Category Archives: How-To

Procedures or processes to accomplish specific tasks or objectives with technology.

Traceroute through Firepower Threat Defense

Nearly eight years ago, I wrote an article about configuring the ASA to permit Traceroute and how to make the device show up in the output. That article is still relevant and gets quite a few hits every day. I … Continue reading

Posted in How-To | Tagged | Comments Off on Traceroute through Firepower Threat Defense

Connecting Postman to Firepower Management Center API

A few months back, I wrote an article about my Initial Observation on the Firepower FMC API. Today’s article takes this one step further with a step-to-step guide to connecting Postman to the FMC API. It is worth noting that this … Continue reading

Posted in How-To | Tagged , | Comments Off on Connecting Postman to Firepower Management Center API

Redirecting DNS Requests to Umbrella with ASA

As networks begin leveraging intelligent DNS products, there is often a need to do some magic at the Internet edge to redirect to the target provider. Some products actually have this capability embedded. Even though the ASA doesn’t specifically have … Continue reading

Posted in How-To | Tagged | Comments Off on Redirecting DNS Requests to Umbrella with ASA

Redirecting DNS Requests to Umbrella with FTD

A few days ago I shared an article that described redirecting DNS requests with ASA. A good use case for this might be if an organization is using Cisco Umbrella but there is no way to get every host is … Continue reading

Posted in How-To | Tagged | Comments Off on Redirecting DNS Requests to Umbrella with FTD

Validating SGT Inline with Netflow and Embedded Packet Capture

In the last article, Learning TrustSec, An Introduction to Inline Tagging, we took a quick look at manual configuration of SGT Inline Tagging in a manual configuration. We also performed some validation with show commands and proved the operation by enabling … Continue reading

Posted in How-To | Comments Off on Validating SGT Inline with Netflow and Embedded Packet Capture

Learning TrustSec – An Introduction to Inline Tagging

In my last article, Basic TrustSec – Implementing Manual SGTs and SGACLs, we talked about a basic TrustSec configuration. In that example, we shared the understanding of having two devices connected to a single switch and enforcing traffic policies via … Continue reading

Posted in How-To | 1 Comment