Implementing Cisco Managed Services Solution (MSS)

Size: px
Start display at page:

Download "Implementing Cisco Managed Services Solution (MSS)"

Transcription

1 Implementing Cisco Managed Services Solution (MSS) CCS-2041 Jan Husack 1

2 The Operational Support System (OSS) People Processes Tools 2

3 Running Infrastructure Services is different than Managed (Value Added) Services (NOC) Operations Service Assurance Service Fulfillment Fulfillment Active Network Abstraction (ANA) Assurance Oracle Configuration Engine Fulfillment Assurance IP Solutions Center: Security Management Managed Security Services (MSS 1.x) Traditional Business Interconnect Wholesale or Internet based Interconnect 3

4 Cisco MSS 1.x is a subset of the NGOSS Solution for Managed IP Services (NGOMIS) Remote Moves, Adds & Change Provisioning of handsets Remote QoS SLA management Voice A Catalyst Demo for TeleManagement World, Nice 2007 (Extended MSS 1.x solution) Managed IPSec VPN Managed Firewall Branch Office B Multi-Tenant SMB Building Enhanced Security Network Remote monitoring of VPN and Firewall performance Remote monitoring and automated provisioning of ISR Branch Office A Deep Packet SMB Inspection or Branch (Cisco Office SCE) Branch Office C Service Provider NOC Service Management Frame Service Provider NOC NGOMIS Executive Executive Ops Ops Console Console NGOMIS Customer Customer Portal Portal NGOSS Compliant OSS Mediation Integration Layer + adapters MTOSI OSS/J IPDR (Usage) Service Fulfillment Service Fulfillment Service Assurance Service Assurance Service Mediation & Billing IP Solutions Center (ISC) Security Mgr Product Lifecycle Management Configuration Policy Control Engine System IP Solutions Active Network Active Performance Network Center: Abstraction Security Management Abstraction & SLA Management (ANA) Reporting (ANA) System Oracle Mediation & QOE Analysis Charging & Invoicing 4

5 A use case to highlight some consideration for MSS implementation Operations Customer Relationship Management Service Management & Operations Resource Management & Operations Supplier / Partner Relationship Management Infrastructure Management Service Fulfillment Service Assurance Configuration Engine IP Solutions Center: Security Management Oracle Active Network Abstraction (ANA) Supply Partner Resource Management 5

6 Initial ISR(CPE) Configuration (Bootstrap Config) used as part of MSS 1.x Initial / Infrastructure / Bootstrap Configuration hostname CPE IN-S2 username cisco password 0 cisco aaa new-model aaa session-id common interface FastEthernet0/0 ip address interface FastEthernet0/1 ip address ip route snmp-server community ciscohh RW snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart snmp-server enable traps isakmp policy add snmp-server enable traps isakmp policy delete snmp-server enable traps isakmp tunnel start snmp-server enable traps isakmp tunnel stop snmp-server enable traps ipsec cryptomap add snmp-server enable traps ipsec cryptomap delete snmp-server enable traps ipsec cryptomap attach snmp-server enable traps ipsec cryptomap detach snmp-server enable traps ipsec tunnel start snmp-server enable traps ipsec tunnel stop snmp-server enable traps cpu threshold snmp-server enable traps eigrp snmp-server enable traps flash insertion removal snmp-server enable traps isdn call-information snmp-server enable traps isdn layer2 snmp-server enable traps isdn chan-not-avail snmp-server enable traps isdn ietf snmp-server enable traps bgp snmp-server enable traps memory bufferpeak snmp-server enable traps mpls ldp snmp-server enable traps mpls traffic-eng Service Assurance Service Fulfillment snmp-server enable traps mpls vpn snmp-server enable traps msdp snmp-server enable traps mvpn snmp-server enable traps ospf state-change snmp-server enable traps ospf errors snmp-server enable traps ospf retransmit snmp-server enable traps ospf lsa snmp-server enable traps ospf cisco-specific statechange nssa-trans-change snmp-server enable traps ospf cisco-specific statechange shamlink interface-old snmp-server enable traps ospf cisco-specific statechange shamlink neighbor snmp-server enable traps ospf cisco-specific errors snmp-server enable traps ospf cisco-specific retransmit snmp-server enable traps ospf cisco-specific lsa snmp-server enable traps cpu threshold snmp-server host version 2c ciscohh logging cns trusted-server all-agents cns trusted-server all-agents cns event source FastEthernet0/1 failover-time 10 reconnect-time 15 cns event backup cns config notify all interval 5 old-format cns config partial cns exec 80 end Site engineer deploy devices and devices boot up providing basic IP reachability to MSS setup in Etisalat NOC. CNS Agent initiate connection with CNS-CE (Configuration Engine). CNS-CE informs ISC about the existing device getting live on the coming up on the network. 6

