• Phase 2 issues – traffic stops but no errors logged in fortigate firewall
    ,

    Phase 2 issues – traffic stops but no errors logged in fortigate firewall

    If you are facing this kind of issue, you should use some cli command to fix issue- You need to first take the packet capture on the FGT side by using the sniffer as below: dia sniffer packet any ” host <DST IP> and icmp ” 4 0 l Can […]

  • Cisco AnyConnect VPN Troubleshooting

    Cisco AnyConnect VPN Troubleshooting

    Scenario 1- Unable to access the VPN website If you cannot access the VPN website https://vpn.techclick.in add itto your trusted sites.At the top of the page, select the “Tools” drop down list.Select “Internet Options”Click on the “Security” tab at the top of the menu box.Select the “Trusted sites” icon at […]

  • How to configure Site to Site VPN in checkpoint
    , ,

    How to configure Site to Site VPN in checkpoint

     How to configure Site to Site VPN in checkpoint – There are below steps to configure Site to Site VPN into Checkpoint – We are configuring Site to Site VPN on SITE A — Types of VPN terminologies —  1- Domains 2 – Member 3- Sites 4- Communities We can  follow […]

  • How to Configure IPSec VPN on Palo Alto Firewall
    , ,

    How to Configure IPSec VPN on Palo Alto Firewall

      How to Configure IPSec VPN on Palo Alto Firewall We need to configure below steps to configure S2S vpn into Paloalto –>> Tunnel Zone –>> Tunnel Interface –>> IKE Crypto (phase 1) –>> IPSec Crypto (phase 2) –>> IKE Gateway –>> IPSec Tunnel –>> Routes –>> Security Policy Zone […]

  • what is difference between route based VPN and Policy based VPN

    what is difference between route based VPN and Policy based VPN

      what is difference between route based VPN and Policy based VPN

  • Difference  betweenTunnel  Mode vs. Transport  Mode in VPN

    Difference betweenTunnel Mode vs. Transport Mode in VPN

    Difference between IPsec Tunnel Mode vs. Transport Mode Difference between IPsec Tunnel Mode vs. Transport Mode IPsec (Internet Protocol Security) is a suite of protocols used to secure communication over IP networks, such as the internet. IPsec can be implemented in two primary modes: Tunnel Mode and Transport Mode. These modes […]

  • VPN Interview Questions and Answers
    ,

    VPN Interview Questions and Answers

      What is IPsec? IPsec is a protocol that provides security for internet protocol communications. It can be used to encrypt data and to authenticate communications. IPsec can be used in a number of different ways, but is most commonly used in virtual private networks (VPNs) Can you explain how […]

  • SITE to SITE IPSEC VPN PHASE-1 And PHASE-2 Troubleshooting step
    , , ,

    SITE to SITE IPSEC VPN PHASE-1 And PHASE-2 Troubleshooting step

     Troubleshooting ———->>> Four most common issue we generally face — –> Phase 1 (ISAKMP) security associations fail  –> Phase 2 (IPsec) security associations fail –> VPN Tunnel is established, but not traffic passing through –> Intermittent vpn flapping and disconnection Phase-1 and Phase-2 configuration should be identical of both side […]

  • SITE to SITE IPSEC VPN PHASE-1 And PHASE-2 Troubleshooting step
    ,

    SITE to SITE IPSEC VPN PHASE-1 And PHASE-2 Troubleshooting step

     Troubleshooting ———->>> Four most common issue we generally face — –> Phase 1 (ISAKMP) security associations fail  –> Phase 2 (IPsec) security associations fail –> VPN Tunnel is established, but not traffic passing through –> Intermittent vpn flapping and disconnection Phase-1 and Phase-2 configuration should be identical of both side […]

Visit Our Store and Buy All document (F5, Zscaler, ASA, Paloalto, Checkpoint,Forescout, Cisco ISE etc) only in  1600RS, click here on store - Store

X
error: Content is protected !!