According to Gartner, by the year 2022, around 80% of new business applications will be accessed through Zero Trust Network Access and by 2023, around 60% of enterprises will be phasing out their remote access VPN in the favor of ZTNA. What is ZTNA? It is a software defines perimeter service that provides secure and […]
OSPF stands for Open Shortest Path First, it is open standard protocol, it belongs to IGP Protocol, it is a link-state routing protocol, it sends first-time full update after that it sends a partial update. And it has an unlimited hop count limit. OSPF is used protocol number 89 and the default administrative distance (AD) […]
In the last blog we have explained what STP is and how does it work. Today we will see different topology changes in STP and its effect on the network. Types Of Topology Change Insignificant topology change Indirect topology change Direct topology change Insignificant Topology Change When the access port of the switch goes down […]
What is SDN? SDN is Software Defined Networking, which is an approach of network management, managing our devices centrally. This will give us easy monitoring and easy troubleshooting of distributed network devices. By removing the control plane of network devices, SDN will attempt to centralize the network intelligence in our network component. Having one or […]
It is an EGP protocol (it can form a neighborship between two AS’s). It is a path-vector routing protocol (it uses multiple attributes to select the best path). It is highly scalable than IGP (it can have lakh of routes in its BGP table). It is a reliable protocol because it uses TCP. It uses […]
Ethical Hacking involves attacking and trying to gain access to a computer, server, database, or application. Ethical hackers are also known as white hats, ethical hackers are security experts that perform these assessments. It helps to improve the security posture of an organization. There Are Mainly Five Steps In Hacking Reconnaissance The first step of […]
What is DNS? DNS translates domain names to IP addresses by which the browsers can load resources over the internet. Each device connected to the Internet has a unique IP address which is the identity to find other machines over the internet. DNS servers eliminate the need for humans to memorize IP addresses such as 192.168.1.1 (in […]
In this article, we are going to discuss MACSec & its role in our network environment. The following topics will be covered in this article: What is MACSec? Why MACSec as a solution? How MACSec works? Configuration of MACSec What is MACSec? MACSec stands for Media Access Control Security. It was introduced in 2006 […]
What is the blacklisting of an IP? A blacklist is a list of suspicious or malicious entities that should be denied access or running rights on a network or system. The blacklisting of IP addresses is a common occurrence on today’s internet. Most of us have encountered networking attacks in one form or another, ranging […]
In this blog, you will see about the necessary config. of NIPS 8350 (Network Intrusion Prevention System). We will give you point-to-point information, will not complicate this by going into deep theories. We will keep it technical for your better understanding. We are using hardened operating system Cisco Sourcefire NIPS-8350 physical device in this blog […]