Author: bsnetworking

VRF and OSPFv3

VRF and OSPFv3

Virtual Routing Forwarding used to create virtual routing instances in a router. Configurations: R1 hostname R1 ! ! ip vrf BLUE  description BLUE Virtual Forwarding ! ip vrf RED  description RED Virtual Forwarding ! ! interface Ethernet0/0  description RED Network 10  ip vrf forwarding RED  ip address 10.0.0.1 255.255.255.0  ipv6 enable  ospfv3 1 ipv4 area … Continue reading VRF and OSPFv3

Advertisements
FlexVPN – DVTI – Dymanic Virtual Tunnel Interface

FlexVPN – DVTI – Dymanic Virtual Tunnel Interface

Using the configuration of the previous post we will configure R1 external interface as a Dynamic Virtual Tunnel Interface that will allow the dynamic creation of Virtual-Accesses one per connection. We will also add a new Router R3 to the mix as another peer in the flexVPN topology to get a hub and spoke topology. … Continue reading FlexVPN – DVTI – Dymanic Virtual Tunnel Interface

FlexVPN Site to Site – IKEv2

FlexVPN Site to Site – IKEv2

What is a FlexVPN? Cisco answers: "FlexVPN is Cisco's implementation of the IKEv2 standard featuring a unified paradigm and CLI that combines site to site, remote access, hub and spoke topologies and partial meshes (spoke to spoke direct). FlexVPN offers a simple but modular framework that extensively uses the tunnel interface paradigm while remaining compatible … Continue reading FlexVPN Site to Site – IKEv2

Kali Linux on EVE-NG

Kali Linux on EVE-NG

Kali Linux is a Linux distro based on Debian that brings a ton of forensic/penetration testing tools pre-installed. Here is a small list of what you can find in Kali: John the Ripper - Password Attacks Maltego - Information Gathering Wireshark - Sniffing & Spoofing Yersinia - Vulnerability Analysis Aircrack-ng - Wireless Attacks Grabber - … Continue reading Kali Linux on EVE-NG

Dynamic Virtual Tunnel Interface – Securing a Hub & Spoke Topology

Dynamic Virtual Tunnel Interface – Securing a Hub & Spoke Topology

The last post we talk about VTI to establish a connection between to points over the Internet. This connection was secure via IPSec and allowed dynamic routing protocols through it. The challenge in this post is to escalate this topology into multipoints, which is the usual topologies that we can encounter in the real world. … Continue reading Dynamic Virtual Tunnel Interface – Securing a Hub & Spoke Topology