Sagar Hiremath
Level 1
Level 1
Member since ‎06-24-2013
‎09-20-2021

User Statistics

  • 18 Posts
  • 0 Solutions
  • 35 Helpful votes Given
  • 10 Helpful votes Received

User Activity

Hi Folks,I need your help to understand what are the actions you would take when you get a report of vulnerabilities on Cisco devices and you are supposed to check whether this vulnerability is a genuine one or is a False positive.I'm only looking fo...
Hi Guys! I'm trying to understand which is the best tool for detecting and fixing security Vulnerabilities in Cisco devices. Please share your opinions and thoughts as well as recommendations as to which tool will be more efficient.  Thanks & Regards...
Hello Guys, I wanted to know where i can get more information on technologies such as Reporting and Dashboard. I know about monitoring network traffic and we have many software/tools for it.  I have an interview where they are looking for below skill...
Hi Team, I'm currently working on creating a standard configuration for switches connecting the firewalls (DMZ Switch). Can you please suggest what would be considered as the most important commands that can be used in this scenario? Apart from the u...
Hi Guys, I have a configuration where in i see multiple spanning-tree features been enabled on a port. I know we use portfast for access ports and root guard between trunk ports. I would like to know how the below port would behave given the config i...
Community Statistics
Member Since ‎06-24-2013 08:51 PM
Date Last Visited ‎09-20-2021 10:12 PM
Posts 18
Total Helpful Votes Received 10
Helpful Votes From