May 24, 2018

Tag Archives: ccie

Cisco ASA :: Object NAT

In this video demonstration, we take a look at Object NAT and how it can be used to map hosts statically.    

CCIE Security v5 :: TCP Interception

This article accompanies the demonstration video I have created below. TCP interception is a CCIE Security version 5 blueprint topic. What is TCP interception? TCP interception is a method used to protect against TCP SYN-flooding attacks. This is achieved by intercepting TCP connection requests (SYN packets) and verifying the connection before passing the original TCP SYN packet […]

CCIE Security v5 :: Adding Remote FTD Device To The FMC

In this article, I wanted to demonstrate how we can add a Firepower Threat Defence appliance to an FMC located at another site. Let’s take a fictitious scenario to provide some context to why and how we configure the FTD device the way we do. Scenario Currently Synack Corp has one Firepower Management Center (FMC) […]

CCIE Security v5 :: Adding Devices to FirePOWER Management Center (FMC)

This article is intended to cover some of the topics listed within the ‘Perimeter Security and Intrusion Prevention’ section of the CCIE Security v5 blueprint. This article focuses on configuring compatible devices to be managed by the FirePower Management Center (FMC). It is assumed that devices are already installed and you have access to the FMC […]

OSPFv3 Virtual Link Configuration

In this article, you find many use cases for OSPF virtual links when and how they are used. We will dive into OSPFv3 for this example. All areas in an OSPF autonomous system must be physically connected to the backbone area (area 0). In some cases where this physical connection is not possible, Virtual-Links are […]

CCIE Security v5 :: TrustSec Notes

Notes taken below are not exhaustive and can/will be updated if required. This is the first of many posts to come, where I share my CCIE Security v5 study notes. All posts are open for discussion, so feel free to add something you may have come across if related to the topic. What is TrustSec? IETF […]

CCIE :: Starting my CCIE Journey

I have been so busy over the last few months, I haven’t had much chance to post about certifications and my progress so I wanted to start by giving you a brief update. Over the last few months I have obtained my CCNA Security and more recently my CCNP Routing & Switching certification. It’s not been easy, […]

Demultiplexing And How It Works

In this article I will explain demultiplexing and how it works by walking through a .pcap file taken from the lab in the screenshot below. We will focus on the data flowing from PC1 and SW1 to R1’s ingress port. Demultiplexing (DEMUX) is the method in which the TCP/IP stack uses to determine if datagrams have […]

Subscribe to SYNACK via Email