Hello, We have a setup where currently a single workstation is configured with 2 project data vlans using the 801.x setup and is working perfectly without any problems or glitches, however here is the problem.I am transitioning both these proj...
Hi, I am trying to understand the basics and the working of websense/ironport and how it works on the network. I would be suggesting this to the client and would appreciate any information/white papers/documents which can help me provide some answ...
Hi Guys, I need your help in getting a resolution to the Natting problem mentioned below. I have a 10.x.x.x network in place(site A). Another partner who also houses a 10.x.x.x subnet(site B) needs to access a particular server...
Hi, If i have a vpn concentrator setup in the following manner...Internet |Router |VPN concentrator |Distribution Switcha) Will i be able to see the vpn concentrator ip when i tracert from the Distribution switch to the router ( assuming no acl's ...
Sir, I would like to understand the reason why the below commands are given.1. crypto ipsec transform-set Name esp-aes esp-sha-hmac Here we see that this particular transform set is followed by mulitple options of encryption/authentication pro...
Hello Prapanch, Thank you for your response. This clarifies things quite a bit. i do have a doubt here... If i have an ACL specifying IP traffic from the SIte A server's real IP (in the 10.x.x.x) range ...
I would also like to know if icmp traffic is classified as "interesting traffic" while being sent through a tunnel. ( assuming the icmp traffic is being generated from the pre approved source subnet )
Hi, You may want to try to do a packet capture from the paticular source ip 10.1.2.166 to the destination 169.254.196.189. THis way you will see what kind of traffic is being sent / received. once you know this you can analyze