View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

gre

SEC0266 - FlexVPN Redundancy with Dual Hub Single Cloud (Part 4)

The video shows you how to create Cisco FlexVPN dual-hub single-cloud topology using dVTI Virtual-Template with certificate-based authentication and Suite-B cryptography. We will cover FlexVPN configuration, BGP and EIGRP routing, Spoke-to-Spoke tunnel creation and failover testing. We will also demonstrate and provide solution for a split-hub scenario. 
Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0266 - FlexVPN Redundancy with Dual Hub Single Cloud (Part 3)

The video shows you how to create Cisco FlexVPN dual-hub single-cloud topology using dVTI Virtual-Template with certificate-based authentication and Suite-B cryptography. We will cover FlexVPN configuration, BGP and EIGRP routing, Spoke-to-Spoke tunnel creation and failover testing. We will also demonstrate and provide solution for a split-hub scenario. 
Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0266 - FlexVPN Redundancy with Dual Hub Single Cloud (Part 2)

The video shows you how to create Cisco FlexVPN dual-hub single-cloud topology using dVTI Virtual-Template with certificate-based authentication and Suite-B cryptography. We will cover FlexVPN configuration, BGP and EIGRP routing, Spoke-to-Spoke tunnel creation and failover testing. We will also demonstrate and provide solution for a split-hub scenario. 
Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0266 - FlexVPN Redundancy with Dual Hub Single Cloud (Part 1)

The video shows you how to create Cisco FlexVPN dual-hub single-cloud topology using dVTI Virtual-Template with certificate-based authentication and Suite-B cryptography. We will cover FlexVPN configuration, BGP and EIGRP routing, Spoke-to-Spoke tunnel creation and failover testing. We will also demonstrate and provide solution for a split-hub scenario. 
Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0259 - FlexVPN L2L with Spoke-to-Spoke (Part 2)

The video demonstrates Spoke-to-Spoke tunnel capability of Cisco FlexVPN. We will be converting our Hub-and-Spoke DVTI implementation to support Spoke-to-Spoke tunnel. We will review how NHRP is actually used in the tunnel instantiation process and discuss how this is different from DMVPN. The video finishes with a review of NHRP debug packet.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0259 - FlexVPN L2L with Spoke-to-Spoke (Part 1)

The video demonstrates Spoke-to-Spoke tunnel capability of Cisco FlexVPN. We will be converting our Hub-and-Spoke DVTI implementation to support Spoke-to-Spoke tunnel. We will review how NHRP is actually used in the tunnel instantiation process and discuss how this is different from DMVPN. The video finishes with a review of NHRP debug packet.
Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0243 - FTD 6.1 Prefilter Policy (Part 3)

The video introduces you to Pre-filter policy on Cisco FTD 6.1. We will demonstrate how prefilter policy can be used in addition to a regular access control rule to allow (Fastpath) or drop traffic and prevent them from further processing. The second half of the videos takes you through another feature called Tunnel Rule that allows FTD to analyze unencrypted tunnel traffic.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0243 - FTD 6.1 Prefilter Policy (Part 2)

The video introduces you to Pre-filter policy on Cisco FTD 6.1. We will demonstrate how prefilter policy can be used in addition to a regular access control rule to allow (Fastpath) or drop traffic and prevent them from further processing. The second half of the videos takes you through another feature called Tunnel Rule that allows FTD to analyze unencrypted tunnel traffic.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0243 - FTD 6.1 Prefilter Policy (Part 1)

The video introduces you to Pre-filter policy on Cisco FTD 6.1. We will demonstrate how prefilter policy can be used in addition to a regular access control rule to allow (Fastpath) or drop traffic and prevent them from further processing. The second half of the videos takes you through another feature called Tunnel Rule that allows FTD to analyze unencrypted tunnel traffic.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SP0030 - MPLS Multicast VPN (Part 3)

The video introduces you to Cisco MPLS multicast VPN. We will first go through some theories behind the technology to give you a big picture of configuration steps that will be involved and familiarize you with essential terminologies. The configuration begins at global multicast, of which we will use Source-Specific Multicast (SSM), and followed by Default-MDT and Data-MDT configuration. During configuration, we will provide tips and point out anything that you might need to pay attention to. We will be testing using both Dense and Sparse modes at the client sites. Wireshark packet capture will be performed throughout this lab to help you place the theories into practice, and understand the structure of the multicast packets.

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

Pages

Subscribe to RSS - gre

Lab Minutes Classifieds