
How does certificate-based authentication work?
The subject that does not have to be scary, but there are a few misunderstandings. Here's a look at how certificate-based authentications actually works.

Securing the modern mobile OS
Researchers from the Talos intelligence group recently published some research about a malicious MDM server pwning some mobile devices. In this blog post, we discuss how these mobile endpoints leverage MDMs and how the mobile OS is...

Protecting iOS against the aLTEr attacks
The new aLTEr attack can be used against nearly all LTE connected endpoints by intercepting traffic and redirecting it to malicious websites. This article summarizes how the attack works, and suggests ways to protect yourself from it...

A first-hand account of Cisco Live 2018 in Orlando
The Cisco Live experience – from the perspective of a long-term attendee and speaker. A peak behind the curtain, learning Cisco technology, culture, education, beer and even kilts! See the options that are available to you through...
AMP and ThreatGrid Integration into Meraki UTMs
A fun overview of Cisco's AMP and Threat Grid technology, a little history, and a look into "Meraki-fying" the technology.

Cisco Rapid Threat Containment quickly detects, removes infected end points
Set up and use Cisco's Rapid Threat Containment with Cisco Firepower Management Center and Identity Services Engine to detect, remove infected end points.
Troubleshooting Cisco's ISE without TAC
Aaron Woland examines the top troubleshooting and serviceability features in Cisco's Identity Services Engine (ISE).

Triggered NetFlow — A Trick of the Trade
A deployment methodology for profiling difficult endpoints designed to enable NetFlow when needed, and disable when not.

How to use Anycast to provide high availability to a RADIUS server
A brilliant solution for providing high availability in a small RADIUS server/ISE deployment
Device administration with Cisco WLC
My experience with a deep dive into device administration AAA with Cisco Wireless LAN controllers and the SourceFire/Cisco FirePower Manager software.
10 cool things about ISE 2.0
Now that Cisco has Finally Released the Identity Service Engine 2.0 (ISE) it seems only appropriate to call out some of the BEST things about it.
AnyConnect Day 0 Support for Windows 10 and OSX El Capitan
A summary of what versions are needed. What needs to be uninstall and re-installed. Best practices to get AnyConnect support on Day-1 of Windows 10, and what to do BEFORE you upgrade.
Machine Authentication and User Authentication
I am often asked about Machine Authentications, how they differ from User Authentications, and how to authenticate both identities togethers.
Cisco ISE API for Certificate Provisioning
Here is a walk-through to write a script that leverages the certificate authorities RESTful API to generate certificate pairs.
Give me my Attribute mapping back for Sponsor Groups
Cisco ISE 1.3 introduced a completely re-written Guest solution that greatly simplifies the deployment and allows for high-levels of customization. Things have been simplified GREATLY, but unfortunately some of the power got lost at...
RADIUS versus TACACS+
An explanation and comparison of RADIUS and TACACS+ for Authentication, Authorization and Accounting (AAA).
Industry Standards for Secure Network Access
As someone who is passionate not only about innovation in security but also about the standardization of those innovations, I thought I'd point out a few of the recent efforts that I've either been involved in, or am just very...
MAB with Non-Cisco Switches
Blog describing MAC Authentication Bypass (MAB), and how to integrate Non-Cisco Switches with Cisco Identity Services Engine (ISE) for MAB.
A primer on support for 'Realm Stripping'
I am often asked about support for “Realm Stripping,” albeit mostly by those in the university space. It’s an interesting concept, certainly. The idea is that someone will issue an identity that includes some “routing” information...
Using the DogTag CA with ISE 1.2
Dog Tag is an Enterprise-class open source Certificate Authority that Red Hat purchased from AOL back in 2004. Red Hat opened it up to the open source community in 2008. Dog Tag supports all aspects of certificate lifecycle...