7 IPSec with GRE Full-Mesh ISC generated as part of MSS 1.x Service Configuration Service Fulfillment Configlet #1, Job ID 143 (Created: :18:30) crypto isakmp policy 10 encr 3des hash md5 group 2 lifetime authentication pre-share crypto ipsec transform-set ISC_TS_1 ah-sha-hmac crypto isakmp invalid-spi-recovery ip access-list extended ISC_IPSEC_ACL_1 permit crypto map ISC_CME 1 ipsec-isakmp set peer match address ISC_IPSEC_ACL_1 set transform-set ISC_TS_1 set security-association lifetime seconds 144 set security-association lifetime kilobytes set pfs group5 description Provisioned by ISC: Peer location = Site_1 device = CPE IN-S2 interface Tunnel0 description Provisioned by ISC: Peer location = Site_1 device = CPE IN-S2 tunnel source Hssi1/0 tunnel destination ip unnumbered FastEthernet0/1 keepalive 10 3 ip mtu bandwidth exit ip route Null0 249 crypto isakmp key XIUPn87UL4yYIgQ1wh950pj1QXDjUmPALHq2QTGLZKLPUI2nTLOSpU8D Q9nJ4bKVYM1ZsqUmPAYCwYrWZU3eLJUCKvy98TnD7jZO4D52vDlTWyu5 9nJXKBDCfGYUcUP address no-xauth ip access-list extended ISC_IPSEC_ACL_2 permit ip route Null0 249 crypto isakmp key Xm2CPULJDYIUQ1haQj1HUmbzhH027UTJuL0TrPdUnTLO3ApI8ZLQ9n74P BUZVA10RsxUxcPA6lYGCPwYUrUXWZDUXBJ2KfvU48viTKqD17Uj8ODS2r vl3yu579ojaxk address no-xauth interface Hssi1/0 description Provisioned by ISC (public interface) crypto map ISC_CME exit interface FastEthernet0/1 description Provisioned by ISC (private interface) exit router ospf 2650 network area 2 crypto isakmp nat keepalive 5 ISC activates services already configured for the Customer ISC completes configuration audit for the deployed service Etisalat NOC engineer perform Functional Audit Service is successfully deployed. 7

8 MSS setup for small scale based on initial Business Model deploying 2500 ISRs 3 rd party Order Mgmt, Workflow) Customer Portals with RBAC BQL API Zero-Touch Provisioning CNS Config Engine IPSec Provisioning ISC Operator Console Data Store Oracle Discovery ANA GW/Unit Fault v490, (4 CPUx1.5GHz), 16GB RAM 150GB HD, Solaris 10 v490, (4 CPUx1.35GHz), 16GB RAM 150GB HD, Solaris 8 Server #3 VNEs VNEs ISR ANA VNEs Server #1 Server #2 ISR Platform Implementation of Cisco MSS1.1 at Etisalat In two locations: Abu Dhabi, Electra Street Dubai, Zabeel Road 8

9 Orchestration of People, Processes and Tools is the Key for Managed Services Technology use can be often demonstrated in show cases like the NGOMIS Catalyst demo Managed Services are a perfect example of the combination of people, processes and tools required to perform efficiently Any type of Managed Services (or SLA) impact the business or operational model in place 9

10 Q and A 10

11 Complete Your Online Session Evaluation Presenter: Jan Husak, CA Solutions Architect Session: CCS-2041 Win fabulous prizes; Give us your feedback Receive ten Passport Points for each session evaluation you complete Go to the Internet stations located throughout the Convention Center to complete your session evaluation Drawings will be held in the World of Solutions Tuesday, June 20 at 12:15 p.m. Wednesday, June 21 at 12:15 p.m. Thursday, June 22 at 12:15 p.m. and 2:00 p.m. 11

12 12

Managing and Monitoring Network Management Features

Managing and Monitoring Network Management Features Managing and Monitoring Network Management Features This feature module describes how to monitor, manage and deploy a variety of network management features, including Cisco Active Network Abstraction

More information

Netgear ProSafe VPN firewall (FVS318 or FVM318) to Cisco PIX firewall

Netgear ProSafe VPN firewall (FVS318 or FVM318) to Cisco PIX firewall Netgear ProSafe VPN firewall (FVS318 or FVM318) to Cisco PIX firewall This document is a step-by-step instruction for setting up VPN between Netgear ProSafe VPN firewall (FVS318 or FVM318) and Cisco PIX

More information

Configure ISDN Backup and VPN Connection

Configure ISDN Backup and VPN Connection Case Study 2 Configure ISDN Backup and VPN Connection Cisco Networking Academy Program CCNP 2: Remote Access v3.1 Objectives In this case study, the following concepts are covered: AAA authentication Multipoint

More information

REMOTE ACCESS VPN NETWORK DIAGRAM

REMOTE ACCESS VPN NETWORK DIAGRAM REMOTE ACCESS VPN NETWORK DIAGRAM HQ ASA Firewall As Remote Access VPN Server Workgroup Switch HQ-ASA Fa0/1 111.111.111.111 Fa0/0 172.16.50.1 172.16.50.10 IPSEC Tunnel Unsecured Network ADSL Router Dynamic

More information

Configuring an IPSec Tunnel between a Firebox & a Cisco PIX 520

Configuring an IPSec Tunnel between a Firebox & a Cisco PIX 520 Configuring an IPSec Tunnel between a Firebox & a Cisco PIX 520 This document describes how to configure an IPSec tunnel with a WatchGuard Firebox II or Firebox III (software version 4.5 or later) at one

