Today, I am gonna dive into some easy build on BGP in GNS3.
[Read More]
Site-to-Site IPsec VPN
To establish an Ipsec tunnel, we use a protocol called IKE (Internet Key Exchange). There are two phases to build an IPsec tunnel.
[Read More]
Summary for Another Interview
router on a stick
It is been three days since I finished my last interview. In general, the interview is not bad, the topic goes deep into ccnp study. It has the real-time troubleshooting with the manager. He draw the scenario and gave me some questions and I needed to figure out where it...
[Read More]
UTM and Social Engineering
Before we jump into social engineering, I want to address the connection of TLS. We have DNS, TCP three-way handshake, and last we start the TLS session. It all begins with a hello from the client including the version of TLS and cipher suite. Then, server will respond with the...
[Read More]
Some Network Details You May Ignore
Cybersecurity Included
Recently, I have been staying home and studying for my interview. No matter how well I prepare, there are always something I don’t know. It is super frustrating and anywho, I decide to write it down to keep my memory fresh.
[Read More]