web analytics

OWASP Top 10

A01:2021-Broken Access Control moves up from the fifth position to the category with the most serious web application security risk; the contributed data indicates that on average, 3.81% of applications tested had one or more Common Weakness Enumerations (CWEs) with more than 318k occurrences of CWEs in this risk category. The 34 CWEs mapped to Broken … Read more

Cisco Nexus 9000 series

Deployment scenarios The Cisco Nexus 9500 Series Switches support various deployment scenarios: ●     Spine nodes in a spine-leaf fabric ●     Core or aggregation node in an L2/L3 network ●     Border gateway in a L2/L3 network Spine-leaf fabric architecture The high port-density and ability to support multispeed ports on the same chassis make the Cisco Nexus 9500 Series Switches … Read more

Cisco Nexus – Port Channel Compatibility Requirements

switch# show port-channel compatibility-parameters port mode Members must have the same port mode configured, either E,F or AUTO. Ifthey are configured in AUTO port mode, they have to negotiate E or F modewhen they come up. If a member negotiates a different mode, it will besuspended. speed Members must have the same speed configured. If … Read more

OSPF – Packet Types

The OSPF packet types Hello packet – These packets are multicast periodically to 224.0.0.5 multicast address on all interfaces (unicast on virtual-links) enabling dynamic discovery of neighbours and maintain neighbour relationships. On broadcast and NBMA networks, Hello packets are used to elect DR and BDR. The following hello packets must match on neighboring routers to establish … Read more

Digital Signatures and Digital Certificates

Digital Signatures A digital signature is a mathematical scheme for verifying the authenticity of digital messages or documents. A valid digital signature, where the prerequisites are satisfied, gives a recipient very high confidence that the message was created by a known sender (authenticity), and that the message was not altered in transit (integrity). A digital signature is … Read more

OSI and TCP/IP Reference Models

Unit Layers Description  Example Protocols Data Application End user layer – provides services to the software through which the user requests network services (browsers, FTP clients, and mail clients are in this layer) HTTP, FTP, IRC, SSH,DNS Data Presentation Syntax Layer – Ensures that data is in a usable format; Translates, encrypts and compresses data SSL/TLS, SSH, … Read more