Latest Articles
  • July 1, 2025

    Secure Firewall – Network Discovery: Creating policies, Custom Fingerprinting, Custom Network Topology, and more

  • July 1, 2025

    Secure Firewall – URL Filtering

  • July 1, 2025

    Secure Firewall – High Availability

  • June 30, 2025

    Secure Firewall – Prefilter Policy

  • June 30, 2025

    Secure Firewall Device Administration – Part 4: Platform Settings, Multicast Routing, QoS, uRPF, and Fragmentation

  • June 28, 2025

    Secure Firewall Device Administration – Part 3: NAT

  • June 28, 2025

    Secure Firewall Device Administration – Part 2: OSPF, EIGRP, RIP, Static Routes, IPv6 Routing, and SLA Monitoring

  • June 26, 2025

    Secure Firewall – Transparent Mode

  • June 25, 2025

    Secure Firewall Device Administration – Part 1: Management, Interfaces, and BGP Configuration

  • June 23, 2025

    Secure Firewall Management Center Administration Part 1

  • June 23, 2025

    Secure Firewall Overview and Packet Flow

  • June 22, 2025

    ASA Clustering

  • June 22, 2025

    Understanding Security Contexts on Cisco ASA

  • June 22, 2025

    ASA Failover

  • June 22, 2025

    ASA Transparent Mode Firewall

  • June 22, 2025

    Modular Policy Framework (MPF) on ASA

  • June 21, 2025

    IPSec VPN on Cisco ASA

  • June 21, 2025

    Understanding Cut-Through Proxy (CTP) in Cisco ASA

  • June 21, 2025

    ASA: NAT Theory and Configuration

  • June 20, 2025

    Cisco ASA Basics: Part 2 – Packet Flow, DHCP, Fragmentation, Management, Monitoring, and Routing

  • June 20, 2025

    A Deep Dive into Cisco Secure Email Appliance: Part 1

  • June 20, 2025

    Understanding Cisco Secure Web Appliance: Part 1

  • June 20, 2025

    Just A Bunch of IOS Remote Access VPN Configuration Examples

  • June 19, 2025

    Configuring Remote Access VPN on Cisco ASA

  • June 19, 2025

    Understanding Remote Access VPNs

  • June 19, 2025

    Just A Bunch of FlexVPN Configuration Examples

  • June 18, 2025

    Deep Diving into IKEv2 & IPSec VPNs Troubleshooting: Protocols, Tools, and Debugging Techniques

  • June 18, 2025

    Monitoring IPsec VPNs: Tools, Protocols, and Best Practices

  • June 18, 2025

    VPN Deep Dive: IPSec Overhead and Fragmentation

  • June 18, 2025

    Diving Deep Deep Deep into FlexVPN – Part 5: FlexVPN Load Balancer

  • June 18, 2025

    Diving Deep Deep Deep into FlexVPN – Part 4: FlexVPN Client Operations

  • June 18, 2025

    Diving Deep Deep Deep into FlexVPN – Part 3: FlexVPN Server Operations

  • June 18, 2025

    Diving Deep Deep Deep into FlexVPN – Part 2: Configuring and Debugging FlexVPN

  • June 18, 2025

    Diving Deep Deep Deep into FlexVPN – Part 1

  • June 17, 2025

    OCSP and Certificate Mapping for Cisco Routers

  • June 17, 2025

    Understanding IKEv2: Enhancements Over ISAKMP and Why It Matters

  • June 17, 2025

    Understanding VPN Configuration Differences Between Cisco ASA and IOS Devices

  • June 17, 2025

    Verifying and Troubleshooting GETVPN

  • June 16, 2025

    Just A Bunch of GETVPN Configuration Examples

  • June 16, 2025

    Configuring GETVPN: Key Server and Group Member Setup

  • June 16, 2025

    Troubleshooting DMVPN: A Dive into ISAKMP, IPSec, and NHRP Issues

  • June 16, 2025

    Just A Bunch of DMVPN Configuration Examples

  • June 16, 2025

    FlexVPN Overview and IKEv2 Deep Dive

  • June 16, 2025

    Understanding GETVPN: Tunnel-less VPN for Private WANs

  • June 16, 2025

    Integrating PKI with DMVPN: Certificate-Based Authentication in Cisco IOS

  • June 16, 2025

    DMVPN Phase 3: The NHRP Redirect Revolution

  • June 16, 2025

    DMVPN Phase 2: Enabling Spoke-to-Spoke Communication

  • June 16, 2025

    DMVPN Phase 1: Hub-and-Spoke Architecture

  • June 16, 2025

    Understanding DMVPN and MGRE: A Practical Overview

  • June 16, 2025

    DMVPN Theory: Dynamic Multipoint VPN Theory & Architecture

  • June 16, 2025

    Troubleshooting Site-to-Site IKEv1 VPN Issues in Cisco IOS

  • June 15, 2025

    Just A Bunch of VPN Configuration Examples

  • June 14, 2025

    Understanding How PKI-Based VPN Works

  • June 14, 2025

    Fixing IPSec Tunnels with NAT Traversal (NAT-T)

