A portchannel is a technique used in computer networking to combine multiple physical network links into a single logical link. It is also known as a Link Aggregation Group (LAG), EtherChannel, or NIC Teaming. Portchannels are commonly used to increase a network connection’s bandwidth, redundancy,…
The process of information classification is one of the most fascinating and perplexing problems in the study of information security management. Classifying data has been around for quite some time, so it was probably the first part of information security to be overseen. Governments, militaries, and private companies have been using secret classification for their data since long before the advent of computers. However, the precise workings of the mechanism were unclear.
Context-based access control is a firewall software feature that intelligently filters TCP and UDP packets based on application layer protocol session information. CBAC can be configured only to allow specified TCP and UDP traffic through a firewall when the connection is initiated from the protected…
Dynamic Access Lists solve a different problem that traditional ACLs cannot solve quickly. Imagine a few users accessing a set of servers. ACLs match user host IP addresses. The legitimate user’s IP address changes if she borrows a PC, uses DHCP, takes her laptop home, etc. Each new IP address requires editing a traditional ACL. This caused painful administration and security holes.
An extended access list, a reflexive access list allows for the dynamic combination of two access lists. If the outbound access list recognizes a remote connection, the inbound access list will be activated to permit bidirectional traffic. With the conclusion of this interactive session, the remote host is once again denied access to the inbound access list.
Authentication is key to OSPF because only authorized devices can share routing information and change the network. This blog post will look more closely at OSPF authentication methods and why it’s important.
The most common type of two-factor authentication (2FA) is a one-time code texted to your phone, but the most secure type is a physical security key. The accounts you designate will be inaccessible to anyone who doesn’t know your password and possession of your security key.
Cisco Catalyst 9000 StackWise Virtual Link merges two physical switches into one. Both switches’ configuration and forwarding state are identical. This technology improves the network availability, scalability, management, and maintenance.
This article will discuss how to upgrade IOS-XE on switches belonging to the catalyst 9000 series.