The SD-Access solution is made possible by a combination of Cisco DNA Center, the Identity Services Engine (ISE), and fabric-enabled wired and wireless device platforms. The elements of a fabric site are created using wired and wireless device platforms. A fabric site is a node with its own control plane and edge node. A fabric-mode […]
Cisco ACI (Application Centric Infrastructure) was a game-changing Software-Defined Networking (SDN) solution for data centers when it was released in 2013. Over time, there has been a critical requirement for networking companies to have an effective networking device setup approach. Cisco ACI addresses the demand for networking systems to be simple, which has become a […]
How it all started? What is network pivoting? So, after lots of hard work and brainstorming you finally got that sweet Reverse Shell then you escalated your privileges and then you came to know that this current compromised system is not the real target. The TARGET is AD Controller or Admin Desktop and so on […]
As we know today’s Organizations have a big security concern. Signatures are very important to mitigate various types of attacks. Many vendors provide security solutions like NGFW (Next-Generation Firewall), IPS, and IDS. Mostly server-side, and client-side attacks are identified by the signatures. Every Security vendor has an internal Malware Analysis, Incident Response, and Threat Hunting […]
What is an SSRF attack? When a web application fetches a remote resource without validating the URL provided by the user, an SSRF fault occurs. Even when secured by a firewall, VPN, or another sort of network access control list, it permits an attacker to force the program to send a forged request to an […]
In this blog, we will go through the step-by-step process of upgrading the Radware Alteon (Server load balancer) from its old to the new version. What is SLB? A Server load balancer (SLB) is a piece of hardware (or virtual hardware) that distributes network and/or application traffic across many servers by acting as a reverse […]
It is an unspoken rule that if you are running an organization then you have to take care of cybersecurity. This is the foremost smart step towards the security of your hard work and following the best cybersecurity practices is a must. Seeing the situation now that the world is going through; most of the […]
What is Docker? Docker is an open platform for developing, shipping, and running applications. Docker enables you to separate your applications from your infrastructure so you can deliver software quickly. With Docker, you can manage your infrastructure in the same ways you manage your applications. By taking advantage of Docker’s methodologies for shipping, testing, and […]
DHCP (Dynamic Host Configuration Protocol) The Dynamic Host Configuration Protocol is commonly known as DHCP. DHCP is a network management protocol. It is used for assigning the IP address automatically. The DHCP server is also assigned other network configurations at the same time like subnet mask, default gateway, DNS IP Normally in any network assigning […]
In this article, we are going to discuss how Policy Based Routing (PBR) works with IP SLA. Apart from this blog, I have written other technology blogs that you can read when you click here. What is PBR? PBR stands for Policy Based Routing. It is used to overrule the routing table. The overrule means, […]