  • June 14, 2025

    Simplifying Site-to-Site VPNs with Static Virtual Tunnel Interfaces (SVTI)

  • June 14, 2025

    Deep Diving into GRE Tunnels: Explanation, Configuration, and Optimization Tips

  • June 14, 2025

    VRF-Aware IPSec L2L VPN on Cisco IOS

  • June 14, 2025

    IPv6 VPNs on Cisco IOS: Considerations and Configuration with Certificate Authentication

  • June 14, 2025

    Deep Dive into IOS CA and Certificate-Based IPSec VPN Authentication

  • June 14, 2025

    Configuration Example: IPSec VPN Failover with HSRP and Redundancy

  • June 14, 2025

    Configuration Example: Configuring an IOS Router as a CA

  • June 14, 2025

    Configuration Example: Configuring IPSec LAN-to-LAN VPN

  • June 14, 2025

    Introduction to IPSec

  • June 13, 2025

    Introduction to ISAKMP

  • June 13, 2025

    Understanding IKEv1: Main Mode and Aggressive Mode Exchanges

  • June 13, 2025

    Understanding IKE: The Backbone of Secure VPN Negotiation

  • June 13, 2025

    Encryption Types, PKI, and IPSec Components

  • June 13, 2025

    VPN Theory Overview

  • June 13, 2025

    Cisco ASA Link Redundancy

  • June 13, 2025

    Cisco ASA Basics

  • November 24, 2024

    Installing the fancy UI Meshtastic image on the Lilygo T-Deck Plus

  • November 24, 2024

    Flashing the LilyGo T-Watch S3 with GhostESP

  • November 24, 2024

    Quick overview of the M5Stick

  • November 24, 2024

    Configuring and demoing Evil Portal on the Flipper Zero

  • September 18, 2024

    Old Video: BYOD Configuration

  • September 18, 2024

    Old Video: Switch Configuration

  • September 18, 2024

    Configuring MDM Integration with ISE

  • September 17, 2024

    Configuring Single-SSID BYOD Policy with ISE (Internal CA)

  • September 17, 2024

    Configuring Single-SSID BYOD Policy with ISE (External CA)

  • September 8, 2024

    Old blog post: ISE 2.0 – Understanding Policy and Configuring Dot1x

  • September 8, 2024

    Configuring an 802.1x Wired Policy using PEAP-MSCHAPv2 (No MAR)

  • September 8, 2024

    Configuring an 802.1x Wired Policy using PEAP-EAP-TLS

  • September 6, 2024

    Understanding Policy Logic in ISE

  • September 5, 2024

    Airespace Wireless Controller Configuration for ISE

  • September 5, 2024

    Catalyst 9800 WLC Configuration for ISE (FlexConnect)

  • September 5, 2024

    Catalyst 9800 WLC Configuration for ISE (Non-FlexConnect)

  • September 4, 2024

    Switch Configuration for ISE

  • September 3, 2024

    Adding Network Access Devices (NADs) in ISE

  • September 3, 2024

    Using Roles-Based Access Control (RBAC) and Active Directory to Manage ISE

  • September 3, 2024

    Patching and backing up ISE

  • September 3, 2024

    Enabling AI Endpoint Analytics in ISE

  • September 3, 2024

    Enabling and Configuring ISE Profiling Probes

  • September 3, 2024

    pxGrid 2.0 in ISE

  • September 2, 2024

    Enabling Services, Personas, and PassiveID on Identity Services Engine

  • September 2, 2024

    Creating Certificate Authentication Profiles in ISE

  • September 1, 2024

    Adding Certificates to ISE

  • September 1, 2024

    Old Video: ISE Initial Configuration

  • September 1, 2024

    Joining ISE to an Active Directory Domain

  • September 1, 2024

    Getting your hands on Identity Services Engine and installing it

  • September 1, 2024

    Old Video: Configuring the CA, DNS, Active Directory, GPO and DHCP

  • August 31, 2024

    Windows Server – ISE’s PassiveID Configuration

  • August 31, 2024

    Windows Server Group Policy Creation for PEAP MSCHAPv2

  • August 31, 2024

    Windows Server Group Policy Creation for PEAP EAP-TLS

  • August 31, 2024

    Configuring Certificate Templates with Active Directory Certificate Services

  • August 30, 2024

    Installing Windows Server

  • August 30, 2024

    Adding and Configuring Roles in Windows Server