In the High Availability SSO configuration, there are two WLC (Wireless LAN Controller) at the site, at a time only one WLC will be active, and the other will be in standby mode. All configurations can only do on the Active Wireless controller, and it will share the mirror copy to the standby wireless controller […]
We have read about Docker, its terminologies, advantages, and how one can install Docker in the previous blog. In this blog, we are going to continue with Docker and see what containers are and how to install them and how we can use Docker via GUI. In this blog, we will tell you: What are […]
In the previous blog, we have got an idea about the viruses, the types, and the use of Antivirus to protect endpoints of our IT environment. Whereas, in this blog, we will talk about the best Antivirus solution for an organization. Before moving to the solution, we should talk about the problem of why securing […]
In this part 2 of this blog series, we will cover 2nd pillar of the Cisco DNA Centre workflow that is “POLICY”. Have you read the CISCO DNA CENTER WORKFLOW, the first blog of this series? Preface For security reasons, we use Cisco Identity Services Engine (ISE). In SD-Access environment. This integrates with Cisco DNA Center […]
Companies are stepping up their game and migrating their data to the cloud as the cloud gives various benefits to access the data and consolidations to the user. Whereas some companies still want to follow the old school methods and want to keep their data on the premises; they might have their reasons. If we […]
When we configure (Multiprotocol Label Switching) MPLS we ensure reachability only. In MPLS, traffic goes in plain text form, so if someone wants to eavesdrop and wants to collect sensitive data or confidential information, they can get that data, and to secure MPLS connectivity we must configure GETVPN (Group Encryption Transport VPN). In general, companies […]
We have been chasing technology in all possible ways and we try our best to keep on the same steps as the technology. To be sure that we are on the same platform, we need to practice the devices. For the practice, we would need a virtual environment. So why not start with the installation […]
The need for micro-segmentation has been emerging in the market ever since its introduction and it has been quite a buzz. But why do we care about micro-segmenting our network? Before coming to why we need it, we first need to know what micro-segmenting your data center means. What is Micro-Segmentation? Micro-segmentation is a technology […]
What is YUM ClientPackage managers are a great feature of every Linux system. They allow us to easily handle the installation, removal, and inspection of software packages. YUM is a package management utility for RPM-based distribution. RPM (RedHat package manager) is the package manager that systems like RHEL and CentOS are based on. In this […]
Today, Billions of people worldwide access web applications over various networks including the Internet. Based primarily on the HTTP Protocol, web applications are an economical way for businesses to interact with their customers and employees through ubiquitous browsers. The ability to update and maintain web applications without distributing and installing software on potentially thousands of […]