Community ForumCommunity Wiki * Blog Home  * Log in

Posts Tagged ‘VPN’

Encryption: Introduction and Applications

posted in General
by on September 1st, 2011 tags:

Encryption is the primary technical control used to enforce confidentiality of sensitive digital information. Extensively used in the enterprise environment, small and medium business users have recently seen an increased demand for cryptographic services. This post will examine some of the basics of encryptions as covered on the Cisco IINS 640-553 exam, and close with suggestions geared toward the small business contractor on how to implement email and file encryption.

Encryption algorithms are divided into two categories: symmetric and asymmetric. In symmetric encryption, the same key is used to encrypt and decrypt. Variable length keys are used to transform plain text according to the encryption algorithm. DES and its variations, AES, IDEA, the RC series, and Blowfish are all popular symmetric encryption algorithms. Symmetric encryption commonly uses three different techniques: Block, Stream, and Message Authentication Codes (MAC).

Read the rest of this post »



VPN Options for Small Businesses

posted in General
by on August 22nd, 2011 tags:

Small businesses are an essential part of the network market. They provide economic growth and are crucial target for any networking company’s market share. Though small businesses do not generate as much revenue for networking companies as enterprise customers do, getting a business to adopt your products early on is sound marketing. As a business grows, the need for more flexible communication will prompt a small business owner to ditch their AT&T 2 Wire and move up to a better device.

The small business environment differs significantly from the enterprise. There is generally little or no existing infrastructure, a limited budget, and a particular need for user friendliness and simplicity for the end user. In this blog post, we will briefly review the basics of VPN protocols, how they apply to the small business environment, and then pay special attention to several specific solutions that are less known, particularly in the Mac world.

Read the rest of this post »



MPLS VPN with BGP Customers

posted in Cisco Networking, Technical
by on November 23rd, 2010 tags: , , ,

Objectives

Company 1 and Company 2 have decided to sign up with ISP for their MPLS VPN service to connect their two sites. CE routers IP addresses and routing protocols are already configured. ISP already has MPLS and iBGP peering between the PE routers configured.

We will complete these six steps to complete and verify the setup of a MPLS VPN for C1 and C2:

  1. Configure C1 and C2 VRFs on PE1 and PE2 router. Assign a RD and RT for each VRF
  2. Configure PE1 and PE2 CE-facing interfaces
  3. MP-BGP IPv4 address family BGP configuration
  4. Verification of configuration for both C1 and C2
  5. Remove TTL propagation so that P routers are hidden from customer during traceroutes
  6. MD5 authentication added to LDP sessions for PE1-P and PE2-P

Read the rest of this post »



MPLS VPN with OPSF and OSPF-Sham Link Customers

posted in Cisco Networking, Technical
by on November 1st, 2010 tags: , , ,

Objectives

Company 1 and Company 2 have decided to sign up with ISP for their MPLS VPN service to connect their two sites. CE routers IP addresses and routing protocols are already configured. ISP already has MPLS and iBGP peering between the PE routers configured.

We will complete these six steps to complete and verify the setup of a MPLS VPN for C1 and C2:

  1. Configure C1 and C2 VRFs on PE1 and PE2 router. Assign a RD and RT for each VRF
  2. Configure PE1 and PE2 CE-facing interfaces
  3. PE-CE routing protocol setup
  4. MP-BGP IPv4 address family configuration
  5. OSPF sham link configuration
  6. Verification of configuration for both C1 and C2

Read the rest of this post »



MPLS VPN with RIPv2 and EIGRP Customers

posted in Cisco Networking, Technical
by on October 23rd, 2010 tags: , , ,

Objectives

Company 1 and Company 2 have decided to sign up with ISP for their MPLS VPN service to connect their two sites. CE routers IP addresses and routing protocols are already configured. ISP already has MPLS and iBGP peering between the PE routers configured.

We will complete these five steps to complete and verify the setup of a MPLS VPN for C1 and C2:

  1. Configure C1 and C2 VRFs on PE1 and PE2 router. Assign a RD and RT for each VRF
  2. Configure PE1 and PE2 CE-facing interfaces
  3. PE-CE routing protocol setup
  4. MP-BGP IPv4 address family configuration
  5. Verification of configuration for both C1 and C2

Read the rest of this post »