top of page

Search


ACI Basics
The Cisco Application Policy Infrastructure Controller (APIC) works as a smart policy manager, sending the required policy settings to...

Mukesh Chanderia
Jun 17, 202325 min read
APIC M1/M2/L1/L2 to M3/L3 Cluster Migration
Both APIC L1/M1 and APIC L2/M2 servers have reached their end-of-sales and end-of-life date. APIC servers forming a cluster must all run...

Mukesh Chanderia
Apr 24, 20234 min read
TERRAFORM
Lab Setup Create three VMs of CentOS. One will act as a controller and the rest two as workers. Install ansible rpm -qa | grep ansible...

Mukesh Chanderia
Jan 16, 20231 min read
PYTHON
Search Everywhere Double Shift Go To File Ctrl+Shift+N Recent Files Ctrl+E Navigation Bar Alt+Home Print "Hello Mukesh" --> Right Click +...

Mukesh Chanderia
Jan 16, 20231 min read


Wireless
BSS: Basic Service Set (Range of the wireless adaptor of laptop/mobile) ESS: Extended Service Set (More than one Access Point sharing the...

Mukesh Chanderia
Dec 27, 202214 min read
PANORAMA
Hook Firewall & Panorama Step 1: Go to Firewall and add the IP address of Primary and secondary Panorama. Step 2: Go to Panorama and in...

Mukesh Chanderia
Dec 26, 20222 min read
Manager Interview Questions
1) How do you handle the pressure? I stay calm under pressure and handle it well. My complete focus is on the job done. I will break the...

Mukesh Chanderia
Dec 20, 202214 min read


Interview Preparation
Can you explain what Cisco ACI is and its key features? Cisco ACI, or Application Centric Infrastructure, is a software-defined...

Mukesh Chanderia
Dec 10, 202217 min read


IPsec VPN Configuration
Let's have a look at ip address of two site for which we need to configure site to site VPN Let's configure Router A Step 1: Create an...

Mukesh Chanderia
Nov 5, 20224 min read


IPsec VPN
IPsec rides on Layer3 of TCP/IP. SSH & SSL rides on layers 4 -7. In transport mode layer 4 and above is encrypted whereas in tunnel mode...

Mukesh Chanderia
Nov 4, 20224 min read


IQ
Routing + Switching Loopguard Loopguard come into action only when the BPD's suddenly disappeared. It is incompatible with Root Guard....

Mukesh Chanderia
Oct 28, 202212 min read


Important Questions
R+S What is PTP used for? The Precision Time Protocol (PTP) is a protocol used to synchronize clocks throughout a computer network. On a...

Mukesh Chanderia
Jul 3, 202215 min read


ISE
ISE Use Cases 1) Visibility: What all users & devices are on the network and where are they connected. Where are phones, printers,...

Mukesh Chanderia
Jun 23, 202216 min read


Panorama
It is a centralized controller for PA firewalls. How to add devices in Panorama? Go to Panorama --> Managed Device --> Here you will get...

Mukesh Chanderia
Feb 28, 20221 min read


WildFire & Dos Protection
Create WildFire Profile Attach it in Security Policy as Security Profile Objects > Security Profiles > DoS Protection It is similar to...

Mukesh Chanderia
Feb 1, 20221 min read


PA Interface Mgmt Profile & Captive Portal
Network > Network Profiles > Interface Mgmt It is used to control what protocols are allowed on interface. Now Go to Interface -->...

Mukesh Chanderia
Jan 31, 20221 min read


PA ZONE PROTECTION PROFILE & Sub Interface
Network > Network Profiles > Zone Protection Tcp SYN Cookies : It is a technique used to resist SYN flood attacks. An SYN flood attack is...

Mukesh Chanderia
Jan 31, 20221 min read


Install CA Certificate on PA
Step 1 : Generate Certificate through CSR [Certificate Signing Request]. Click : Request a Certificate Open CSR file in notepad & Copy...

Mukesh Chanderia
Jan 30, 20221 min read


PA LDAP AD AUTHENTICATION
The default port for LDAP is port 389, but LDAPS uses port 636 and establishes TLS/SSL upon connecting with a client. Step 1 : Create...

Mukesh Chanderia
Jan 30, 20221 min read


PA Decryption Policy
Decryption Policy for Outbound SSL Connection. Why do we require this policy ? We do require this policy for acting Palo Alto as a Man In...

Mukesh Chanderia
Jan 30, 20222 min read
bottom of page