In my previous blog, we learned about the BGP neighbourship states and attributes and in this blog, we will learn about EIGRP. EIGRP stands for Enhanced interior gateway routing protocol also known as open standard protocol. It is an IGP protocol and advanced distance routing protocol. Its hello time is 5 sec, hold time is […]
Session Hijacking Session hijacking can be done when a user session is hijacked by the hacker when he is currently logged in and lose control of the session, then the hacker can easily steal their personal data, bank details whenever a user starts a session and log in into bank websites. While hijacking a session […]
What is Traceroute? Traceroute is the tool that network engineers use to troubleshoot the networks, now if we talk about, what does it do?? So, as its name suggests, the main purpose of a traceroute is to trace the path from source to destination, that is how many hops are coming in between the source […]
Network File Systems, commonly known as NFS, is file-level storage, allocated by shared storage. The way you access local files, NFS allows you to access files in an analogous way as a remote host as well. NFS offers some extremely useful features. Data at the central host can be accessed by multiple clients Data consume […]
In this blog, we will see the importance of Threat Grid and what are the different types of interfaces in this appliance. Threat Grid (TG) is a Sandbox appliance that is very important for the network. Importance of Threat Grid (TG) A Cisco Threat Grid appliance provides safe and highly secure on-premises advanced malware analysis, […]
Do you know how CentOS/RHEL boots their operating system? If yes, it is very good but if not, it is sad news, because if you are Linux Administrator and you don’t have knowledge about how to operate the system boot you might lack behind in many ways. Well don’t worry, we have got you covered. […]
As we have learned in my previous blog about IGMP (Internet Group Management Protocol) version 1 and version2. Thisblog will cover IGMP version 3 how it is a better approach to use this version, and how IGMPv3 solves the Source authentic issue with the concept of Source-Specific Multicast (SSM). Terminology of IGMP Version 3 IGMPv3 uses Membership Report message as it is like use as the previous IGMP version 1 & version 2. IGMPv3 uses multicast address 224.0.0.22 on all enabledIGMPv3 multicast […]
Here we will discuss what is cloud computing in which we will be discussing about the foundation topics of cloud computing like what is cloud hype, the history about the foundation topics of cloud computing like what is cloud hype, the history about cloud computing, common cloud characteristics, on-demand self-service, rapid elasticity, resource pooling, etc. […]
As a Network Security Engineer, this is our responsibility to secure your organization’s data over the internet. Our goal is to give you detailed information about How your data would be protected over the internet and Which protocols and Frameworks will be used to protect your data. We already discussed IKev1 working with IPsec. In […]
What is IPsec? IPsec VPN (internet protocol security) is a protocol or method to encrypt the traffic between two branches or sites. It is used to secure the traffic over an untrusted network, and we can understand by its name that it provides security of INSIDE network IPs. It provides Confidentiality, Integrity, and Authentication over […]