This document describes how to create TCL scripts to capture and execute Cisco IOS CLI commands. The example provided show how it is possible to add functionality to the CLI by allowing a simple "show... more
Do you need an on-demand fully-meshed (any-to-any) topology using IPsec in your network? And you want simplicity in configuration? Among various implementations of the IPsec the Cisco`s Group Encrypte... more
The legacy technologies such as leased lines or switched networks (Frame relay, ATM) have long been replaced by public Internet or MPLS. To secure the traffic between the Local Area Networks at remote... more
Site-to-site VPNs using IPsec can be implemented with the crypto maps or, when routed interface is needed, by GRE-tunnels. Virtual Tunnel Interfaces (VTIs) are a relatively late addition to Cisco IOS ... more
Crypto maps - used as one of the oldest Cisco IOS implementation options for IPsec – have a downside - they do not provide for a routable logical interface. When migrating from a traditional WAN or up... more
When designing a network solution, we often are faced with a myriad of parameters that influence the design process and the selection of the final solution. A network designer ideally would want to co... more