Application Programming Interfaces for Cisco Umbrella./introWe take for granted nowadays that a WEB-service will have an API to be explored, somehow. Countless are the business cases for doing it — including being able to integrate with other service...
According to the Verizon 2018 Data Breach Investigations Report, 81% of hacking-related incidents leverage stolen or weak passwords. When your workforce requires access to business-critical information residing on your corporate network and cloud, a VPN c...
On April 11, 2019, CERT/cc published a vulnerability note ( VU#192371) describing a vulnerability on how different VPN implementations store session cookies within system memory.
Cisco investigated this issue and determined Cisco AnyConnect is not vulner...
ACS to ISE Migration
ACS 5.x: TACACS+ Authentication and Command Authorization based on AD group membership Configuration Example - Cisco
ACS Shell Command Authorization Sets on IOS and ASA/PIX/FWSM Configuration Example - Cisco
ASA 8.3: TACACS Authe...
The Community is Not TAC
If you have an emergency network problem - Open a Case with the Cisco TAC!
While Cisco employees including members of its Technical Services teams may participate, the Cisco Community is not a replacement for TAC or other ...