Cisco Remote Execution and Denial of Service Vulnerability

“A vulnerability in the Secure Sockets Layer (SSL) VPN functionality of the Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause a reload of the affected system or to remotely execute code.” (Cisco Security Advisories and Alerts) Read the full article HERE  

Meraki CDP and Cisco 550X, 500X Tale of Insanity:

Recently I was contacted by a good client of mine because their organization was having issues with their Meraki wireless after installing the Cisco 500X switches connected to Cisco 550X core.  When I asked him the details, it turned out that Cisco had already replaced his switches in an unsuccessful attempt to fix the problem […]

Step by Step Guide to Configuring the Nexus 3K Line

Since many of my customers have issues configuring the Cisco Nexus line, I thought to create a short configuration guideline that readers can follow to get their switches up and running quickly. Personally, I’m extremely impressed with their performance and value. I’m going to start with explaining the difference between stacked switches and the Nexus […]

Deploying 3CX with Cisco ASA Firewall

One of the common mistakes when installing a voice over IP (VoIP) system is the firewall configuration. Since VoIP systems depend on the Internet to send and receive calls, any misconfiguration will lead to one way audio and or complete loss of ability to either make or receive calls. In this example, I’m going to […]

MAC Address Limit on the Palo Alto 500 Firewalls

One of my clients recently suffered from continuous semi-outages with peculiar symptoms. As the number of people logging onto the internal network increased, new users were unable to access resources while existing users were completely unaffected. Initially, the two causes that came to mind were service policy limits and utilization on the data plane. I […]