Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
Health & Fitness
Technology
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Podjoint Logo
US
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/24/05/69/24056954-fe89-fb86-d076-f3293a6280bf/mza_18004292568648643824.jpg/600x600bb.jpg
IBN's Revenge
Jeremy Bowman
12 episodes
1 month ago
Improve security at the enterprise remote location edge with the SDWAN Application Aware Enterprise Firewall. This episode explains the feature and steps through the configuration.
Show more...
Technology
RSS
All content for IBN's Revenge is the property of Jeremy Bowman and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Improve security at the enterprise remote location edge with the SDWAN Application Aware Enterprise Firewall. This episode explains the feature and steps through the configuration.
Show more...
Technology
Episodes (12/12)
IBN's Revenge
SDWAN Enterprise Application Firewall
Improve security at the enterprise remote location edge with the SDWAN Application Aware Enterprise Firewall. This episode explains the feature and steps through the configuration.
Show more...
2 years ago
8 minutes

IBN's Revenge
SDWAN Multicast
This episode addresses the usage of the multicast replicator in the SDWAN topology and discusses how SDWAN uses OMP to signal multicast joins between remote locations.
Show more...
2 years ago
14 minutes

IBN's Revenge
SDA Multicast
SDA uses unicast encapsulation to send end user data traffic between the various network nodes. In this episode, we examine how the SDA fabric uses VXLAN encapsulation in both ingress replication and in SDA native multicast to forward multicast data traffic across the fabric.
Show more...
2 years ago
12 minutes

IBN's Revenge
SDA L2 BN Functionality
This episode discusses how the Layer 2 Border Node functions in a Cisco SDA fabric and how to use it to facilitate a migration from a Layer 2 access network to SDA.
Show more...
2 years ago
10 minutes

IBN's Revenge
SDA DHCP
This episode discusses how DHCP signaling occurs in the Cisco SDA fabric. Also, it examines the SDA chicken and egg issue.
Show more...
2 years ago
10 minutes

IBN's Revenge
SDA FEW versus OTT
This episode compares the Cisco SDA wireless deployment models of Over the Top (OTT) and Fabric Enabled Wireless (FEW). In both models, we discuss how the control plane and data plane traffic is handled.
Show more...
2 years ago
13 minutes

IBN's Revenge
OAuth versus SAML
In this episode, we examine the open standard protocols OAuth and SAML. Only one is for authentication and one is for authorization. How do they work and what do they achieve.
Show more...
2 years ago
13 minutes

IBN's Revenge
The YANG Model
Getting started with automation in IBN can be daunting at first. In this episode, we will look at the YANG data model and investigate how to be able to read and understand the model.
Show more...
3 years ago
14 minutes

IBN's Revenge
What is SASE
In this episode, we discuss the integrated network and security architecture of SASE with Umbrella and SDWAN.
Show more...
3 years ago
13 minutes

IBN's Revenge
SDA and SDWAN Integration
Integration of SDA and SDWAN are discussed. What are the one box and the two box solutions, and how do they work?
Show more...
3 years ago
12 minutes

IBN's Revenge
What is IBN
In this introductory episode, we discuss what is IBN, what is IBN's Revenge, and who we are.
Show more...
3 years ago
3 minutes

IBN's Revenge
Why Use SDA 2.0
Cisco DNA Center has introduced the LISP Pub/Sub model with SDA 2.0. Find out just how SDA has changed from SDA 1.0 to SDA 2.0 to master Cisco's Intent Based Networking.
Show more...
3 years ago
10 minutes

IBN's Revenge
Improve security at the enterprise remote location edge with the SDWAN Application Aware Enterprise Firewall. This episode explains the feature and steps through the configuration.