Skip to content
AAA-1

Before diving into configuration let me first describe what AAA is all about. AAA stands  for authentication, authorization and accounting, a system in IP-based networking to control what computer resources (routers,switches, firewalls, wireless access points, WLC, WCS)  users have access to and to keep track of the activity of users over a network. Authentication is […]

HP Switch IRF

Apr 20
HP IRF

IRF:- IRF stands for Intelligent Redundant Framework. It is similar technology like cisco uses in 6500 series product named as VSS (Virtual Switching System) or Juniper QFabric. Intelligent Resilient Framework (IRF) is an advanced technology that allows  to aggregate 2 or more switches into a single switching and routing system also known as a “virtual […]

Meinberg

We are working on the following network diagram. In order to properly work with my existing CCIE security lab i needed a valid ntp server in my virtual LAN, i decided to use windows 2003 box as ntp server for my cisco routers, switches and other linux machines running with the help of GNS3, Virtual […]

Asa multiple context

Information about Security Context We can partition a single ASA into multiple virtual devices, known as security contexts. Each context is an independent device, with its own security policy, interfaces, and administrators. Multiple contexts are similar to having multiple standalone devices. Many features are supported in multiple context mode, including routing tables, firewall features, IPS, and […]

Anonymous

As we have already installed Backtrack as our Virtual Machine here now this is the time to explore more , how about becoming anonymous on the web, however the reality behind the Anonymity is really complex to explain, there are  EYES watching us every time and noting down our every movement on the web. In […]

Clientless3

We will be working on following topology. First of all we gather requirement for our ClientLess VPN, the requirement portion is  inspired by the Keith CBT video. Requirement: Type of VPN:- Clientless VPN Randon machines on Internet They all support global PKI (SSL) Not managed by company Stage 1 Group Level: Banner message: No Custom […]

Backtrack

In this tutorial i will show you how to install Backtrack 5 R3 in Vmware workstation 8, it is recently  released by offensive security team and it is used by penetration testers world wide. Installation is easy just follow given simple steps. Requirements 1 : Download backtrack ISO from here 2 :  Download VMware Workstation or  VMplayer 3 : […]

Titanium

This exercise has been completed on Nexus 7K titanium emulator. I am running two N7K titanium machines inside vmware workstation and have connected 7 network adapters to emulate the physical interfaces in N7K, i am using titanium emulator version 5.2.1, if you are curious to know about the N7K titanium emulator and how to install […]

N7k ACL1

This lab has been completed on Nexus 7010 with following hardware and software installed, it can be seen here in my previous post. In this task we will configure ACLs using the atomic programming feature of Cisco NX-OS Software. In addition, we will investigate the method used to modify, validate and re sequence ACLs. Step […]

VPN S2S

We will be working on above mentioned topology on GNS3. Our goal is to make VPN S2S tunnel between Arizona ASA1 running  code 8.4 and Nevada router and finally we will allow our LAN subnets of both locations to move across the VPN S2S tunnel. Ip addressing is mentioned in the diagram. Before starting with […]