Congratulations, you’ve purchased one of Cisco’s shiny new Next-Generation Firewalls. It’s going inspect more packets, push bits at blazing speed, and finally lockdown your disgraceful network. You’ve built your access control policy and added a ton of rules allowing traffic outside to your inside zone. Maybe you even took this…
-
-
We need to talk about GETVPN
We really have to talk about GETVPN. Despite its drawbacks, I can’t seem to get it out of my head now and I’m constantly running through scenarios where using it might make sense. If you’re not too familiar with GETVPN, let me offer this high-level summary of the technology. GETVPN…
-
Cisco Firepower Threat Defense (FTD) in GNS3 part 2
Video Only Post In this quick part two video, I cover some basic recommendations for organizing your access control policy and add a couple base rules in. I’ll also cover how we can create IPS policies, and apply them to access control entries, within our access control policy (ACP). As…
-
Windows Server in GNS3
*UPDATE* After tinkering around with Spice and QXL VGA driver, I’ve found that increases performance exponentially as well. Update highlighted below. How I get a Windows guest running smoothly in GNS3 using virtIO drivers, sysprep, and creating a linked base. This can be especially useful for testing FirePOWER services, integrating…
-
Cisco Firepower Threat Defense (FTD) in GNS3 part 1
If you’re like me, then the best way to learn something new is to get your hands dirty. Get some lab gear, boot devices up, and try different scenarios. This is as true (if not more) with Cisco’s Next-Generation Firewall, Firepower (FirePOWER?) Threat Defense. Lucky for us, at least those…