This blog explores data science and networking, combining theoretical concepts with practical implementations. Topics include routing protocols, network operations, and data-driven problem solving, presented with clarity and reproducibility in mind.
Sunday, December 8, 2024
ASA Remote Access VPN Load Balancing: Pre-9.7 vs. Post-9.7
Friday, December 6, 2024
Step-by-Step Guide to sVTI VPN Configuration in Cisco IOS
Static Virtual Tunnel Interface (sVTI) in Cisco IOS 15.9(3)M10
The advent of Static Virtual Tunnel Interface (sVTI) has revolutionized VPN design in Cisco IOS, especially for GRE and IPSec deployments. While GRE offers simplicity and multicast support, its combination with IPSec historically introduced MTU challenges and configuration complexity.
The introduction of sVTI addresses these issues by simplifying encryption, improving performance, and reducing operational overhead.
sVTI is a tunnel interface with IPSec encapsulation built in. It eliminates the need for GRE, crypto maps, and complex ACLs.
- Native multicast support without extra configuration
- No GRE overhead (saves 56–76 bytes)
- Simplified IPSec deployment
- NAT and QoS support on the tunnel interface
Pre-15.9(3)M10: Traditional GRE + IPSec
GRE encapsulated traffic was encrypted using crypto maps applied to physical interfaces, relying heavily on crypto ACLs.
IPSec profiles could be applied using tunnel protection,
but still required careful manual configuration.
- MTU issues and packet fragmentation
- 56–76 bytes of GRE + IPSec overhead
- Complex crypto ACL and policy management
Cisco IOS 15.9(3)M10: sVTI Breakthrough
IPSec is automatically applied to all traffic sourced from the tunnel interface. No crypto maps or ACLs required.
Default MTU is set to 1442 bytes, eliminating fragmentation caused by GRE encapsulation.
IPSec SAs are automatically created with 0.0.0.0 → 0.0.0.0, removing the need for crypto ACLs.
Router# show crypto ipsec sa
local ident (addr/mask/prot/port): (0.0.0.0/0/0/0)
remote ident (addr/mask/prot/port): (0.0.0.0/0/0/0)
status: ACTIVE
NAT and QoS are now natively supported on the sVTI interface, just like physical interfaces.
Example sVTI Configuration
interface Tunnel10 ip address 10.10.10.1 255.255.255.252 tunnel source GigabitEthernet0/0 tunnel destination 203.0.113.2 tunnel mode ipsec ipv4
๐ก Key Takeaways
- sVTI removes GRE, crypto maps, and ACL complexity
- Native multicast with lower packet overhead
- Default MTU of 1442 prevents fragmentation
- Automatic IPSec SA creation simplifies deployment
- Improved performance and operational efficiency
Conclusion
Cisco IOS 15.9(3)M10 marks a major shift in VPN design. sVTI provides a cleaner, faster, and more maintainable approach to secure tunneling, making it ideal for modern enterprise and service provider networks.
Thursday, November 28, 2024
Dual Hub Dual DMVPN Setup: Comparing Old vs New Cisco IOS Versions
Tuesday, November 26, 2024
Cisco DMVPN Phase 3 OSPF Configuration and Optimization Guide
๐ OSPF in DMVPN Phase 3 (Cisco IOS 15.9) – Complete Deployment Guide
๐ Table of Contents
๐ Introduction
Deploying OSPF in DMVPN Phase 3 requires precision. Unlike traditional hub-and-spoke routing, DMVPN Phase 3 introduces dynamic spoke-to-spoke tunnels, making routing decisions more complex.
๐ DMVPN Phase 3 Explained
DMVPN Phase 3 allows spokes to dynamically build tunnels after initial communication through the hub. This improves latency, bandwidth usage, and scalability.
๐ฝ Expand: How Phase 3 Works Internally
Phase 3 uses NHRP redirect and shortcut messages. The hub informs spokes about better paths, and spokes establish direct GRE/IPsec tunnels.
๐ก Role of OSPF in DMVPN
OSPF distributes routing information across the DMVPN network. Its behavior directly impacts:
- Route propagation
- Next-hop selection
- Convergence speed
⚠️ Why OSPF Network Type Matters
Default: Broadcast
- Triggers DR/BDR elections ❌
- Causes unnecessary adjacency overhead ❌
- Breaks DMVPN next-hop logic ❌
๐ฝ Expand: DR/BDR Problem Explained
Broadcast networks assume full mesh connectivity, which DMVPN does not provide. This mismatch leads to inefficient routing.
