Michael Keenan
Michael Keenan
  • Видео 19
  • Просмотров 15 821
Palo Alto Firewall Agentless User-ID Configuration
In this video I describe and configure Palo Alto User-ID for dynamic identity based access control via Windows Active Directory Server.
Просмотров: 2 274

Видео

VLANs and Trunks
Просмотров 545 лет назад
In this video I explain the concepts of VLANs and trunk ports as well as showing how to configure them in a network environment.
IPSec IKEv2 VPN Configuration for Cisco ASA and Palo Alto Firewall
Просмотров 6 тыс.5 лет назад
In this video I demonstrate how to configure an IPSec VPN using IKEv2 with pre-shared keys for a Cisco ASA and Palo Alto Firewall. You can also view the configuration on my website: wp.me/PaIg3C-b1.
Single Area OSPF Configruation in Under 5 Minutes
Просмотров 455 лет назад
Here I go over how to configure Single Area OSPF in under 5 minutes.
EIGRP Configured in Under 5 Minutes
Просмотров 345 лет назад
Here I go over how to configure EIGRP in under 5 minutes.
TCP/IP Data Link and Physical Layers
Просмотров 1,2 тыс.5 лет назад
In this video I discuss the Data Link and Physical Layers of the TCP/IP model.
IPv4 Subnetting
Просмотров 515 лет назад
In this video I go over how to find the network address, host range, and broadcast address in various IP addresses using subnetting.
IPv4 Subnetting & Decimal to Binary Conversion
Просмотров 365 лет назад
This video describes subnetting at the binary level.
IPv4 Addresses
Просмотров 375 лет назад
This video briefly describes IPv4 addresses and how they are used in a network.
TCP/IP Network Layer
Просмотров 1045 лет назад
This video briefly describes the Network Layer of the TCP/IP and ISO Network models.
TCP/IP Transport Layer
Просмотров 6475 лет назад
This video briefly describes the Trans Layer of the TCP/IP and ISO Network models.
TCP/IP Application Layer
Просмотров 7045 лет назад
This video briefly describes the Application Layer of the TCP/IP and ISO Network models. For more information please visit my website at michaelkeenan.com/ccna/ccna-tcp-ip-osi-application-layer.
Network Models
Просмотров 405 лет назад
This video goes over the TCP/IP and OSI network models.
Cisco CCNA Routing and Switching Exams
Просмотров 375 лет назад
This video describes the fundamentals of the Cisco Certified Network Associate (CCNA) Routing and Switching and Cisco Certified Entry Network Technician (CCENT) certification exams. For more information please visit my website at michaelkeenan.com/ccna/ccna-certification-exams/
Configure IPSec VPNs with IKEv2
Просмотров 3,9 тыс.5 лет назад
In this video I go over the configuration of IPSec VPNs using a Cisco ASA Firewall (9.9) as the hub and two spokes using a Cisco IOS Router (15.6) and another Cisco ASA Firewall (9.9). The code for this configuration can be found on my website here: wp.me/paIg3C-7i
IPSec VPNs
Просмотров 595 лет назад
IPSec VPNs
Address Resolution Protocol (ARP)
Просмотров 295 лет назад
Address Resolution Protocol (ARP)
Network Routing | Connected, Static and Dynamic
Просмотров 1025 лет назад
Network Routing | Connected, Static and Dynamic
Configure Apache Virtual Hosts
Просмотров 1005 лет назад
Configure Apache Virtual Hosts

Комментарии

  • @jonreyno1187
    @jonreyno1187 21 день назад

    thanks!

  • @ChristopherKing-j9p
    @ChristopherKing-j9p 9 месяцев назад

    Thank you so much! Post more!!!

  • @ThePoslad
    @ThePoslad Год назад

    Is that posible on Palo v10?

  • @y4ni608
    @y4ni608 2 года назад

    great explanation :D

  • @chiterrapalmer
    @chiterrapalmer 2 года назад

    Thank You. The Network chapter is definitely challenging but doable!

  • @osvaldomartinez5271
    @osvaldomartinez5271 2 года назад

    I'm currently taking the Google IT certificate program on Coursera and just finished the network basics module, this definitely helped explain the data link layer and how it relates to the remaining layers! Thank you!

  • @nickelmypickle
    @nickelmypickle 2 года назад

    Thank you so much sorry this video got buried under the algorithm this is very valuable infromation

  • @globalmodels9859
    @globalmodels9859 2 года назад

    Thanks Mike even tho I’m three years late

  • @liklerstroyer9641
    @liklerstroyer9641 2 года назад

    There is no NAT in a LAB, so no nat exempt in this video In a real world it will break the setup

  • @informaticam153
    @informaticam153 2 года назад

    Thank you so much!

  • @marcoshaw1
    @marcoshaw1 2 года назад

    GNS3 newbie... What do you have loaded for your switches? That looks like the built-in ethernet switch, but AFAIK, it's not usable. Perhaps you have an IOS image loaded, but what model?

  • @dmitryignatenko7421
    @dmitryignatenko7421 3 года назад

    Hello Michael! Why you used policy-based configuration (you configured proxy-ids in video on Palo Alto firewall) instead of route-based? I read that Palo Alto recommends to use exactly route-based VPN configuration.

  • @nourelhoudakerim4558
    @nourelhoudakerim4558 3 года назад

    thank you, it was very helpful

  • @bradpitt1415
    @bradpitt1415 3 года назад

    I know and use Panda VPN among VPNs that offer IKEV2 methods. I know it's a Korean company, but I'm very satisfied with it and I'm using it. I realized once again that Korea is the number one country in the IT industry.

