Blog

Moving Firepower Management Center: Dealing with Licensing Errors

Today I finally got around to re-configuring our Firepower Management Center (FMC) after we moved it from my companies data center to our head office (we were moving servers from a whole subnet over so we recreated the subnet here at the head office and moved the servers over like for like and without the … Continue reading Moving Firepower Management Center: Dealing with Licensing Errors

Redundancy in the Cloud: The need for well-designed applications

Both AWS and Azure sell the idea of inherent high-availability and scalability within their cloud services.  Many companies bought into that idea and dove head-first thinking that, once in the cloud, the provider will provide the redundancy natively. With the recent AWS S3 outage many customers learned the hard way that this is not the … Continue reading Redundancy in the Cloud: The need for well-designed applications

Deploying AMP for Endpoints

Recently I deployed Cisco’s AMP for Endpoints for a 50-user organization.  For the uninitiated, AMP for Endpoints is Cisco’s cloud based, enterprise grade, advanced malware protection software that is deployed to each end device in the network.  Each endpoint reports back to the central cloud controller and is managed by the controller.  Cisco integrated AMP … Continue reading Deploying AMP for Endpoints

2016 Brings New Additions to the Meraki Family

Cisco Meraki has been working hard to expand their portfolio of cloud controlled devices this year with VOIP phones and IP security cameras.  Customers who currently have a Meraki network will be glad to hear that both phones and security cameras are configured in the same dashboard we are all familiar with.  Both devices are … Continue reading 2016 Brings New Additions to the Meraki Family

Explanation of Access Control Lists

Currently I am working on a project where I am going through and optimizing a large set of Access Control Lists (ACL) on a set of 5585 Firewalls.  While going through these massive lists I have noticed a few mistakes other engineers have made while configuring these rules.  I figured I might as well write … Continue reading Explanation of Access Control Lists

Deploying Layer 3 Meraki Switches in Warm Spare

Being a Cisco Partner I get the joy of learning new technology in the Cisco family.  I was tasked to deploy a complete Meraki network with full redundancy at each layer of the campus.  Everything was going smoothly until it came time to deploy the two Meraki MS320's in warm spare mode. Before I tell … Continue reading Deploying Layer 3 Meraki Switches in Warm Spare

Upgrading Cisco Nexus Switches with Duel Homed FEXs

The Problem One issue I ran into a few months ago while at the customer site was upgrading Cisco Nexus 5500 series switches that had duel homed Nexus 2000 series FEXs.  For anyone who has looked into the process of upgrading Cisco's Nexus series switches you would find that there are two ways to do … Continue reading Upgrading Cisco Nexus Switches with Duel Homed FEXs