While mainly used for consumer stuff, expect to see it in your network. It uses link local multicast so gets flooded at L2.
While mainly used for consumer stuff, expect to see it in your network. It uses link local multicast so gets flooded at L2.
You need to understand the impact, probability, and triggers.
1. Find the risk.
2. Analyze it.
3. Develop a risk plan.
4. Mitigate.
Read more at www.linkedin.com/posts/daniel...
You need to understand the impact, probability, and triggers.
1. Find the risk.
2. Analyze it.
3. Develop a risk plan.
4. Mitigate.
Read more at www.linkedin.com/posts/daniel...
What are some of your favorite questions to ask when collecting business requirements? 🤔
What are some of your favorite questions to ask when collecting business requirements? 🤔
It all comes down to an event triggering, then based on matching different things in the classes, taking an action.
It will take time to put this together, but it will be unique content.
It all comes down to an event triggering, then based on matching different things in the classes, taking an action.
It will take time to put this together, but it will be unique content.
I am thankful for the opportunity to build an inclusive community with you all. I see you and appreciate you.
🙏
I am thankful for the opportunity to build an inclusive community with you all. I see you and appreciate you.
🙏
You can get this data from show logging process smd internal if you have the proper debugs enabled. I'm going to use this in my IBNS 2.0 post to show how you can see the flow of the policy.
You can get this data from show logging process smd internal if you have the proper debugs enabled. I'm going to use this in my IBNS 2.0 post to show how you can see the flow of the policy.
I'm now running my ISE lab and have a Win 10 WM successfully using EAP-TLS to authenticate.
I'm now running my ISE lab and have a Win 10 WM successfully using EAP-TLS to authenticate.
Great deal on his course right now.
www.practicalnetworking.net/announcement...
Great deal on his course right now.
www.practicalnetworking.net/announcement...
I'm writing several blog posts on IBNS, policy sets, etc., and I NEED to know how it all works. Then hopefully I can share what I learned with you all ☺️
I'm writing several blog posts on IBNS, policy sets, etc., and I NEED to know how it all works. Then hopefully I can share what I learned with you all ☺️
Some of the new features include smart annotations, support for FMC and FTDv, LDAP group support, and custom MAC addresses.
I'm going to see what's new with the Catalyst9000v, should be running 17.15 as opposed to 17.12 in earlier versions of CML.
Some of the new features include smart annotations, support for FMC and FTDv, LDAP group support, and custom MAC addresses.
I'm going to see what's new with the Catalyst9000v, should be running 17.15 as opposed to 17.12 in earlier versions of CML.
It's a super deep dive on everything you need to know to set it up, to verify, getting nerdy with packet captures, debugs ,and live logs.
Enjoy!
lostintransit.se/2024/11/20/t...
It's a super deep dive on everything you need to know to set it up, to verify, getting nerdy with packet captures, debugs ,and live logs.
Enjoy!
lostintransit.se/2024/11/20/t...
Here's how I responded to a Reddit user with some of my advice on combating it.
Here's how I responded to a Reddit user with some of my advice on combating it.
Happy reading!
lostintransit.se/2024/11/07/l...
Happy reading!
lostintransit.se/2024/11/07/l...
Let's say you run EAP-TLS for WiFi. Your RADIUS is SaaS. You'll likely see UDP fragments. What do you expect happen to your fragments as they traverse the interwebz?
Let's say you run EAP-TLS for WiFi. Your RADIUS is SaaS. You'll likely see UDP fragments. What do you expect happen to your fragments as they traverse the interwebz?