In this blog, we’ll explore the operation of IGP interior routing protocol EIGRP over vNET trunks (another way to say networking trunking similar to vlan trunks used in L2 network by switches to...
Let’s put into play AS-Override feature in BGP: see when it applies and how it works. First, AS-Override feature applies to sites that have the same AS number but are linked by another different...
In this blog, we’ll discuss the operation of OSPF dynamic routing protocol in a specific case where all participating routers share the same LAN Ethernet broadcast network and are configured as ...
In this blog, we study how DUAL route FSM Processes EIGRP Queries. Introduction Let’s recall that EIGRP is one of the so called IGP routing protocols. IGP stands for interior routing protocols a...
This post is part of a series of posts about dynamic routing protocols and especially RIP. We’ll try to get a deep understanding of its operation and function as an introductory to dynamic routi...
Presenting ARM In this post, that is a part of a serie of post that discuss how Wlan to radio ressources management, we talk of Aruba way of doing it. The figure shows a simple wlan network of 6 AP or...
4/5g (1) analytical (1) approach (1) architecte (1) artificial intelligence (1) aws (1) azure (1) bgp (1) casb (1) cfs (1) channel (1) chd (2) chef de projet (1) client (1) cloudwan (1) conception (1) contexte (1) contrat (1) dca (1) demande (1) discours (1) dlp (1) drrm (1) dtls (2) ekinops (1) enterprise (1) entreprise (1) ergonome (1) exploitant (1) exploitation (1) fabric (1) fabric-path (1) fonctionnel (1) fortinet (2) frequency (1) gestion (1) hsrp (1) information technology (1) intégration (1) keepalive (1) l2 (1) l3 (1) lacp (1) livrable (1) lmp (1) machine learning (3) manager (1) mc-lag (1) mec (1) microsoft (1) moa (1) modèle (1) moe (1) nacxwan (1) nfv (1) objet (1) objet-intermédiaire (1) omp (1) overlay (1) palo alto (1) peer-link (1) performance (1) physique (1) policy (3) port-channel (1) power (1) produit (1) protocole (1) routage (1) rrp (1) réalisation (1) rôle (1) sase (1) sateful (1) sd-wan (1) software defined (1) solution (2) spof (1) sso (1) stacking (1) standard (1) stratégie (1) swg (1) switchover (1) technique (1) top-down (1) tpc (1) transmission (1) underlay (1) velocloud (1) viptelia (1) vmware (1) vpc (1) vrrp (1) vsl (1) vss (1) wan (1) wireless (1) wlan (7) étude (1)
- Protected: An Example Network From Scratch… Internet AccessThis content is password protected.
- Protected: An Example Network From Scratch… Build The Wifi NetworkThis content is password protected.
- Protected: An Example Network From Scratch… On-Premise Network Automation With AnsibleThis content is password protected.
- Protected: An Example Network From Scratch… Build Your Network SecurityThis content is password protected.
- Travailler Son CVLe CV est une étape importante de toute recherche d’emploi, au moins pour initier le processus (répondre à une offre, candidature spontanée, etc.)… plus encore, c’est une occasion de se poser, de réfléchir son développement, son expérience et de se projeter dans une nouvelle opportunité! Une approche classique du CV Pour nombre de “demandeurs d’emploi”,
| M | T | W | T | F | S | S |
|---|---|---|---|---|---|---|
| 1 | 2 | |||||
| 3 | 4 | 5 | 6 | 7 | 8 | 9 |
| 10 | 11 | 12 | 13 | 14 | 15 | 16 |
| 17 | 18 | 19 | 20 | 21 | 22 | 23 |
| 24 | 25 | 26 | 27 | 28 | 29 | 30 |






