INE Live Webinar: Securing Network Connectivity with IPsec

แชร์
ฝัง
  • เผยแพร่เมื่อ 5 ก.ย. 2024
  • You never know who’s listening to you. In today’s climate, it’s a necessity to provide secure network connectivity between Enterprise sites, Data Center sites, Clouds, and any other applications of sensitive data, especially over the Internet. In this webinar INE instructor Brian McGahan explores the theory and practical implementation of providing secure network connectivity using IPsec.

ความคิดเห็น • 11

  • @aslanabdurahmanov
    @aslanabdurahmanov 4 หลายเดือนก่อน +1

    I never get tired of listening to Brian!!!

  • @joerockhead7246
    @joerockhead7246 3 ปีที่แล้ว +4

    Brian is one of the few instructors who can get theory and practical implementation through my thick skull. Thank you.

  • @sanjeewamaduranga8199
    @sanjeewamaduranga8199 20 วันที่ผ่านมา

    Thanks a lot Brian. The session is very informative.

  • @farghamahsan5034
    @farghamahsan5034 2 ปีที่แล้ว

    Thankyou INE and Brian.

  • @ahmedshwehdi153
    @ahmedshwehdi153 3 ปีที่แล้ว

    Thanks, brain, and INE

  • @zadkieladdae8145
    @zadkieladdae8145 3 ปีที่แล้ว +1

    Great thanks for your wonderful webinar.

  • @ferozsyed2014
    @ferozsyed2014 3 ปีที่แล้ว

    very informative content...like always explained very crystal clear. Thanks.

  • @bhavirisrinivas8754
    @bhavirisrinivas8754 3 ปีที่แล้ว

    Awesome webinar. One quick one : IKEv2 supports asymmetric authentication , so i can use PSK and the remote server uses Certificate, it works. Does this work the other way around as well ?

  • @DirtyEyeBall007
    @DirtyEyeBall007 3 ปีที่แล้ว

    Very precise ... But where's the PFS is enabled in ikev2 ?? Is it available only with Crypto-map config ?
    P.S : newbie here hopping into VPN's & ipsec

    • @kelvintechie
      @kelvintechie 3 ปีที่แล้ว

      If you're not using crypto-maps, then the PFS is enabled as part of the IPsec profile configuration (crypto ipsec profile X). The syntax is, similar to how you'd set your transform-sets and IKEv2 profiles, set pfs . You can then verify it following your first rekey with show crypto ipsec sa. Note that if you try to do that show command without waiting for the first rekey, you might see that PFS is disabled when it's really not, due to the nature of how IKEv2 handles the rekey.

  • @mattshen1207
    @mattshen1207 3 ปีที่แล้ว

    Anyway we can get the cml yaml?