Profile cover photo
Profile photo
Network Expert
Internetworking and Security Training Speciality Centre
Internetworking and Security Training Speciality Centre


Post has attachment
Cisco ASA Traffic Flow

Post has attachment
Understanding Bidirectional PIM
Bidirectional PIM (PIM-Bidir) is specified by the IETF in RFC 5015, Bidirectional Protocol Independent Multicast (BIDIR-PIM). It provides an alternative to other PIM modes, such as PIM sparse mode (PIM-SM), PIM dense mode (PIM-DM), and PIM source-specific multicast (SSM). In bidirectional PIM, multicast groups are carried across the network over bidirectional shared trees. This type of tree minimizes the amount of PIM routing state information that must be maintained, which is especially important in networks with numerous and dispersed senders and receivers.

To Read more visit:

CCIE Security ver 4 Rack Rental
Rs.2500/- per session (each session is of 6hrs)
List of Equipments:
-Cisco ASA 5512x-2nos
Cisco ASA 5510 2nos
-Cisco Routers-6nos
-Cisco Switch 3560-4nos
-Cisco Switch 3750-2nos
-Cisco ISE
-Cisco ACS 5.x
-Cisco WLC 2504
-Cisco LWAP
-Cisco WSA (Ironport)
-Test PC

Interested candidates please send email to

Configuring Cisco Router as CA Server

R1(config)#ip domain-name
R1(config)#crypto key generate rsa general-keys label netx exportable
R1(config)#crypto key export rsa netx pem url nvram: 3des netx123
!generate and export RSA keys

R1#show crypto key mypubkey rsa

R1(config)#ip http server
R1(config)#crypto pki server netxCA
R1(cs-server)#database url nvram:
!If this command is not specified, all database entries are written to Flash.
R1(cs-server)#database level <minimum | names | complete>
!Minimum: Enough information is stored only to continue issuing new certificates without
conflict; the default value.
!Names: In addition to the information given in the minimal level, the serial number and
subject name of each certificate.
!Complete: In addition to the information given in the minimal and names levels, each issued
certificate is written to the database.
R1(cs-server)#issuer-name L=Blr C=In
R1(cs-server)#lifetime ca-certificate 365
!default 3year
R1(cs-server)#lifetime certificate 200   
!default 1 year
R1(cs-server)#cdp-url R1(cs-server)#lifetime crl 24   
!default 1week
R1(cs-server)#grant auto
R1(cs-server)#no shutdown

R1# show crypto pki server

Configuring Anyconnect on ASA 8.2

crypto key generate rsa label sslvpnkeypair modulus 1024
crypto ca trustpoint localtrust
enrollment self
keypair sslvpnkeypair
crypto ca enroll localtrust noconfirm
ssl trust-point localtrust outside
copy tftp:// flash
svc image disk0:/anyconnect-win-2.0.0343-k9.pkg 1
enable outside
svc enable
ip local pool SSLClientPool mask
group-policy SSLCLientPolicy internal
group-policy SSLCLientPolicy attributes
dns-server value
vpn-tunnel-protocol svc
default-domain value
address-pools value SSLClientPool
sysopt connection permit-vpn
tunnel-group SSLClientProfile type remote-access
tunnel-group SSLClientProfile general-attributes
default-group-policy SSLCLientPolicy
tunnel-group SSLClientProfile webvpn-attributes
group-alias SSLVPNClient enable
tunnel-group-list enable
access-list no_nat extended permit ip host
nat (inside) 0 access-list no_nat

nat (inside) 1 0 0
global (outside) 1 interface
username netx password netx
username netx attributes
service-type remote-access

Post has attachment
Cisco Ironport WSA S170
2 Photos - View album

Post has attachment
CCIE Security Rack upgrade

Post has attachment
Cisco WLC

Post has attachment
Cisco LWAP

Post has attachment
Cisco ASA 5512X
Wait while more posts are being loaded