Prerequisites for DCNM Installation VMware ESXi host imported into vCenter. Three port groups must be present on the ESXi host- DCNM Management, Enhanced Fabric Management Network, and In-band interface. Make sure no antivirus is running on the host where the VMware vcenter web client is launched for the DCNM OVA installation. Otherwise, the DCNM installation […]
vPC (Virtual Port Channel) is a Layer 2 technology used in Cisco Nexus Switch that enables the device to appear as a single logical device for the end host. It is an advanced version of VSS technology. The Benefits of vPC are as follows Each peer device in the vPC domain runs its control plane […]
In the previous blog, I have discussed complete insights to EIGRP and its messages and you can read the blog on our website. Stuck in active in EIGRP When a router notices a route failure and there is no feasible successor, that route moves in active state from passive. That route sends a query message […]
What is cross-site scripting (XXS)? Cross-site scripting (XSS) is a web security vulnerability that allows an attacker to compromise user interactions with a vulnerable application. It allows an attacker to get around the same-origin policy, which is intended to keep websites separate from one another. Cross-site scripting vulnerabilities allow the attacker to imitate a victim […]
In this blog, we will see how we can upgrade the Fortinet firewall with format and upgrade process, usually, to upgrade the Fortinet devices there is always a specific upgrade path that has to be followed each and every time but the procedure which we are going to see also an official procedure to upgrade […]
As we know In Air-Gapped Network has no internet connectivity, and all the communication takes place between sites and devices using private IP addresses. If we want to update or install any package on a Linux machine it is not a big hurdle for us, if the machine is connected to the Internet. But suppose, […]
In the last blog, we discussed STP and how it works, types of topology change, and their effect on the network. In this, we will explain what different mechanisms are to protect STP. Types of mechanisms to protect STP are as follows: – Root Guard Loop Guard BPDU Guard BPDU Filter UDLD Root Guard It […]
In my previous blog, we learned about the BGP neighbourship states and attributes and in this blog, we will learn about EIGRP. EIGRP stands for Enhanced interior gateway routing protocol also known as open standard protocol. It is an IGP protocol and advanced distance routing protocol. Its hello time is 5 sec, hold time is […]
Session Hijacking Session hijacking can be done when a user session is hijacked by the hacker when he is currently logged in and lose control of the session, then the hacker can easily steal their personal data, bank details whenever a user starts a session and log in into bank websites. While hijacking a session […]
What is Traceroute? Traceroute is the tool that network engineers use to troubleshoot the networks, now if we talk about, what does it do?? So, as its name suggests, the main purpose of a traceroute is to trace the path from source to destination, that is how many hops are coming in between the source […]