INE Live Webinar: Securing Network Connectivity with IPsec

Поделиться
HTML-код
  • Опубликовано: 20 авг 2024
  • You never know who’s listening to you. In today’s climate, it’s a necessity to provide secure network connectivity between Enterprise sites, Data Center sites, Clouds, and any other applications of sensitive data, especially over the Internet. In this webinar INE instructor Brian McGahan explores the theory and practical implementation of providing secure network connectivity using IPsec.

Комментарии • 11

  • @aslanabdurahmanov
    @aslanabdurahmanov 4 месяца назад +1

    I never get tired of listening to Brian!!!

  • @joerockhead7246
    @joerockhead7246 3 года назад +4

    Brian is one of the few instructors who can get theory and practical implementation through my thick skull. Thank you.

  • @sanjeewamaduranga8199
    @sanjeewamaduranga8199 4 дня назад

    Thanks a lot Brian. The session is very informative.

  • @farghamahsan5034
    @farghamahsan5034 2 года назад

    Thankyou INE and Brian.

  • @ahmedshwehdi153
    @ahmedshwehdi153 3 года назад

    Thanks, brain, and INE

  • @zadkieladdae8145
    @zadkieladdae8145 3 года назад +1

    Great thanks for your wonderful webinar.

  • @ferozsyed2014
    @ferozsyed2014 3 года назад

    very informative content...like always explained very crystal clear. Thanks.

  • @bhavirisrinivas8754
    @bhavirisrinivas8754 3 года назад

    Awesome webinar. One quick one : IKEv2 supports asymmetric authentication , so i can use PSK and the remote server uses Certificate, it works. Does this work the other way around as well ?

  • @mattshen1207
    @mattshen1207 3 года назад

    Anyway we can get the cml yaml?

  • @DirtyEyeBall007
    @DirtyEyeBall007 3 года назад

    Very precise ... But where's the PFS is enabled in ikev2 ?? Is it available only with Crypto-map config ?
    P.S : newbie here hopping into VPN's & ipsec

    • @kelvintechie
      @kelvintechie 3 года назад

      If you're not using crypto-maps, then the PFS is enabled as part of the IPsec profile configuration (crypto ipsec profile X). The syntax is, similar to how you'd set your transform-sets and IKEv2 profiles, set pfs . You can then verify it following your first rekey with show crypto ipsec sa. Note that if you try to do that show command without waiting for the first rekey, you might see that PFS is disabled when it's really not, due to the nature of how IKEv2 handles the rekey.