Jump to content

Search the Community

Showing results for tags 'CCIE Security'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


    • LINUX
    • ORACLE
    • GNS3

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start





Website URL







Found 56 results

  1. Could anyone share any valid dumps for SCOR 350-701 CCNP Security/CCIE? Thank you in advance.
  2. Please find below download link to INE CCIE v5 Advanced Technologies Videos. [Hidden Content] Kind Regards, JS
  3. Topic: Cisco FlexVPN Number of Video: 16 Total Duration: 15 Hours (approx.) This video bundle features a complete video download set for Cisco FlexVPN. With almost 15 hours of lab video tutorial, you will be able to get up to speed and become more familiar with the technologies. Buy this video bundle and view them locally on your computer at your own pace without internet connection, and also save over 18%. This video bundle begins by laying down foundation on IKEv2 protocol, and helps you understand configuration construct of FlexVPN. It then gets you into series of configuration scenarios that are most commonly found in a typical FlexVPN deployment including site-to-site, hub-and-spoke, and remote access VPN. It is recommended that you have basic understanding of some of the related technologies like IPSec, RADIUS, PKI, Certificate, and possibly the predecessor protocol; IKEv1. Not knowing which video to start with? The videos in this particular video series is designed to be watched sequentially as our lab configuration is usually based on the preceding lab, especially if you are new to FlexVPN. If you already have some experiences, you may proceed to the desired video. Video List SEC0251 - FlexVPN Introduction to IKEv2 14:04 SEC0252 - FlexVPN IKEv2 Basic Configuration 58:05 SEC0253 - FlexVPN L2L with Pre-Shared Key 48:45 SEC0254 - FlexVPN L2L with Certificate 63:21 SEC0255 - FlexVPN L2L with Static and Dynamic Routing 40:34 SEC0256 - FlexVPN L2L with Next Generation Encryption 49:47 SEC0257 - FlexVPN L2L with Dynamic Virtual Tunnel Interface (DVTI) 68:47 SEC0258 - FlexVPN L2L with dVTI and External PSK 46:34 SEC0259 - FlexVPN L2L with Spoke-to-Spoke 38:11 SEC0260 - FlexVPN Server with Router Client 74:57 SEC0261 - FlexVPN Server with AnyConnect Client 65:26 SEC0262 - FlexVPN Server with Windows IKEv2 Client 44:15 SEC0263 - FlexVPN Server with Local and External Authorization 62:12 SEC0264 - FlexVPN with FVRF and IVRF 56:46 SEC0265 - FlexVPN Redundancy with Dual Hub Dual Cloud 73:15 SEC0266 - FlexVPN Redundancy with Dual Hub Single Cloud 93:23 [hide][Hidden Content]] TIP: DONT CLICK ON LINK COPY PASTE
  4. Copyright 2020 Dimensions: 7-3/8" x 9-1/8" Pages: 904 Edition: 1st Book ISBN-10: 0-13-597197-7 ISBN-13: 978-0-13-597197-0 The CCNP Security Core SCOR 300-701 Official Cert Guide serves as comprehensive guide for individuals who are pursuing the Cisco CCNP Security certification. This book helps any network professionals that want to learn the skills required to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. Complete and easy to understand, it explains key concepts and techniques through real-life examples. This book will be valuable to any individual that wants to learn about modern cybersecurity concepts and frameworks. EPUB [hide][Hidden Content]] PDF [hide][Hidden Content]]
  5. Hello Guys, CCNP and CCIE Security Core SCOR 300-701 Official Cert Guide: Implementing and Operating Cisco Security Core Technologies Can someone please share this ebook with us ?
  6. Hi Team I am looking for CCIE Security Live lessons videos [Hidden Content] Please share if anyone have Thanks
  7. Can anyone share latest valid CSL for CCIE security lab3, and If anyone passed lab3 please share the right answers.
  8. Is anybody aware which labs are frequently coming in Bangalore nowadays?
  9. If you have taken Lab 7 and passed, kindly share your experience and let us whether the CSL lab solution is valid or not Thanx
