Hello world!
Welcome to WordPress. This is your first post. Edit or delete it, then start writing!
Welcome to WordPress. This is your first post. Edit or delete it, then start writing!
We understand that a lot of our customers and users have issues troubleshooting Site-to-Site VPN tunnels.Here’s a small reference sheet that you could use while trying to sort such issues. Introduction# Firstly, the two most important commands when troubleshooting any vpn tunnel on a cisco device: 1. “show crypto isakmp sa” or “sh cry isa…
JULY 19 at 18:00 Introduction To Cyber Security About this event Cyber security is one of the world’s most challenging business concerns, impacting national security, infrastructure, and economy, hence cyber security skills are a most sought-after necessity. This webinar enables you understand concepts in the cyber space, such as cyber risks, threats, vulnerabilities, risk management,…
June 21 at 18:00 Introduction to Cyber Security About this event Cyber security is one of the world’s most challenging business concerns, impacting national security, infrastructure, and economy, hence cyber security skills are a most sought-after necessity. This webinar enables you understand concepts in the cyber space, such as cyber risks, threats, vulnerabilities, risk management, and so on. Ideal for both…
Policy based routing This is more like a filter for networks. It has 3 basic steps ACL to define interesting trafficRoutemap to refer to the ACL (If/Then statement) Apply route Map to ingress interface Normal traffic outward flowR1 – R3 – R5 – R4 – R7Return pathR7 – R4 – R5 – R3 – R1…
What goes into a blog post? Helpful, industry-specific content that: 1) gives readers a useful takeaway, and 2) shows you’re an industry expert. Use your company’s blog posts to opine on current industry topics, humanize your company, and show how your products and services can help people.
Start by Building your lab your Lab on your PC. Cisco DevNet Source control systems like git or Subversion are a core part of the software development workflow. Examples of shells include: bash (or “Bourne-again shell”) is a common shell Mac, Linux and other “Unix-like” operating systems cmd.exe is the native command line interpreter for…
Difference Between Overlay And Underlay Network In Tabular Form BASIS OF COMPARISON UNDERLAY NETWORK OVERLAY NETWORK Description Underlay Network is physical infrastructure above which overlay network is built. An Overlay Network is a virtual network that is built on top of an underlying Network infrastructure/Network layer (the underlay). Traffic Flow Transmits packets which traverse over…
Top 10 Web Application Security Risks Injection Broken Authentication Sensitive Data Exposure
Would you like to learn about Network Automation, Data Science, use Data for prediction, detection and much more… Join us in our BootCamp in July.