Author: Muhammad Marakkoottathil

A Real-world Analysis of ACI Multi-site

Datacenter infrastructure landscape evolving to take various forms and shapes, it is going from a centralized location to co-locations, remote, branch offices, and to the clouds. Clearly, these are sort of influenced by datacenter cost, flexibility, agility and application, and cloud dynamics. Consequently, the multisite solution from Cisco certainly targeting to address some of these

Zero-Trust Security with Micro-Segmentation

Segmentation has been around for a long time there’s nothing new. There’s nothing sexy in it, we been doing segmentation for years. However, it is done specifically for network optimization and network performance, and it’s neither for security nor for compliance. Micro-segmentation however is a concept that is designed and purpose-built for security. In this

Easy Segmentation & Operation with NSX-T 3.0

In the NSX-T Datacenter, segments are virtual layer 2 domains. With NSX-T you can do VLAN based or overlay-backed segmentation. The VLAN backed segments are usually done for bridging traffic to the devices usually outside of the NSX-T deployment. Such as gateway, physical firewall, etc. In this blog, we will discuss how easy segmentation and

Active-Active Data Center Design

Defining an active-active data-center strategy is not an easy task when you talk to network, server & compute teams who usually do not collaborate when it comes to planning their infrastructure. Most importantly, active-active data Center design requires end-to-end technology stack working together cohesively. It usually needs an enterprise-level architecture drive to establish the idea.

NSX-T: Exploring Distributed IDS

Using this blog “NSX-T: Exploring Distributed IDS” let’s examine distributed IDS features introduced part of NSX 3.0. and we will explore its architecture and key configuration details. Distributed intrusion detection uses network introspection to identify malicious intrusion attempts. This results in distributed intrusion detection to protects east-west traffic and detects L4 attacks. In fact, the