About
Professional History
Topics
ASA
AMP
Career
Cisco DNA
CCIE Security v5
Firepower
Identity Services Engine
Labbing
Microsoft Server
Netflow
Nexus 1000v
pxGrid
Training Reviews
Splunk
Stealthwatch
Tetration
TrustSec
VPN
Video Training
Web Security Appliance
Blog
Contact
Social Media
LinkedIn
Twitter
Links

Networking fun

About
Professional History
Topics
ASA
AMP
Career
Cisco DNA
CCIE Security v5
Firepower
Identity Services Engine
Labbing
Microsoft Server
Netflow
Nexus 1000v
pxGrid
Training Reviews
Splunk
Stealthwatch
Tetration
TrustSec
VPN
Video Training
Web Security Appliance
Blog
Contact
Social Media
LinkedIn
Twitter
Links
  • Topics
  • ASA
  • AMP
  • Career
  • Cisco DNA
  • CCIE Security v5
  • Firepower
  • Identity Services Engine
  • Labbing
  • Microsoft Server
  • Netflow
  • Nexus 1000v
  • pxGrid
  • Training Reviews
  • Splunk
  • Stealthwatch
  • Tetration
  • TrustSec
  • VPN
  • Video Training
  • Web Security Appliance
Featured
Apr 2, 2020
ASA VPN Posture Part 3 - Policy Set
Apr 2, 2020

In this video, we’re going to be configuring the policy set to redirect endpoints of an unknown compliance status to client provisioning. For endpoints that are non-compliant, access will be restricted.

Read More →
Apr 2, 2020
Apr 2, 2020
ASA VPN Posture Part 2 - Posture Policy
Apr 2, 2020

In this video, we will be configuring the ISE posture policy where we define the conditions that must be met and the remediations if they are not.

Read More →
Apr 2, 2020
Jul 26, 2017
CCIE Security: Site-to-Site ASA VPN
Jul 26, 2017

In this post, I'll be configuring site-to-site VPN with ASA as peers. This post won't be a very long one because the configuration is almost identical to configuring it on a router using crypto maps with some slight syntax changes. 

Read More →
Jul 26, 2017
Jul 26, 2017
CCIE Security: NAT Traversal
Jul 26, 2017

In this blog post, we're going to walk through NAT Traversal and the different considerations to think about when a firewall is in the path of the VPN peers.

Read More →
Jul 26, 2017
Jul 26, 2017
CCIE Security: Troubleshooting Site-to-Site IPSec VPN with Crypto Maps
Jul 26, 2017

In this post, we are going to go over troubleshooting our VPN using debug commands. This is particularly useful for the folks out there reading this that only have access to only one side of the VPN or have a VPN to a 3rd party. I wanted this to remain a separate post from my ASA and IOS site-to-site VPN configuration posts because troubleshooting this is almost entirely identity on both a router or an ASA so I wanted to combine the troubleshooting to a single post. 

Read More →
Jul 26, 2017
Jul 26, 2017
CCIE Security: Site-to-Site IOS VPN with Crypto Maps
Jul 26, 2017

In this post, I'm going to go through configuring site-to-site VPN on IOS. We're going to take what we learned in the last blog post and apply it here. I think the best way this was explained to me was by Khawar Butt where you should think about your VPN configuration by break it down by the phases and then create your base VPN configuration on that. For the folks who don't know who Khawar Butt is, I'll be writing a review of his class shortly but you can see a sample of his work here.  

Read More →
Jul 26, 2017
Jul 25, 2017
CCIE Security: IPSec VPN Overview (IKEv1)
Jul 25, 2017

In this post, I'm going to go over a high level explanation of VPNs and specifically IPSec. This is going to be the first in a series of VPN posts focusing on the various types of VPNs one might see on the CCIE Security lab or on the job. I think it's important to have this overview because as you configure IPSec VPN or troubleshoot it, it'll help you to know what's going on under the covers of that configuration. 

Read More →
Jul 25, 2017

Back to Top