In a previous blog I’ve written about the differences between Firepower Threat Defense and ASA software. And although the basic OS appears to be ASA with Snort set in between ASA ingress and egress, some basic concepts of the ASA (or actually the PIX) have dissappeared in FTD. And it will have an impact once you migrate from ASA (with or without firepower) to FTD devices.. Continue reading “FTD access policy behaviour”
Yesterday (5 sept) Cisco finally released Firepower Threat Defense 6.2.2 Now is a new update not always a big thing but this specific release had me waiting for quite some time. Key to this release is the support of remote access VPN (e.g. anyconnect) in the FTD image. So FTD was already available on ASA5500-X platform, but if you used anyconnect on your ASA, you just had to wait for this release. But what now is the difference between Firepower on ASA and FTD.. Continue reading “Firepower on ASA, Firepower Threat Defense, what is what?”
Green IT was one of the hot issues back in 2009 during the hype of server virtualization and the introduction of 10 Gig. During the Cisco Networks in 2009 (Barcelona) Cisco EnergyWise was then greatly pushed as an innovation and as a cornerstone for Smart Buildings and Green IT.
The principle thought behind the technology is that the network can also communicate with the endpoints connected to the network and that the network can ask / tell the endpoints to lower down the power consumption in order to reduce the power footprint of the environment. For example, at night time IP Phones in an office network don’t need to have full power, as nobody is working. So EnergyWise can power down the IP phones during the night.
Continue reading “My first steps with EnergyWise”
Cisco introduced Digital Network Architecture (DNA) last year as a new architecture for the digitialized agile world that is becoming a reality at a very fast pace. The DNA is built upon design principles such as security everywhere, automation (enabling centralized service management), virtualize everything, analytics and openness. Key to these design principles is that software is not only defining the datacenter (SDN), the WAN (SD-WAN) anymore but also the access layer. So it should be possible to deploy any service anywhere in your network, whether it’s in your Datacenter, the cloud or at the branch.
Continue reading “Cisco enables a mini (mini) cloud at the branch”
I recently ran across the following issue on a DMVPN Hub-Spoke network with some sites. The network was behaving perfectly fine and spokes were happily communicating with the servers behind the hub until windows 10 came along… Continue reading “Windows 10, Delivery Optimization, SSDP and blocking multicast”