✅ Point-to-Multipoint Advantages
- No DR/BDR election ✔
- Hub-based next-hop ✔
- Simplified routing ✔
- Better scalability ✔
ip ospf network point-to-multipoint in DMVPN Phase 3.
⚙️ Configuration Guide
1. Hub Configuration
interface Tunnel0 ip address 10.0.0.1 255.255.255.0 ip nhrp map multicast dynamic ip nhrp network-id 1 ip nhrp redirect tunnel source GigabitEthernet0/0 tunnel mode gre multipoint tunnel key 100
2. Spoke Configuration
interface Tunnel0 ip address 10.0.0.2 255.255.255.0 ip nhrp map 10.0.0.1 192.168.1.1 ip nhrp shortcut tunnel source GigabitEthernet0/0
3. OSPF Configuration
router ospf 1 network 10.0.0.0 0.0.0.255 area 0 interface Tunnel0 ip ospf network point-to-multipoint
๐ป CLI Verification
Code Example
show ip ospf neighbor show ip route ospf
Sample CLI Output
Neighbor ID State Address Interface 1.1.1.1 FULL 10.0.0.1 Tunnel0 O 192.168.2.0/24 [110/2] via 10.0.0.1
๐ฝ Expand CLI Explanation
Routes show the hub as next-hop, ensuring proper DMVPN behavior before shortcuts occur.
๐ Cisco IOS 15.9 Enhancements
- Improved NHRP stability
- Better next-hop handling
- Reduced need for route-maps
- Enhanced scalability
๐ฝ Expand: Old vs New Behavior
Older IOS required manual next-hop fixes. IOS 15.9 aligns OSPF behavior automatically with DMVPN design.
๐ Mathematical Insight: OSPF Cost & Path Selection
Understanding OSPF in DMVPN becomes clearer when we look at the mathematics behind routing decisions. OSPF selects the best path based on cost, which is inversely proportional to bandwidth.
๐ OSPF Cost Formula
The cost of an interface is calculated as:
\[ \text{Cost} = \frac{\text{Reference Bandwidth}}{\text{Interface Bandwidth}} \]
By default, the reference bandwidth is 100 Mbps. For example:
\[ \text{Cost} = \frac{100}{10} = 10 \]
This means a 10 Mbps link has a higher cost than a 100 Mbps link, so OSPF prefers higher bandwidth paths.
๐ฝ Expand: Why Cost Matters in DMVPN
In DMVPN Phase 3, OSPF initially routes traffic via the hub. The cost calculation ensures that the most efficient path is selected before NHRP redirects create a direct spoke-to-spoke tunnel.
๐ Shortest Path First (SPF) Algorithm
OSPF uses Dijkstra’s algorithm to compute the shortest path:
\[ D(v) = \min \left( D(u) + c(u,v) \right) \]
Where:
- \(D(v)\): shortest distance to node v
- \(c(u,v)\): cost between nodes
This ensures that routing decisions are mathematically optimal.
๐ฏ Key Takeaways
- DMVPN Phase 3 enables dynamic spoke tunnels
- OSPF must use point-to-multipoint
- Broadcast mode causes inefficiencies
- IOS 15.9 simplifies deployment
๐ Final Thoughts
Correct OSPF configuration is critical in DMVPN Phase 3. Using point-to-multipoint ensures predictable routing, scalability, and efficient tunnel creation.
Monday, November 25, 2024
DMVPN Phase 3: Enhancing Scalability and Performance in VPN Networks
Friday, November 22, 2024
The Evolution of DMVPN: How Modern Routers with Cisco IOS 15.9(3)M10 Enhance Scalability, Security, and Efficiency
Tuesday, November 12, 2024
Configuring a Basic Site-to-Site VPN with NAT on Cisco Routers: Old vs. New IOS
Site-to-Site VPN with NAT (Cisco IOS)
In a typical Site-to-Site VPN with NAT (Network Address Translation), you connect two different sites over the internet through an encrypted VPN tunnel while possibly translating IP addresses along the way.
Moving from an older Cisco router to one running Cisco IOS version 15.9(3)M10 introduces some changes to configuration syntax and capabilities, but the basic structure remains consistent.
Below, I’ll outline a basic Site-to-Site VPN setup with NAT. I’ll include the essential steps and configurations for both an older IOS version and newer 15.9(3)M10.
Basic Overview of Site-to-Site VPN with NAT
- IPsec VPN: Used to encrypt the connection between the two sites.
