Skip to content
  • Email :- saikat@saikatinfotech.com
  • PH:- +918777701917
Facebook Youtube Instagram
  • Home
  • Blog

    furniture

    Dining Chairs
    Counter & Bar Stools
    Occasional Chairs
    Daybeds & Chaises

    lightings

    Benches & Ottomans
    Dining Tables
    Coffee & Cocktail Tables
    Consoles & Desks

    accessories

    Cabinets & Bookcases
    Screens
    Outdoor Furniture
    Floor Samples

    Texture lab

    Side Tables
    Beside Tables
    Sideboards & Drawers
    Lounge Chairs

    what’s new

    Benches & Ottomans
    Cocktail Tables
    Dining Tables
    Consoles & Desks

    what’s new

    Benches & Ottomans
    Cocktail Tables
    Dining Tables
    Consoles & Desks

    Flash sales

    Easy to Customise
    Simple and intuitive
    Highly customisable
    Coding skills

    Flash sales

    Easy to Customise
    Simple and intuitive
    Highly customisable
    Coding skills
  • IoT Projects
    • ESP32
    • Fiber Optic
  • All Dashboard
    • Networking
    • Network Security
    • Fiber Solution
    • Server Dashboard
    • Linux Server
    • Computer IT Support
    • Voice Solution Dashboard
    • Internet Of Things IoT
    • Windows

SSL Deep Inspection

  • Post author:admin
  • Post published:April 24, 2026
  • Post category:Uncategorized
  • Post comments:0 Comments

SSL Deep Inspection & Intrusion Prevention SSL Deep Inspection SSL Deep Inspection is a firewall security feature that decrypts, inspects, and analyzes encrypted HTTPS traffic (SSL/TLS traffic) to detect hidden…

Continue ReadingSSL Deep Inspection

Web filtering

  • Post author:admin
  • Post published:April 24, 2026
  • Post category:Uncategorized
  • Post comments:0 Comments

Web Filtering & Content Filtering What is Web Filtering Policy Firewall Web Filter is a security feature used in enterprise firewalls like Fortinet that controls and monitors access to websites…

Continue ReadingWeb filtering

What is Layer 2 VPN (L2VPN)

  • Post author:admin
  • Post published:April 18, 2026
  • Post category:Uncategorized
  • Post comments:0 Comments

Layer 2 VPN (L2VPN) What is Layer 2 VPN (L2VPN) A Layer 2 VPN (L2VPN) is a type of Virtual Private Network that connects multiple locations at the data link…

Continue ReadingWhat is Layer 2 VPN (L2VPN)

What is a Protocol

  • Post author:admin
  • Post published:April 1, 2026
  • Post category:Uncategorized
  • Post comments:0 Comments

What is a Protocol What is a Protocol?A protocol is a set of rules and standards that define how devices communicate with each other over a network. Just like people…

Continue ReadingWhat is a Protocol

OSPF Default Route

  • Post author:admin
  • Post published:March 29, 2026
  • Post category:Uncategorized
  • Post comments:0 Comments

OSPF Default Route What is a Default RouteWhen a router receives an IP packet, it matches the destination IP address against its routing table. If the destination IP address matches…

Continue ReadingOSPF Default Route

Networking Gallary

  • Post author:admin
  • Post published:March 15, 2026
  • Post category:Uncategorized
  • Post comments:0 Comments

Network Gallary OSPF Protocol Network Design BGP Protocol Network Design MPLS VPN Protocol Network Design

Continue ReadingNetworking Gallary

What is OSPF

  • Post author:admin
  • Post published:March 7, 2026
  • Post category:Uncategorized
  • Post comments:0 Comments

What Is OSPF History Of OSPF Open Shortest Path First (OSPF) is a link-state routing protocol used in IP networks to find the shortest path for data packets between routers.…

Continue ReadingWhat is OSPF

FortiGate Deep Inspection Security Profiles

  • Post author:admin
  • Post published:December 3, 2025
  • Post category:Uncategorized
  • Post comments:0 Comments

FortiGate Deep Inspection Security Profiles Slide 1: Introduction to Security ProfilesSecurity Profiles = Inspection mechanisms applied after firewall policy matchProtect users & network from:MalwareIntrusionsWeb-based risksData leakageBotnetsApplied per firewall policySlide 2:…

Continue ReadingFortiGate Deep Inspection Security Profiles

Tally prime What is Debit, Credit, Ledger, Under, Voucher

  • Post author:admin
  • Post published:November 24, 2025
  • Post category:Uncategorized
  • Post comments:0 Comments

Ledger,Group,Voucher Entery What is a Ledger?A Tally Ledger is one of the most important elements in Tally Prime.It represents an individual account where all the transactions related to a specific…

Continue ReadingTally prime What is Debit, Credit, Ledger, Under, Voucher

CCL Progarming Code

  • Post author:admin
  • Post published:November 4, 2025
  • Post category:Uncategorized
  • Post comments:0 Comments

CCL Programing Code For CCL108 / CCL308 / CCL412 / CCL416 / CCL108SU CCL 108 PBX ........... 1.Default Ext Numer Start 601 To 608 2.Default Password:- #*0000 3.Password Change :-…

Continue ReadingCCL Progarming Code
  • 1
  • 2
  • Go to the next page

Recent Posts

  • VLAN Iin Details
  • What is Switch
  • What is Security Policy
  • interface
  • SSL Deep Inspection

Recent Comments

No comments to show.
Copyright - WordPress Theme by OceanWP