When you are planning to build your data center, a question arises which says; should you go with Traditional Infrastructure or Hyper-Converged Infrastructure? To be honest, your environmental requirement should be the driving factor over here for your preferred architecture. If a more unique virtualization platform is required, then you would want to choose every […]
Transferring all FSMO rolesHere we will explain how to transfer all FSMO roles, Primary Domain controller to Additional Domain controller.Active Directory has five FSMO roles, two of which are “Enterprise Level” and the rest three are “Domain Level”Enterprise Level or Forest-wide roleSchema masterDomain Naming MasterDomain Level or Domain-wide roleRID MasterPDC EmulatorInfrastructure Master. Brief Introduction of […]
No one ever thought that the situation would become such that people would be forced to work from home for an unexpected amount of time. This is a very crucial time taking into consideration the data that is with the employees in their homes which was initially within the office premise. Security breaches and data […]
In this blog post, you will learn various deployment modes of the Cisco Wireless LAN Controller (WLC) and it explains the nuances of each model and requires beginner to intermediate level of skill related to Wireless Technology. After reading this blog you will be able to distinguish between the different WLC deployment models and will […]
In this part 2 of this blog series, we will cover all the major features of ACI in detail. Have you read the overview of CISCO ACI for your Data Center yet? Simplified Automation with Application-Driven Policy Model Think of a Data Center with 50 Leaf Switches and a pair of Spine Switches, your job […]
Although Cisco Meeting Server and Cisco Webex might seem solutions with similar functionality, these two are completely different in terms of architecture, licensing, and features they provide. Cisco meeting server provides a similar experience as WebEx which is why most people get confused between these two solutions. Here are some differences: On one side Cisco […]
As previously mentioned on how VXLAN resolves the Mobility (VMs can move anywhere from one data center to another location without any changes), Scalability (VLAN 4K to VXLAN 16 Million Logical Network), and encapsulation related limitation. Here we will know how traffic flooding is controlled by the EVPN and the use of BGP as a […]
This blog post will explain how:1. Password based SSH works (briefly),2. Password-less SSH works differently,3. To configure it for any Linux based platform,4. In what scenario should you use it,5. To revert to the regular SSH. After reading this blog post you will be able to understand what goes behind making password-less SSH work and […]
The Firewall means a device/system/software. We use it to secure a trusted network from an untrusted network. We defined policies on the firewall to allow the trusted traffic or to stop unauthorized access.Now, the firewall is not used only to allow and disallow the traffic, it also comes with multiple features of filtering Network Devices, […]
CUCM is the heart of Cisco Collaboration. The server which integrates with all servers for signaling and is accountable for registrations of almost all devices should be in good health. A good plan to check health is very important. How to check? What to check specifically? What is alarming? Need not worry, the information below […]