Virtual Routing Forwarding used to create virtual routing instances in a router. Configurations: R1 hostname R1 ! ! ip vrf BLUE description BLUE Virtual Forwarding ! ip vrf RED description RED Virtual Forwarding ! ! interface Ethernet0/0 description RED Network 10 ip vrf forwarding RED ip address 10.0.0.1 255.255.255.0 ipv6 enable ospfv3 1 ipv4 area … Continue reading VRF and OSPFv3
Author: bsnetworking
FlexVPN – DVTI – Dymanic Virtual Tunnel Interface
Using the configuration of the previous post we will configure R1 external interface as a Dynamic Virtual Tunnel Interface that will allow the dynamic creation of Virtual-Accesses one per connection. We will also add a new Router R3 to the mix as another peer in the flexVPN topology to get a hub and spoke topology. … Continue reading FlexVPN – DVTI – Dymanic Virtual Tunnel Interface
FlexVPN Site to Site – IKEv2
What is a FlexVPN? Cisco answers: "FlexVPN is Cisco's implementation of the IKEv2 standard featuring a unified paradigm and CLI that combines site to site, remote access, hub and spoke topologies and partial meshes (spoke to spoke direct). FlexVPN offers a simple but modular framework that extensively uses the tunnel interface paradigm while remaining compatible … Continue reading FlexVPN Site to Site – IKEv2
Kali Linux on EVE-NG
Kali Linux is a Linux distro based on Debian that brings a ton of forensic/penetration testing tools pre-installed. Here is a small list of what you can find in Kali: John the Ripper - Password Attacks Maltego - Information Gathering Wireshark - Sniffing & Spoofing Yersinia - Vulnerability Analysis Aircrack-ng - Wireless Attacks Grabber - … Continue reading Kali Linux on EVE-NG
Dynamic Virtual Tunnel Interface – Securing a Hub & Spoke Topology
The last post we talk about VTI to establish a connection between to points over the Internet. This connection was secure via IPSec and allowed dynamic routing protocols through it. The challenge in this post is to escalate this topology into multipoints, which is the usual topologies that we can encounter in the real world. … Continue reading Dynamic Virtual Tunnel Interface – Securing a Hub & Spoke Topology