Although Cisco Meeting Server and Cisco Webex might seem solutions with similar functionality, these two are completely different in terms of architecture, licensing, and features they provide. Cisco meeting server provides a similar experience as WebEx which is why most people get confused between these two solutions. Here are some differences: On one side Cisco […]
Change is constant and inevitable but one aspect that will remain ever constant is traffic: the ever-growing traffic. All the devices and users demand an upgradation in the higher bandwidth connections. The era is changing and 5G testing is on the verge of completion in some parts and in the rest, it has already been […]
What is VDI? The infrastructure which provides a pool of virtual desktops to the end-users is known as VDI or Virtual Desktop Infrastructure. According to the type of workloads, administrators can assign the type of virtual desktops (Dedicated/floating/shared) to the end-users. If the requirement is only to allow the specific application and not the full […]
This blog post will explain how:1. Password based SSH works (briefly),2. Password-less SSH works differently,3. To configure it for any Linux based platform,4. In what scenario should you use it,5. To revert to the regular SSH. After reading this blog post you will be able to understand what goes behind making password-less SSH work and […]
As previously mentioned on how VXLAN resolves the Mobility (VMs can move anywhere from one data center to another location without any changes), Scalability (VLAN 4K to VXLAN 16 Million Logical Network), and encapsulation related limitation. Here we will know how traffic flooding is controlled by the EVPN and the use of BGP as a […]
The Firewall means a device/system/software. We use it to secure a trusted network from an untrusted network. We defined policies on the firewall to allow the trusted traffic or to stop unauthorized access.Now, the firewall is not used only to allow and disallow the traffic, it also comes with multiple features of filtering Network Devices, […]
CUCM is the heart of Cisco Collaboration. The server which integrates with all servers for signaling and is accountable for registrations of almost all devices should be in good health. A good plan to check health is very important. How to check? What to check specifically? What is alarming? Need not worry, the information below […]
What is SDA? SDA stands for software-defined network it is the transformation of the traditional campus area network; it gives much new functionality which traditional network was lacking. It makes it possible to design and build networks by decoupling the control and forwarding planes. It works on the approach of Software-Defined Networking (SDN) network architecture […]
Data Centers are in news again and this time it is Microsoft’s Data Center and this time it is bigger than that time when a submarine-like data center was submerged in the sea by the researchers. The submerged rack is sunken in special engineered fluid in Microsoft Data Center situated in Quincy, Washington. This has […]
Knowing tcpdump is an essential skill that will come in handy for any System Administrator, Network Engineer, and security professional. Tcpdump is an immensely powerful command-line interface packet sniffer. It must be launched as root or with superuser rights because of its use of the promiscuous mode or to be sure to have sufficient privileges […]