top of page

Category ✅
Search


-
Jul 26, 20250 min read


BGP and BGP Path Attributes
BGP, which stands for Border Gateway Protocol, is a standardized exterior gateway protocol used in computer networking and the internet...
-
Jan 17, 20252 min read


Cisco Umbrella DNS Interview Questions and Answers
1. Why is it important to communicate with the appropriate teams before making DNS changes? Answer: DNS changes can have a significant impact on network operations, potentially causing service disruptions if not properly coordinated. Communicating with the relevant teams ensures that all stakeholders are informed, and permissions are obtained, reducing the risk of unexpected downtime or misconfigurations. 2. How can you verify if a device is already using Cisco Umbrella DNS
-
Jan 14, 20257 min read


Cisco AnyConnect VPN Troubleshooting
Scenario 1- Unable to access the VPN website If you cannot access the VPN website https://vpn.sandybrown-stingray-351145.hostingersite.com add itto your trusted sites. At the top of the page, select the “Tools” drop down list.Select “Internet Options”Click on the “Security” tab at the top of the menu box.Select the “Trusted sites” icon at the top.Click on the “Sites” button on the middle right.Type: https://vpn.sandybrown-stingray-351145.hostingersite.com in the box under “Ad
-
Oct 31, 20234 min read
how to take backup of cisco ise thought clI aNd cGUI
Take backup from ISE thought CLI and GUI 1- Creating a Repository 2- Adding crypto key 3- Backing up ISE 4- Backing Up ISE Certificates STEP 1- Create Repository - - >>>>>> Administration > System > Maintenance > Repository For cli simple login on device thought cli and put below command for create repository - Please make sure when you will create repository you should add id and password under repository otherwise it will failed Please make sure when you will create re
-
Aug 25, 20221 min read


Acess-List In Network Security
Packets are compared to the access lists sequentially until a match is found. If no match is found, the packet is discarded. Access lists filter content going through the router, not the traffic originated by the router. You should place standard IP access lists as close to the destination as possible, whereas extended IP access lists should be as close from the source as possible. You can only assign two access lists per interface, one in each direction. 1. Standard IP Acces
-
Jun 21, 20183 min read
bottom of page