In this blog, we will discuss the fundamentals of Firewall services introduced in CentOS named FirewallD. Firewalld provides a way to configure dynamic firewall rules in Linux that can be applied instantly, without the need for firewall restart and it supports D-BUS and zone concepts which mark configures easy. It comes with an extremely powerful […]
As we learn in the last blog Multicasts with PIM DM (Protocol Independent Dense Mode) in this blog we will learn why we need Sparse Mode in PIM. To understand this, we require PIM Dense mode disadvantages. One of the big disadvantages of Multicast DM is, multicast stream sends (Flood) to all PIM enables routers […]
In this blog, we are going to talk about VSS and tell you how to configure the VSS in the live environment. We will see the prerequisite and limitations for configuring VSS first and then will come up with the VSS configuration. The following topics will be covered in this blog: Prerequisite for configuring VSS […]
What Is Nac? Network access control (NAC) is a solution that supports network visibility, access management through policy enforcement on devices and users of a corporate network. Why Do We Need Nac? In organizations now we have exponential growth of mobile devices and the endpoint that accessing their network and then they bring the security […]
What is SPAN? SPAN stands for switchport analyzer .it is also called port mirroring. To analyze network traffic passing through the port by using span. How do SPAN works? It will send a copy of the traffic to another port on the switch. Span monitors received or sent (both) traffic on one or more source […]
STP is a Layer 2 protocol that makes a loop-free network topology by blocking the redundant path. STP elects the root bridge, and it will decide which port will be in forwarding and blocking state. A switch that has the lowest bridge-id will become a root bridge. Priority is a decimal number, ranging from 0-65535. […]
It is called link aggregation. It is used to aggregate multiple physical links into a single logical link. That logical link is called a port channel. What are the requirements of Etherchannel? Duplex must match. The speed must match. Etherchannel standard must match. Trunk allowed VLAN list must match. Native VLAN must match. Tunk encapsulation […]
Hi guys, in this series of blogs, we will talk about different FortiGate HA protocols. FortiGate has different HA protocols FGCP and FGSP. In this blog, we will understand more about FGSP protocol i.e FortiGate Session Life Support Protocol. FGSP was introduced in Fortios 5.0 and above to overcome the HA restrictions over asymmetric traffic, TCP, UDP, […]
Cryptography is the study of secure communication that allows the sender and recipient of a message to have highly secure and confidential to view its contents. The data is encrypted using a secret key, and then both the encoded message and secret key are sent to the recipient for decryption. What are the Objectives Of […]
What is Simple Network Management Protocol ? Simple Network Management Protocol (SNMP) is an application protocol that is used to manage the network devices on a public or private network, by using port numbers 161 & 162. The main perspective of SNMP is to provide network devices such as routers, servers, and printers with a […]