Sammyskinekwokdoodle.com路Oct 16, 2024Doodle #3: How Service Providers connect Non-MPLS Customer Site to their MPLS fabric?Introduction You know now what is Multi-Protocol Label Switching (MPLS), and how you can utilize its concept to form a MPLS L3 VPN connection with your customers. That鈥檚 very good because your customers are segmented using virtual routing instances t...Cisco
Ronald Bartelshubandspoke.amastelek.com路Sep 20, 2024馃ПDebunking the Firewall Vendor Myth | SD-WAN is Not Just "Branch Networking with IPSEC"馃悽In recent years, a growing number of firewall vendors, particularly from Silicon Valley, have tried to rebrand their traditional products as SD-WAN solutions. They often advertise their offerings as being the perfect branch networking tool, wrapped i...4 likesipsec
Ronald Bartelshubandspoke.amastelek.com路Aug 4, 2024馃悰The Decades old Mikrotik Bug that is Killing your VPNs softly馃Multiple roadwarrior access from behind a Mikrotik router to a common VPN server has been a decades old problem mainly for the Windows built-in client. Refer: L2TP/IPSec for Road Warrior There is no way to fix it on ROS, not even on V7. The Mac clien...6 likes#Mikrotik
Sammyskinekwokdoodle.com路Jul 12, 2024DOODLE #2: The Customer's Way of Connecting Branch Sites using MPLS L3 VPN and Site-to-Site IPsec VPN - Pt. 2Introduction We are going to continue to where we left in the part 1 of this work (doodle). Where are we? Yes, IPsec. It will be configured to have our customer routes have a backup path when the primary path fails. So, let's start now! Main Tasks B...ccnp
Sammyskinekwokdoodle.com路Jul 12, 2024DOODLE #2: The Customer's Way of Connecting Branch Sites with MPLS L3 VPN and Site-to-Site IPsec VPN - Pt. 1Introduction Have you ever wondered how Customers design their enterprise WAN? Especially with other site located in other location? This is the right page to know! Today, I'm going to show you two (2) ways how customers connect to their site in othe...ccnp
Christopher Wilsontechshopper.hashnode.dev路Jul 10, 2024Modern Network Security Protocols: From SSL/TLS to Zero TrustIn today's digital landscape, network security is paramount. As cyber threats evolve, so do the protocols designed to protect data and ensure secure communications. This article delves into the world of modern network security protocols, tracing the ...network security protocols
Ronald Bartelshubandspoke.amastelek.com路Feb 7, 2024馃尦Redefining Branch Connectivity for Modern Business Needs when deploying SD-WANs 馃寪馃捈In the past, branches were connected to head offices through leased MPLS lines or VPNs over dedicated Internet access. These deployments were often customized, resulting in a tangled mess of configurations and a lack of universal solutions. However, ...4 likesIPSECipsec
Ronald Bartelshubandspoke.amastelek.com路Feb 3, 2024馃棏锔廡he Rise of WireGuard | Why IPSEC is Becoming Obsolete in Modern Networking馃拏In the ever-evolving landscape of cybersecurity, the clash between legacy IPsec and the innovative WireGuard protocol has taken center stage. As organizations seek cutting-edge solutions, it's time to unravel the complexities, pitfalls, and promises ...10 likesIPSECipsec
CodiLimecodilime.hashnode.dev路Oct 6, 2023Comparing IPsec and OpenVPN: A Comprehensive Analysis of VPN ProtocolsIn the realm of VPNs, references to IPsec and OpenVPN are ubiquitous, however the choice between the two is not an either-or decision and both can be used simultaneously, depending on the purpose and need. But how does one decide which protocol align...ipsec
Jitin Tyagijeetintyagi.hashnode.dev路Jul 13, 2023IPsec VPN: Understanding IKE Phase 2 Quick modePrerequisites: IPsec VPN: Understanding the IKE Phase 1 Main Mode IKE Phase 2 | Quick mode IKE phase 2 tunnel is also referred to as IPsec tunnel. This tunnel will be used to protect user data and there is only 1 mode to build this tunnel and i.e. ...345 readsHashnode