More information

Cisco Site-to-Site VPN Lab 3 / GRE over IPSec VPNs by Michael T. Durham

Cisco Site-to-Site VPN Lab 3 / GRE over IPSec VPNs by Michael T. Durham Cisco Site-to-Site VPN Lab 3 / GRE over IPSec VPNs by Michael T. Durham In part two of NetCertLabs Cisco CCNA Security VPN lab series, we explored setting up a site-to-site VPN connection where one side

More information

VPN SECURITY POLICIES

VPN SECURITY POLICIES TECHNICAL SUPPORT NOTE Introduction to the VPN Menu in the Web GUI Featuring ADTRAN OS and the Web GUI Introduction This Technical Support Note shows the different options available in the VPN menu of

More information

Network Diagram Scalability Testbed and Configuration Files

Network Diagram Scalability Testbed and Configuration Files APPENDIX A Network Diagram Scalability Testbed and Configuration Files This appendix contains configurations that were used during a V 3 PN performance and scalability evaluation based on the network illustrated

More information

LAN-Cell to Cisco Tunneling

LAN-Cell to Cisco Tunneling LAN-Cell to Cisco Tunneling Page 1 of 13 LAN-Cell to Cisco Tunneling This Tech Note guides you through setting up a VPN connection between a LAN-Cell and a Cisco router. As the figure below shows, the

More information

Expert Reference Series of White Papers. Integrating Active Directory Users with Remote VPN Clients on a Cisco ASA

Expert Reference Series of White Papers. Integrating Active Directory Users with Remote VPN Clients on a Cisco ASA Expert Reference Series of White Papers Integrating Active Directory Users with Remote VPN Clients on a Cisco ASA 1-800-COURSES www.globalknowledge.com Integrating Active Directory Users with Remote VPN

More information

Keying Mode: Main Mode with No PFS (perfect forward secrecy) SA Authentication Method: Pre-Shared key Keying Group: DH (Diffie Hellman) Group 1

Keying Mode: Main Mode with No PFS (perfect forward secrecy) SA Authentication Method: Pre-Shared key Keying Group: DH (Diffie Hellman) Group 1 Prepared by SonicWALL, Inc. 09/20/2001 Introduction: VPN standards are still evolving and interoperability between products is a continued effort. SonicWALL has made progress in this area and is interoperable

More information

Tech Note Cisco IOS SNMP Traps Supported and How to Conf

Tech Note Cisco IOS SNMP Traps Supported and How to Conf Tech Note Cisco IOS SNMP Traps Supported and How to Conf Table of Contents Cisco IOS SNMP Traps Supported and How to Configure Them...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1

More information

Lab 6.2.12a Configure Remote Access Using Cisco Easy VPN

Lab 6.2.12a Configure Remote Access Using Cisco Easy VPN Lab 6.2.12a Configure Remote Access Using Cisco Easy VPN Objective Scenario Topology In this lab, the students will complete the following tasks: Enable policy lookup via authentication, authorization,

More information

Lab14.8.1 Configure a PIX Firewall VPN

Lab14.8.1 Configure a PIX Firewall VPN Lab14.8.1 Configure a PIX Firewall VPN Complete the following lab exercise to practice what you learned in this chapter. Objectives In this lab exercise you will complete the following tasks: Visual Objective

More information

Skills Assessment Student Training (Answer Key)

Skills Assessment Student Training (Answer Key) CCNA: Connecting Networks Skills Assessment Student Training (Answer Key) Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only. Topology Assessment

More information

GregSowell.com. Mikrotik VPN

GregSowell.com. Mikrotik VPN Mikrotik VPN What is a VPN Wikipedia has a very lengthy explanation http://en.wikipedia.org/wiki/virtual_private_ network This class is really going to deal with tunneling network traffic over IP both

More information

Cisco EXAM - 300-209. Implementing Cisco Secure Mobility Solutions (SIMOS) Buy Full Product. http://www.examskey.com/300-209.html

Cisco EXAM - 300-209. Implementing Cisco Secure Mobility Solutions (SIMOS) Buy Full Product. http://www.examskey.com/300-209.html Cisco EXAM - 300-209 Implementing Cisco Secure Mobility Solutions (SIMOS) Buy Full Product http://www.examskey.com/300-209.html Examskey Cisco 300-209 exam demo product is here for you to test the quality

More information

Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM

Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM Objective Scenario Topology In this lab, the students will complete the following tasks: Prepare to configure Virtual Private Network (VPN)

More information

Virtual Private Network (VPN)

Virtual Private Network (VPN) Configuration Guide 5991-2120 April 2005 Virtual Private Network (VPN) VPN Using Preset Keys, Mode Config, and Manual Keys This Configuration Guide is designed to provide you with a basic understanding

More information

Triple DES Encryption for IPSec

Triple DES Encryption for IPSec Triple DES Encryption for IPSec Feature Summary Platforms Prerequisites IPSec supports the Triple DES encryption algorithm (168-bit) in addition to 56-bit encryption. Triple DES (3DES) is a strong form

More information

Industrial Classed H685 H820 Cellular Router User Manual for VPN setting

Industrial Classed H685 H820 Cellular Router User Manual for VPN setting H685/H820 VPN User Manual Industrial Classed H685 H820 Cellular Router User Manual for VPN setting E-Lins Technology Co., Limited PHONE: +86-755-29230581 83700465 Email: sales@e-lins.com sales@szelins.com

More information

SEC-370. 2001, Cisco Systems, Inc. All rights reserved.