- NAT: Used to translate private IP addresses to public addresses or resolve overlapping networks.
- Endpoints: Each router acts as the VPN endpoint.
Key Components
- VPN Configuration – Encryption, hashing, and negotiation settings.
- NAT Configuration – Address translation rules.
1. Configuring Site-to-Site VPN on an Older IOS Version
Older Cisco IOS commonly uses manual crypto map configuration.
Step 1: Define ISAKMP (IKE) Policy
crypto isakmp policy 10
encryption aes 256
hash sha256
authentication pre-share
group 2
lifetime 86400
Step 2: Set Pre-Shared Key
Define the key and remote peer IP.
crypto isakmp key YOUR_PRESHARED_KEY address 203.0.113.2
Step 3: Define IPsec Transform Set
crypto ipsec transform-set TS esp-aes 256 esp-sha256-hmac
Step 4: Create Crypto Map
crypto map MYMAP 10 ipsec-isakmp
set peer 203.0.113.2
set transform-set TS
match address 101
Step 5: Configure Access List
access-list 101 permit ip 192.168.1.0 0.0.0.255 192.168.2.0 0.0.0.255
Step 6: Apply Crypto Map
interface GigabitEthernet0/0
crypto map MYMAP
Step 7: Configure NAT
ip access-list extended NAT_EXEMPT
permit ip 192.168.1.0 0.0.0.255 192.168.2.0 0.0.0.255
!
ip nat inside source list NAT_EXEMPT interface GigabitEthernet0/0 overload
Example CLI Verification
Router# show crypto isakmp sa
IPv4 Crypto ISAKMP SA
dst src state conn-id status
203.0.113.2 198.51.100.1 QM_IDLE 1001 ACTIVE
2. Configuring Site-to-Site VPN with Cisco IOS 15.9(3)M10
Newer IOS versions support IKEv2 and tunnel interface-based VPNs.
Step 1: Define IKEv2 Proposal
crypto ikev2 proposal MY_PROPOSAL
encryption aes-cbc-256
integrity sha256
group 14
Step 2: Define IKEv2 Profile
crypto ikev2 profile MY_PROFILE
match identity remote address 203.0.113.2 255.255.255.255
authentication remote pre-share
authentication local pre-share
keyring local MY_KEYRING
Step 3: Define IPsec Transform Set
crypto ipsec transform-set TS esp-aes 256 esp-sha256-hmac
Step 4: Define IPsec Profile
crypto ipsec profile MY_IPSEC_PROFILE
set transform-set TS
set ikev2-profile MY_PROFILE
Step 5: Configure Access Control List
ip access-list extended VPN_TRAFFIC
permit ip 192.168.1.0 0.0.0.255 192.168.2.0 0.0.0.255
Step 6: Configure Tunnel Interface
interface Tunnel0
ip address 192.168.10.1 255.255.255.252
tunnel source GigabitEthernet0/0
tunnel destination 203.0.113.2
tunnel protection ipsec profile MY_IPSEC_PROFILE
Step 7: Configure NAT Exemption
ip access-list extended NAT_EXEMPT
permit ip 192.168.1.0 0.0.0.255 192.168.2.0 0.0.0.255
!
ip nat inside source list NAT_EXEMPT interface GigabitEthernet0/0 overload
Example CLI Verification
Router# show crypto ikev2 sa
IPv4 Crypto IKEv2 SA
Tunnel-id Local Remote Status
1 198.51.100.1 203.0.113.2 READY
Key Differences
- IKEv1 vs IKEv2 – IKEv2 is faster, more secure, and supports mobility.
- Crypto Map vs Tunnel Interface – Tunnel interfaces simplify design and scale better.
- NAT Handling – NAT exemption rules still apply for VPN traffic.
๐ก Key Takeaways
- Older IOS uses Crypto Maps + IKEv1.
- Modern Cisco IOS supports IKEv2 with Tunnel Interfaces.
- NAT exemption is required so VPN traffic is not translated.
- Using IPsec profiles improves scalability and maintainability.
Summary
For older routers, crypto maps and IKEv1 are commonly used.
For newer Cisco IOS versions such as 15.9+, using IKEv2 and tunnel interfaces provides a cleaner and more scalable configuration.
This configuration provides a functional, secure, and NAT-friendly Site-to-Site VPN solution across Cisco IOS versions.
Let me know if you need further customization or troubleshooting steps.
