Join us as our experts walk you through the steps required to install NSO in your network environment. We will also explore the data required to size NSO per your unique network device types and count. Additionally, review the steps required to deploy NSO in a containerized environment such as Docker.
Join us as our experts walk you through a secure application access with phishing resistant MFA. This session will help you identify prerequisites, define a testing methodology and go live with an application at high-level. You will also understand different ways to protect an application, such as RADIUS, SAML WITH SSO, and so on.
Join us as our experts walk you through how to automate the ACI fabric configuration. The session will cover industry-standard tools to perform ACI configuration tasks and demonstrate ACI use cases which can benefit from automation.
Dive into the intricacies of SR-MPLS and LDP Internetworking and unlock the power of seamless label distribution in your network. This session delves into the core principles of Segment Routing and LDP, providing a comprehensive understanding of their interplay. Explore the practical steps involved in configuring Segment Routing in a LDP enabled network and gaing insights ...