SEC-370. 2001, Cisco Systems, Inc. All rights reserved. SEC-370 2001, Cisco Systems, Inc. All rights reserved. 1 Understanding MPLS/VPN Security Issues SEC-370 Michael Behringer SEC-370 2003, Cisco Systems, Inc. All rights reserved. 3

More information

Network Security 2. Module 6 Configure Remote Access VPN

Network Security 2. Module 6 Configure Remote Access VPN 1 1 Network Security 2 Module 6 Configure Remote Access VPN 2 Learning Objectives 6.1 Introduction to Cisco Easy VPN 6.2 Configure the Easy VPN Server 6.3 Configure Easy VPN Remote for the Cisco VPN Client

More information

Application Notes SL1000/SL500 VPN with Cisco PIX 501

Application Notes SL1000/SL500 VPN with Cisco PIX 501 Application Notes SL1000/SL500 VPN with Cisco PIX 501 Version 1.0 Copyright 2006, ASUSTek Computer, Inc. i Revision History Version Author Date Status 1.0 Martin Su 2006/5/4 Initial draft Copyright 2006,

More information

Point-to-Point GRE over IPsec Design and Implementation

Point-to-Point GRE over IPsec Design and Implementation CHAPTER 2 Point-to-Point GRE over IPsec Design and Implementation In designing a VPN deployment for a customer, it is essential to integrate broader design considerations such as high availability, resiliency,

More information

IPSec interoperability between Palo Alto firewalls and Cisco ASA. Tech Note PAN-OS 4.1. Revision A 2011, Palo Alto Networks, Inc.

IPSec interoperability between Palo Alto firewalls and Cisco ASA. Tech Note PAN-OS 4.1. Revision A 2011, Palo Alto Networks, Inc. IPSec interoperability between Palo Alto firewalls and Cisco ASA Tech Note PAN-OS 4.1 Revision A Contents Overview... 3 Platforms and Software Versions... 3 Network topology... 3 VPN Tunnel Configuration

More information

Deploying the Barracuda Link Balancer with Cisco ASA VPN Tunnels

Deploying the Barracuda Link Balancer with Cisco ASA VPN Tunnels Deploying the Barracuda Link Balancer with Cisco ASA VPN Tunnels This article provides a reference for deploying a Barracuda Link Balancer under the following conditions: 1. 2. In transparent (firewall-disabled)

More information

External Authentication with Cisco Router with VPN and Cisco EZVpn client Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Cisco Router with VPN and Cisco EZVpn client Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Cisco Router with VPN and Cisco EZVpn client Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210

More information

Cisco Virtual Office Deployment Guide

Cisco Virtual Office Deployment Guide Cisco Virtual Office Deployment Guide Scope of Document This deployment guide provides detailed information on configuring the Cisco Virtual Office headend devices and ManageExpress Virtual Office. It

More information

Configuring Remote Access IPSec VPNs

Configuring Remote Access IPSec VPNs CHAPTER 34 Remote access VPNs let single users connect to a central site through a secure connection over a TCP/IP network such as the Internet. This chapter describes how to build a remote access VPN

More information

Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1

Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1 Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1 This document describes how to configure an IPSec tunnel with a WatchGuard Firebox II or Firebox III (software version 4.5 or later)

More information

Case Studies. Static p2p GRE over IPsec with a Branch Dynamic Public IP Address Case Study. Overview CHAPTER

Case Studies. Static p2p GRE over IPsec with a Branch Dynamic Public IP Address Case Study. Overview CHAPTER CHAPTER 5 The following two case studies are provided as reference material for implementing p2p GRE over IPsec designs. Static p2p GRE over IPsec with a Branch Dynamic Public IP Address Case Study This

More information

SSECMGT: CManaging Enterprise Security with Cisco Security Manager v4.x

SSECMGT: CManaging Enterprise Security with Cisco Security Manager v4.x SSECMGT: CManaging Enterprise Security with Cisco Security Manager v4.x Introduction The Managing Enterprise Security with Cisco Security Manager (SSECMGT) v4.0 course is a five-day instructor-led course

More information

IP Office Technical Tip

IP Office Technical Tip IP Office Technical Tip Tip no: 186 Release Date: August 14, 2007 Region: GLOBAL Configuring a VPN Remote IP Phone with an Adtran Netvanta 3305 VPN Router The following document assumes that the user/installer

More information

Configuring Simple Network Management Protocol (SNMP)

Configuring Simple Network Management Protocol (SNMP) Configuring Simple Network Management Protocol (SNMP) This chapter describes the Simple Network Management Protocol (SNMP), SNMP Management Information Bases (MIBs), and how to configure SNMP on Cisco

More information

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Product Overview Cisco Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software-based security solution for building scalable

