In this blog, we will see the importance of Threat Grid and what are the different types of interfaces in this appliance. Threat Grid (TG) is a Sandbox appliance that is very important for the network. Importance of Threat Grid (TG) A Cisco Threat Grid appliance provides safe and highly secure on-premises advanced malware analysis, […]
Do you know how CentOS/RHEL boots their operating system? If yes, it is very good but if not, it is sad news, because if you are Linux Administrator and you don’t have knowledge about how to operate the system boot you might lack behind in many ways. Well don’t worry, we have got you covered. […]
As we have learned in my previous blog about IGMP (Internet Group Management Protocol) version 1 and version2. Thisblog will cover IGMP version 3 how it is a better approach to use this version, and how IGMPv3 solves the Source authentic issue with the concept of Source-Specific Multicast (SSM). Terminology of IGMP Version 3 IGMPv3 uses Membership Report message as it is like use as the previous IGMP version 1 & version 2. IGMPv3 uses multicast address 224.0.0.22 on all enabledIGMPv3 multicast […]
Here we will discuss what is cloud computing in which we will be discussing about the foundation topics of cloud computing like what is cloud hype, the history about the foundation topics of cloud computing like what is cloud hype, the history about cloud computing, common cloud characteristics, on-demand self-service, rapid elasticity, resource pooling, etc. […]
As a Network Security Engineer, this is our responsibility to secure your organization’s data over the internet. Our goal is to give you detailed information about How your data would be protected over the internet and Which protocols and Frameworks will be used to protect your data. We already discussed IKev1 working with IPsec. In […]
What is meant by a Fail-Over? How does it works on Cisco ASA? The meaning of the word “Fail-Over” is a procedure by which a system automatically transfers control to a duplicate system when it detects a fault or failure. In this blog, we will learn how Active-Active Failover works on Cisco ASA. So, when an ASA […]
What is IPsec? IPsec VPN (internet protocol security) is a protocol or method to encrypt the traffic between two branches or sites. It is used to secure the traffic over an untrusted network, and we can understand by its name that it provides security of INSIDE network IPs. It provides Confidentiality, Integrity, and Authentication over […]
In this blog, we will learn about VLAN Trunking Protocol generally called VTP. We will see why VTP came into existence and will discuss how it works and where it can be deployed. For understanding, we will take some examples. Before VLAN trunking protocol (VTP), for creation, addition, deletion, renaming of VLAN, we must go […]
An Area type of ospf is a logical group of devices within a single administration. Cisco recommends that the single area should not have more than 50 routers. It has a 32 bit long ID and area-id can be represented in decimal number or ipv4 format Area type of ospf. WHY DO WE USE AREA […]
Communication between two private networks is not possible as the ISP is not aware of the private IP and moreover ACL is created on the ISP side which denies the private network. However, we can make communication possible with GRE. What is GRE? It stands for Generic Router Encapsulation. GRE is a Layer 3 Protocol. […]