Although the GNS3 team makes a lot of effort to keep the appliances up to date,we certainly can’t guarantee that every supported network device’s every release will be included.
Today, I became a GNS3 Certified Associate (if it had a serial number, that would be Nr.1 😄)! The exam was great, covering most of the GNS3 features and networking in general:
I recently had to do some POC’s with many public cloud providers and I needed VPN tunnels between my environment and them.
The basic concept is the same but those pesky little details can cause headaches when someone’s trying to find a solution that works with all (or at least most) of the providers.
Being the first well-known network device virtualization software, Dynamips is widely used for network labs. In fact, it’s so fixed in people’s awareness that they still think GNS3 = Dynamips, which was the case with GNS3 version 0.
When I shoot up labs with FortiGate firewalls in my local environment, I usually connect port1 to the inside because it allows access (PING, HTTP(S), SSH, FMGR) by default; in other words all the other ports are protected with factory default settings.
At a first glance, the site to site VPN peer settings of VMware’s vCloud Director looks confusing; there’s no clear separation of the IPSec phases, some of the IKE parameters are missing, etc.