Configured as specific static route

Slides:



Advertisements
Similar presentations
Module 13: Implementing ISA Server 2004 Enterprise Edition: Site-to-Site VPN Scenario.
Advertisements

Haga clic para modificar el estilo de subtítulo del patrón © 2012 – Teldat GmbH – All rights reserved „Port Based Security“ – „Drop-In-Mode“ The ideal.
CCNP Network Route IPV-6 Part-III IPV-6 Static Routing: R1(Conf t)# ip routing  (Turn on Routing) R1(Conf t)# ipv6 unicast-routing  (Turn on ipv6 routing)
Lecture 2: Servers and Services Network Design & Administration.
Module 5: Configuring Access for Remote Clients and Networks.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
MS Proxy Internet Microsoft Proxy Server Secure Network LAN.
Routing and Routing Protocols Introduction to Static Routing.
NAT Network Address Translation. NAT Links cisco.shtmlhttp:// cisco.shtml.
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—5-1 Implementing Path Control Lab 5-1 Debrief.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Implementing Secure Converged Wide Area Networks (ISCW)
Remote Networking Architectures
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Sample Diagram.
OSPF To route, a router needs to do the following: Know the destination address Identify the sources it can learn from Discover possible.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
DrayTek VPN Solution. Outline What is VPN What does VPN Do Supported VPN Protocol How Many Tunnels does Vigor Support VPN Application Special VPN Application.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 9 Network Policy and Access Services in Windows Server 2008.
Chapter 8 PIX Firewall. Adaptive Security Algorithm (ASA)  Used by Cisco PIX Firewall  Keeps track of connections originating from the protected inside.
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Network Connectivity Options Currently offered by Wyless.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 12: Routing.
Objectives Configure routing in Windows Server 2008 Configure Network Address Translation 1.
EMEA Partners XTM Network Training
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Networks Warren Toomey. Available WAN Links.
1 Chapter 7: NAT in Internet and Intranet Designs Designs That Include NAT Essential NAT Design Concepts Data Protection in NAT Designs NAT Design Optimization.
Module 5: Configuring Access for Remote Clients and Networks.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
OSPF “Magic” Exercise We will use a “quick and dirty” configuration to make OSPF work with minimal configuration. DO NOT do this on your production network.
Module 8: Managing Terminal Services. Overview Use and manage Terminal Services RemoteApp programs Use and manage Terminal Services Gateway Optimize and.
Reliability (5.39 ‘ per year) Overview of reliability Outside Network Two different ISPs Two BGP Routers – each connected to their respective ISP.
Internet (THEnet ISP Gateway) Home PC Home Laptop Wireless AP/RouterVPN Concentrator Firewall Hub (running WireShark for Monitoring) Work Server Work PCs.
Networking Components Michelle Vega Network System Administrations LTEC /026 Mr. West.
1 Installing and Maintaining ISA Server Planning an ISA Server Deployment Understand the current network infrastructure. Review company security.
ISACA – Charlotte Chapter June 3, 2014 Mark Krawczyk, CISA, CISSP, CCNA.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Chapter 9: Implementing the Cisco Adaptive Security Appliance
Static Routes Static routing occurs when you manually add routes in each router's routing table.
DMZ Switch Inside Switch Data Router ISP- 2 Public Switch ISP -1 Public Switch Juniper Primary Juniper Secondary Core-1Core-2 Access Switch USER Voice.
Comparison of price, topology and architecture with Telekom Malaysia (TM) Topology And Architecture. Basically TM does not offer the same solution as offered.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
MPLS Virtual Private Networks (VPNs)
CSCI 465 Data Communications and Networks Lecture 26
Module 4: Configuring Site to Site VPN with Pre-shared keys
Virtual Private Networks
The Ethernet Cable CAT5 CAT6 Fiber Speed 10 ~ 100 Mbps 1000 Mbps
Virtual Private Network (VPN)
NETW 208 RANK The power of possibility/netw208rank.com
Switch Setup Connectivity to Other locations Via MPLS/LL etc
Planning and Troubleshooting Routing and Switching
Computer Data Security & Privacy
Reliability (5.39 ‘ per year)
Reliability (5.39 ‘ per year)
Server: ASA FW R1 WAN S0/0: R2 LAN: /24
VCE Questions Dumps -VceTests
Introducing To Networking
Virtual Private Network (VPN)
Server-to-Client Remote Access and DirectAccess
PPPoE Internet Point to Point Protocol over Ethernet
Virus 18/11/2018.
Firewalls Routers, Switches, Hubs VPNs
© 2006 ITT Educational Services Inc.
Virtual Private Networks and Network Address Translation
Networks Your Name Roll No To be continued.... 1/12/2019 Your Name.
Virtual Private Networks and Network Address Translation
Virtual LAN VLAN Trunking Protocol and Inter-VLAN Routing
Topic 12: Virtual Private Networks
Presentation transcript:

Configured as specific static route Intranet Router HQ Internet Router AS-IS 2M a.a.0.0/16 only ASA01 Configured as specific static route to connect HQ a.a.0.0/16 Branch Office Users. a.a.0.0/16 Branch Users are using the service via ‘Intranet Router’ to communicate HQ IDC server farm for their Job.

Configured as specific static route Intranet Router HQ Internet Router To BE HQ Default route Established new L2L tunnel only specific source 2M a.a.0.0/16 only Only b.b.0.0/16 need to pass this Tunnel ASA01 Configured as specific static route to connect HQ Branch Office Users. b.b.0.0/16  New networks are in placed. Recently, b.b.0.0/16 has been placed on branch office users. That network have to communicate HQ via new VPN tunnel not existing leased line since some reason Q. To archive above diagram, we need to configure PBR(policy-base-routing) at ASA. Does ASA support PBR? Q. If just established the L2L between HQ and BR, the traffic matched ACL pass via new VPN tunnel automatically?