Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
Hi Team,I would like clarifications on the below queries1. Lets say a network administrator in a remote office is connecting a new managed switch or hub in the network, is it possible to proactively identify a new device installed in the network. Thi...
Hi Team,I have been researching on emerging trends in networking and came across this interesting concept of WAN Virtualization. Refer to the URL below for details - http://www.networkworld.com/community/blog/wan-virtualization-next-generation-comple...
Dear Team,I need suggestion on best practice of terminating internet link. The ISP provides Ethernet connection and I am evaluating the pros and cons between the following options1. ISP Internet link ---> Internet Router ----> Firewall (NAT, DMZ, IPS...
Hi Team,I am evaluating the best means for single factor authentication for remote access (client to site or SSL VPN). The options I see are creating local usernames and password or integration with Active Directory via LDAP. What are the pros and co...
Dear Team,Have a clarification regarding a LAN design. I have Cisco 3750 in stack configuration acting as core switch. The access layer switches are 2960X in stack mode. I plan to have link level redundancy as well with the ports from each of the 296...
Hello Javier,Thank you for your response. From a security perspective, isn't AD integration more vulnerable to brute force than local authentication. If AD account gets compromised, the overall security gets compromised. But if the local authenticati...