In this article, we are going to discuss the feature called ‘N+N’ High Availability in Cisco Wireless Controller. The“N+N” HA solution is used when the backup controller is located geographically at a separate data center. Here, ‘N+N’ means how many WLCs we have, each WLC will have a backup controller on the other side. Why […]
This blog is a continuation of our CISCO DNA CENTER WORKFLOW Series. In Part 1, we discussed the Design of Cisco DNA Center Workflow, in the second part, we discussed the Policies of Cisco DNA Workflow, whereas, in the third part, we discussed the Provision aspect of Cisco DNA workflow. In this part 4, we […]
For remote users/employees of the company, connectivity with security is required to access resources and information of the office. Using Cisco AnyConnect and Cisco FTD we can achieve the same. We will configure RA VPN (Remote access VPN) in Cisco FTD and install Cisco AnyConnect software in the client system to achieve the requirement. Preresiquites– […]
Device Administration We can control the access who can log in to a network device via Console, Telnet, SSH, or any other methods. Device Administration is a process of AAA to control the access of network devices, which can by any method. A device administrator is a user, who logs into the Network Devices such […]
Technology is something that changes continuously and keeps on evolving. Nothing remains the same, not even the traditional security tools. Endpoint security has now taken the front seat and put back anti-malware and anti-virus in the back. Endpoint security is advanced and one step ahead of the basic anti-malware and anti-virus solutions. What Is Endpoint […]
We came across a challenge in one of our deployments where we had provisioned the virtual machines and handed them over to the application team to work on deploying their application on the VMs. The issue that we faced is that VM – A was able to ping VM – B but it was happening […]
Basically, Logical Volume Management (LVM) introduces an extra layer between the physical disk and the file system, it can create “virtual” disk partitions out of one or more physical hard drives. It also allows you to create larger partitions, then you could achieve with a single drive allowing the file system to be – Resized […]
NCR Corporation/AT&T in the Netherlands invented Wi-Fi, a popular wireless networking technology that stands for WIreless FIdelity, in 1991. We can exchange information between two or more devices that have been developed for mobile computing, such as laptops, mobile phones, and so on, using this technology. The data is converted into radio signals by the […]
Data loss prevention, sometimes referred to as data leak prevention is the practice to ensure that there are no data breaches and sensitive data is not lost or misused. DLP is defined as technologies to perform both content inspection and contextual analysis of data sent via messaging applications, in use on a managed endpoint device, […]
Our goal as a Network Security Engineer is to be able to provide secure channels of communication over unsecured networks. E.g., the Internet. We have 2 remote offices we are trying to connect or remote users and a central office that we are trying to connect, and we want to make sure that we have […]