Before moving forward to see how traffic flows in the ACI environment let’s have a look at a few terminologies which are required to understand the traffic flow. What Are Endpoints? Endpoints are the devices/host which is connected to the fabric. In ACI endpoint can be represented by MAC or IP with /32 masks. There […]
Microsoft Azure is frequently linked to big businesses with an international presence. Although 95% of Fortune 500 firms employ Azure, many small and medium-sized enterprises in a variety of sectors, including manufacturing, government, healthcare, financial services, and retail, have already found that Azure can help them meet their goals. What Exactly Is Microsoft Azure? A […]
With the rise of the Wireless Technological domain in the world, Is it the sole purpose of the Access points (APs) to just connect the devices to the world of the Internet? With every technology breaking the shackles of being kept bound by wires and roaming around free by being wireless The roles and responsibilities […]
A Layer-3 virtualization technology called Virtual Routing and Forwarding (VRF) is used to virtualize routing tables so that numerous routing tables can coexist and function simultaneously in a single hardware router. Layer-3 direct routing is possible between any two devices in the same VRF; however, it is not possible to reach a device in another […]
Network security is an essential part of an IT infrastructure. So is remote access administration. It is usually enforced in the form of a centralized access mechanism. Such a framework takes care of three key components of network access – Authentication, Authorization, and Accounting, or AAA. AAA is a security framework that controls user access […]
This is the 3rd and last part of Layer 2 Security. We have already discussed MAC Attacks, VLAN Hopping attacks in Part 1 and DHCP Attacks, and GARP Attacks in Part 2. If you really need to secure your Layer-2 of the network, then please follow all the parts, and apply Layer-2 Security in your […]
In this Blog, we will learn about simple steps to configure Your VPN (Virtual Private Network) on the AWS (Amazon Web Services) Cloud. This helps you to configure your Private Network. Let Us First Understand What Is VPN? VPN stands for Virtual Private Network. It is used to connect private Networks (Remote locations) with the […]
IPV4 or Internet Protocol Version 4 is an address that provides a unique identity to the devices on the Internet and Intranet. For Example (Non-Technical) Two people from different countries want to talk to each other with their mobile phones but if they don’t own a phone number, they can’t be able to contact each […]
Intersight is a cloud-based, software as a service (SaaS) platform that enables us to centrally manage the UCS manager and its components including their operations, optimizations, health checkups, service profiles, fabric interconnect, hyperflex clusters, policies, and the devices connected to them. It mainly includes Cisco C-Series rack servers, Blade servers, Fabric Interconnects, and even the HX […]
During the pandemic when the world was fighting the deadly virus, organizations were struggling with a sudden change in working conditions. The companies were in the initial stages of bringing the work online and remote and nobody was prepared for it. The sudden change in the working conditions in the organization would only be fulfilled […]