Related Topics
Thursday, November 7, 2024
Modernizing IKE Phase 1 (Main Mode) Message 5 Authentication in Cisco ASA Post-9.7
๐ IKE Phase 1 – Message 5 Deep Dive (ASA Post-9.7)
๐ Table of Contents
- Introduction
- Understanding IKE Phase 1
- What is Message 5?
- Legacy Authentication (Pre-9.7)
- Modern Authentication (Post-9.7)
- Cryptographic Math Explained
- Configuration Examples
- CLI Output Samples
- Benefits
- Key Takeaways
- Related Articles
๐ Introduction
The Internet Key Exchange (IKE) protocol is essential for establishing secure IPsec tunnels. It handles authentication, encryption negotiation, and key exchange.
๐ง Understanding IKE Phase 1
IKE Phase 1 creates a secure channel between two peers. It operates in:
- Main Mode (secure, 6 messages)
- Aggressive Mode (faster, less secure)
Main Mode hides identities and provides stronger protection.
๐ฆ What is Message 5?
Message 5 is the authentication phase where one peer proves its identity.
It contains:
- Identity payload
- Authentication hash or signature
- Encrypted content
๐ Expand Technical Flow
Message 5 and 6 complete mutual authentication. Both peers validate each other using cryptographic proof derived from shared or asymmetric keys.
⏳ Legacy Approach (Pre-9.7 ASA)
๐ Pre-Shared Key Authentication
Authentication relied on a shared secret:
HASH_I = prf(SKEYID, IDi)
Where:
- SKEYID = derived key
- IDi = identity of initiator
๐ Why This Was a Problem
Managing multiple PSKs across devices becomes complex. Also, weak keys are vulnerable to brute-force attacks.
๐ Modern Authentication (ASA Post-9.7)
1. ECDSA Authentication
Elliptic Curve Digital Signature Algorithm replaces PSK-based hashing.
Signature Formula:
r = (kG)x mod n s = k⁻¹ (H(m) + d·r) mod n
๐ Explanation
ECDSA uses elliptic curves to generate signatures. It provides high security with smaller key sizes.
2. Certificate-Based Authentication
Instead of shared secrets, certificates validate identity.
Verify(Signature, PublicKey, Message)
3. Strong Encryption
Modern ASA uses:
- AES-256
- SHA-256
- Elliptic Curve DH Groups
This ensures Message 5 is securely encrypted.
๐ Cryptographic Math Explained
Diffie-Hellman Key Exchange
Shared Secret = g^(ab) mod p
Both peers compute the same secret without transmitting it.
Hash Function
H(x) → fixed-length output
Used for integrity verification.
๐ Deep Explanation
Modern implementations combine DH + hashing + signatures to ensure confidentiality, integrity, and authenticity simultaneously.
๐ Deep Mathematical Explanation of IKE Authentication
To truly understand how Message 5 secures authentication, we need to look at the mathematical foundations behind it. This includes Diffie-Hellman key exchange, hash-based authentication, and digital signatures.
1️⃣ Diffie-Hellman Key Exchange (Shared Secret)
Shared Secret = g^(ab) mod p
- g → Generator (public)
- a, b → Private keys of peers
- p → Large prime number
Each peer computes the same shared secret independently without ever transmitting it.
๐ Why This Matters
Even if someone intercepts communication, they cannot derive the shared secret without knowing private keys. This forms the basis of secure key exchange in IKE Phase 1.
2️⃣ Hash-Based Authentication (Legacy PSK)
HASH_I = prf(SKEYID, IDi) HASH_R = prf(SKEYID, IDr)
- prf → Pseudo-Random Function
- SKEYID → Derived secret key
- IDi / IDr → Peer identities
This ensures both peers prove identity using a shared secret.
⚠️ Limitation
If the pre-shared key is weak or leaked, attackers can brute-force these hashes.
3️⃣ ECDSA Digital Signature (Modern ASA)
r = (kG)x mod n s = k⁻¹ (H(m) + d·r) mod n
- k → Random nonce
- G → Base point on elliptic curve
- d → Private key
- H(m) → Hash of message
ECDSA replaces shared secrets with mathematically secure signatures.
๐ Why ECDSA is Stronger
It uses elliptic curve cryptography, providing higher security with smaller keys and faster computations.
4️⃣ Certificate Verification (PKI)
Verify(Signature, PublicKey, Message) = TRUE
The receiver verifies the sender’s identity using a trusted Certificate Authority (CA).
๐ Real Meaning
Instead of trusting a shared password, trust is delegated to a trusted authority, making large-scale deployments easier and safer.
