Fabio Semperboni

Understanding Cisco DMVPN

In an old post, dated 2011, I explained various types of VPN technologies. In seven years several things have changed: SHA1 is deprecated, des...

Cisco Smart Install Remote Code Execution

At the end of March, Cisco published a stack-based buffer overflow vulnerability in Smart Install Client code. This vulnerability enables an attacker to remotely...

Cisco WebVPN critical bug. Patch it now!

Few days ago, Cisco published a critical advisor with a score of 10/10 about ASA and Firepower devices. The vulnerability known as CVE-2018-0101 and...

Cisco EIGRP named, a better approach

The Enhanced Interior Gateway Routing Protocol can be configured using either the classic mode or the named mode. The classic mode is the old...

WPA2 is no more secure

WPA2 (Wi-Fi Protected Access 2) is a network security technology commonly used on Wi-Fi wireless networks. It's an upgrade from the original WPA technology,...

The power of prefix lists

Prefix lists are used in route maps and route filtering operations and can be used as an alternative to access lists in many route...

How to install Cisco ISE using USB or CIMC interface

In one of my last job activities, the customer has requested to reinstall the Cisco ISE appliance (SNS-3495). The first option, a DVD reader,...

Cisco will fail after 18 months

Recently, Cisco published a critical advisory concerning a clock signal component problem. Devices that contain the faulty component could potentially fail after 18 months...

Cisco 2017 Annual Cybersecurity Report

Cisco published the annual Cybersecurity report that presents the latest security industry advances designed to help organizations and users defend against attacks. The report...

How to access network devices via Radius server

Suppose you manage hundreds of Cisco devices; how can you connect and secure it against unauthorized access? You can use local username, but it...