  • @Harun1401
    @Harun1401 3 года назад

    Good job man, Thanks for config notes. its good for working and save time.

  • @sergiog2671
    @sergiog2671 4 года назад

    Hello Michael. Your website is not working :(

  • @mnaneek
    @mnaneek 4 года назад

    ASA Configuration Configure interesting traffic ACL access-list VPN-PALO-1 extended permit ip 10.1.1.0 255.255.255.0 10.2.2.0 255.255.255.0 Configure IKEv2 Policy crypto ikev2 policy 1 encryption aes-256 integrity sha256 group 20 prf sha256 lifetime seconds 28800 Configure IPSec Proposal crypto ipsec ikev2 ipsec-proposal VPN-IPSEC_PROPOSAL-1 protocol esp encryption aes-256 protocol esp integrity sha-256 Configure Crypto Map crypto map VPN-OUTSIDE_CRYPTO_MAP-1 10 match address VPN-PALO-1 crypto map VPN-OUTSIDE_CRYPTO_MAP-1 10 set peer 3.3.3.3 crypto map VPN-OUTSIDE_CRYPTO_MAP-1 10 set ikev2 ipsec-proposal VPN-IPSEC_PROPOSAL-1 crypto map VPN-OUTSIDE_CRYPTO_MAP-1 10 set security-association lifetime seconds 28800 crypto map VPN-OUTSIDE_CRYPTO_MAP-1 interface OUTSIDE Configure Group Policy group-policy 3.3.3.3 internal group-policy 3.3.3.3 attributes vpn-tunnel-protocol ikev2 Configure Tunnel Group tunnel-group 3.3.3.3 type ipsec-l2l tunnel-group 3.3.3.3 general-attributes default-group-policy 3.3.3.3 tunnel-group 3.3.3.3 ipsec-attributes ikev2 remote-authentication pre-shared-key key123 ikev2 local-authentication pre-shared-key key123

  • @edquijano8342
    @edquijano8342 4 года назад

    could you share the config from ASA?

    • @mnaneek
      @mnaneek 4 года назад

      I just posted it as a comment to this video

  • @rgan74
    @rgan74 4 года назад

    Thanks a lot this video. I just brought up a VPN tunnel for my company btw Cisco & Palo Alto after watching and using these exact configs.

  • @ahmadzubair654
    @ahmadzubair654 4 года назад

    Thank you so much! You helped me clarifying that Policy-based-vpn with Cisco requires a route in routing table in virtual-router rather than 'policy-based-forwarding', kinda deceiving at palo side, but all is well, tunnels up!

  • @benjaminczarny
    @benjaminczarny 4 года назад

    This was incredibly helpful - thank you.

  • @hamzaghazi7485
    @hamzaghazi7485 5 лет назад

    Did you also made the Lab on GNS3. If yes, please can you let me know if we can Download the ASA and palo Alto firewall in GNS3. Also does it cost to get the image file

    • @mnaneek
      @mnaneek 5 лет назад

      Yes, I used GNS3. The way I did it for the ASA was to spend the money on Cisco VIRL (which is $200) and import the images it comes with into GNS3. You should be able to get the Palo Alto for free with a trial license.

    • @hamzaghazi7485
      @hamzaghazi7485 5 лет назад

      @@mnaneek thanks for the Info.

  • @ameydhumaskar6383
    @ameydhumaskar6383 5 лет назад

    Why did you kept font size of text is very small....it is difficult to see the command syntext...☹

  • @josesantiago4892
    @josesantiago4892 5 лет назад

    Hi Michael. I have been trying work out some site to multisite VPN using ASAs like in your video and I am having trouble keeping the SAs alive. Do you do one-to-one remote consult

    • @mnaneek
      @mnaneek 5 лет назад

      Hi Jose, I can tell you that from my experience, if there is a reliable connection between the sites, and the SAs are not consistently up, it typically indicates that there is something wrong with encryption domains (crypto ACLs) especially when using IKEv2. I would make sure that they are mirror images of eachother on both sides and that the traffic selectors match exactly.

    • @josesantiago4892
      @josesantiago4892 5 лет назад

      @@mnaneek Thanks for the reply Michael. The issue that I am having is that I have ISP redundancy with two separate Cisco routers in a remote site. One of the routers works perfectly and is my master gateway, this one can ping to my ASA and viceversa. The other spoke I am able to ping from my local ASA to its inside interface and they even have a steady sa relationship, but, the router cannot ping my local inside network. It is important for me that it can ping my local network since I provide redundancy with it.

    • @mnaneek
      @mnaneek 5 лет назад

      @@josesantiago4892 Can anything ping through it? It might be that you have to add icmp to the inspection policy on the ASA. It's not there by default. If it isn't there then nothing will be able to ping through the ASA.

    • @josesantiago4892
      @josesantiago4892 5 лет назад

      @@mnaneek I enabled icmp inspection on my HUB ASA and I can ping one of the network's but not from or to the secondary one. I have the same setup to second Site. On the second site I have two ASAs as spokes instead of two IOS routers. Again from this secondary Site I configured a secondary ASA as ISP redundancy. I enabled icmp inspection and management-access to the INSIDE interfaces on every ASA and was able to ping from just one of the ASAs. I am beggining to think that the crypto ACLs are only allowing to ping from just one of the spokes for every internal ACL and crypto ACL. The network is the same for each gateway so I think I dont have to add a secondary internal ACL on the HUB. I you can give me a way to share the configurations and screenshot of the topology I can explain further. If you need to charge for your services I would gladly pay. This is a very important project that I wish to push through. Many thanks for the reply.