<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Todd Lammle Official Blog - Todd Lammle, LLC</title>
	<atom:link href="http://www.lammle.com/blog/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.lammle.com/blog/</link>
	<description>Advanced Security Training</description>
	<lastBuildDate>Tue, 10 Dec 2024 21:45:29 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.lammle.com/wp-content/uploads/2019/07/cropped-lammle-icon-dkteal-1-32x32.png</url>
	<title>Todd Lammle Official Blog - Todd Lammle, LLC</title>
	<link>https://www.lammle.com/blog/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>*NEW* Designing and Implementing Enterprise Network Assurance (ENNA) 300-445</title>
		<link>https://www.lammle.com/post/new-designing-and-implementing-enterprise-network-assurance-enna-300-445/</link>
		
		<dc:creator><![CDATA[Todd Lammle]]></dc:creator>
		<pubDate>Thu, 25 Jan 2024 20:55:43 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://www.lammle.com/?p=191854</guid>

					<description><![CDATA[<p>Want more job security? Along with the CCNP Enterprise cert, the new Cisco ENNA certification might be just what you&#8217;ve been waiting for. The new ENNA specialist certification exam is...</p>
<p>The post <a href="https://www.lammle.com/post/new-designing-and-implementing-enterprise-network-assurance-enna-300-445/">*NEW* Designing and Implementing Enterprise Network Assurance (ENNA) 300-445</a> appeared first on <a href="https://www.lammle.com">Todd Lammle, LLC</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Want more job security? Along with the CCNP Enterprise cert, the new Cisco ENNA certification might be just what you&#8217;ve been waiting for. The new ENNA specialist certification exam is scheduled to launch at the end of May 2024</p>



<p>In networking, network assurance is the difference between having rules and knowing if they&#8217;re being followed. What is Network Assurance?This is how you check on your network traffic, make sure it&#8217;s going where it&#8217;s supposed to, and that all the devices on your network are playing by the rules you made for them.</p>



<p>Network assurance includes techniques, tools, and software that help you monitor your network traffic, manage and tweak devices, and configure special rules and protocols so that everything runs smoothly.</p>



<p>If you’re interested in learning about the ENNA exam, <a href="https://learningnetwork.cisco.com/s/enna-exam-topics?utm_campaign=ennablueprint&amp;utm_source=blog&amp;utm_medium=blog-enna">download the exam topic blueprint here.</a></p>



<h3 class="wp-block-heading"><strong>ThousandEyes and Network Assurance</strong>&nbsp;</h3>



<p>While the certification primarily focuses on network assurance for enterprise networks, ThousandEyes plays a crucial role in the exam. Candidates should demonstrate their ability to determine the right monitoring strategy, recognize appropriate monitoring techniques, and configure integrations for alerts, API, OTEL, and more. Mastering skills such as deploying the right agent, configuring tests, and analyzing collected data is essential for success in the field.</p>



<h2 class="wp-block-heading"><strong>Integration into CCNP Enterprise</strong>&nbsp;</h2>



<p>The ENNA specialist certification is now part of the CCNP Enterprise Professional-level certification. This integration recognizes the importance of network assurance as a pillar in the evolution of networking. The inclusion of ENNA in the CCNP Enterprise certification reflects the industry’s demand for specialized skills in enterprise networking.&nbsp;</p>



<h2 class="wp-block-heading">What is the Cisco ENNA Certification</h2>



<p>As enterprise networks continue to grow and become more complex and prone to hidden inefficiencies and waste, the need for a network assurance specialist certification became clear. Hiring IT staff with the ENNA Network Assurance Specialist certification will be a priority for organizations whose networks depend on digital experience monitoring, end-to-end visibility, proactive monitoring, and automation solutions. Large-scale networks have high performance, network security and usability expectations, and the ENNA is designed to prove that a network professional knows how to meet them.</p>



<p>You can earn Cisco&#8217;s enterprise network assurance specialist cert by passing the 300-445 ENNA test once it’s available in May 2024. The 300-445 will also become one of the eight concentration exams you can take to qualify for the CCNP Enterprise. </p>



<p>More info from Cisco: https://blogs.cisco.com/learning/meet-enna-the-new-cisco-enterprise-network-assurance-enna-specialist-certification</p>
<p>The post <a href="https://www.lammle.com/post/new-designing-and-implementing-enterprise-network-assurance-enna-300-445/">*NEW* Designing and Implementing Enterprise Network Assurance (ENNA) 300-445</a> appeared first on <a href="https://www.lammle.com">Todd Lammle, LLC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>FPR9300 and FPR4100 Series Security Appliances &#8211; Some Appliances Might Fail to Pass Traffic After 3.2 Years of Uptime</title>
		<link>https://www.lammle.com/post/fpr9300-and-fpr4100-series-security-appliances-some-appliances-might-fail-to-pass-traffic-after-3-2-years-of-uptime/</link>
		
