As we know In Air-Gapped Network has no internet connectivity, and all the communication takes place between sites and devices using private IP addresses. If we want to update or install any package on a Linux machine it is not a big hurdle for us, if the machine is connected to the Internet. But suppose, […]
In the last blog, we discussed STP and how it works, types of topology change, and their effect on the network. In this, we will explain what different mechanisms are to protect STP. Types of mechanisms to protect STP are as follows: – Root Guard Loop Guard BPDU Guard BPDU Filter UDLD Root Guard It […]
In my previous blog, we learned about the BGP neighbourship states and attributes and in this blog, we will learn about EIGRP. EIGRP stands for Enhanced interior gateway routing protocol also known as open standard protocol. It is an IGP protocol and advanced distance routing protocol. Its hello time is 5 sec, hold time is […]
Session Hijacking Session hijacking can be done when a user session is hijacked by the hacker when he is currently logged in and lose control of the session, then the hacker can easily steal their personal data, bank details whenever a user starts a session and log in into bank websites. While hijacking a session […]
What is Traceroute? Traceroute is the tool that network engineers use to troubleshoot the networks, now if we talk about, what does it do?? So, as its name suggests, the main purpose of a traceroute is to trace the path from source to destination, that is how many hops are coming in between the source […]
Network File Systems, commonly known as NFS, is file-level storage, allocated by shared storage. The way you access local files, NFS allows you to access files in an analogous way as a remote host as well. NFS offers some extremely useful features. Data at the central host can be accessed by multiple clients Data consume […]
In this blog, we will see the importance of Threat Grid and what are the different types of interfaces in this appliance. Threat Grid (TG) is a Sandbox appliance that is very important for the network. Importance of Threat Grid (TG) A Cisco Threat Grid appliance provides safe and highly secure on-premises advanced malware analysis, […]
Do you know how CentOS/RHEL boots their operating system? If yes, it is very good but if not, it is sad news, because if you are Linux Administrator and you don’t have knowledge about how to operate the system boot you might lack behind in many ways. Well don’t worry, we have got you covered. […]
As we have learned in my previous blog about IGMP (Internet Group Management Protocol) version 1 and version2. Thisblog will cover IGMP version 3 how it is a better approach to use this version, and how IGMPv3 solves the Source authentic issue with the concept of Source-Specific Multicast (SSM). Terminology of IGMP Version 3 IGMPv3 uses Membership Report message as it is like use as the previous IGMP version 1 & version 2. IGMPv3 uses multicast address 224.0.0.22 on all enabledIGMPv3 multicast […]
Here we will discuss what is cloud computing in which we will be discussing about the foundation topics of cloud computing like what is cloud hype, the history about the foundation topics of cloud computing like what is cloud hype, the history about cloud computing, common cloud characteristics, on-demand self-service, rapid elasticity, resource pooling, etc. […]