The Cisco TAC Security Podcast Series is created by Cisco TAC engineers. Each episode provides an in-depth technical discussion of Cisco product security features, with emphasis on troubleshooting.
(Left to right) Blayne Dreier (on MAC), Jay Johnston, David White, Magnus Mortensen
Subscribe to the Podcast
Subscribe to the Podcast in iTunes by clicking the image below:
Alternatively, you can search within iTunes for Cisco TAC Security Podcast, and subscribe there. By subscribing, you will automatically receive future episodes when they are posted.
You can call +1 (424) 272-6877 to leave a voicemail for the TAC Security Podcast Team! Please leave us a message with your feedback about the show, and if you have a technical question that you would like us to discuss on the podcast, please leave a messages with your detailed question, a note saying we have permission to use your question and tell us how to pronounce your name.
We encourage you to listen and provide feedback on the episodes. We create these shows for you, and we want your feedback.
What future show topics would you like us to discuss? What do you like about the show, and how can we make it better?
Jay Johnston - CCIE No. 17663, has worked in the Cisco TAC for the last 6+ years, specializing in security technologies. He is on the TAC escalation team focusing on ASA, FWSM and IOS Firewall support and is a speaker at Cisco's yearly Cisco Live! conference.
Blayne Dreier - CCIE No. 19346, has been with Cisco for 6+ years, focusing on security technologies, and specializing in firewall and intrusion prevention systems. He is a member of the TAC escalation team and is actively engaged in the future direction of the IPS product.
Magnus Mortensen - CCIE No. 28219, has been with Cisco since June of 2006 and has been working with the Firewall ever since. He specializes in the full breadth of Firewall technologies.
Hello,I recently got a Firepower 1010 for my home lab and was testing the VLAN interface feature that I previously used on my old ASA 5505.I used my 5505 as a DHCP server on the Inside network and had the DHCP server enabled on my Inside VLAN interf...
Hello world ! Actually this is a pre-sales question, and I do not have previous experience with "Firepower's". :-) I'm preparing a solution for a client and include FPR-1K (all types, some 1010, some 1120 and a 1140) devices but checking-o...
Hi Experts,We've a requirement of rules to be allowed for penetration testing from Outside Public IP to scan all entire Internal networks on port 'any'.Typically, we've seen PAT from Inside to Outside, is there any configuration to be done to accomp...
Hi, I have question regarding Global Packet Inspection on a Cisco ASA.So, since by default all traffic from higher security Interface is allowed towards a lower security interface but NOT the other way around, traffic is inspected in>out to create...