- RSS Channel Showcase 8913895
- RSS Channel Showcase 4566100
- RSS Channel Showcase 6670415
- RSS Channel Showcase 5443343
Articles on this Page
- 08/20/15--06:37: _Is static port chan...
- 08/31/15--11:56: _Cisco 2015 Midyear ...
- 09/17/15--14:50: _SYNful Knock – bac...
- 10/28/15--02:26: _SecureCRT: How to i...
- 02/01/16--12:49: _Using Cisco ISE API...
- 03/20/16--14:48: _Interview with Ande...
- 04/20/16--01:30: _vPC aka Virtual Por...
- 08/20/15--06:37: Is static port channel a good idea?
- 08/31/15--11:56: Cisco 2015 Midyear Security Report
- 09/17/15--14:50: SYNful Knock – backdoor in Cisco devices
- 10/28/15--02:26: SecureCRT: How to import sessions via CSV file
- 02/01/16--12:49: Using Cisco ISE API to write web interface
- 03/20/16--14:48: Interview with Anderson Mota Alves, 7x CCIE
- 04/20/16--01:30: vPC aka Virtual PortChannel
During my CCIE R&S studies (CCIE Routing and Switching v5.0 Official Cert Guide, Volume 1), I have discovered an unexpected behavior of the static port channel: a Layer2 loop! Obviously, in order for that happen, several things must happen. Suppose to have three switches: The Ciscozine-ROOT switch, as the word suggest, is the root bridge (priority 4096); the Ciscozine-ROOT_SEC is the “backup root bridge” (priority 8192), while the Ciscozine-SW has the default priority. Now suppose that: the ports on the Ciscozine-ROOT_SEC switch toward Ciscozine-SW have already been bundled in a Port-channel using mode on (without Pagp or Lacp protocol). the Ciscozine-SW has no yet configured […]
Like every year, Cisco has released the Midyear Security Report. This paper is written to understand how attackers are evolving their techniques to evade defenses, using stealthy tactics based on agility, speed, adaptation, and even destruction. New threat intelligence and trend analysis reveal how attackers use stealthy tactics based on agility, speed, adaptation, and even destruction. During this year, adversaries continue to innovate as they slip into networks undetected and evade security measures: Exploits of Adobe Flash vulnerabilities are increasing. They are regularly integrated into widely used exploit kits such as Angler and Nuclear. Operators of crimeware, like ransomware, are hiring and funding professional development […]
Recently, Fireeye researchers have discovered a new type of malware implant in Cisco router that allows attackers to gain and keep access to these devices. The implant consists of a modified Cisco IOS image that allows the attacker to load different functional modules from the anonymity of the internet. The implant also provides unrestricted access using a secret backdoor password. Each of the modules are enabled via the HTTP protocol (not HTTPS), using a specifically crafted TCP packets sent to the routers interface. The packets have a nonstandard sequence and corresponding acknowledgment numbers. The modules can manifest themselves as independent executable […]
In my opinion, one of the best Telnet/Serial/SSH client is SecureCRT, that provides rock-solid terminal emulation for computing professionals, raising productivity with advanced session management and a host of ways to save time and streamline repetitive tasks. I recently had the need to import a hundred devices in SecureCRT, but I didn’t know how to do it. Surfing the web, I found a helpful python script to import it via CSV! Three components are required: SecureCRT (obviously), the script and the CSV file. Step1 Create a CSV file with these fields: session_name: The name that should be used for the session. If this […]
In the last three months, I was involved in a project concerning the migration of the authentication system (dot1x) from Cisco ACS to Cisco ISE (1.4). At the end of this work, the account told me if it is possible to have a web interface with the active sessions, the devices authenticated via Dot1x and the devices authenticated via MAB. Reading the official guide, I found that Cisco ISE has embedded API. Cool! This what I needed! There are two different API: REST API: it allow you to gather session and node-specific information; for instance: session management, troubleshooting, change of authorization (CoA). External […]
This is the first interview on Ciscozine and it is my pleasure and honor to introduce Anderson Mota Alves. With more 15 years of experience in the network consulting, he is a teacher in San Paulo university and have SEVEN CCIE!!! How do you combine study, work and personal life? During my study process combining these three things were one of the greatest difficulties I had to learn how to manage, because I had to spend so many hours of study after work and still save some time to attend to a few meetings with family and friends along the […]
The vPC aka virtual Port Channel is a Cisco technology that presents both Nexus paired devices as a unique Layer 2 logical node to a third device. The third device can be a switch, server, or any other networking device that supports link aggregation technology. From a spanning tree standpoint, vPC eliminates STP blocked ports and uses all available uplink bandwidth. Spanning-Tree is used as a fail safe mechanism and does not dictate L2 path for vPC attached devices. First of all, it is required to understand all vPC components: vPC: The combined port-channel between the vPC peers […]