Skip to main content

CCIE Security Lab Emulation

Comments

  1. please send me link on parvez.ahmad54@gmail.com

    ReplyDelete
  2. Good video that provides CCIE Security Lab Emulation. Much understandable than any other. Thanks

    ReplyDelete
  3. Nice to hear, now as CCIE SEC is changed some more products added so u can email me if you interested in building CCIE SEcv4 lab on you pc

    thnks

    ReplyDelete
    Replies
    1. Hi Saju,

      I am currently preparing for my CCIE security, any advice on building a SECv4 lab on pc?

      Delete
  4. Great information provided. I appreciate your work.

    CCIE Security

    ReplyDelete

Post a Comment

Popular posts from this blog

Image Recovery Using ROMMON mode

If incase ASA system image is lost or got corrupted we can recover it by booting ASA in ROMMON mode and executing following commands please refer above mentioned diagram. Step 1: Make sure you have assigned the right IP address to the PC which has ASA system image and tftp installed. Step 2: Set the following parameters rommon #0> address 10.1.1.254 rommon #1 > server 10.1.1.1 rommon #2> interface GigabitEthernet0/0 GigabitEthernet0/1 MAC Address: 000f. f775.4b54 rommon #3> file asa801 -k8. bin Step 3: Verify your configured parameters in ROMON mode rommon #4> set ROMMON Variable Settings: ADDRESS=10.1.1.254 SERVER=10.1.1.1 PORT=GigabitEthernet0/0 VLAN=untagged IMAGE=asa801-k8. bin CONFIG= rommon #12> set ROMMON Variable Settings: ADDRESS=10.1.1.50 SERVER=10.1.1.1 ------- output omitted for brevity ----- rommon #13> unset ADDRESS ROMMON Variable Settings: ADDRESS=0.0.0.0 SERVER=10.1.1.1 GATEWAY=0.0.0.0 ------- output omitted f

Securing Routing updates (Routing Authentication)

Router ASA RIP v2 ! key chain RIP   key 1       key-string cisco ! router rip   version 2   network 136.1.0.0   network 150.1.0.0   no auto-summary ! interface FastEthernet0/0   ip address 136.1.121.1 255.255.255.0   ip rip authentication mode md5   ip rip authentication key-chain RIP end ! ! router rip   network 10.0.0.0   network 136.1.0.0   version 2   no auto-summary ! interface Ethernet0/1   description ** Inside   Interface **   nameif inside   security-level 100   ip address 136.1.121.12 255.255.255.0   rip authentication mode md5   rip authentication key <removed> key_id 1 OSPF v2 Simple ! router ospf 1   router-id 150.1.3.3   log-adjacency-changes   area 0 authentication   network 136.1.0.0 0.0.0.255 area 0   network 150.1.3.3 0.0.0.0 area 0 ! interface FastEthernet0/0   ip address 136.1.0.3 255.255.255.0   ip ospf authentication-key cisco end ! MD5-Hash ! interface FastEthernet0/0   ip address 136.1.124.4 255.255.255.0   ip ospf authentication message-digest   ip o