How to add an ESA’s DKIM Signature to a DNS TXT Record

Hopefully, this post will help you save a lot of time when trying to add a DomainKeys Identified Mail (DKIM) signature to a Windows server. The motivation for this post is simply because I spent more than enough time trying…

Configuring D-VTI and S-VTI for Hub & Spoke Deployments

In this post, we're going to configure D-VTI and S-VTI between two CSR1000v routers to demonstrate hub and spoke deployments. The two devices used as shown in the topology below are R9 and R10. R9 will act as the hub…

Configuring IPSec Site-to-Site VPN’s using IOS-XE as a CA Server

In this post, we're going to configure an IPSec site-to-site VPN with two CSR1000v routers. The authentication between the two routers will be performed using digital certificates issued from a separate Cisco CSR1000v router which is acting as a CA…

ODBC & Cisco ISE Integration using Microsoft SQL Server for Streamlined Policy Management

In this article, I would like to walk through the process of integrating the Microsoft SQL server with the Cisco Identity Services Engine (ISE). This is a recent piece of work that I have been exploring and not one that…

Configuring Site-to-Site VPN for Firepower Threat Defense

In this article we will take a look at how to configure site-to-site virtual private networks (VPN) on Firepower Threat Defense (FTD) managed devices. Note: This demonstration assumes that managed devices are licensed appropriately.   In this demonstration, the site-to-site…