View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

Security

SEC0259 - FlexVPN L2L with Spoke-to-Spoke (Part 2)

The video demonstrates Spoke-to-Spoke tunnel capability of Cisco FlexVPN. We will be converting our Hub-and-Spoke DVTI implementation to support Spoke-to-Spoke tunnel. We will review how NHRP is actually used in the tunnel instantiation process and discuss how this is different from DMVPN. The video finishes with a review of NHRP debug packet.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0259 - FlexVPN L2L with Spoke-to-Spoke (Part 1)

The video demonstrates Spoke-to-Spoke tunnel capability of Cisco FlexVPN. We will be converting our Hub-and-Spoke DVTI implementation to support Spoke-to-Spoke tunnel. We will review how NHRP is actually used in the tunnel instantiation process and discuss how this is different from DMVPN. The video finishes with a review of NHRP debug packet.
Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0258 - FlexVPN L2L with dVTI and External PSK (Part 2)

The video shows you how to configure Cisco FlexVPN with DVTI using local and external pre-shared key (PSK). We start by converting our previous DVTI setup from certificate authentication to PSK. We then shows you, for scalability and consistency purpose, that you can have DVTI headend router centrally fetch PSK from a RADIUS server.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0258 - FlexVPN L2L with dVTI and External PSK (Part 1)

The video shows you how to configure Cisco FlexVPN with DVTI using local and external pre-shared key (PSK). We start by converting our previous DVTI setup from certificate authentication to PSK. We then shows you, for scalability and consistency purpose, that you can have DVTI headend router centrally fetch PSK from a RADIUS server.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0257 - FlexVPN L2L with Dynamic Virtual Tunnel Interface (DVTI) (Part 3)

The video walks you through the configuration of Dynamic Virtual Tunnel Interface (DVTI) on Cisco FlexVPN and several of its benefits. You will see its ability to flexibly terminate different type of VPN tunnels with and without routing protocol by cloning a VTI template. Many of possible uses-cases are included in this lab.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0257 - FlexVPN L2L with Dynamic Virtual Tunnel Interface (DVTI) (Part 2)

The video walks you through the configuration of Dynamic Virtual Tunnel Interface (DVTI) on Cisco FlexVPN and several of its benefits. You will see its ability to flexibly terminate different type of VPN tunnels with and without routing protocol by cloning a VTI template. Many of possible uses-cases are included in this lab.
Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0257 - FlexVPN L2L with Dynamic Virtual Tunnel Interface (DVTI) (Part 1)

The video walks you through the configuration of Dynamic Virtual Tunnel Interface (DVTI) on Cisco FlexVPN and several of its benefits. You will see its ability to flexibly terminate different type of VPN tunnels with and without routing protocol by cloning a VTI template. Many of possible uses-cases are included in this lab.
Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0256 - FlexVPN L2L with Next Generation Encryption (Part 2)

The video introduces you to the Next Generation Encryption (NGE) that can be used with Cisco FlexVPN. You will learn NGE-compliant encryption, hashing, digital signature and key exchange algorithms and see how they are configured in FlexVPN. 
Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0256 - FlexVPN L2L with Next Generation Encryption (Part 1)

The video introduces you to the Next Generation Encryption (NGE) that can be used with Cisco FlexVPN. You will learn NGE-compliant encryption, hashing, digital signature and key exchange algorithms and see how they are configured in FlexVPN. 
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0255 - FlexVPN L2L with Static and Dynamic Routing (Part 2)

The video shows you various routing options available across Cisco FlexVPN using one hub and two spokes topology. We will cover the most basic form of routing; static routes, followed by more favourable options of EIGRP and BGP. The lab finishes with Multicast routing example.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

Pages

Subscribe to RSS - Security