This blog is a continuation of our CISCO DNA CENTER WORKFLOW SERIES. Previously, we had explained about CISCO DNA WORKFLOW – DESIGN and CISCO DNA WORKFLOW – POLICY. In this part 3 of the series, we will cover 3rd pillar of the CISCO DNA CENTER WORKFLOW that is “PROVISION”. PROVISION We use Cisco DNA Center […]
SSL VPN (Secure Socket Layer Virtual Private Network) is used for RA (remote access) VPN. Previously there was SSL Version 1, SSL Version 2, SSL Version 3, now we have TLS (Transport layer security) version 1.0, version 1.1 and version 1.2 are available. We can say that TLS is a successor of SSL. SSL and […]
Hello Guys, today we will learn the installation of FortiGate Firewall in EVE-NG. It might seem difficult to some people but we are here to make things easy for you. Now, you must have the following software, tool, and file.– VMware Workstation.– File transfer Software, we recommend “WinSCP”.– FortiGate Firewall “.qcow2” file. First, you need […]
Cisco’s UCS Manager is a Software-Defined Data Center (SDDC) solution that provides us a single pane of glass to provide simplified management of our servers and chassis. UCS Manager allows you to configure/manage your blade chassis, blade servers, rack servers, etc. in a single UCS domain. What exactly is a UCS domain? – Fabric Interconnects […]
The data breach is one such thing that is seen a lot of times and can be avoided if proper footsteps and practices are followed. Data is authorized to people who are the part of a company or an organization, but data breach is still happening from outside premises. This can be stopped, and we […]
What is systemd (daemon)? Systemd (daemon) was designed to conquer the faults of init. It is a process that runs in the background, and it starts in parallel. This in turn reduces the time taken to boot and computational overhead. As compared to init, systemd (daemon) has a lot of features. Systemd is the […]
As with many critical networks and IT infrastructure components, Load balancer systems can be deployed in High Availability (HA) configurations to support continuous application delivery without service interruptions over a long period of time. HA functions are provided by the Device Service Clustering (or DSC) feature. Several configuration options are offered, each with its advantages […]
Guest Access Overview Getting concise information on the multiple modes of Guest Access on ISE can be a bit of a challenge as there is a lot of information out there. This blog will provide a concise and simple-to-understand summary of the different modes available, their nuances and help you choose which will be most […]
Cisco UCS stands for Unified Computing System. It is an integrated computing infrastructure with intent-based management to accelerate and automate the deployment of all your compute infrastructure, including cloud computing and virtualization, bare-metal and scale-out workloads, and analytics, as well as edge computing that supports remote locations. This blog provides you an overview of the […]
User Principal Name (UPN) for service discovery is used by Jabber for Windows. The client who entered windows using domain credentials will not be prompted for credentials in Jabber until not connected to a network. There are scenarios wherein some customers do not have the same login details for jabber as they have on Windows […]