What Is NAT? NAT is the process of reassigning the single IP address space into a further one by altering the network address data in…
Author: Sonny Brar
What Is Virtualization? The formation of virtual computing resources like storage, computer networking systems, operating systems, etc. is known as Virtualization. The basic building block…
Review the assumptions section and make the necessary changes to the configuration to match your deployment. Install the updated configuration file to your branch You…
Creating the SD-WAN interface This recipe provides an example of how to start using SD-WAN for load balancing and redundancy. In this example, two ISP…
Disable unnecessary services – By default, Cisco routers run several optional services. These services can be used to give attackers information about the router that…
IEEE 802.1Q tunneling can be used to achieve simple layer two VPN connectivity between sites by encapsulating one 802.1Q trunk inside another. The topology below…
What is IPSEC? IPSec stands for "IP Security" and the standard definition of IPSEC is-- “A security protocol in the network layer will be developed…
We frequently see a fair amount of confusion from new customers as to what 95th percentile bandwidth metering and billing is and how it works.…
What is ZTNA Zero Trust Network Access (ZTNA) is a service or product that creates context- and identity-based, logical access boundaries around a set of…
We will discuss and compare the two NAC (Network Access Control) solutions from Cisco (ISE) and Aruba (ClearPass). Gartner defines network access control (NAC) as…