In this blog, we will discuss the I-BGP synchronization with IGP feature. A little introduction By definition, the BGP synchronization rule requires that when a BGP router receives information about a...
In this blog, we will setup a Checkpoint lab using virtualbox and gns3 on windows. Introduction In this lab we implement a basic security architecture to demonstrate the operation of a firewall cluste...
In this blog, let’s study static routing with an intermediate address to resolve in a Checkpoint firewall. Introduction Static routing is supported by CKP (Checkpoint firewalls or gateways). Let...
In this post, we explore the operation of Cisco FabricPath (FP) and more specifically Vlan information propagation in this fabric in comparison with other platforms: Catalyst for example from the same...
In this blog, let’s discover the DMVPN feature. DMVPN stands for dynamic multipoint virtual private network and as per its naming, refers to the ability for many routers to share the same networ...
In this post, let’s understand hard drive operation and try to find a methodology (procedure) to troubleshoot it (and heal it if needed). Lab setup Let’s describe in detail our “simp...
4/5g (1) analytical (1) approach (1) architecte (1) artificial intelligence (1) aws (1) azure (1) bgp (1) casb (1) cfs (1) channel (1) chd (2) chef de projet (1) client (1) cloudwan (1) conception (1) contexte (1) contrat (1) dca (1) demande (1) discours (1) dlp (1) drrm (1) dtls (2) ekinops (1) enterprise (1) entreprise (1) ergonome (1) exploitant (1) exploitation (1) fabric (1) fabric-path (1) fonctionnel (1) fortinet (2) frequency (1) gestion (1) hsrp (1) information technology (1) intégration (1) keepalive (1) l2 (1) l3 (1) lacp (1) livrable (1) lmp (1) machine learning (3) manager (1) mc-lag (1) mec (1) microsoft (1) moa (1) modèle (1) moe (1) nacxwan (1) nfv (1) objet (1) objet-intermédiaire (1) omp (1) overlay (1) palo alto (1) peer-link (1) performance (1) physique (1) policy (3) port-channel (1) power (1) produit (1) protocole (1) routage (1) rrp (1) réalisation (1) rôle (1) sase (1) sateful (1) sd-wan (1) software defined (1) solution (2) spof (1) sso (1) stacking (1) standard (1) stratégie (1) swg (1) switchover (1) technique (1) top-down (1) tpc (1) transmission (1) underlay (1) velocloud (1) viptelia (1) vmware (1) vpc (1) vrrp (1) vsl (1) vss (1) wan (1) wireless (1) wlan (7) étude (1)
- Protected: An Example Network From Scratch… Internet AccessThis content is password protected.
- Protected: An Example Network from Scratch… Build the Wifi NetworkThis content is password protected.
- Protected: An Example Network From Scratch… On-Premise Network Automation With AnsibleThis content is password protected.
- Protected: An Example Network From Scratch… Build your Network SecurityThis content is password protected.
- Travailler Son CVLe CV est une étape importante de toute recherche d’emploi, au moins pour initier le processus (répondre à une offre, candidature spontanée, etc.)… plus encore, c’est une occasion de se poser, de réfléchir son développement, son expérience et de se projeter dans une nouvelle opportunité! Une approche classique du CV Pour nombre de “demandeurs d’emploi”,
| M | T | W | T | F | S | S |
|---|---|---|---|---|---|---|
| 1 | 2 | |||||
| 3 | 4 | 5 | 6 | 7 | 8 | 9 |
| 10 | 11 | 12 | 13 | 14 | 15 | 16 |
| 17 | 18 | 19 | 20 | 21 | 22 | 23 |
| 24 | 25 | 26 | 27 | 28 | 29 | 30 |