More information

Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example

Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example Document ID: 113337 Contents Introduction Prerequisites Requirements Components Used Conventions Configuration

More information

Managing Enterprise Security with Cisco Security Manager

Managing Enterprise Security with Cisco Security Manager Managing Enterprise Security with Cisco Security Manager Course SSECMGT v4.0; 5 Days, Instructor-led Course Description: The Managing Enterprise Security with Cisco Security Manager (SSECMGT) v4.0 course

More information

Router and Routing Basics

Router and Routing Basics Router and Routing Basics Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Routing Protocols and Concepts CCNA2 Routing and packet forwarding Static routing Dynamic

More information

Deploying IPSec VPN in the Enterprise

Deploying IPSec VPN in the Enterprise VPN5 6/9/03 6:14 PM Page 137 Chapter 5 Deploying IPSec VPN in the Enterprise 5.1 Chapter Overview In Chapters 3 and 4, the focus was on implementing a single site-to-site IPSec VPN and the different IKE

More information

Intranet Security Solution

Intranet Security Solution Intranet Security Solution 1. Introduction With the increase in information and economic exchange, there are more and more enterprises need to communicate with their partners, suppliers, customers or their

More information

Objectives. Router as a Computer. Router components and their functions. Router components and their functions

Objectives. Router as a Computer. Router components and their functions. Router components and their functions 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Introduction to Routing and Packet Forwarding Routing Protocols and Concepts Chapter 1 Identify a router as a computer with an OS and

More information

Task Manager. Tasks. Starting Task Manager CHAPTER

Task Manager. Tasks. Starting Task Manager CHAPTER CHAPTER 52 Cisco Prime Fulfillment provides a that allows you to view pertinent information about both current and expired tasks of all types, and to create and schedule new tasks, delete specified tasks,

More information

Configuring a Check Point FireWall-1 to SOHO IPSec Tunnel

Configuring a Check Point FireWall-1 to SOHO IPSec Tunnel Configuring a Check Point FireWall-1 to SOHO IPSec Tunnel This document describes the procedures required to configure an IPSec VPN tunnel between a WatchGuard SOHO or SOHO tc and a Check Point FireWall-1.

More information

Managing Enterprise Security with Cisco Security Manager

Managing Enterprise Security with Cisco Security Manager Course: Managing Enterprise Security with Cisco Security Manager Duration: 5 Day Hands-on Lab & Lecture Course Price: $ 3,395.00 Learning Credits: 34 Description: The Managing Enterprise Security with

More information

IPSec Network Security Commands

IPSec Network Security Commands IPSec Network Security Commands This chapter describes the function and displays the syntax for IPSec network security commands. For more information about defaults and usage guidelines, see the corresponding

More information

Understanding the Cisco VPN Client

Understanding the Cisco VPN Client Understanding the Cisco VPN Client The Cisco VPN Client for Windows (referred to in this user guide as VPN Client) is a software program that runs on a Microsoft Windows -based PC. The VPN Client on a

More information

VPN Configuration Guide. Cisco ASA 5500 Series

VPN Configuration Guide. Cisco ASA 5500 Series VPN Configuration Guide Cisco ASA 5500 Series 2010 equinux AG and equinux USA, Inc. All rights reserved. Under copyright law, this configuration guide may not be copied, in whole or in part, without the

More information

Cisco Active Network Abstraction 4.0

Cisco Active Network Abstraction 4.0 Cisco Active Network Abstraction 4.0 Product Overview Cisco Active Network Abstraction (ANA) is a flexible, vendor-neutral network resource management solution for a multitechnology, multiservice network

More information

Module 6 Configure Remote Access VPN

Module 6 Configure Remote Access VPN Network Security 2 Module 6 Configure Remote Access VPN Learning Objectives 6.1 Introduction to Cisco Easy VPN 6.2 Configure the Easy VPN Server 6.3 Configure Easy VPN Remote for the Cisco VPN Client 4.x

More information

Configuring Internet Key Exchange Security Protocol

Configuring Internet Key Exchange Security Protocol Configuring Internet Key Exchange Security Protocol This chapter describes how to configure the Internet Key Exchange (IKE) protocol. IKE is a key management protocol standard that is used in conjunction

More information

Amazon Virtual Private Cloud. Network Administrator Guide API Version 2015-04-15

Amazon Virtual Private Cloud. Network Administrator Guide API Version 2015-04-15 Amazon Virtual Private Cloud Network Administrator Amazon Virtual Private Cloud: Network Administrator Copyright 2015 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Table of Contents

More information

7750 SR OS System Management Guide

7750 SR OS System Management Guide 7750 SR OS System Management Guide Software Version: 7750 SR OS 10.0 R4 July 2012 Document Part Number: 93-0071-09-02 *93-0071-09-02* This document is protected by copyright. Except as specifically permitted

More information

CAPPS. Integrating Cisco Unified Communications Applications (CAPPS) v8.0. Remote Lab Administration Guide

CAPPS. Integrating Cisco Unified Communications Applications (CAPPS) v8.0. Remote Lab Administration Guide CAPPS Integrating Cisco Unified Communications Applications (CAPPS) v8.0 Remote Lab Administration Guide Contents 1. Overview... 4 2. Course Version... 4 3. Remote Lab Topology... 5 4. Remote Lab Description...

