TCP Three-Way Handshake

TCP Three-Way Handshake

TCP requires a connection to be established between two end systems before data transfer can begin. TCP establishes the connection using a process that is called the TCP three-way handshake. This process involves setting the SYN bit and ACK bit in the segments between the two devices. An important function that is performed during connection establishment is … Read more

Understanding 7 layers of OSI model

7 Layers of OSI model is a base of networking. Let’s understand what is OSI model first OSI Model is a conceptual model for understanding and designing a network architecture that is flexible, robust, and inter-operable. An open system is a set of protocols that allows any two different systems to communicate regardless of their underlying architecture. … Read more

How to Install Cisco ACS 5.8 on VMware

Cisco ACS is one of the best security product provided by Cisco. Cisco ACS is used to manage multiple Network and server devices. Cisco secure ACS is an authentication , authorization, and Accounting(AAA) access control server. Cisco ACS uses RADIUS and TACACS protocol to manage devices. Minimum requirement to install Cisco ACS on VMware- 2 … Read more

The Top 10 Super Computers in the World

Super Computers

The Top 10 Super Computers in the world are ranked by their performance on the linpack benchmark. For the first time, a supercomputer based in the Middle East has appeared in the top 10. 10. Trinity Los Alamos National Laboratory’s Trinity makes the third straight list, with its 8.1 Petaflops of Linpack performance good for 10<sup>th</sup> … Read more

Comparison between TACACS+ and RADIUS

UDP and TCP RADIUS uses UDP while TACACS+ uses TCP. TCP offers several advantages over UDP. TCP offers a connection-oriented transport, while UDP offers best-effort delivery. RADIUS requires additional programmable variables such as re-transmit attempts and time-outs to compensate for best-effort transport, but it lacks the level of built-in support that a TCP transport offers: … Read more

Configuring Security Context in ASA Firewall [Solved]

ASA firewall can be divided into multiple virtual devices, known as Security Context. Each context acts as an independent firewall device, with its own security policy, interfaces, and administrators. Multiple contexts are similar to having multiple standalone devices. With enabling of Multiple context mode enables some Benefits and limitation of using Cisco ASA Multiple Context Mode. … Read more

Cisco ASA Firewall Virtualization

ASA Virtual Firewall

Cisco ASA firewall Virtualization is a concept where ASA is divided into multiple virtual standalone firewalls and each virtual standalone firewall acts and behaves as an independent firewall with its own configuration, interfaces, Security Policies, routing table and etc. Virtual ASA is also known as “Security Context”.  Cisco ASA firewall virtualization  is one of the … Read more