<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Malware/Ransomware Testing...Safe On Separate VLAN? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/malware-ransomware-testing-safe-on-separate-vlan/m-p/4445934#M1082779</link>
    <description>&lt;P&gt;as long it is a separate setup from the production network you are good with, different interface and different zone.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;make sure after testing, that the device can not connect to another Lan ? without proper investigation or wipe and build new before bringing to Live network.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 07 Aug 2021 21:47:24 GMT</pubDate>
    <dc:creator>balaji.bandi</dc:creator>
    <dc:date>2021-08-07T21:47:24Z</dc:date>
    <item>
      <title>Malware/Ransomware Testing...Safe On Separate VLAN?</title>
      <link>https://community.cisco.com/t5/network-security/malware-ransomware-testing-safe-on-separate-vlan/m-p/4445917#M1082778</link>
      <description>&lt;P&gt;I have an ESXi server connected to 1 physical interface on my firepower 1010 that has 2 VLANS.&lt;/P&gt;&lt;P&gt;I have my pentest/kali box on one VLAN and a nasty malware infected windows machine one the other VLAN.&lt;/P&gt;&lt;P&gt;I have set the access rules to only let traffic in the malware network but nothing comes out.&lt;/P&gt;&lt;P&gt;Is this setup safe.&amp;nbsp; I have other interfaces routed to other trusted networks on the firepower 1010 that I don't want to infect at all cost.&lt;/P&gt;</description>
      <pubDate>Sat, 07 Aug 2021 21:14:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/malware-ransomware-testing-safe-on-separate-vlan/m-p/4445917#M1082778</guid>
      <dc:creator>1timcisco</dc:creator>
      <dc:date>2021-08-07T21:14:45Z</dc:date>
    </item>
    <item>
      <title>Re: Malware/Ransomware Testing...Safe On Separate VLAN?</title>
      <link>https://community.cisco.com/t5/network-security/malware-ransomware-testing-safe-on-separate-vlan/m-p/4445934#M1082779</link>
      <description>&lt;P&gt;as long it is a separate setup from the production network you are good with, different interface and different zone.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;make sure after testing, that the device can not connect to another Lan ? without proper investigation or wipe and build new before bringing to Live network.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 07 Aug 2021 21:47:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/malware-ransomware-testing-safe-on-separate-vlan/m-p/4445934#M1082779</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2021-08-07T21:47:24Z</dc:date>
    </item>
    <item>
      <title>Re: Malware/Ransomware Testing...Safe On Separate VLAN?</title>
      <link>https://community.cisco.com/t5/network-security/malware-ransomware-testing-safe-on-separate-vlan/m-p/4446179#M1082787</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;is this a live production network?&lt;/P&gt;&lt;P&gt;it's not advisable to do any pen testing in a live network unless there's an explicit permission from your IT management.&lt;/P&gt;&lt;P&gt;it's better and safe to test on an isolated network or in a virtual lab environment.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Aug 2021 04:13:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/malware-ransomware-testing-safe-on-separate-vlan/m-p/4446179#M1082787</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2021-08-09T04:13:39Z</dc:date>
    </item>
  </channel>
</rss>