More information

Configuring Tunnel Default Gateway on Cisco IOS EasyVPN/DMVPN Server to Route Tunneled Traffic

Configuring Tunnel Default Gateway on Cisco IOS EasyVPN/DMVPN Server to Route Tunneled Traffic Configuring Tunnel Default Gateway on Cisco IOS EasyVPN/DMVPN Server to Route Tunneled Traffic Introduction This document discusses Cisco tunnel default gateway implementations that are available as part

More information

Lab 7.3.6 Configure Remote Access Using Cisco Easy VPN

Lab 7.3.6 Configure Remote Access Using Cisco Easy VPN Lab 7.3.6 Configure Remote Access Using Cisco Easy VPN Objective Scenario Estimated Time: 20 minutes Number of Team Members: Two teams with four students per team In this lab, the student will learn the

More information

Configuring IPsec VPN Fragmentation and MTU

Configuring IPsec VPN Fragmentation and MTU CHAPTER 5 This chapter provides information about configuring IPsec VPN fragmentation and the maximum transmission unit (MTU). It includes the following sections: Understanding IPsec VPN Fragmentation

More information

Application Note 45. Main Mode IPSec VPN from Digi WR44 to a Cisco 3745. Using GRE over IPSec with the Cisco configured for VTI. UK Support June 2011

Application Note 45. Main Mode IPSec VPN from Digi WR44 to a Cisco 3745. Using GRE over IPSec with the Cisco configured for VTI. UK Support June 2011 Application Note 45 Main Mode IPSec VPN from Digi WR44 to a Cisco 3745. Using GRE over IPSec with the Cisco configured for VTI UK Support June 2011 1 Contents 1 Introduction... 3 1.1 Outline... 3 1.2 Assumptions...

More information

Monitoring Remote Access VPN Services

Monitoring Remote Access VPN Services CHAPTER 5 A remote access service (RAS) VPN secures connections for remote users, such as mobile users or telecommuters. RAS VPN monitoring provides all of the most important indicators of cluster, concentrator,

More information

200-101: Interconnecting Cisco Networking Devices Part 2 v2.0 (ICND2)

200-101: Interconnecting Cisco Networking Devices Part 2 v2.0 (ICND2) 200-101: Interconnecting Cisco Networking Devices Part 2 v2.0 (ICND2) Course Overview This course provides students with the knowledge and skills to successfully install, operate, and troubleshoot a small

More information

IOS NAT Load Balancing with Optimized Edge Routing for Two Internet Connections

IOS NAT Load Balancing with Optimized Edge Routing for Two Internet Connections IOS NAT Load Balancing with Optimized Edge Routing for Two Internet Connections Document ID: 99427 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram

More information

WiNG 5.X How To. Policy Based Routing Cache Redirection. Part No. TME-05-2012-01 Rev. A

WiNG 5.X How To. Policy Based Routing Cache Redirection. Part No. TME-05-2012-01 Rev. A WiNG 5.X How To Policy Based Routing Cache Redirection Part No. TME-05-2012-01 Rev. A MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered trademarks of Motorola Trademark

More information

Remote Access VPN Business Scenarios

Remote Access VPN Business Scenarios CHAPTER 4 This chapter explains the basic tasks for configuring an IP-based, remote access Virtual Private Network (VPN) on a Cisco 7200 series router. In the remote access VPN business scenario, a remote

More information

Encrypted Preshared Key

Encrypted Preshared Key The feature allows you to securely store plain text passwords in type 6 (encrypted) format in NVRAM. Feature History for Release Modification 12.3(2)T This feature was introduced. Finding Support Information

More information

Amazon Virtual Private Cloud. Network Administrator Guide API Version 2014-06-15

Amazon Virtual Private Cloud. Network Administrator Guide API Version 2014-06-15 Amazon Virtual Private Cloud Network Administrator Amazon Web Services Amazon Virtual Private Cloud: Network Administrator Amazon Web Services Copyright 2014 Amazon Web Services, Inc. and/or its affiliates.

More information

Encrypted Preshared Key

Encrypted Preshared Key Encrypted Preshared Key The Encrypted Preshared Key feature allows you to securely store plain text passwords in type 6 (encrypted) format in NVRAM. Feature History for Encrypted Preshared Key Release

More information

Packet Tracer Configuring VPNs (Optional)

Packet Tracer Configuring VPNs (Optional) Topology Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1 G0/0 192.168.1.1 255.255.255.0 N/A S0/0/0 10.1.1.2 255.255.255.252 N/A G0/0 192.168.2.1 255.255.255.0 N/A R2 S0/0/0

More information

Cisco Wireless Security Gateway R2

Cisco Wireless Security Gateway R2 Cisco Wireless Security Gateway R2 Product Overview The Cisco Wireless Security Gateway (WSG) is a highly scalable solution for tunneling femtocell, Unlicensed Mobile Access (UMA)/Generic Access Network

More information

Table of Contents. Cisco Configuring IPSec Cisco Secure VPN Client to Central Router Controlling Access

