Site-to-Site IPsec VPN

To establish an Ipsec tunnel, we use a protocol called IKE (Internet Key Exchange). There are two phases to build an IPsec tunnel. [Read More]

Summary for Another Interview

router on a stick

It is been three days since I finished my last interview. In general, the interview is not bad, the topic goes deep into ccnp study. It has the real-time troubleshooting with the manager. He draw the scenario and gave me some questions and I needed to figure out where it... [Read More]

UTM and Social Engineering

Before we jump into social engineering, I want to address the connection of TLS. We have DNS, TCP three-way handshake, and last we start the TLS session. It all begins with a hello from the client including the version of TLS and cipher suite. Then, server will respond with the... [Read More]