In this video, we’re going to be configuring the policy set to redirect endpoints of an unknown compliance status to client provisioning. For endpoints that are non-compliant, access will be restricted.
ASA VPN Posture Part 2 - Posture Policy
CCIE Security: Site-to-Site ASA VPN
CCIE Security: NAT Traversal
CCIE Security: Troubleshooting Site-to-Site IPSec VPN with Crypto Maps
In this post, we are going to go over troubleshooting our VPN using debug commands. This is particularly useful for the folks out there reading this that only have access to only one side of the VPN or have a VPN to a 3rd party. I wanted this to remain a separate post from my ASA and IOS site-to-site VPN configuration posts because troubleshooting this is almost entirely identity on both a router or an ASA so I wanted to combine the troubleshooting to a single post.
CCIE Security: Site-to-Site IOS VPN with Crypto Maps
In this post, I'm going to go through configuring site-to-site VPN on IOS. We're going to take what we learned in the last blog post and apply it here. I think the best way this was explained to me was by Khawar Butt where you should think about your VPN configuration by break it down by the phases and then create your base VPN configuration on that. For the folks who don't know who Khawar Butt is, I'll be writing a review of his class shortly but you can see a sample of his work here.
CCIE Security: IPSec VPN Overview (IKEv1)
In this post, I'm going to go over a high level explanation of VPNs and specifically IPSec. This is going to be the first in a series of VPN posts focusing on the various types of VPNs one might see on the CCIE Security lab or on the job. I think it's important to have this overview because as you configure IPSec VPN or troubleshoot it, it'll help you to know what's going on under the covers of that configuration.