Table of Contents. Cisco Configuring IPSec Cisco Secure VPN Client to Central Router Controlling Access Table of Contents Configuring IPSec Cisco Secure VPN Client to Central Router Controlling Access...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...1 Conventions...1 Configure...2

More information

Configuring the Cisco Secure PIX Firewall with a Single Intern

Configuring the Cisco Secure PIX Firewall with a Single Intern Configuring the Cisco Secure PIX Firewall with a Single Intern Table of Contents Configuring the Cisco Secure PIX Firewall with a Single Internal Network...1 Interactive: This document offers customized

More information

Cisco Router and Security Device Manager (SDM)

Cisco Router and Security Device Manager (SDM) Cisco Router and Security Device Manager (SDM) Session Number 1 Cisco SDM: Combining Ease Of Use & Application Intelligence Cisco SDM is an intuitive, web-based tool for Easy and Reliable Deployment and

More information

How To Monitor Cisco Secure Pix Firewall Using Ipsec And Snmp Through A Pix Tunnel

How To Monitor Cisco Secure Pix Firewall Using Ipsec And Snmp Through A Pix Tunnel itoring Cisco Secure PIX Firewall Using SNMP and Syslog Thro Table of Contents Monitoring Cisco Secure PIX Firewall Using SNMP and Syslog Through VPN Tunnel...1 Introduction...1 Before You Begin...1 Conventions...1

More information

Supporting Document LNS Configuration

Supporting Document LNS Configuration Supporting Document LNS Configuration Swisscom (Schweiz) AG Version 1-0 15.112010 Inhalt 1 General... 3 1.1 Appendix A: Load Balancing between POPs... 3 1.2 Appendix B: Examples of LNS and BGP Configurations...

More information

VPN. VPN For BIPAC 741/743GE

VPN. VPN For BIPAC 741/743GE VPN For BIPAC 741/743GE August, 2003 1 The router supports VPN to establish secure, end-to-end private network connections over a public networking infrastructure. There are two types of VPN connections,

More information

Case Study for Layer 3 Authentication and Encryption

Case Study for Layer 3 Authentication and Encryption CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client

More information

Lab 6.5.9b Configure a Secure VPN Using IPSec between a PIX and a VPN Client using CLI

Lab 6.5.9b Configure a Secure VPN Using IPSec between a PIX and a VPN Client using CLI Lab 6.5.9b Configure a Secure VPN Using IPSec between a PIX and a VPN Client using CLI Objective Scenario Topology In this lab exercise, the students will complete the following tasks: Configure and Verify

More information

IPSec. User Guide. 2120028 Rev 2.2

IPSec. User Guide. 2120028 Rev 2.2 IPSec User Guide 2120028 Rev 2.2 Important Notice Safety and Hazards Due to the nature of wireless communications, transmission and reception of data can never be guaranteed. Data may be delayed, corrupted

More information

Cisco IP Solution Center MPLS VPN Management 5.0

Cisco IP Solution Center MPLS VPN Management 5.0 Cisco IP Solution Center MPLS VPN Management 5.0 As part of the Cisco IP Solution Center (ISC) family of intelligent network management applications, the Cisco ISC MPLS VPN Management application reduces

More information

DS3 Performance Scaling on ISRs

DS3 Performance Scaling on ISRs This document provides guidelines on scaling the performance of DS3 interface (NM-1T3/E3) for the Cisco 2811/2821/2851/3825/3845 Integrated Services Routers. The analysis provides following test results;

More information

BONUS TUTORIAL CISCO ASA 5505 CONFIGURATION WRITTEN BY: HARRIS ANDREA ALL YOU NEED TO KNOW TO CONFIGURE AND IMPLEMENT THE BEST FIREWALL IN THE MARKET

BONUS TUTORIAL CISCO ASA 5505 CONFIGURATION WRITTEN BY: HARRIS ANDREA ALL YOU NEED TO KNOW TO CONFIGURE AND IMPLEMENT THE BEST FIREWALL IN THE MARKET BONUS TUTORIAL CISCO ASA 5505 CONFIGURATION ALL YOU NEED TO KNOW TO CONFIGURE AND IMPLEMENT THE BEST FIREWALL IN THE MARKET WRITTEN BY: HARRIS ANDREA MSC ELECTRICAL ENGINEERING AND COMPUTER SCIENCE CISCO

More information

TABLE OF CONTENTS NETWORK SECURITY 2...1

TABLE OF CONTENTS NETWORK SECURITY 2...1 Network Security 2 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors

More information

Viewing VPN Status, page 335. Configuring a Site-to-Site VPN, page 340. Configuring IPsec Remote Access, page 355

Viewing VPN Status, page 335. Configuring a Site-to-Site VPN, page 340. Configuring IPsec Remote Access, page 355 VPN This chapter describes how to configure Virtual Private Networks (VPNs) that allow other sites and remote workers to access your network resources. It includes the following sections: About VPNs, page

More information

Cisco 1841 MyDigitalShield BYOG Integration Guide

Cisco 1841 MyDigitalShield BYOG Integration Guide Cisco 1841 MyDigitalShield BYOG Integration Guide CONTENTS Introduction 3 Assumptions 3 What You Will Need 4 Verify IP Address 5 Configure the IPSEC Tunnel 6 Configure Access List for Local Interface 6

