Archives
- August 2020 (1)
- October 2019 (2)
- September 2018 (1)
- June 2018 (1)
- April 2018 (3)
- January 2018 (2)
- December 2017 (3)
- August 2017 (2)
- July 2017 (1)
- February 2017 (1)
- January 2017 (5)
- September 2016 (2)
- January 2016 (1)
- November 2015 (1)
- September 2015 (2)
- October 2014 (1)
- April 2014 (1)
- March 2014 (2)
- December 2013 (1)
- November 2013 (1)
- October 2013 (3)
- September 2013 (2)
- July 2013 (3)
- May 2013 (2)
- March 2013 (2)
- February 2013 (2)
- January 2013 (1)
- December 2012 (5)
- November 2012 (5)
- October 2012 (4)
- September 2012 (3)
- August 2012 (7)
- July 2012 (8)
- June 2012 (2)
- May 2012 (2)
- April 2012 (4)
- March 2012 (1)
- January 2012 (1)
- December 2011 (1)
- November 2011 (1)
- October 2011 (2)
- September 2011 (1)
- August 2011 (3)
- July 2011 (4)
Tag Archives: security
Cisco ISR Router Any Connect with Front Door VRF and a Meraki Firewall
First, let me start by saying I love the Meraki networking stack. It is easy and efficient to deploy and customers love it. Occasionally, however, you find a key feature that Meraki won’t do. In this case, Any Connect client VPN. Continue reading
Posted in Networking, Security Tagged cisco, configuration, IOS, networking, security Leave a comment
Configure Cisco IOS 802.1x Supplicant
If you have an intermediate familiarity with Ethernet switching you are more than likely familiar with 802.1x port based authentication. With that assumption let’s assume your environment is locked down tight enough to the point where this security is enabled. Great! However, what if you needed to add another Cisco device to a client facing switch port? Not so great… How do you get the device to authenticate the same way as your PC does? Fortunately the IOS includes a supplicant for 802.1x that will allow us to authenticate just like a wired windows client! Let’s check out the config … Continue reading
IPv6 Access List Basics
Chances are that if you have worked with IPv4 on the IOS platform for any length of time you are familiar with the access list formats, both standard and extended. Assuming you know at least the basics of the addressing structure you should have no issue establishing similar ACLs for IPv6. Creating IPv6 ACLs The first considerations are that IPv6 ACLs have to be the “extended” format meaning the both the source and destinations have to be defined. The ACLs also have to be named with a string as numbered ACLs are not acceptable. The ACL name can contain numbers … Continue reading
Verifying Cisco IOS File Integrity
Moving files on Cisco devices is important to know how to do but knowing the files are free of errors is also important. If you have every upgraded a device and find that it won’t boot because the image file corrupted you certainly know what I’m talking about. While this happens very rarely it’s important none the less. Additionally, knowing that you got the IOS from Cisco without it being tampered with is also important from a security standpoint. First, jump onto Cisco.com and log in with your Cisco ID. Access the download section for a device you have support … Continue reading