⚙️ Configuration Examples
๐ ECDSA Configuration
crypto ikev2 policy 1 encryption aes-256 integrity sha256 group 19 prf sha256 authentication ecdsa-sig
๐ PKI Setup
crypto ca trustpoint CA-TrustPoint enrollment url http://CA-Server subject-name CN=Device,O=Org usage ike
๐ฅ CLI Output Sample
IKEv2-PLAT-1: Auth exchange started IKEv2-PLAT-1: Using ECDSA certificate IKEv2-PLAT-1: Peer authenticated successfully Tunnel established
๐ Output Explanation
Shows successful authentication using certificate-based identity verification.
๐ Benefits of Modern Approach
- Stronger encryption
- Better scalability
- Lower operational risk
- Improved performance
๐ฏ Key Takeaways
- Message 5 is the authentication backbone
- Pre-9.7 used PSK-based hashing
- Post-9.7 supports ECDSA and certificates
- Security, scalability, and performance improved significantly
๐ Final Thoughts
The transition from PSK-based authentication to certificate and ECDSA-based systems marks a major advancement in network security.
Understanding Message 5 helps you understand the core of secure tunnel establishment.
Wednesday, November 6, 2024
Transitioning from IKEv1 to IKEv2: Enhancements in ASA Post-9.7 VPN Configurations
Saturday, November 2, 2024
Modern IKE and IPSec Configuration on Cisco ASA (Post-9.7)
Saturday, September 21, 2024
Modern NAT Exemption on Cisco ASA Post-9.7: A Guide to Manual NAT Configuration
Cisco ASA NAT Exemption: Legacy vs Modern (Post-9.7)
Cisco ASA’s NAT handling has evolved from static NAT Exemption using NAT 0 to a more flexible object-based approach in version 9.7 and beyond. This guide explores the differences and benefits of the modern method.
Legacy NAT Exemption (Pre-ASA 9.7)
Before ASA 9.7, NAT Exemption was configured using NAT 0 along with an ACL:
Step 1: Define an ACL
access-list NO_NAT extended permit ip 192.168.1.0 255.255.255.0 10.10.10.0 255.255.255.0
Step 2: Apply the ACL to NAT 0
nat (inside) 0 access-list NO_NAT
NAT Exemption Post-ASA 9.7
Modern ASA versions use Manual NAT (Twice NAT) with objects for NAT Exemption.
Step 1: Define Network Objects
object network LOCAL_NET subnet 192.168.1.0 255.255.255.0 object network REMOTE_NET subnet 10.10.10.0 255.255.255.0
Step 2: Create a Manual NAT Rule
nat (inside,outside) source static LOCAL_NET LOCAL_NET destination static REMOTE_NET REMOTE_NET
Step 3: Verification
show nat detail
Advantages of Modern NAT Exemption
- Object-Based Configuration: Easier to define, reuse, and manage networks.
- Simplified Troubleshooting: Rules are logically grouped and human-readable.
- Better VPN Integration: Ensures traffic bypasses NAT seamlessly.
- Granular Control: Allows precise matching of source and destination addresses.
Sample Scenario: VPN Traffic NAT Bypass
Step 1: Define Networks
object network LOCAL_VPN subnet 192.168.100.0 255.255.255.0 object network REMOTE_VPN subnet 10.0.0.0 255.255.255.0
Step 2: Configure NAT Exemption Rule
nat (inside,outside) source static LOCAL_VPN LOCAL_VPN destination static REMOTE_VPN REMOTE_VPN
Step 3: Verify Configuration
show nat detail
Conclusion
ASA 9.7 and later provides a more intuitive, flexible approach to NAT Exemption using object-based Manual NAT. The legacy NAT 0 method is replaced by Twice NAT rules, making VPN traffic handling, troubleshooting, and future configurations simpler and more precise.
Thursday, September 12, 2024
Modern Approach to Identity NAT (NAT 0) in Cisco ASA
Thursday, September 5, 2024
Modern NTP Configuration and Security Enhancements
Modern NTP Practices – Interactive Guide
Network Time Protocol (NTP) ensures that all network devices, servers, and applications share a consistent time reference. Accurate time is critical for logging, security, cryptography, event correlation, and even for financial transactions in latency-sensitive systems. Modern NTP practices focus not only on accuracy but also on security and reliability.
Old Way: Shared keys were configured between NTP clients and servers to ensure that devices only accepted time from trusted sources. This method prevented accidental or malicious misconfiguration but did not encrypt the traffic.
New Way: Modern environments adopt more advanced security measures:
- NTP with Autokey: Uses asymmetric cryptography to verify the authenticity of time updates.
- NTP over TLS: Encrypts NTP packets, protecting against man-in-the-middle attacks and replay attacks.
- These methods are particularly critical in networks supporting sensitive services, such as VPNs or certificate-based authentication.
Old Way: Time sources were usually local or internal servers, and devices could be configured as NTP masters using ntp master <stratum>. These were static configurations and often limited in redundancy.
New Way: Modern deployments emphasize multiple authoritative sources for redundancy and precision:
- Public NTP servers (Google, NIST) provide high reliability and global availability.
- Precision Time Protocol (PTP, IEEE 1588) is increasingly used where sub-millisecond accuracy is required, such as in financial trading or telecom networks.
- Hybrid approaches can combine GPS, NTP, and PTP for multi-layered accuracy.
Old Way: The stratum indicated how far a device was from a reference clock. A lower stratum number meant closer proximity to a reliable clock source, but configuration was static.
New Way: While stratum remains conceptually important, modern networks focus on:
- Synchronizing to multiple servers of varying stratum levels to improve accuracy.
- Preference for GPS or atomic clock-backed servers for mission-critical devices.
- Monitoring actual synchronization quality rather than relying solely on stratum number.
Old Way: NTP was the standard for time synchronization, with no secure variant widely deployed.
New Way: New protocols and enhancements improve security and precision:
- Network Time Security (NTS) provides authentication and encryption for NTP.
- Precision Time Protocol (PTP) supports sub-millisecond accuracy in data centers, telecom, and high-frequency trading environments.
- Some deployments use hybrid models where NTP provides general synchronization, and PTP is used for critical, latency-sensitive operations.
Old Way: Physical devices were manually configured for NTP.
New Way: Virtualized and cloud networks often rely on platform-provided time services:
- Cloud instances may automatically sync with highly accurate NTP servers maintained by the provider.
- Hypervisors offer host-to-VM time synchronization ensuring consistent clocks even when VMs are migrated or restarted.
- This reduces the operational overhead of managing NTP in large-scale virtual deployments.
Old Way: Network engineers used basic commands to check NTP status, such as show ntp status or show ntp associations.
New Way: Modern networks integrate NTP into monitoring platforms and management systems:
- Track drift, offsets, and synchronization accuracy across hundreds of devices.
- Real-time alerts for devices falling out of sync, enabling rapid remediation.
- Compliance reporting for security audits, regulatory frameworks, and SLA verification.
๐ก Key Takeaways
- Secure time synchronization using TLS or NTS is now a best practice.
- Redundant sources (GPS, atomic clocks, public NTP servers) improve accuracy and reliability.
- PTP is used where sub-millisecond precision is required.
- Virtualized and cloud environments rely on platform-managed NTP services.
- Monitoring time synchronization is essential for security, compliance, and operational reliability.
Featured Post
How HMT Watches Lost the Time: A Deep Dive into Disruptive Innovation Blindness in Indian Manufacturing
The Rise and Fall of HMT Watches: A Story of Brand Dominance and Disruptive Innovation Blindness The Rise and Fal...
Popular Posts
-
EIGRP Stub Routing In complex network environments, maintaining stability and efficienc...
-
Modern NTP Practices – Interactive Guide Modern NTP Practices – Interactive Guide Network Time Protocol (NTP)...
-
DeepID-Net and Def-Pooling Layer Explained | Interactive Guide DeepID-Net and Def-Pooling Layer Explaine...
-
GET VPN COOP Explained Simply: Key Server Redundancy Made Easy GET VPN COOP Explained (Simple + Practica...
-
Modern Cisco ASA Troubleshooting (Post-9.7) Modern Cisco ASA Troubleshooting (Post-9.7) With evolving netwo...
-
When Machine Learning Looks Right but Goes Wrong When Machine Learning Looks Right but Goes Wrong Picture a f...
-
Latent Space & Vector Arithmetic Explained | AI Image Transformations Latent Space & Vector Arit...
-
Process Synchronization – Interactive OS Guide Process Synchronization – Interactive Operating Systems Guide In an operati...
-
Event2Mind – Teaching Machines Human Intent and Emotion Event2Mind: Teaching Machines to Understand Human Intent...
-
Linear Regression vs Classification – Interactive Guide Linear Regression vs Classification – Interactive Theory Guide Line...