IOS-XE Policy Based Routing
Policy-Based Routing (PBR) can be used to gain more precise control over how traffic flows through the networks. PBR allows organizations to direct specific types of traffic over a preferred…
Policy-Based Routing (PBR) can be used to gain more precise control over how traffic flows through the networks. PBR allows organizations to direct specific types of traffic over a preferred…
The ASA inspection engine is required for services that embed IP addressing information in the user data packet or open secondary channels on dynamically assigned ports. Application Inspection uses the…
The Cisco ASA firewall, Service Policies use the Modular Policy Framework (MPF) to provide a flexible way to configure ASA features, such as connection settings, inspection, QoS, redirection to service…
IKEv2 normally uses a single Diffie-Hellman (DH) key exchange during the IKE_SA_INIT phase to derive a shared secret between the VPN peers. Multiple Key Exchanges lets the peers perform more…
This post will cover the steps to configure a basic route-based VPN using a static Virtual Tunnel Interface (VTI) on a FortiGate Firewall using the CLI. VTI Configuration Configure the…
This post describes how to configure a Cisco Firepower Threat Defence (FTD) Firewall using local/on box management via Firepower Device Manager (FDM) for redundant/dual ISP connections, using the SLA Monitor…