Cisco ISE: Adding Network Devices

In ISE, switches are referred to as a Network Access Device (NAD).  Other NAD devices include wireless LAN controllers and VPN concentrators.  NADs are responsible for enforcing ISE policies on devices connecting to the network with MAB authentication via RADIUS, as well as authorization of remote device administration over SSH via TACACS+. Before a switch …

Continue reading Cisco ISE: Adding Network Devices

SolarWinds Orion NPM: Configuring Cisco Hardware Health Pollers

While troubleshooting an issue with a 4506 switch recently, I discovered an interesting discrepancy: Orion was reporting a critical hardware issue on the switch, but the switch itself didn’t seem to have any idea that anything was wrong. The exact error I was seeing was that a supply voltage sensor for a fiber switchport interface …

Continue reading SolarWinds Orion NPM: Configuring Cisco Hardware Health Pollers

Cisco ISE 2.x: MAC Authentication Bypass (MAB)

MAC Authentication Bypass (MAB) is a method of network access authorization used for endpoints that cannot or are not configured to use 802.1x authentication.  MAB uses the hardware address (MAC address) of the device connecting to the network to authenticate onto the network. This hardware-based authentication happens when a device connects to a Network Access …

Continue reading Cisco ISE 2.x: MAC Authentication Bypass (MAB)

Wireshark Fundamentals: Setup and Configuration

Wireshark is an open-source tool which is used to perform packet capture and analysis for wired or wireless network traffic.  It can be intimidating to look at the first time you open a packet capture file (or pcap).  Hopefully this introduction will help smooth the sharp edges on learning this tool. I was first introduced …

Continue reading Wireshark Fundamentals: Setup and Configuration

Introduction to the Volatility Framework

Recently I was very fortunate to be able to attend not only the BSides Austin conference this past weekend, but the two training days immediately preceding it.  One of the training workshops I attended was Incident Response with Volatility Framework, taught by Evan Wagner.  If you ever have the opportunity to attend this training in …

Continue reading Introduction to the Volatility Framework