Month: February 2017

FlexVPN – DVTI – Dymanic Virtual Tunnel Interface

FlexVPN – DVTI – Dymanic Virtual Tunnel Interface

Using the configuration of the previous post we will configure R1 external interface as a Dynamic Virtual Tunnel Interface that will allow the dynamic creation of Virtual-Accesses one per connection. We will also add a new Router R3 to the mix as another peer in the flexVPN topology to get a hub and spoke topology. … Continue reading FlexVPN – DVTI – Dymanic Virtual Tunnel Interface

Advertisements
FlexVPN Site to Site – IKEv2

FlexVPN Site to Site – IKEv2

What is a FlexVPN? Cisco answers: "FlexVPN is Cisco's implementation of the IKEv2 standard featuring a unified paradigm and CLI that combines site to site, remote access, hub and spoke topologies and partial meshes (spoke to spoke direct). FlexVPN offers a simple but modular framework that extensively uses the tunnel interface paradigm while remaining compatible … Continue reading FlexVPN Site to Site – IKEv2

Kali Linux on EVE-NG

Kali Linux on EVE-NG

Kali Linux is a Linux distro based on Debian that brings a ton of forensic/penetration testing tools pre-installed. Here is a small list of what you can find in Kali: John the Ripper - Password Attacks Maltego - Information Gathering Wireshark - Sniffing & Spoofing Yersinia - Vulnerability Analysis Aircrack-ng - Wireless Attacks Grabber - … Continue reading Kali Linux on EVE-NG

Dynamic Virtual Tunnel Interface – Securing a Hub & Spoke Topology

Dynamic Virtual Tunnel Interface – Securing a Hub & Spoke Topology

The last post we talk about VTI to establish a connection between to points over the Internet. This connection was secure via IPSec and allowed dynamic routing protocols through it. The challenge in this post is to escalate this topology into multipoints, which is the usual topologies that we can encounter in the real world. … Continue reading Dynamic Virtual Tunnel Interface – Securing a Hub & Spoke Topology