Learn hot to get a secure and scalable instance of Docker Enterprise up and running.
Related Page
In this post I’ll focus on a topic that’s mentioned in the Cisco FIREWALL training class but isn’t emphasized there or in the online Cisco ASA documentation. When configuring failover on a pair of ASA security appliances, a situation can arise in which network disruption occurs due to the secondary ASA in a failover pair becoming active first and then the primary comes online second. Both the documentation and the courseware point out that this causes the secondary (and active ASA) to swap its interface MAC addresses with those of the primary. Being naturally skeptical about this behavior, I decided to investigate. The rest of this post illustrates my confirmation of this phenomenon.
Related Page
Discover why Amazon Redshift is one of the most talked about and fastest growing services that Amazon Web Services (AWS) has ever released.
A local area network (LAN) provides a path of communication, originating from the sender to the receiver; Ethernet is the most common LAN used.
Learn how to use PowerShell cmdlets specific to installing and configuring Hyper-V.
Learn how to get your best practices in order with ITSM in our webinar.