Cisco CCIE Security 350-701 – Site to Site IPSEC VPN
How IPsec VPN Works Now the next thing we’ll try to understand how the IPsec VPN works. So here I’m going to quickly give an overview of how the IPsec VPN works. Probably we’ll see more in detail about each and every, each and every step. So overall the IPsec VPN goes in five steps. Now the first step is we need to configure something like interesting traffic. Interesting traffic means like take an example. I want, want to secure the traffic which is going from one network, let’s say…
Cisco CCIE Security 350-701 – Remote Access VPN
Remote Access VPN Remote access VPNs. Now Remote Access VPN allows a user to connect remotely to a corporate network. To a VPN gateway typically can be a router or a firewall and access the resources in the land as if he is sitting in the land. Because technically the user may be in a different place, maybe he is sitting in a home or maybe somewhere outside the city for some work. But using Remote Access VPN you can connect to your corporate network and access the resources as…
Cisco CCIE Security 350-701 – IPSec – IP Protocol Security
What is IPSec ? Okay, so the next thing we need to understand what is IPsec? IPsec stands for Internet Protocol Security. So IPsec is actually a combination of protocols, or we can say, a set of protocols developed by IETF, which provides a secure communication between two or more sites. Like in the previous section, we discussed the VPN types where we can use something like side to side VPNs where we can connect two different sites to talk to each other. Or we can also use a remote…
Cisco CCIE Security 350-701 – Cryptography
What is Cryptography The cryptography is a method or technique which is used for securing the communication. So in other words, we can say it’s an art of writing a message, a secret message which is known only to both the sender and the receiver now in the network. Securing the communication is important, especially when you are trying to connect to a remote head office and you’re trying to send some information or maybe you’re trying to access some devices remotely. Now there’s a possibility that an attacker sitting…
Cisco CCIE Security 350-701 – Authentication, Authorization, Accounting – AAA
AAA – Network Security Triple a overview. Now triple A stands for Authentication, Authorization and Accounting. Now, authentication, if you, if you go with some basic general examples, authentication refers to authenticating the user or verifying who the user is. Like if you take an example of any, any kind of credit card details, let’s say if you are using your own credit card, probably you may want to do some kind of transaction. Now, in order to do the transaction, you have to provide the credentials. Like maybe you…
Cisco CCIE Security 350-701 – AAA Authorization Part 5
Modify RBAC Views – LAB 2 Now, the next thing is I want to modify the existing user. Like the previously I have configured the user one with a level one views, level one engineer views. So I want to add some more commands to this particular user. Let’s say this user, the user one or any user who is associated with a level one engineered view can also make changes to the initial IP or IP VC service configurations and enable and disable the interface like shutting down and…
Cisco CCIE Security 350-701 – AAA Authorization Part 4
RBAC Views – Types Now, in this section we’ll try to understand what are the different types of views we have and then what exactly they do. So before we assign any specific commands, we need to create the views. So unlike privilege levels, we don’t have any limitations. So here mainly there are two views called root view and the CLI view. Now, root view is just like a master view where we can make all all the changes just like privilege of 15. So if you want to…
Cisco CCIE Security 350-701 – AAA Authorization Part 3
IOS Privilege Levels _ Limitations IOS privilege Levels and Limitations now, in this video we’ll try to understand what are the limitations of iOS privilege levels. Like the first one is, as we discussed earlier, the commands at the lower privilege levels are always executable. At higher privilege levels, like in the previous we discuss, we see some configuration where I have assigned a user with a privilege level of five and also we have created a user with a privilege level of two with a user two as a…
Cisco CCIE Security 350-701 – AAA Authorization Part 2
Local Authorization using Privilege Levels Now in this video, we’ll see some local authorization by using privilege levels and these privilege levels are configured on the local router. So in this example, I’m going to configure some privilege levels. So I’ll create some two user accounts, user two and the user file, and then we’ll assign different privilege levels to them. Like user two will be assigned with the privilege level of two and the user file will be assigned with the privilege level of file. And then we’ll allocate…
1z0-062 Oracle Database 12c: Installation and Administration – Module 11: Data Concurrency
Data Concurrency Part1 So Oracle is probably the largest database system in the world. They claim they are the largest database system in the world. We’re not talking megabytes of data here. We are talking terabytes and terabytes and terabytes. I forget what, as of Oracle twelve C, I forget what the storage capacity of it is just off the top of my head, but I believe it’s in the hundreds of terabytes for a 32 bit operating system. Most operating systems, of course, are not 32 bit operating systems….
Popular posts
Recent Posts