We hope you have got an understanding of the StackWise Virtual, its benefits, architecture, and the components from our previous blog. Now, if you want to deploy StackWise virtual in your IT environment then this blog will help you a lot in understanding the prerequisites, restrictions that should be kept in your mind before deploying […]
Remember Edward Snowden and how he leaked highly classified information from the NSA in the year 2013 when he was an employee of the CIA. The amount of information revealed by him was highly classified and being a government employee, this was a very serious offense. Now this was something that was “done” by a […]
In the first part of this blog, we have already discussed MPLS, its benefits, and the terminologies which are used in MPLS. In this article, we will continue with the remaining below pointers: i) MPLS Architecture & Packet Flowii) Several Applications used in MPLSiii) Prerequisite for Configuring MPLS MPLS Architecture & Packet Flow In the […]
Just like a drill, a number of corporate accounts are hacked, and the data is compromised. Most of the time, the corporates make only one change in the strictness and that is bringing out stricter policies and passwords. This is just like a false accomplishment that is short-lived in the sense of security. The result […]
Hi guys, we are here to dive into WSA (Web Security Appliance) Policies. You may be good or new to WSA but if you want to be a hero in WSA then we recommend this Blog. Please check it out. In this blog, we will talk about only the policies of WSA and from this, […]
Dell NX3340 is a member of the Dell PowerVault NX line-up. It is a Windows-based NAS appliance that runs Windows Storage Server OS as their baseline operating system. In this article, we are going to cover how to deploy a cluster of Dell NX3340 nodes over Windows Server Failover Cluster to expose NFS or SMB […]
File Server Resource Manager FSRM is an important addition to a windows server. It is a file server resource manager is a feature that helps administrators classify and manage data stored in the File server. It is configurable with the file and storage service roles. FSRM’s capabilities make it easier to manage a file server. […]
Our goal as a Network Security Engineer is to be able to provide security of communication and restrict access from insecure networks. E.g. Internet. We use Firewall very commonly to restrict unwanted communication between various private networks and public networks. E.g. If we are hosting a Web Server in our environment, we expect only http […]
In the last article “Setting up Cisco Meeting Server – 2”, we covered the high availability and clustering of various components in the Cisco Meeting Server. In this article, we will discuss CMS Active Directory integration and creating meeting spaces via GUI. You need the below details to configure the active directory on CMS. Address: […]
A Data Center will consist of multiple hardware and software such as Servers, Storage, Network switches, WAN routers, Firewall, Backup software, Tape Library, Monitoring software, OS, Hypervisor, DB, etc. In this blog, we are going to share our insights and things to consider in Server & Storage if you are looking for a brand-new server/storage. […]