In this blog, we will see the importance of Threat Grid and what are the different types of interfaces in this appliance. Threat Grid (TG) is a Sandbox appliance that is very important for the network. Importance of Threat Grid (TG) A Cisco Threat Grid appliance provides safe and highly secure on-premises advanced malware analysis, […]
Do you know how CentOS/RHEL boots their operating system? If yes, it is very good but if not, it is sad news, because if you are Linux Administrator and you don’t have knowledge about how to operate the system boot you might lack behind in many ways. Well don’t worry, we have got you covered. […]
As we have learned in my previous blog about IGMP (Internet Group Management Protocol) version 1 and version2. Thisblog will cover IGMP version 3 how it is a better approach to use this version, and how IGMPv3 solves the Source authentic issue with the concept of Source-Specific Multicast (SSM). Terminology of IGMP Version 3 IGMPv3 uses Membership Report message as it is like use as the previous IGMP version 1 & version 2. IGMPv3 uses multicast address 224.0.0.22 on all enabledIGMPv3 multicast […]
Here we will discuss what is cloud computing in which we will be discussing about the foundation topics of cloud computing like what is cloud hype, the history about the foundation topics of cloud computing like what is cloud hype, the history about cloud computing, common cloud characteristics, on-demand self-service, rapid elasticity, resource pooling, etc. […]
As a Network Security Engineer, this is our responsibility to secure your organization’s data over the internet. Our goal is to give you detailed information about How your data would be protected over the internet and Which protocols and Frameworks will be used to protect your data. We already discussed IKev1 working with IPsec. In […]
What is IPsec? IPsec VPN (internet protocol security) is a protocol or method to encrypt the traffic between two branches or sites. It is used to secure the traffic over an untrusted network, and we can understand by its name that it provides security of INSIDE network IPs. It provides Confidentiality, Integrity, and Authentication over […]
In this blog, we will learn about VLAN Trunking Protocol generally called VTP. We will see why VTP came into existence and will discuss how it works and where it can be deployed. For understanding, we will take some examples. Before VLAN trunking protocol (VTP), for creation, addition, deletion, renaming of VLAN, we must go […]
An Area type of ospf is a logical group of devices within a single administration. Cisco recommends that the single area should not have more than 50 routers. It has a 32 bit long ID and area-id can be represented in decimal number or ipv4 format Area type of ospf. WHY DO WE USE AREA […]
What is GSLB? Global Server Load Balancer (GSLB) enables balancing server traffic load across multiple physical sites. It Refers to web traffic management and application delivery over multiple data centers whether it is public or private clouds in multiple geographical areas. A load of hosted applications on the servers at each location is managed by […]
What is SDN? SDN is Software Defined Networking, which is an approach of network management, managing our devices centrally. This will give us easy monitoring and easy troubleshooting of distributed network devices. By removing the control plane of network devices, SDN will attempt to centralize the network intelligence in our network component. Having one or […]