Learning Topics
Latest Articles
Installing Custom Remediation Modules on FMC
In this video, I introduce a revolutionary concept: installing custom remediation modules on Cisco FMC for the first time. This game-changing approach enables you to extend your firewall's capabilities and tackle complex security challenges with ease. With this innovative application, you can dynamically respond to threats, integrate with tools like VirusTotal, and even customize solutions tailored to your organization's unique needs. From blocking malicious IPs to automating advanced remediation workflows, this module takes your firewall beyond traditional boundaries. Want to explore this solution? Download the application now from www.networkingwithehsan.com. If you have specific requirements, reach out, and I can help create a custom application for you. https://networkingwithehsan.com/site/... Don't miss the next video, where I'll share more case studies and advanced use cases. Let's unlock the full potential of FMC together!
Integrating Cisco ACI with RADIUS/TACACS with MFA Using Microsoft Entra ID (Azure AD)
In this comprehensive tutorial, I'll show you how to authenticate users by enforcing Multi-Factor Authentication (MFA) using Microsoft Azure (Entra ID). We'll explore various scenarios: Integrate Cisco ACI Fabric with RADIUS and TACACS using Cisco ISE. Remove Cisco ISE and integrate Cisco ACI with Network Policy Server (NPS) and Azure MFA Extension. You'll see all the detailed configurations from start to finish (verification). Whether you're enhancing your network security or streamlining authentication processes, this video has you covered. Let's get started!
Integrating Cisco ACI with Microsoft Using OAuth2: A Step-by-Step Guide
In this video, we dive into a practical setup of integrating Cisco ACI with Microsoft Azure AD using OAuth2 for secure access management. Instead of focusing on OAuth2 theory, we walk you through each configuration step needed to enable seamless authentication and role-based access control for Cisco ACI. From setting up the necessary parameters to testing our configuration in Postman, you’ll learn how to generate and validate tokens, configure the Certificate Authority, and manage Redirect URIs to ensure secure communication between Cisco ACI and Azure AD. Watch along as we decode the tokens, explore ID tokens for group and role claims, and get a hands-on look at making this integration happen in real time. If you find this content helpful, please give it a thumbs up, subscribe for more network solution videos, and drop any questions in the comments. Enjoy, and let’s secure those networks!
Cisco Secure Network Analytics(Stealthwatch): Migrating from Non-Datastore to Datastore Architecture
In this video, we dive into the key differences between non-datastore and datastore architectures in #cisco #SNA. Cisco Secure Network Analytics( formerly Stealthwatch) We walk through a step-by-step lab to show you how to migrate your setup from a non-datastore to a datastore deployment, enhancing your network's performance and security analytics.
How to Configure SNMP and NetFlow on Cisco SD-WAN
In this video, I will guide you through the steps to configure SNMP and NetFlow on Cisco SD-WAN. Learn how to set up and manage these essential monitoring tools to ensure optimal network performance and visibility. Whether you're a network administrator or an SD-WAN enthusiast, this tutorial will provide you with practical insights and hands-on instructions.
Resolving Music on Hold (MoH) Update Failures in Cisco CUCM: A Step-by-Step Guide
In this video, we tackle the common issue of Music on Hold (MoH) update failures in Cisco Unified Communications Manager (CUCM). Often, these failures are due to strict security policies on the operating system that prevent file modifications.