Content filtering blocks certain categories of websites based on organizational needs/policies. Here’s a quick walkthrough of how to set this up for Meraki MX devices: Step 1: On the Meraki...
Read More
If you find yourself needing to change the internal IP from the default 192.168.1.x network on a USG-Pro-4, it’s pretty easy by using the command line. Here’s a quick setup:...
Read More
Licensing: vSAN is licensed separately from ESXi and vCenter. You must obtain a separate license and decide which tier you need. More info here. For the most part, all you...
Read More
Troubleshooting SIP trunks and voice traffic requires being able to view traffic at many different points in the total path. Two of the main points to view and validate traffic...
Read More
Virtual Router Redundancy Protocols can use a function called tracking to follow (track) another portion of the configuration. Typically when I see this done it’s with the track being done...
Read More
Summary: If you use Windows domain authentication in Firepower Management Console, you could be affected by this vulnerability. Cisco announced on January 22nd that a vulnerability in the web-based management…
VRRP (Virtual Router Redundancy Protocol) is a First Hop Redundancy Protocol (yes they give this an acronym of FHRP). FHRPs are designed to allow for a highly available gateway (or...
Read More
Description: This document describes the process of building an OpenVPN server to facilitate secure remote access to systems. The installation utilizes the base ArchLinux build we posted a few weeks...
Read More
The guest OS function of the Cisco IR800 routers is a Linux server with a hypervisor-supported functionality where separate, light-weight applications can be loaded. This write up is intended to...
Read More
If you find your network growing and you need to start segmenting users based on physical locations, you may want to start using virtual networks, or VLANs. Here’s a quick...
Read More