Shortest Path Bridging (SPB) is an 802.1aq IEEE (Institute of Electrical and Electronic Engineers) standard whose important focus was to highlight and address the challenges of Spanning-tree. But SPB can do much more than STPs emerge: SPB also provides MPLS-like VPN (Virtual Private Network) services but is very significantly simpler to deploy and maintain also. […]
A highly available Kubernetes cluster ensures your applications run without outages which are required for production. In this connection, there are plenty of ways for you to choose from to achieve high availability. This tutorial demonstrates how to configure Keepalived and HAproxy for load balancing and achieve high availability. The steps are listed below: Prepare […]
The year 2022 has been very hardworking for every member of the Zindagi Family. Despite Covid surging like wildfire, we as a company gained so much professionally and in terms of fun too. Here is a recap of 2022. We wrote a lot in 2022. We published more than 150 blogs on our website out […]
In this blog, we are going to discuss SD-Access Overlay Network. You can also refer to it for a basic understanding of SD-Access Wireless. An overlay network runs over the underlay to create a virtualized network. Virtual networks isolate both data plane and control plane traffic among the virtualized networks from the underlay network. Virtualization […]
It is said that if you have to catch the criminal then you have to think like them. In the scenario of a cyberattack, it does not happen in a jiffy, it takes planning and steps by which the systems and servers are hacked. It is important to know what and how a hacker thinks […]
Cloud computing benefits are maximized, and the costs are too when the DevOps approach is followed. In this blog, we will explain the benefits and why cloud with DevOps are great when combined together. Having a DevOps services provider that can combine with the cloud to function better will not only fulfil business goals but […]
In this blog, we are going to discuss SD-Access Wireless. You can also refer to the LISP understanding that is used in SD-Access as a control plane. The SD-Access Wireless architecture provides the following three things: Simplifying the Control & Management Plane Optimizing the Data Plane Integrating Policy & Segmentation E2E We will talk about […]
Earlier, we discussed the AAA framework and products available to provide AAA service. We know that protocols are essential to achieve communication between devices. So, today we are going to shed light on the protocols used between the device and the AAA server and how exactly they work. Several protocols can be used by the […]
A new protocol known as OMP (Overlay Management Protocol) is included in Cisco’s Viptela SDWAN and serves as the overlay network’s nerve centre. The TLS or DTLS tunnels that are created between the vEdge router and the vSmart controller are used by the OMP protocol. The vSmart controllers and vEdge routers in the overlay network […]
All switches that are a component of the ACI fabric are managed and automated provisioned through the APIC. Multiple ACI fabrics may exist within the same data center, and each ACI fabric may have its own APIC cluster and Cisco Nexus 9000 Series switches. Each switch must be registered with the individual APIC cluster that […]