Recent Posts
Cloud connecting | Cisco Cloud Services Router (CSR) 1000v – (MS-Azure & Amazon AWS)
Cisco Cloud Services Router CSR 1000v As you may or may not be aware the Cisco Cloud Services Router (CSR) 1000v is now available on…
Internet Cyber Threat and Malicious Internet Functioning.
Internet Cyber Threat and Malicious Internet Functioning – DDoS ATTACKS , Ransomware , Virus , Malware and Malicious Activity. Internet is full of story on Malicious…
AWS Interview Questions and Answers for Certified Solutions Architect – Associate Job
AWS Interview Questions and Answers – EC2 , VPC , S3 and Network and Security. Describe, What is EC2 instance ? An EC2 instance is…
F5 Big IP LTM Setup of Virtual Interface Profile and Pool
F5 Big-IP LTM Setup of Virtual Server , Pool and SNATs Configuration Overview. Image Source – www.techmusa.com – virtual server with IP 200.100.0.1/32 that will…
SITE TO SITE IPSEC VPN PHASE-1 AND PHASE-2 TROUBLESHOOTING STEPS
SITE TO SITE IPSEC VPN PHASE-1 AND PHASE-2 TROUBLESHOOTING STEPS , NEGOTIATIONS STATES AND MESSAGES MM_WAIT_MSG (Image Source – www.Techmusa.com) Network Troubleshooting is…
Security Penetration Testing – Network Security Evaluation Programme
Penetration Testing ? The simple definition of penetration testing (Pen testing) is used to discover and exploit the vulnerabilities in the Networking infrastructure. A penetration…
CONFIGURATION BACKUP PROCEDURE FOR QLOGIC SANBOX 5802 FC SWITCH
STEPS TO CREATE AND DOWNLOAD CONFIGURATION FILE BACKING UP ON QLOGIC SANBOX 5802 FC SWITCH Creating the Backup File on Qlogic SANbox switch Step…
OSPF PROTOCOL OVERVIEW AND BASIC CONCEPTS,OSPF TERMINOLOGY AND OPERATION
OSPF PROTOCOL OVERVIEW AND BASIC CONCEPTS: BASIC OSPF LAB, OSPF AREAS, TOPOLOGY & ROUTING TABLE, OSPF TERMINOLOGY AND OPERATION OSPF Overview -: Open Shortest…