Author Archive: Philip Straatsma
Using Cisco’s NBAR2 to Rate Limit Streaming Media on Your ISR Router

What do Netflix, Windows Updates, YouTube, Facebook, Instagram, and the Apple App Store have in common? They are all major drains on your business’ internet connection. While the knee-jerk reaction is to simply ban any site that drains your bandwidth,…
Read more
Fix for – Login Denied , unauthorized connection mechanism , contact your administrator – Cisco AnyConnect

The following error is one of the more annoying errors I have received when setting up Dynamic Access Policies. “login denied your environment does not meet the access criteria defined by your administrator” If you’ve ever seen this error before…
Read more
HSRP With Two Routers and Two Diverse Internet Circuits

Redundancy is the name of the game when it comes to uptime in the computer networking field. We as networking professionals spend time tracking down our single points of failure and eliminating them one by one. However, one place we…
Read more
A Simple Fix for a Duplicate Remote Static IP

Have you ever had two devices on a remote network that have the same static IP address? Let’s be honest, the answer is yes, of course it is, it happens, no biggie, no one is judging you for how it…
Read more
SECURE ALL THE SWITCHES! Part 2: DHCP Snooping

Welcome to our new SECURE ALL THE SWITCHES! series. We will be covering in-depth countermeasures that you can deploy in your network to help defend against network switch pwnage. Part 2: DHCP Snooping The Attack: In our Network Takedown series…
Read more
SECURE ALL THE SWITCHES! Part 1: Port Security

In our past Network Takedown series we covered how to own a network using a switch’s default security configuration. In our new SECURE ALL THE SWITCHES! series we will be covering in-depth countermeasures that you can deploy in your network…
Read more
Heartbleed, Cisco Products and You.

By now most of you have heard of the Heartbleed software bug that was recently discovered in OpenSSL version 1.0.1 through 1.0.1f. If you have not, check out heartbleed.com, a site dedicated to information about the bug created by the…
Read more
Network Takedown Part 2: Rogue DHCP Server with DHCP Starvation and Rogue Routing

Welcome to part 2 of the Network Takedown series where we feature tutorials that take on the core functionality of a corporate network and bend them to our will. In this tutorial we will take down our network’s legitimate DHCP…
Read more
Network Takedown Part 1: CAM Table Overflow with Password Capture

Welcome to part 1 of our Network Takedown series. Today we will cover the CAM table overflow attack. A CAM table overflow works just as the name applies, by overflowing the limited amount of space in a switch’s CAM table…
Read more
How to use Ncat and 7-Zip Command Line Version to Easily Transfer Multiple Files and Folders from a Remote Windows Host.

Ncat is an updated version of Netcat often referred to as a “network swiss army knife” providing multiple useful functions on remote networks, one of which is file transfer from host to host. The file transfer feature in Ncat while…
Read more