped Network, while we did not have access to the internet connection. In our previous blog, we used the apt-offline tool to achieve the task. But the […]
Prerequisites for DCNM Installation VMware ESXi host imported into vCenter. Three port groups must be present on the ESXi host- DCNM Management, Enhanced Fabric Management Network, and In-band interface. Make sure no antivirus is running on the host where the VMware vcenter web client is launched for the DCNM OVA installation. Otherwise, the DCNM installation […]
vPC (Virtual Port Channel) is a Layer 2 technology used in Cisco Nexus Switch that enables the device to appear as a single logical device for the end host. It is an advanced version of VSS technology. The Benefits of vPC are as follows Each peer device in the vPC domain runs its control plane […]
What is cross-site scripting (XXS)? Cross-site scripting (XSS) is a web security vulnerability that allows an attacker to compromise user interactions with a vulnerable application. It allows an attacker to get around the same-origin policy, which is intended to keep websites separate from one another. Cross-site scripting vulnerabilities allow the attacker to imitate a victim […]
In this blog, we will see how we can upgrade the Fortinet firewall with format and upgrade process, usually, to upgrade the Fortinet devices there is always a specific upgrade path that has to be followed each and every time but the procedure which we are going to see also an official procedure to upgrade […]