Contact me on Skype

Skype Id - tauseefahmadlko

If you want IT go and get IT

Good things come to those who wait, but better things come to those who go out and get them .

Connect IT now

The new information technology... Internet and e-mail... have practically eliminated the physical costs of communications. - Peter Drucker

Wednesday, June 28, 2023

Cisco Umbrella

Simplify, streamline, and scale your security with Cisco Umbrella

    Cisco Umbrella offers flexible, cloud-delivered security. It combines multiple security functions into one solution, so you can extend data protection to devices, remote users, and distributed locations anywhere. Umbrella is the easiest way to effectively protect your users everywhere in minutes...... 

click here

Source :- www.cisco.com

Get to know the new Cisco Umbrella

    As a leading provider of recursive DNS services, we’ve helped businesses of all sizes and industries connect to the internet with confidence. We’ve built a reputation on easy deployment and powerful protection anywhere users work.
    To help organizations embrace direct internet access, in addition to DNS-layer security and interactive threat intelligence, Cisco Umbrella now includes secure web gateway, firewall, and cloud access security broker (CASB) functionality, plus integration with Cisco SD-WAN, delivered from a single cloud security service......


click here


Source :- www.cisco.com

Tuesday, June 27, 2023

VXLAN

 

Introduction: VXLAN


    Now a days the concept of network overlays is used and in network overlays people have gained interest in the past few years because of their potential to address some of the requirements which are beneficial for the enterprise networks. The network overlays are the different virtual networks of interconnected nodes that enable applications to be deployed without having to change any of the underlying networks.

                With time, there are lot of new encapsulation frame formats purpose-built for the data center, including Virtual Extensible LAN (VXLAN), Location/Identifier Separation Protocol (LISP). So, as we go through this post you will come to know some of the overlay transport protocols and they are.

  • VXLAN: Virtual Extensible LAN
  •  LISP: Locator/Identifier Separation Protocol

          Virtual Extensible LAN (VXLAN) and Location/Identifier Separation Protocol (LISP) are two new encapsulation frame types designed specifically for data centers.

 

What is VXLAN?

VXLAN is an extension to the Layer 2 VLAN. It was designed to provide the same VLAN functionality with greater extensibility and flexibility. VXLAN is an overlay encapsulation technology (network overlay and tunnelling technology) which allows us to extend Layer 2 across a Layer 3 routed infrastructure.

Main concern with VLANs is the limited address space. Each device can have around 4000 usable VLANs. This is an issue with service providers. They may have to maintain several VLANs per customer, which exhausts the address space quickly. To work around this VLAN ID’s can be reused on different switches, or technologies like Q-in-Q can be used.

VXLAN does not have this limitation. It uses a 24-bit header, which gives us about 16 million VNI’s to use. A VNI is the identifier for the LAN segment, like a VLAN ID. With an address space this large, an ID can be assigned to a customer, and it can remain unique across the entire network. VXLAN network identification (VNI) is assigned to each Layer 2 subnet to segment traffic.

In data centers, VXLAN is the most used protocol to create overlay networks that sit on top of the physical network, enabling the use of virtual networks. The VXLAN protocol supports the virtualization of the data center network while addressing the needs of multi-tenant data centers by providing the necessary segmentation on a large scale.

The VXLAN tunneling protocol that encapsulates Layer 2 Ethernet frames in Layer 3 UDP packets enables you to create virtualized Layer 2 subnets, or segments, that span physical Layer 3 networks. Each Layer 2 subnet is uniquely identified by a VXLAN network identifier (VNI) that segments traffic.

In other words, VXLAN defines a MAC-in-UDP encapsulation scheme where the original Layer 2 frame has a VXLAN header added and is then placed in a UDP-IP packet. With this MAC-in-UDP encapsulation, VXLAN tunnels the Layer 2 network over the Layer 3 network.

