12/7/2023 0 Comments Sas elearning![]() ![]() It wasn’t a problem… until there was one. For me, that meant taking the configuration templates built by the team’s more senior engineers and updating them with the details for a particular tunnel creation. In fact, one of my first jobs as a shiny new network engineer was building out IPSEC VPN connections using Cisco PIX firewalls for a Cisco Partner. I’ve been building IPSEC VPNs for almost my entire career as a network engineer. If you’re new here, I’m Hank Preston, Principal Engineer on the Labs and Systems team in Cisco Learning and Certifications. by Learning and Certifications YouTube Channel. ![]() “Technically Speaking… with Hank Preston” is a segment on The U. series. If that sounds good to you, continue on, network adventurer! A Technical Look at IPSEC VPN Tunnel Creation We’ll even look at the packets involved in the communications as tunnels are set up. We’ll explore “Phase 1” and “Phase 2” and take a look at how the ACLs that identify “interesting traffic” impact the security associations that are built. In this blog post and the accompanying video, I’ll cover the IPSEC VPN tunnel creation process. But since I’m working on building the IPSEC VPN connections between this new data center and the others in our network, let’s narrow it down and take a technical look at IPSEC VPN tunnel creation. As you may know, A LOT goes into building a new data center. or taking a course with your favorite Cisco instructor. Right now, we’re building a new data center to host the hands-on lab environments for learners, whether you’re training in Cisco U. I always take inspiration from what I’m currently working on in my day job when putting together an idea for a post and/or video. Hello everyone, and welcome back to my little corner of the Internet. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |