Q-Q Tunneling For Fun & Profit
Introduction Welcome back everybody! Last week we covered a tunneling technology known as l2protocol-tunneling or L2pt here on the blog. If you missed that article, you may want to go through and...
View ArticleTaking Another Shot At The Title: CCIE Security
Good morning to all my readers out there (at least it is morning for me)! Some of you have reached out to me and wondered what has been going on lately. I know there has been a lack of fresh content...
View ArticleBuilding A CCIE Security VRACK
Introduction Since my recent twitter update showing off my new CCIE security vrack script, I have been getting a flutter of messages from readers and subscribers asking about how I put everything...
View ArticleConfiguring NAT/PAT On The ASA
Introduction The ASA is relatively new to me. I was not one of those RS CCIEs that did a lot of security work on the old PIX and the ASA when I was coming up the ranks of the routing and switching...
View ArticleASA Dynamic Outside NAT
This is a bit of a followup post on my previous blog entry from earlier today covering NAT. One of the only things I did not cover in that post was dynamic outside NAT. I was labbing up some NAT...
View ArticleASA Authentication Proxy Notes
These are just the notes I put together after researching and labbing basic ASA auth proxy over the last few days. Keep in mind, this does not include the authorization stuff / downloadable ACL stuff...
View ArticleASA ICMP Error Inspection
Introduction I have been labbing up this particular technology in an effort to understand it better. It is my personal opinion that the documentation is rather “lacking” in this particular area. The...
View ArticleUnderstanding EZVPN Authentication
Introduction I have been learning EZVPN lately, and one thing that most books and things all say but don’t really explain all that well is this — “If you are using pre-shared key authentication with...
View ArticleINE Publishes CCIE Career Infographic
INE released an interesting CCIE career infographic on their blog today. I thought you all might be interested in this information! Infographic by INE, Inc. providers of Cisco Certification Training.
View ArticleAn Oldie But A Goodie: MLPPPoFR Configuration
Introduction “Alright this is an oldie…well an oldie where I come from” — Marty McFly I ran into a situation today that got me thinking about getting the rust off and configuring MLPPPoFR (PPP...
View ArticleIntroduction to Cisco NAT
I have recently been teaching Cisco Networking Academy classes at a local college. One topic my students seem to struggle with is NAT and PAT. To help them, I wrote up a “Introduction to NAT”...
View ArticleQuick and Dirty SSL Myth Busting
Hi guys, So, it is April, 2014 and the media is buzzing with news about the recent OpenSSL vulnerability known as heartbleed. It’s a perfect time to refresh some basic knowledge on SSL and how it...
View ArticleNew CCIE R&S MPLS Course Released!
I am excited to announce that my latest course covering all the MPLS related topics from the CCIE R&S v5 blueprint has been released at Pluralsight The course is more … Continue Reading →
View ArticleHow To Pass The CCNA
I know there are a lot of people out there that have aspirations and dreams to achieve the CCNA certification, but they simply don’t know where to start. I have … Continue Reading →
View ArticleGRE over IPsec and Static NAT
Introduction I have recently been studying IPsec based VPNs and kept running into the same struggle – Many sources out there claim that when implementing GRE over IPsec, if the … Continue Reading →
View ArticleDMVPN Phase I
Introduction In this blog, we will take a look at DMVPN phase I, exploring what exactly it is, how it works, and configuring it in a lab environment. Dynamic … Continue Reading →
View ArticleDMVPN Phase II
Introduction In this post, I am going to continue my series on DMVPN by covering DMVPN Phase II. The crypto implementation will be exactly as it was in part … Continue Reading →
View ArticleDMVPN Phase III
Introduction Welcome to the last installment of my series on DMVPN, which will cover DMVPN phase III. If you missed the first two blog posts covering phase I and … Continue Reading →
View ArticleGETVPN COOP with PKI & Multicast Rekey
Introduction In this blog, we will be taking a look at group encrypted transport VPN, or GETVPN. GETVPN is a Cisco VPN technology that is generally usually used to … Continue Reading →
View Article
More Pages to Explore .....