In this article, we are going to discuss the feature called ‘N+N’ High Availability in Cisco Wireless Controller. The“N+N” HA solution is used when the backup controller is located geographically at a separate data center. Here, ‘N+N’ means how many WLCs we have, each WLC will have a backup controller on the other side. Why […]
This blog is a continuation of our CISCO DNA CENTER WORKFLOW Series. In Part 1, we discussed the Design of Cisco DNA Center Workflow, in the second part, we discussed the Policies of Cisco DNA Workflow, whereas, in the third part, we discussed the Provision aspect of Cisco DNA workflow. In this part 4, we […]
For remote users/employees of the company, connectivity with security is required to access resources and information of the office. Using Cisco AnyConnect and Cisco FTD we can achieve the same. We will configure RA VPN (Remote access VPN) in Cisco FTD and install Cisco AnyConnect software in the client system to achieve the requirement. Preresiquites– […]
Device Administration We can control the access who can log in to a network device via Console, Telnet, SSH, or any other methods. Device Administration is a process of AAA to control the access of network devices, which can by any method. A device administrator is a user, who logs into the Network Devices such […]
We came across a challenge in one of our deployments where we had provisioned the virtual machines and handed them over to the application team to work on deploying their application on the VMs. The issue that we faced is that VM – A was able to ping VM – B but it was happening […]
Data loss prevention, sometimes referred to as data leak prevention is the practice to ensure that there are no data breaches and sensitive data is not lost or misused. DLP is defined as technologies to perform both content inspection and contextual analysis of data sent via messaging applications, in use on a managed endpoint device, […]
Our goal as a Network Security Engineer is to be able to provide secure channels of communication over unsecured networks. E.g., the Internet. We have 2 remote offices we are trying to connect or remote users and a central office that we are trying to connect, and we want to make sure that we have […]
What do you understand by the term CYBERSECURITY? Novices may think about a group of hackers wearing masks of anonymous and breaking in a website to steal the data. This might be the scene and we are not denying it, but they might be hidden in plain sight. They may be people with who you […]
Cisco Meeting Server is a Secure on-premises Video Conferencing solution that is easy to configure and for that, you just need to have some understanding of CMS components. Most new users get confused with what all is required to know and configure. In this blog, we will cover the deployment models and basic configuration to set up […]
ACI (Application Centric Infrastructure) and NX-OS (Nexus Operation System) both are the very advance technology which is mostly used in Cisco Nexus Switches in Data Center. With this technology, most of the customers are shifting from a legacy network to ACI and VXLAN concepts. As we know the VXLAN protocol overcomes this limitation by using […]