Whatever building or an institute or an office or an eatery you enter, you will find Wi-Fi installed and ready to use. This brings us to the conclusion that Wi-Fi has now become a necessity and you will find it almost everywhere. Wi-Fi gives us the option of being connected with the internet and allows […]
In our previous blog, we gave you 3 options on how you can choose the best antimalware solution, and in this blog, we will discuss the types of memories and the booting process of a cisco router. Cisco Router is a networking device that is mainly used to route and forward the data traffic between […]
In this article, we are going to discuss the feature called ‘N+N’ High Availability in Cisco Wireless Controller. The“N+N” HA solution is used when the backup controller is located geographically at a separate data center. Here, ‘N+N’ means how many WLCs we have, each WLC will have a backup controller on the other side. Why […]
This blog is a continuation of our CISCO DNA CENTER WORKFLOW Series. In Part 1, we discussed the Design of Cisco DNA Center Workflow, in the second part, we discussed the Policies of Cisco DNA Workflow, whereas, in the third part, we discussed the Provision aspect of Cisco DNA workflow. In this part 4, we […]
For remote users/employees of the company, connectivity with security is required to access resources and information of the office. Using Cisco AnyConnect and Cisco FTD we can achieve the same. We will configure RA VPN (Remote access VPN) in Cisco FTD and install Cisco AnyConnect software in the client system to achieve the requirement. Preresiquites– […]
Device Administration We can control the access who can log in to a network device via Console, Telnet, SSH, or any other methods. Device Administration is a process of AAA to control the access of network devices, which can by any method. A device administrator is a user, who logs into the Network Devices such […]
Technology is something that changes continuously and keeps on evolving. Nothing remains the same, not even the traditional security tools. Endpoint security has now taken the front seat and put back anti-malware and anti-virus in the back. Endpoint security is advanced and one step ahead of the basic anti-malware and anti-virus solutions. What Is Endpoint […]
We came across a challenge in one of our deployments where we had provisioned the virtual machines and handed them over to the application team to work on deploying their application on the VMs. The issue that we faced is that VM – A was able to ping VM – B but it was happening […]
Basically, Logical Volume Management (LVM) introduces an extra layer between the physical disk and the file system, it can create “virtual” disk partitions out of one or more physical hard drives. It also allows you to create larger partitions, then you could achieve with a single drive allowing the file system to be – Resized […]
NCR Corporation/AT&T in the Netherlands invented Wi-Fi, a popular wireless networking technology that stands for WIreless FIdelity, in 1991. We can exchange information between two or more devices that have been developed for mobile computing, such as laptops, mobile phones, and so on, using this technology. The data is converted into radio signals by the […]