In this blog, we are going to discuss SD-Access Overlay Network. You can also refer to it for a basic understanding of SD-Access Wireless. An overlay network runs over the underlay to create a virtualized network. Virtual networks isolate both data plane and control plane traffic among the virtualized networks from the underlay network. Virtualization […]
In this blog, we are going to discuss SD-Access Wireless. You can also refer to the LISP understanding that is used in SD-Access as a control plane. The SD-Access Wireless architecture provides the following three things: Simplifying the Control & Management Plane Optimizing the Data Plane Integrating Policy & Segmentation E2E We will talk about […]
In this article, we are going to discuss VXLAN & its role in our network environment. The following topics will be covered in this article: What is VXLAN? Why VXLAN as a solution? How VXLAN works? Configuration of VXLAN What is VXLAN? VXLAN stands for Media Access Control Security. It was introduced in 2006 by […]
Regardless of the fact that next-generation LANs should indeed be built on SD-Access technology, many businesses currently use an intermediate solution to secure their wired networks. This entails using a mix of 802.1x and MAC Authentication Bypass (MAB). The endpoints that connect to the access layer can be authenticated and authorized using those techniques. Many […]