The Top 10 Super Computers in the World

Super Computers

The Top 10 Super Computers in the world are ranked by their performance on the linpack benchmark. For the first time, a supercomputer based in the Middle East has appeared in the top 10. 10. Trinity Los Alamos National Laboratory’s Trinity makes the third straight list, with its 8.1 Petaflops of Linpack performance good for 10<sup>th</sup> … Read more

Configuring Security Context in ASA Firewall [Solved]

ASA firewall can be divided into multiple virtual devices, known as Security Context. Each context acts as an independent firewall device, with its own security policy, interfaces, and administrators. Multiple contexts are similar to having multiple standalone devices. With enabling of Multiple context mode enables some Benefits and limitation of using Cisco ASA Multiple Context Mode. … Read more

RADIUS Operation and Packet format

RADIUS Packet format

Before the Client starts communicating with the Radius Server, it is required that the secret key is shared between the Client and the Server and the Client must be configured to use Radius server to get service. RADIUS Operation The following is the process used in a RADIUS-managed login: Step 1.  A user login generates … Read more

Cisco ASA Firewall Virtualization

ASA Virtual Firewall

Cisco ASA firewall Virtualization is a concept where ASA is divided into multiple virtual standalone firewalls and each virtual standalone firewall acts and behaves as an independent firewall with its own configuration, interfaces, Security Policies, routing table and etc. Virtual ASA is also known as “Security Context”.  Cisco ASA firewall virtualization  is one of the … Read more

Networking Basics

networking-basics

What is Networking? Networking is the practice of linking multiple computing devices together in order to share resources. These resources can be printers, CDs, files, or even electronic communications such as e-mails and instant messages. These networks can be created using several different methods, such as cables, telephone lines, satellites, radio waves, and infrared beams. … Read more

Configure IKEv2 Site to Site VPN in Cisco ASA

IKEv2 is a new design protocol doing the same objective of IKEv1 which protect user traffic using IPSec. IKEv2 provides a number of benefits over IKEv1, such as IKEV2 uses less bandwidth and supports EAP authentication where IKEv1 does not. IKEv2 support three authentication methods : 1. PSK 2. PKI (RSA-Sig) 3. EAP ( initiator … Read more