by admin | Feb 14, 2021 | Cisco, Security, VPN
IPsec VPN Process Search for: (1) IPsec VPN Control Plane How to get router initiate the ISAKMP/IKE negotiation Policy-based IPsec VPN Traffic routed to Crypto-enabled interface and matched by Crypto ACL Sometimes called “Interesting Traffic” E.g.: IPsec VPN Crypto...
by admin | Feb 14, 2021 | Cisco, Security, VPN
IPsec VPN Overview Search for: (1) IPsec VPN Background IP protocol was designed in the early stages of the Internet where security wasn’t an issue IP protocol is vulnerable to many network attacks and introduce security issues IETF introduced IPsec as security...
by admin | Jan 11, 2021 | Book, Cisco, Security
Cisco IPsec VPN Series Search for: Cisco IPsec VPN Series Introduction to Cisco IPsec VPN Overview 1 IPsec VPN Overview IPsec VPN Process ISAKMP IKE Phase 1 Details (ISAKMP and IKE Overview) ISAKMP IKE Phase 2 Details (SA and SPI) IKE Keying And Authentication IPsec...
by admin | Jan 9, 2021 | DevOps, Programming
Python For Network Engineer 3 Search for: Python For Network Engineers 3 (1) Backup switch configurations Ubuntu-1 Create and modify “getconfigs.py” script (Figure 1) Add comments Use “strip()” to removes any leading (spaces at the beginning)...
by admin | Jan 2, 2021 | DevOps, Programming
Python For Network Engineer 2 Search for: Python For Network Engineers 2 (1) Create switch VLANs using loops Ubuntu-1 Create VLAN using loop function (Figure 1) Use “for” to create loop Notice that there is an error when we try to run the script,...
Recent Comments