Cisco is the sought-after vendor for solutions for most IT networking challenges, be it involving hardware, software, the cloud, or virtualization. In 2022 alone, Cisco had a whopping 41% share in the network infrastructure vendor market, bigger than the combined share of the next six vendors on the list. Cisco has an extensive offering of […]
[Continue reading]Cisco Announced its Intend to Acquire Privately Held Isovalent
On December 21st Cisco announced their intent to acquire Isovalent, a company founded by creators of eBPF technology and leading solutions like Cilium and Tetragon. The acquisition aligns with Cisco’s strategic vision of building a unique multicloud security and networking capability to facilitate customers’ digital transformation. Cisco’s announcement discusses the challenges of networking and security […]
[Continue reading]How to Reset Cisco Router or Switch to Factory Settings
If you have had any experience with Cisco switches or routers, you know there are situations where a factory reset of the device is needed. Whether you want to reconfigure a device from scratch to get a clean configuration or repurpose a device to play a different role in the network, it’s always a good […]
[Continue reading]Cisco to Acquire Splunk for Approx. $28 Billion
Cisco’s intended acquisition of Splunk for approximately $28 billion will position the combined entity as a leader in security and observability, leveraging AI to offer organizations increased digital resilience, security, and predictive threat management. Cisco is set to acquire Splunk for $157 per share in cash, which totals an equity value of about $28 billion. […]
[Continue reading]The New Cisco AI Assistant Will Redefine Cybersecurity Defense
With Cybersecurity threats on the rise, Cisco is stepping up the game with a smart AI tool to help protect your business. As cyber threats grow more complex, Cisco is introducing a new way to fight back with its AI Assistant for Security. By bringing artificial intelligence into its security tech, Cisco is making it […]
[Continue reading]BGP Multihoming – Influencing Enterprise to ISP Routing Using BGP
BGP is the de facto routing protocol deployed on the Internet. Large enterprise networks will typically run BGP on the edge of their networks to ensure that routing between the ISP and the enterprise network takes place in the best possible way. It is possible to use BGP to modify the way that the ISP […]
[Continue reading]The Most Important Border Gateway Protocol (BGP) Timers Explained
Border Gateway Protocol or BGP is a routing protocol that uses timers as part of its operation. Various timers perform different functions, and some are used for very specialized operations that are unique to BGP. In this article, we’ll be exploring some of the most common timers used for BGP as well as some less […]
[Continue reading]Comparison of LLDP vs CDP on Cisco Networking Devices
Link Layer Discovery Protocol (LLDP) and Cisco Discovery Protocol (CDP) are network discovery protocols that perform similar functions. These protocols operate at the Data Link layer and are used by network devices to discover information about neighboring devices connected to a local network. Although LLDP and CDP operate in a similar manner, they differ in […]
[Continue reading]Explanation and Comparison of OSPF E1 vs E2 Routes
Open Shortest Path First (OSPF) is a popular routing protocol used in many production networks throughout the world. Understanding route types is important when designing an OSPF topology for efficient and effective operation. Among the various route types OSPF offers, the External types E1 and E2 play an important role in importing routes from outside […]
[Continue reading]Comparison of GRE vs IPSEC Used in TCP/IP Networks
Generic Routing Encapsulation (GRE) and Internet Protocol Security (IPsec) are two related but distinctly different technologies. They can be deployed separately but can also work together (GRE over IPSec) to deliver network tunneling and security services to networks and individual users. In this article, we’ll explore these technologies to understand them, and compare them to […]
[Continue reading]Main Types of Computer Network Diagrams and Their Importance
For the average end user, a computer network seems simple. All they need to do is plug their PC into an ethernet port or connect it via Wi-Fi, and presto-they’re connected and ready to work. The thing is, though, computer networks are vastly more complex under the hood than most people think. They’re so complex, […]
[Continue reading]How to Find a Device MAC Address on a Cisco Switch (show mac address-table)
When performing troubleshooting or maintenance tasks on an enterprise network, it is sometimes necessary to identify the MAC address of particular devices (hosts, other switches, other network devices) that are connected to the network. On smaller networks, this is somewhat simple to achieve, however, on larger networks, it can become a challenge. In this article, […]
[Continue reading]Discussion and Explanation of OSPF Graceful Restart and Shutdown
OSPF is one of the most popular routing protocols for enterprise networks. It has been around since the 1980s and has been continually updated and revised to conform to the requirements of modern IP networks. As such, it is an extremely mature and robust routing protocol that can be tweaked and fine-tuned in many ways […]
[Continue reading]