CCIE Security v5 :: ICMP Redirects

Today I wanted to share my CCIE Security notes on ICMP redirect messages. ICMP Redirection is used to notify hosts that a better route is available for packets destined for a specific destination. This feature is available and enabled by…

Cisco :: Configure ASAv To Use Virtual Serial Ports

In this article, I will demonstrate how to configure the ASAv so that you use a virtual serial port. This article assumes that you have installed the virtual Cisco Adaptive Security Appliance using VMware workstation or it's equivalent and that you…

Cisco :: FXOS Authentication Using TACACS

In this article, I will describe how to enable authentication and authorization for Firepower eXtensible Operating System (FXOS) devices. The use case presented in this document illustrates how Cisco Identity Services Engine (ISE) can be utilised with attribute-value pairs (AV-Pairs)…

Cisco :: Configuring Smart License Software

In this article, I would like to demonstrate how to configure Cisco Smart Licensing on the virtual Cisco Adaptive Security Appliance (ASAv). This post assumes that readers already have access to there own Smart Account and would like to know…

Cisco :: ISE 2.3 Device Administration using TACACS+

In this article, I will cover network device administration using TACACS+ on Cisco's Identity Services Engine. Accompanied with a video demonstration, I will also list the TACACS+ configuration required for Cisco's ASAv. Configure the Network Device/s In the video demonstration,…

Cisco :: Configuring ASAv Active/Standby Failover

In this article, I will share the configurations used in the within the video below. The configurations enable one to configure Active/Standby ASA's with failover and redundant failover links. I have included the topology below as a reference.   ASAv1…

CCIE Security v5 :: Adding Remote FTD Device To The FMC

In this article, I wanted to demonstrate how we can add a Firepower Threat Defence appliance to an FMC located at another site. Let's take a fictitious scenario to provide some context to why and how we configure the FTD…

Kali Linux :: CAM Table Overflow Attack Demonstration

As part of my on-going studying for the CCNA Security 210 – 260 certification I have been exploring different types of network attacks, one of which is CAM table overflow attacks. In this article I would like to share what…