What is Traceroute? Traceroute is the tool that network engineers use to troubleshoot the networks, now if we talk about, what does it do?? So, as its name suggests, the main purpose of a traceroute is to trace the path from source to destination, that is how many hops are coming in between the source […]
Network File Systems, commonly known as NFS, is file-level storage, allocated by shared storage. The way you access local files, NFS allows you to access files in an analogous way as a remote host as well. NFS offers some extremely useful features. Data at the central host can be accessed by multiple clients Data consume […]
In this blog, we will see the importance of Threat Grid and what are the different types of interfaces in this appliance. Threat Grid (TG) is a Sandbox appliance that is very important for the network. Importance of Threat Grid (TG) A Cisco Threat Grid appliance provides safe and highly secure on-premises advanced malware analysis, […]
Do you know how CentOS/RHEL boots their operating system? If yes, it is very good but if not, it is sad news, because if you are Linux Administrator and you don’t have knowledge about how to operate the system boot you might lack behind in many ways. Well don’t worry, we have got you covered. […]
As we have learned in my previous blog about IGMP (Internet Group Management Protocol) version 1 and version2. Thisblog will cover IGMP version 3 how it is a better approach to use this version, and how IGMPv3 solves the Source authentic issue with the concept of Source-Specific Multicast (SSM). Terminology of IGMP Version 3 IGMPv3 uses Membership Report message as it is like use as the previous IGMP version 1 & version 2. IGMPv3 uses multicast address 224.0.0.22 on all enabledIGMPv3 multicast […]
Here we will discuss what is cloud computing in which we will be discussing about the foundation topics of cloud computing like what is cloud hype, the history about the foundation topics of cloud computing like what is cloud hype, the history about cloud computing, common cloud characteristics, on-demand self-service, rapid elasticity, resource pooling, etc. […]
As a Network Security Engineer, this is our responsibility to secure your organization’s data over the internet. Our goal is to give you detailed information about How your data would be protected over the internet and Which protocols and Frameworks will be used to protect your data. We already discussed IKev1 working with IPsec. In […]
When running a business, it can be a daunting task to juggle different technologies and find effective solutions. Here at Zindagi Technologies Private Limited, we help our partners solve their unique challenges through innovative, integrated, and optimized solutions. We are a New Delhi-based technology partner that harnesses the power of business intelligence to serve our […]
BGP Neighborship States And Attributes? Idle – neighbor shutdown/waiting for start 3-way handshake. Connect – try to connect TCP connection but won’t be confirmed. Active – TCP connection not completed, retrying to form tcp connection. Open-sent – TCP connection completed and sent the open message. Open-confirm – exchange open message, parameter agreed, send keep-alive after […]
Cisco DNA Center has many features, out of them one feature is called ‘LAN Automation’ which I like the most. DNA-Center is designed to automatically discover and configure our underlay network that is called LAN automation in the SDA environment. LAN automation brings up the LAN network automatically starting from seed and peer devices. This […]