Recently, Cisco published a critical advisory concerning a clock signal component problem. Devices that contain the faulty component could potentially fail after 18 months of use; once the component has failed, the system will stop functioning, will not boot, and is not recoverable. Cisco did not release specifics of the faulty clock part, but probably the component affected by this problem is the Intel’s Atom C2000 processor family that effectively bricks devices. There is no workaround for this issue, so the only solution is to replace products under warranty or covered by any valid services contract dated as of November 16, […]
Cisco published the annual Cybersecurity report that presents the latest security industry advances designed to help organizations and users defend against attacks. The report also highlights major findings from the Cisco 2017 Security Capabilities Benchmark Study, which examines the security posture of enterprises and their perceptions of their preparedness to defend against attacks.
Suppose you manage hundreds of Cisco devices; how can you connect and secure it against unauthorized access? You can use local username, but it isn’t scalable and granular, or use an AAA Server. In fact, the benefits of AAA are: Increased flexibility and control of access configuration. Scalability. Standardized authentication methods. Multiple backup system. Additionally, AAA provides a modular way of performing the following services:
The DDNS aka Dynamic DNS is an old feature that several routers (non only Cisco devices) have implemented and, in some circumstances, it is very useful. DDNS is a method of automatically updating a name server in the Domain Name System (DNS), often in real time, with the active DDNS configuration of its configured hostnames, addresses or other information. It provides two mechanisms to generate or perform DDNS: the IETF standard as defined by RFC 2136 and a generic HTTP using various DNS services. In a nutshell, when this feature can simplify our lifes? When we haven’t a static IP public […]
In the article vPC aka Virtual PortChannel, I explained how vPC works and the benefits that it gives. However, there is another important feature using HSRP/VRRP protocols in the context of vPC: the Layer2 dual–active peer devices. What does it mean? HSRP and VRRP operate in active-active mode from data plane standpoint, as opposed to classical active/standby implementation with STP based network. From a control plane standpoint, active-standby mode still applies for HSRP/VRRP in context of vPC. A characteristic of the active HSRP/VRRP peer device is that it is the only one to respond to ARP requests for HSRP/VRRP VIP […]
The vPC aka virtual Port Channel is a Cisco technology that presents both Nexus paired devices as a unique Layer 2 logical node to a third device. The third device can be a switch, server, or any other networking device that supports link aggregation technology. From a spanning tree standpoint, vPC eliminates STP blocked ports and uses all available uplink bandwidth. Spanning-Tree is used as a fail safe mechanism and does not dictate L2 path for vPC attached devices.
This is the first interview on Ciscozine and it is my pleasure and honor to introduce Anderson Mota Alves. With more 15 years of experience in the network consulting, he is a teacher in San Paulo university and have SEVEN CCIE!!! How do you combine study, work and personal life? During my study process combining these three things were one of the greatest difficulties I had to learn how to manage, because I had to spend so many hours of study after work and still save some time to attend to a few meetings with family and friends along the […]
In the last three months, I was involved in a project concerning the migration of the authentication system (dot1x) from Cisco ACS to Cisco ISE (1.4). At the end of this work, the account told me if it is possible to have a web interface with the active sessions, the devices authenticated via Dot1x and the devices authenticated via MAB. Reading the official guide, I found that Cisco ISE has embedded API. Cool! This what I needed!
In my opinion, one of the best Telnet/Serial/SSH client is SecureCRT, that provides rock-solid terminal emulation for computing professionals, raising productivity with advanced session management and a host of ways to save time and streamline repetitive tasks. I recently had the need to import a hundred devices in SecureCRT, but I didn’t know how to do it. Surfing the web, I found a helpful python script to import it via CSV! Three components are required: SecureCRT (obviously), the script and the CSV file.
Recently, Fireeye researchers have discovered a new type of malware implant in Cisco router that allows attackers to gain and keep access to these devices. The implant consists of a modified Cisco IOS image that allows the attacker to load different functional modules from the anonymity of the internet. The implant also provides unrestricted access using a secret backdoor password.
Enter your email address to receive notifications of new posts.