Wednesday, January 31, 2018

VPN Techno Logies

VPN Technologies & Theory + Lab (Linux server + Win Client)


OpenVPN

High CPU usage and slower than IPSec. High Encryption Level / Can be combine with other proxies / Easy deployment via .ovpn files

IPSec

All trafic routed through encrypted tunnel / strong encryption / in case of spoofed Root-CA's > possible hijack of the connection / widely used in Cisco routers + Windows clients

 

SSH Reverse Tunneling

SSH v2 used for tunneling of encrypted traffic / can be used as reverse-ssh > proxy server is connecting to you / high encryption level / if using SSH > client can be used / every app has to be setup to use the tunnel!

SQUID-Proxy

As Socks5 can change your IP to the one of proxy server. But has also implemented encryption. Widely used, special software required.

SOCKS5 Proxy

Only IP forwarding without Encryption! Encryption has to be done externally. Quite high speed, widely supported. This is fast and easy possibility to change your IP address w/out slowing down traffic.

PPTP/L2TP

Considered weak. Do not use if possible

----------------------------------------------------

Pritunl Server

Wednesday, January 17, 2018

# Create & Follow the Implementation Plan
## Basic Planning Phases

### **Phase 1 : Necessary Information / Data**
- [ ] Accurate Network Diagram
- [ ] IP Address Diagram / Spreadsheet
- [ ] Configuration Commands
- [ ] Hardware Required
- [ ] Equipment List
- [ ] Link Utilization
- [ ] Timeline
- [ ] Relevant Contact information
  - [ ] consider Cisco TAC+Vice, LCON/LPOC and Remote Hands, Consultants, NOC, COE, Specialists

### **Phase 2: Implementation Plan**
- [ ] Identify devices and tasks (check list)
- [ ] List necessary software version
- [ ] List configuration
- [ ] Verification and testing

### **Phase 3: Documentation**
- [ ] Network diagram with necessary information
- [ ] Network Equipment
- [ ] Current configurations
- [ ] Known issues
- [ ] Network performance baseline
- [ ] Verification commands and results
- [ ] Monitoring and management utilities
- [ ] Photograps and Screencaps

- [x] Documentation must become who you are
- [x] Documentation is a depreciating asset
- [x] Use a checklist to verify all steps had been done