Skip to main content

Featured

Basics of VXLAN

 Maximum number of VLAN is 4000 where  VXLAN can give 16 million Virtualization by adding 24 bit VNI network Identifier. This Vxlan encapsualtion is called Virtual Ethernet modul or VEM. Each VEM has IP address. The IP is assigned to interface VTEP==>> Vxlan Tunnel end point Each VTEP interfaces associated with one or more VNIs. VXLAN usage is can create multiple tunnels over a underlay network. Mainly used on Spine- Leaf Design  bum traffic for broadcast VXLAN can do the load balance between the port channel. Multiple VNI can associated with same multicast group. ========================================= HSRP VS VRRP VS GLBP HSRP and GLBP is cisco properatory VRRP is opensource protocol. HSRP active and standby and VRRP follows master and slave. VRRP can use interface IP as virtual IP. HSRP sents Hello messages but VRRP sents adverticements. GLBP is used to do for load balancing between routers. It uses different mac address for different machine traffic. SSO: ====...

 SSL Hand shake 
Step by Step details:

The following way of messaging order is almost the same way.


1.Hell message from the Client to Server.

==============================

It includes following details.

1.TLS version 

2.Cipher suite

3.String of random bytes(Client random).


2. Server Hello:

===========

As soon as, the Servers receive a reply from clients they sent a message to the client which includes the following details,

1. SSL certificate.

2. The Chosen Cipher suite

3. Server random string which generated by the server.


Certificate verification by the client:

===========================

The next step is SSL certificate verification with certificate issuer(A third party certificate provider).

The client is checks about the certificate  owners details and who owns that, expiry date and so on.

If it gets success, It goes for next step of action.


Next step is Premaster key verification:

=============================

Client generates a key with server chosen cipher' public key and sent to server to verify it. This can be only decrypted by a private key with server.

Session key created :

===============

Now, the client random and server random and pre master secret verification will happens. Now, all should be the same result.

Client ready:

==========

The client sends a finished message that is encrypted with a session key.

Server is ready:

============


The server sends a finished message encrypted with a session key.


Secure symmetric encryption achieved:

============================

The handshake is completed and the communication is continues.


All the sessions uses Asymmetric cryptography.






 Some useful information:
===================

Public Key  is a key can be used to encrypt  Data.
Private key is a key can be used to Decrypt Data.


Comments

Popular Posts