KT S2 EP1 :: Deploying IBNS 2.0

In this video we take a look at what it takes to deploy IBNS 2.0 configurations for secure network access. Please refer to my previous post for a more detailed breakdown of IBNS 2.0: https://networkwizkid.co.uk/2019/05/25/demystifying-ibns-2-0-configuration/ https://youtu.be/EJ3cwmok28Q

Demystifying IBNS 2.0 Configuration

In this article I would like to go through a typical Identity Based Networking Services (IBNS 2.0) configuration, breaking down each so that we can better understand the configuration. While there are many configuration elements of secure network access, this…

CCIE Security v5 :: ICMP Redirects

Today I wanted to share my CCIE Security notes on ICMP redirect messages. ICMP Redirection is used to notify hosts that a better route is available for packets destined for a specific destination. This feature is available and enabled by…

Cisco :: Configure ASAv To Use Virtual Serial Ports

In this article, I will demonstrate how to configure the ASAv so that you use a virtual serial port. This article assumes that you have installed the virtual Cisco Adaptive Security Appliance using VMware workstation or it's equivalent and that you…

Cisco :: FXOS Authentication Using TACACS

In this article, I will describe how to enable authentication and authorization for Firepower eXtensible Operating System (FXOS) devices. The use case presented in this document illustrates how Cisco Identity Services Engine (ISE) can be utilised with attribute-value pairs (AV-Pairs)…

Cisco :: Configuring Smart License Software

In this article, I would like to demonstrate how to configure Cisco Smart Licensing on the virtual Cisco Adaptive Security Appliance (ASAv). This post assumes that readers already have access to there own Smart Account and would like to know…

CCIE Security v5 :: ASA Packet Processing Post 8.3 Code

In this article, I will share my notes on the ASA packet process for version 8.3+. Domain 1.0 off the CCIE Security version blueprint focuses on perimeter security and intrusion prevention, both of which include the ASA. In order to understand…

Cisco :: Configuring ASAv Active/Standby Failover

In this article, I will share the configurations used in the within the video below. The configurations enable one to configure Active/Standby ASA's with failover and redundant failover links. I have included the topology below as a reference.   ASAv1…

CCIE Security v5 :: Adding Remote FTD Device To The FMC

In this article, I wanted to demonstrate how we can add a Firepower Threat Defence appliance to an FMC located at another site. Let's take a fictitious scenario to provide some context to why and how we configure the FTD…