View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

Security

SEC0030 - ISE 1.1 Node Registration with Self-Signed Certificate

The video demonstrates how to register a Policy Service node to a primary Admin node using self-signed certificate. The same process applies to registering a secondary Admin node. This step is required when implementing an ISE distributed design for high scalability. The other option is to use trusted CA-signed certificate, which will be looked at in a separate video.

Rating: 
5
Average: 5 (3 votes)
Difficulty Level: 
0

SEC0029 - Windows 2008 CA User and Computer Certificate Auto-Enrollment

The video walks you through steps to deploy user and computer digital certificates from Windows 2008 Certificate Authority (CA) server through auto-enrollment and Group Policy. This method allows you to automatically distribute certificates to your Windows users, which is very effective for a large scale security deployment that requires either or both user and machine authentication using client-based certificate such as EAP-TLS. This lab assumes you have existing Windows certificate server and Active Directory (AD) infrastructure.

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0028 - ISE 1.1 VMware Installation

The video walks you through an installation of Cisco Identity Services Engine (ISE) (we use 1.1.1 for our demonstration) on VMware. We will guide you step-by-step through the installation process. At the end of this lab, you should have a working ISE server that you can use for future labs. No configuration, other than the setup process, is performed in this video. The video assumes that you have basic working knowledge of VMware ESXi.

Rating: 
5
Average: 5 (5 votes)
Difficulty Level: 
0

SEC0027 - ASA Remote Access IPSec VPN with Pre-Shared Key and Certificate

The video demonstrates configuration of remote access IPSec VPN with Windows software client on Cisco ASA firewall. We will look at both simple pre-shared key authentication as well as using client certificate. The client is placed behind a NAT router to demonstrate the significance of NAT Transparency, and compare it to raw IPSec, IPSec over UDP and IPSec over TCP. The order of precedence on encapsulation types will be investigated when they are all enabled simultaneously. 

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0026 - L2L IPSec IKEv1 with VRF (crypto map & VTI)

The video takes the site-to-site L2L IPSec VPN to the next level by combining what we have learnt from the previous videos with the concept of Virtual Routing Forwarding (VRF). We will look at how you can segregate different type of L2L VPN into their own logical routing domain, while they all share the same physical hardware. Basic understanding of VRF is recommended before viewing this video

Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0024 - L2L IPSec IKEv1 with Certificate on Router and ASA

The video walks you through configuring site-to-site (L2L) IPSec VPN tunnel between Cisco router and ASA firewall using certificate authentication. You will see that choosing the type of identity to send and match becomes very important as the certificate does not get exchanged until later in Phase 1 negotiation. Using aggressive mode allows the device identity contained in the certificate to be revealed sooner but at a risk of identity exposure. Aggressive mode will also be reviewed in this video.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0023 - L2L IPSec IKEv1 with Pre-Shared Key on Router and ASA

The video walks you through configuring site-to-site (L2L) IPSec VPN tunnel between Cisco router and ASA firewall. This is probably the simplest form of L2L IPSec using 'crypto map' and crypto ACL to match interesting traffic. You will see that you can apply the same configuration thought process to both router and ASA, while ASA having slight variation on the use of Tunnel-group and Group-policy. We will also look at how to restrict traffic over the tunnel using an access-list (ACL). 

Rating: 
4.666665
Average: 4.7 (3 votes)
Difficulty Level: 
0

SEC0022 - Router Remote Access IPSec VPN with Pre-Shared Key and Certificate

The video demonstrates configuration of remote access IPSec VPN with Windows software client on Cisco router. We will look at both simple pre-shared key authentication as well as using client certificate. The client is placed behind a NAT router to demonstrate the significance of NAT Transparency, and compare it to raw IPSec and cTCP (IPSec over TCP). The video finishes off by showing how client can be allowed access to local subnet when a non-split tunnel is used.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0021 - Router EZVPN with Cisco Tunneling Control Protocol (cTCP)

The video shows you how to enable Cisco Tunneling Control Protocol, also known as, IPSec over TCP, on Cisco router Easy VPN (EZVPN) connection. cTCP can potentially be a solution when you need to establish a VPN through a device or network that does not support ESP protocol. TCP encapsulation makes IPSec traffic NAT-friendly at the cost of additional overhead of TCP header. In this lab, we will simulate an unsupported network using ACL to block ESP and shows how cTCP provides a workaround.

Topic includes
  • EZVPN with cTCP (aka IPSec over TCP)
Rating: 
0
No votes yet
Difficulty Level: 
1

Pages

Subscribe to RSS - Security