VXLAN has been widely adopted and is now used in many large enterprise networks for virtualization and cloud computing. It provides:

  • A secure and efficient way to create virtual networks.
  • Allowing for the creation of multi-tenant segmentation.
  •  Efficient routing.
  • Hardware-agnostic capabilities.
  • With its widespread adoption, VXLAN has become an essential technology for network virtualization.

 As we have seen, VXLAN traffic is encapsulated before it is sent over the network. This creates stateless tunnels across the network, from the source switch to the destination switch. The encapsulation and decapsulation are handled by a component called a VTEP (VXLAN Tunnel End Point. a VTEP has an IP address in the underlay network. It also has one or more VNI’s associated with it. When frames from one of these VNI’s arrive at the Ingress VTEP, the VTEP encapsulates it with UDP and IP headers. The encapsulated packet is sent over the IP network to the Egress VTEP. When it arrives, the VTEP removes the IP and UDP headers, and delivers the frame as normal.

   

Tuesday, April 21, 2020

Cisco Networking Academy. Build your skills today, online. It’s Free!

Introduction to Cybersecurity

The world is getting more digital and having the skills to secure devices is critical to solving the challenges we face.  The number of connected devices alone is expected to grow to 50 billion sensors, objects, and
other connected ‘things’ by the year 2020.
Source :- www.cisco.com

Monday, March 12, 2018

ARNSEC EST.

Sunday, January 15, 2017

Building DMVPN with mGRE, NHRP and IPSec VPN

Building DMVPN with mGRE, NHRP and IPSec VPN

Source: Link

 I – OVERVIEW

This lab will treat the design and deployment of dynamic multipoint VPN architectures by moving step by step into the configuration and explaining how mGRE (multipoint Generic Router Encapsulation), NHRP (Next-Hop Resolution Protocol) and IPsec VPN are mixed to build a dynamic secure topology over the Internet for large enterprises with hundreds of sites.

LAB: Building DMVPN with mGRE, NHRP and IPSec VPN (OSPF)
Lab configured in GNS3 and tested by me. Thanks

Tuesday, March 8, 2016

Cisco ASA with FirePOWER

Table of Contents

Cisco ASA FirePOWER Module Quick Start Guide
1. About the ASA FirePOWER Module
How the ASA FirePOWER Module Works with the ASA
ASA FirePOWER Management
Compatibility with ASA Features
Licensing Requirements for the ASA FirePOWER Module
2. Deploy the ASA FirePOWER Module in Your Network
Routed Mode
ASA 5585-X (Hardware Module) in Routed Mode
ASA 5506-X through ASA 5555-X (Software Module) in Routed Mode
Transparent Mode
ASA 5585-X (Hardware Module) in Transparent Mode
ASA 5506-X through ASA 5555-X (Software Module) in Transparent Mode
3. Register the ASA FirePOWER with a Management Center
4. Launch ASDM
5. Configure the ASA FirePOWER Module
Install the Licenses (ASDM)
Configure the ASA FirePOWER Security Policy
Configure the ASA Security Policy
6. Where to Go Next

Cisco ASA FirePOWER Module Quick Start Guide

Last Updated: February 10, 2016

1. About the ASA FirePOWER Module

The ASA FirePOWER module supplies next-generation firewall services, including Next-Generation Intrusion Prevention System (NGIPS), Application Visibility and Control (AVC), URL filtering, and Advanced Malware Protection (AMP).
The ASA FirePOWER module runs a separate application from the ASA. The module can be a hardware module (on the ASA 5585-X only) or a software module (all other models).
For ASA model software and hardware compatibility with the ASA FirePOWER module, see Cisco ASA Compatibility.

Wednesday, March 2, 2016

IAMTAUSEEF



"Network Engineer & IT Professional"

Where Do I Start With SASE Evaluations?

Gartner® Report: Where Do I Start With SASE Evaluations? Where to start with SASE Secure access service edge (SASE) is revolutionizing the w...