Below I will go over the different security threats that can happen on our network and a way to mitigate...
JoinedMay 2, 2023
Articles669
20+ years of experience and proven performance in large scale enterprise network infrastructure architecture, design, implementation, migration, security, operation, troubleshooting, leading/managing teams, and budgets. I have a BS in Cybersecurity and a Master's from the University of Florida.
RIB vs FIB In Cisco networking, the Routing Information Base (RIB) and Forwarding Information Base (FIB) are two separate but...
Here I’m going to show a basic configuration on how to Encrypt a 10G link that has a stretched subnet....
This is a good doc from Google. Security Benefits Introduction: DNS security threats and mitigations Because of the open, distributed...
Private autonomous system (AS) numbers which range from 64512 to 65535 are used to conserve globally unique AS numbers....
Here’s something you can come accross. When you do a “sh vpc“, you’ll notice that your Type-2 consistency status is...
There are times you might have to find the PSK in order to share it with a 3rd party vendor...
Recommended Temperature Ranges Low – end temperature = 64.4°F (18°C) High – end temperature = 80.6°F (27°C) Low – end...
Default Distance Value Table This table lists the administrative distance default values of the protocols that Cisco supports:...
No More Content