View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

l2l

SEC0079 - ASA 1000V L2L IPSec VPN (ASDM CLI Mode)

The video shows you how to configure site-to-site IPSec VPN on Cisco ASA 1000V in ASDM mode via CLI. We will go through IKEv1 Phase 1 and Phase 2 configuration to establish an IPSec VPN tunnel to a physical ASA to provide remote access to our servers in the virtual datacenter. You will see the VPN configuration on ASA 1000V being almost identical to a physical ASA.
Topic:
  • ASA 1000V VPN - IKEv1 Phase1/2
  • ASA 1000V VPN - IPSec
  • ASA 1000V NAT Bypass (ie. Self-NAT)
Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0074 - ASA 1000V L2L IPSec VPN (VNMC Mode)

The video shows you how to configure site-to-site IPSec VPN on Cisco ASA 1000V in VNMC mode. We will go through VPN Device Policy (Phase 1) and Interface Policy Set (Phase 2) configuration to establish an IPSec VPN tunnel to a physical ASA to provide remote access to our servers in the virtual datacenter. 
Note: 
  • VPN Interface Policy only take affect when applied to an outside interface
Topic:
  • ASA 1000V VPN Device Policy (Phase 1)
    • IKE Policy
Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0026 - L2L IPSec IKEv1 with VRF (crypto map & VTI)

The video takes the site-to-site L2L IPSec VPN to the next level by combining what we have learnt from the previous videos with the concept of Virtual Routing Forwarding (VRF). We will look at how you can segregate different type of L2L VPN into their own logical routing domain, while they all share the same physical hardware. Basic understanding of VRF is recommended before viewing this video

Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0024 - L2L IPSec IKEv1 with Certificate on Router and ASA

The video walks you through configuring site-to-site (L2L) IPSec VPN tunnel between Cisco router and ASA firewall using certificate authentication. You will see that choosing the type of identity to send and match becomes very important as the certificate does not get exchanged until later in Phase 1 negotiation. Using aggressive mode allows the device identity contained in the certificate to be revealed sooner but at a risk of identity exposure. Aggressive mode will also be reviewed in this video.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0023 - L2L IPSec IKEv1 with Pre-Shared Key on Router and ASA

The video walks you through configuring site-to-site (L2L) IPSec VPN tunnel between Cisco router and ASA firewall. This is probably the simplest form of L2L IPSec using 'crypto map' and crypto ACL to match interesting traffic. You will see that you can apply the same configuration thought process to both router and ASA, while ASA having slight variation on the use of Tunnel-group and Group-policy. We will also look at how to restrict traffic over the tunnel using an access-list (ACL). 

Rating: 
4.5
Average: 4.5 (2 votes)
Difficulty Level: 
0
Subscribe to RSS - l2l

Lab Minutes Classifieds