The Cisco Kid and the Great Packet Roundup, part one
Knowing what your network is doing is central to the NSM doctrine, and the usual method of collecting NSM data is to attach a sensor of some kind to a tap or a span port on a switch. But what if you...
View ArticleThe Cisco Kid and the Great Packet Roundup, part two – session data
In part one, I covered how to use Cisco routers and firewalls to perform full packet capture. This exciting installment will cover how to get network session data out of these devices. Network session...
View ArticleCap’n Quagga’s Pirate Treasure Map
Avast, me hearties! When a swashbucklin’ pirate sights land whilst sailin’ uncharted waters, the first thing he be doin’ is makin’ a map. Ye can’t be burying ye treasure if ye don’t have a map, yarrr!...
View ArticleThe Case of the Great Router Robbery
Here’s another post I wrote for the InfoSec Institute. What are the consequences for an enterprise if one of their branch routers is stolen? Read the article here – comments welcome! Alec Waters is...
View ArticleA Tale of Two Routers
Take a look at the diagram below, showing two (Cisco) routers. HugeCorpCoreRouter is a mighty behemoth with a six figure price tag. It has redundant route processors, handles many gigabits per second...
View Article