I have to install a vendor workstation on our network that I would like to isolate from the rest of our WAN. The workstation does not need to connect to any of our systems and only needs to be able to make a vpn connection with the vendors equipment. In the past we have built vlans for these types of machines and then created access lists on the switch that only allows the workstation to access its vpn peer ip, but this doesn't seem as secure as it could be.
could a GRE tunnel between the router at the site and our edge router or something similar work better in this situation. I think ideally we could provide that workstation with a public ip at our edge so it couldn't see anything within our network.
Meet the Authors Event - A Cybersecurity Deep Dive with Omar Santos
(Live event – Thursday, January 23rd, 2020 at 10:00 a.m. Pacific / 1:00 p.m. Eastern / 7:00 p.m. Paris)
This event will have place on Thursday 23rd, January 2020 at 10hrs PDT
Posting this for anyone interested in using a Raspberry PI as a flow collector for Stealthwatch. We created a very lightweight version of our software. It can create flows if the eth port is attached to a SPAN or you can forward NetFlow/IPFIX ...
Dear Team Suppose we have hundreds of rules in access policy on cisco fmc device. Now I want to fetch all access policy rules in which I have mentioned some specific port number X. Can anyone help me with the process to fetch the same?
Greetings everyone, Happy New Year! I would like to thank you all for making our ISE demos in dCloud a great success!
The ISE instant demo has been in the top 5 of Enterprise demos for a long time now and recently just moved into the #1 and 2 slots...