  10. Hi, Is anyone currently preparing for CCIE Security or done with CCIE security? I am not sure from where to start can anyone please suggest. I did my CCNP security almost 2 years back and now planning to start with CCIE. I started with "Cisco ASA: All-in-one Next-Generation Firewall, IPS, and VPN Services". Anyother suggestion for books or video? Guys living in India, is anyone taking training from any traning institute? Which one is good? Any good institute in Pune? Thanks
  11. Hi guys! Does anybody have working GNS topology for INE Technologies workbook? Or parts of it, for ex. virtual PCs for CSM, WIFI controller, ets... or any resources to start my own lab from... Would be greatly appreciated!!
  12. Hi all, As you must know Cisco released a new version of all CCIE written exams adding the topics SDN, Cloud and IoT. It doesn´t matter what track you want to follow. You must study these technologies. So let´s help each other so all of us can get our objectives.
  13. Anyone knows which labs are currently active in Beijing/Hong Kong?
  14. Please anyone have Lab 4, please share it!!
  15. By Natalie Timms Published May 9, 2014 by Cisco Press. Part of the Practical Studies series. Does anyone get this ? any feedback ? and Please share if possible.
  16. As requested the latest dumps of ccie security version 4 with new questions.... Moderators and people who gave the exam please verify if the new questions are ALL of the NEW ones that are asked currently. This is AT version 18. The VCE version of the file is also available with the VCE player in this thread [Hidden Content] [Hidden Content]
  17. Hi everyone, I was thinking that we can perhaps have a topic where everyone that has their exams booked post the info hear. So that you can see who is possibly writing during the same time and could give some useful feedback. Example Template. Location: South Africa (Brussels Mobile lab) Date: 2014/05/23 Booked: Yes Paid: No Attempt: First This way if someone is writing in Brussels on Monday 26 he/she can could PM me and ask questions like " What version of the lab did you get?" "Was there changes in the questions or topology?"
  18. Any updates for the change in Lab 3 ? Please reply.. A lot of candidates are waiting in anticipation for the same..
  19. Hi there, INE has updated some new videos for CCIE Sec. ATC v4. Does anyone kindly share the new videos ? Thank you in advance.
  20. Anybody have new updates or Tshoots in Lab2 or LAb 3.2. Please Share!!! I heard Cisco remove all Output verfications??
  21. Hi friends, Here are some video tutorials are very interesting to study the ASA. which are taught from a very simple thing to advance. This video tutorial is perfect for taking CCCNP Security or CCIE Security LAB. Here's a link that can be downloaded, or friends can watch via youtube (Thanks to CovertSecCops) The following video is divided into 3 parts: Part I: - Cisco ASA Basics - Lab1 - Interface Security Levels - Cisco ASA Basics - Lab2 - no nat-control nat-control vs - Cisco ASA Basics - Lab3 - Dynamic Policy NAT NATPAT Part II: - Cisco ASA Basics - Lab4 - Static NAT Static NAT Policy - Cisco ASA Basics - Lab5 - NAT exemption - Cisco ASA Basics - Lab6 - Access-lists Part III: - Cisco ASA Basics - Lab7 - Object-groups - Cisco ASA Basics - Lab8 - Packet Capture - Cisco ASA Basics - Lab9 - Packet-tracer Here's a link to download: [Hidden Content] Happy Study RC
  22. Quick question since I can't find this information readily available. What exams are still active? I see VB+, VC+, and VD+ via PCL guides. Other than SW1 to SW2, port 0/24 to port 0/24, is there any other physical connectivity between the switches? Does the CCIE Security lab only have a single 8 hour config section (for blueprint 3), without any troubleshooting section? Thanks in advance. I just passed my CCIE R&S lab- now working on Security.
  23. GENTLEMEN, Kindly can you share INE CCIE Security Deep diving. Regards
  24. Hi Guys, If any one interested for security grup study in KSA
