As we know today’s Organizations have a big security concern. Signatures are very important to mitigate various types of attacks. Many vendors provide security solutions like NGFW (Next-Generation Firewall), IPS, and IDS. Mostly server-side, and client-side attacks are identified by the signatures. Every Security vendor has an internal Malware Analysis, Incident Response, and Threat Hunting […]
What is an SSRF attack? When a web application fetches a remote resource without validating the URL provided by the user, an SSRF fault occurs. Even when secured by a firewall, VPN, or another sort of network access control list, it permits an attacker to force the program to send a forged request to an […]
In this blog, we will go through the step-by-step process of upgrading the Radware Alteon (Server load balancer) from its old to the new version. What is SLB? A Server load balancer (SLB) is a piece of hardware (or virtual hardware) that distributes network and/or application traffic across many servers by acting as a reverse […]
In this article, we are going to discuss about one of the most interesting and demanding technology i.e., SD-WAN. The following topics will be covered: Introduction of SDN Traditional Network vs SDN Introduction of SD-WAN SD-WAN Components Introduction of SDN SDN stands for Software Defined Network. It is a software-based technology which provides a centralize […]
It is an unspoken rule that if you are running an organization then you have to take care of cybersecurity. This is the foremost smart step towards the security of your hard work and following the best cybersecurity practices is a must. Seeing the situation now that the world is going through; most of the […]
DHCP (Dynamic Host Configuration Protocol) The Dynamic Host Configuration Protocol is commonly known as DHCP. DHCP is a network management protocol. It is used for assigning the IP address automatically. The DHCP server is also assigned other network configurations at the same time like subnet mask, default gateway, DNS IP Normally in any network assigning […]
In this article, we are going to discuss how Policy Based Routing (PBR) works with IP SLA. Apart from this blog, I have written other technology blogs that you can read when you click here. What is PBR? PBR stands for Policy Based Routing. It is used to overrule the routing table. The overrule means, […]
In this blog first, we will introduce FXOS and then study upgrading FXOS. FXOS: Firepower Extensible Operating System The Firepower Extensible Operating System (FXOS) is the operating system for the Firepower 4100 on the supervisor. The Firepower Chassis Manager is a GUI-based management feature right out of the box to manage Firepower FXOS. The Firepower […]
In this blog, we will see how Cisco IOS routers can be used as a firewall by adding Modular Policy Framework (MPF), which is by default enabled in the ASA firewall. An organization that cannot afford a hardware firewall device can use it as an alternative. These firewall features can be implemented on Cisco IOS […]
Prerequisites for DCNM Installation VMware ESXi host imported into vCenter. Three port groups must be present on the ESXi host- DCNM Management, Enhanced Fabric Management Network, and In-band interface. Make sure no antivirus is running on the host where the VMware vcenter web client is launched for the DCNM OVA installation. Otherwise, the DCNM installation […]