This guide outlines the steps to integrate Cisco Identity Services Engine (ISE) with Palo Alto Networks firewalls using the RADIUS protocol. This integration supports two primary use cases:Administrat...
Hi All,Tried and tested to run pre and post checks for Cisco FTD over Linux Jump servers.Note: you would require 'ftd_prechecks.txt' with the CLI commands saved in the same folder as your code.#######...
Organizations are facing a fragmented landscape of risks (from adversarial attacks and supply chain compromise to harmful outputs and governance gaps). Cisco has recently published a few resources tha...
This Blog compiles essential information on topics that every Cisco ISE Administrator should know, such as: TLS, Localized Installation, DNS Server, Support Bundle, Data Connect, Log Analytics, SNS / ...
Anomaly identified in Cisco ISE Quick Filter when using OR vs or, which leads to an unexpected result.
An anomaly was identified in Cisco ISE Live Sessions when using Quick Filter with License Type = Premier, which leads to an incorrect result.
OK ... I need a memory refresh. It has been so long since we originally setup our ISE environment that I have forgotten a lot of things. This is specifically addressed to wireless connections but I al...
Can Security Rules Make AI Generated Code Safer?
What We Learned From 2,717 Prompts With Project CodeGuard
AI coding assistants are now a part of everyday development. They scaffold new services,...
I am extremely proud that Cisco is leading the charge with a remarkable suite of open source AI projects. These initiatives aren’t just research experiments; they’re production-ready tools that addres...
Summary:Proxy ARP is enabled by default on all ASA/Firepower interfaces, but it generally comes into effect only when NAT is configured. Under normal circumstances, when traffic flows between a source...
Implementing IPsec over DMVPN Phase-3 Tunnels
Introduction
Lab Topology
IPsec Configuration
Verification
Conclusion
Introducti...
DMVPN Phase 3 Implementation
Introduction
Lab topology
Phase 3 Tunnel Configuration
Routing Protocol (Eigrp)...
Building AI is one thing; securing it is another. While constructing powerful AI systems, the real challenge lies in anticipating how they might be attacked or exploited. That’s where AI red teaming s...
DMVPN Phase-2 Implementation
Introduction
Overlay Configuration
Routing Protocol Configuraton
Verification
Conclusion
Int...
Site-to-Site IPSec VPN with Overlapping Subnets
Introduction
The Problem
The Solution
Lab Example
Introduction
To configure a si...