Why is it important to take a comprehensive approach to secure Internet interfaces, instead of focusing on one area, e.g. a firewall? In this article, we will take a shot at answering this question, showing potential Internet interfaces that can be critical in case of attack. You will learn what firewall network security is and […]
Recently i was asked to advise in the following scenario: VPN tunnel between AWS VPC and Cisco IOS routers on DC prem. Nothing sophisticated but: Two ISR 4k, HSRP VPN redundancy, legacy crypto maps in production (several working vpns) and Static VTI (AWS). Two Crypto structures sourced from one HSRP. I have put the results on blog.