More information

ehealth Integration for Cisco VPN Solutions Center User Guide

ehealth Integration for Cisco VPN Solutions Center User Guide ehealth Integration for Cisco VPN Solutions Center User Guide MN-NHVPNSC-001 June 2003 Important Notice Concord Communications, Inc., ehealth, ehealth Suite, the Concord Logo, eroi, AdvantEDGE, SystemEDGE,

More information

Chapter 5 Virtual Private Networking Using IPsec

Chapter 5 Virtual Private Networking Using IPsec Chapter 5 Virtual Private Networking Using IPsec This chapter describes how to use the IPsec virtual private networking (VPN) features of the ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN to provide

More information

Monitoring the Firewall Services Module

Monitoring the Firewall Services Module 24 CHAPTER This chapter describes how to configure logging and SNMP for the FWSM. It also describes the contents of system log messages and the system log message format. This chapter does not provide

More information

Troubleshooting and Maintaining Cisco IP Networks Volume 1

Troubleshooting and Maintaining Cisco IP Networks Volume 1 Troubleshooting and Maintaining Cisco IP Networks Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and E Learning Goal and Course Flow Additional Cisco Glossary of Terms Your Training

More information

C H A P T E R Management Cisco SAFE Reference Guide OL-19523-01 9-1

C H A P T E R Management Cisco SAFE Reference Guide OL-19523-01 9-1 CHAPTER 9 The primary goal of the management module is to facilitate the secure management of all devices and hosts within the enterprise network architecture. The management module is key for any network

More information

Deploying and Configuring MPLS Virtual Private Networks In IP Tunnel Environments

Deploying and Configuring MPLS Virtual Private Networks In IP Tunnel Environments Deploying and Configuring MPLS Virtual Private Networks In IP Tunnel Environments Russell Kelly rukelly@cisco.com Craig Hill crhill@cisco.com Patrick Naurayan pnauraya@cisco.com 2009 Cisco Systems, Inc.

More information

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the

More information

Corente Cloud Services Exchange

Corente Cloud Services Exchange Corente Cloud Services Exchange Oracle s Corente Cloud Services Exchange (Corente CSX) is a cloud-based software-defined networking (SDN) solution that enables distributed enterprises to deliver trusted

More information

Using Opensource VPN Clients with Firetunnel

Using Opensource VPN Clients with Firetunnel This document describes how to use VPN Clients. Since the number of VPN Tunnels using PPTP is limited to 4, this is your way to connect up to 10 parallel tunnels using VPN/IPSEC technology. The method

More information

VPN L2TP Application. Installation Guide

VPN L2TP Application. Installation Guide VPN L2TP Application Installation Guide 1 Configuring a Remote Access L2TP VPN Dial-in Connection A remote worker establishes a L2TP VPN connection with the head office using Microsoft's VPN Adapter (included

More information

Introduction to Routing and Packet Forwarding. Routing Protocols and Concepts Chapter 1

Introduction to Routing and Packet Forwarding. Routing Protocols and Concepts Chapter 1 Introduction to Routing and Packet Forwarding Routing Protocols and Concepts Chapter 1 1 1 Objectives Identify a router as a computer with an OS and hardware designed for the routing process. Demonstrate

More information

Why Is MPLS VPN Security Important?

Why Is MPLS VPN Security Important? MPLS VPN Security An Overview Monique Morrow Michael Behringer May 2 2007 Future-Net Conference New York Futurenet - MPLS Security 1 Why Is MPLS VPN Security Important? Customer buys Internet Service :

More information

Table of Contents. Introduction

Table of Contents. Introduction viii Table of Contents Introduction xvii Chapter 1 All About the Cisco Certified Security Professional 3 How This Book Can Help You Pass the CCSP Cisco Secure VPN Exam 5 Overview of CCSP Certification

More information

CISCO IOS NETWORK SECURITY (IINS)

CISCO IOS NETWORK SECURITY (IINS) CISCO IOS NETWORK SECURITY (IINS) SEVENMENTOR TRAINING PVT.LTD [Type text] Exam Description The 640-553 Implementing Cisco IOS Network Security (IINS) exam is associated with the CCNA Security certification.

More information

IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE)

IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE) IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE) COURSE OVERVIEW: Implementing Cisco IP Routing (ROUTE) v2.0 is an instructor-led five day training course developed to help students prepare for Cisco CCNP _

More information

Configuring SNMP Monitoring

Configuring SNMP Monitoring 17 CHAPTER This chapter describes how to configure SNMP traps, recipients, community strings and group associations, user security model groups, and user access permissions. Note Throughout this chapter,

More information

Fireware How To VPN. Introduction. Is there anything I need to know before I start? Configuring a BOVPN Gateway

Fireware How To VPN. Introduction. Is there anything I need to know before I start? Configuring a BOVPN Gateway Fireware How To VPN How do I set up a manual branch office VPN tunnel? Introduction You use Branch Office VPN (BOVPN) with manual IPSec to make encrypted tunnels between a Firebox and a second IPSec-compliant

More information