  25. Hello everyone, Am I the only one suspicious regarding this Task? As I am studying mode careful the paper, this question is the most vague one. In theory, by Cisco terminology and if you Google "Cisco FLEXVPN HUB & Spoke" topology you will realize that most of the solutions combine two things 1) IKEv2 2 )Virtual-Template. There is no way to configure the Tunnel number (i.e Tu34 and Tu35) with Virtual-Template. Hence, the requirement of this task is a FLEXVPN HUB & Spoke using SVTI. "Everything clear so far". But in my understanding there are two specific requirements on this question which none of the available solutions suggest. I will suggest my solution on this Task and please comment and share your thoughts. Requirement 1 Tu34 should secure the traffic between and host Tu35 should secure the traffic between and host This requirement can easily accomplished be applying the following configuration on R9 : ! ip route Gi2.1 ip route Gi2.2 ! router eigrp 34 no auto passive-interface default no passive-interface Tunnel34 net net net ! router eigrp 35 no auto passive-interface default no passive-interface Tunnel35 net net net Also, I prefer to use differnt IPsec profiles for each Spoke instead of using the "shared" option which is more related to DMVPN topologies. For the IKEv2 profile you can use either one (match identity remote address address or two (match identity remote address & match identity remote address Hence, my configuration looks like this: ! int tu34 ip add tu sou Gi3 tu des tu mod ipsec ipv4 tu pro ipsec IPSEC-PROF-SPOKE1 ! int tu35 ip add tu sou Gi3 tu des tu mod ipsec ipv4 tu pro ipsec IPSEC-PROF-SPOKE2 The verification of the requirement will look like this: R10#sh ip route | i D D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP D [90/26880256] via, 00:03:18, Tunnel34 D [90/27008000] via, 00:03:18, Tunnel34 R10# --- R11#sh ip route | i D D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP D [90/26880256] via, 00:06:16, Tunnel35 D [90/27008000] via, 00:06:16, Tunnel35 R11# Now the madness... Requirement 2 Loopback1 interfaces on R9, R10 and R11 should be included in the EIGRP routing domain. This requirement is more complicated and even more vague !! Especially, because the Loopback1 of the Spokes are within the same subnet which we need to advertise to the HUB. In theory, we can accomplish that by combining a summary-address under the EIGRP process and a leak-map. The leak-map will be responsible to leak to R9 the /32 address of the Loopback1 of R10,R11 The summary-address will be responsible to advertise each /24 subset to the HUB. The main problem with the solution is that the Loopbacks on R10,R11 should be configured as /32. But in the exam, the Loopback interfaces are pre-configured as /24 !! Do we know if we are able to change the pre-configuration of the Loopbacks ? If yes, then the solution will be as follows: On R10 ---------- ! interface Loopback1 ip address ! ip access-list standard LOOP0 permit ! route-map LEAK-LOOP0 permit 10 match ip address LOOP0 ! router eigrp 34 no auto passive-interface default no passive-interface Tunnel34 network network ! interface Tu34 ip summary-address eigrp 34 leak-map LEAK-LOOP0 end On R11 ---------- ! ip access-list standard LOOP0 permit ! route-map LEAK-LOOP0 permit 10 match ip address LOOP0 ! router eigrp 35 no auto passive-interface default no passive-interface Tunnel35 network network ! interface Tu35 ip summary-address eigrp 35 leak-map LEAK-LOOP0 end The verification of the requirement will look like this: R9#sh ip route | i D D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP D 192.168.[b]10.0/24[/b] [90/27008000] via, 00:01:03, Tunnel34 D 192.168.[b]10.10/32[/b] [90/27008000] via, 00:01:03, Tunnel34 D 192.168.[b]11.0/24[/b] [90/27008000] via, 00:00:13, Tunnel35 D 192.168.[b]11.11/32[/b] [90/27008000] via, 00:00:13, Tunnel35 R9# --- R10#sh ip route | i D D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP D [90/26880256] via, 00:00:43, Tunnel34 D [90/27008000] via, 00:00:43, Tunnel34 [b]D is a summary, 00:00:24, Null0[/b] R10# --- R11#sh ip route | i D D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP D [90/26880256] via, 00:11:08, Tunnel35 D [90/27008000] via, 00:11:08, Tunnel35 [b]D is a summary, 00:01:22, Null0[/b] R11# PS: I am very confident for the Requirement#1 but I am not sure for the Requirement#2 Personally, I will ask the proctor if I can amend the subnet mask of Loopback1 in the Spokes from /24 to /32 and act accordingly. This is NOT 100% the solution, only me point of view. Use this solution with your own risk
  • Create New...