		<dc:creator><![CDATA[Todd Lammle]]></dc:creator>
		<pubDate>Sun, 03 Dec 2023 15:26:55 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://www.lammle.com/?p=186442</guid>

					<description><![CDATA[<p>Field Notice: FN72077 &#8211; FPR9300 and FPR4100 Series Security Appliances &#8211; Some Appliances Might Fail to Pass Traffic After 3.2 Years of Uptime &#8211; Power Cycle Required &#8211; Software Upgrade...</p>
<p>The post <a href="https://www.lammle.com/post/fpr9300-and-fpr4100-series-security-appliances-some-appliances-might-fail-to-pass-traffic-after-3-2-years-of-uptime/">FPR9300 and FPR4100 Series Security Appliances &#8211; Some Appliances Might Fail to Pass Traffic After 3.2 Years of Uptime</a> appeared first on <a href="https://www.lammle.com">Todd Lammle, LLC</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><a href="http://www.cisco.com/c/en/us/support/docs/field-notices/720/fn72077.html?emailclick=CNSemail" target="_blank" rel="noreferrer noopener">Field Notice: FN72077 &#8211; FPR9300 and FPR4100 Series Security Appliances &#8211; Some Appliances Might Fail to Pass Traffic After 3.2 Years of Uptime &#8211; Power Cycle Required &#8211; Software Upgrade Recommended</a></p>



<p>Due to a flaw in solid-state drive (SSD) firmware, the SSD that is internal to the FPR9300 Supervisor module and FPR4100 Series security appliances will no longer respond after approximately 3.2 years of cumulative operation. After the first unresponsive event occurs, every subsequent power-cycle allows the SSD to operate for approximately six weeks of cumulative operation before the SSD will no longer respond again.</p>



<p>More information: http://www.cisco.com/c/en/us/support/docs/field-notices/720/fn72077.html?emailclick=CNSemail</p>



<figure class="wp-block-image size-full"><img fetchpriority="high" decoding="async" width="590" height="450" src="https://www.lammle.com/wp-content/uploads/2019/06/snort3.jpg" alt="" class="wp-image-50342" srcset="https://www.lammle.com/wp-content/uploads/2019/06/snort3.jpg 590w, https://www.lammle.com/wp-content/uploads/2019/06/snort3-100x76.jpg 100w" sizes="(max-width: 590px) 100vw, 590px" /></figure>
<p>The post <a href="https://www.lammle.com/post/fpr9300-and-fpr4100-series-security-appliances-some-appliances-might-fail-to-pass-traffic-after-3-2-years-of-uptime/">FPR9300 and FPR4100 Series Security Appliances &#8211; Some Appliances Might Fail to Pass Traffic After 3.2 Years of Uptime</a> appeared first on <a href="https://www.lammle.com">Todd Lammle, LLC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>cURL and libcurl Vulnerability Affecting Cisco Products: October 2023</title>
		<link>https://www.lammle.com/post/curl-and-libcurl-vulnerability-affecting-cisco-products-october-2023/</link>
		
		<dc:creator><![CDATA[Todd Lammle]]></dc:creator>
		<pubDate>Sat, 21 Oct 2023 21:34:52 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://www.lammle.com/?p=182892</guid>

					<description><![CDATA[<p>Security Advisories &#8211; Next-Generation Firewalls (NGFW) Title:HTTP/2 Rapid Reset Attack Affecting Cisco Products: October 2023 Impact:High Description:On October 10, 2023, the following HTTP/2 protocol-level weakness, which enables a novel distributed...</p>
<p>The post <a href="https://www.lammle.com/post/curl-and-libcurl-vulnerability-affecting-cisco-products-october-2023/">cURL and libcurl Vulnerability Affecting Cisco Products: October 2023</a> appeared first on <a href="https://www.lammle.com">Todd Lammle, LLC</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-table"><table><tbody><tr><td>Security Advisories &#8211; Next-Generation Firewalls (NGFW)</td></tr><tr><td>Title:<a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http2-reset-d8Kf32vZ?emailclick=CNSemail" target="_blank" rel="noreferrer noopener">HTTP/2 Rapid Reset Attack Affecting Cisco Products: October 2023</a> Impact:High <br><br>

Description:On October 10, 2023, the following HTTP/2 protocol-level weakness, which enables a novel distributed denial of service (DDoS) attack technique, was disclosed:CVE-2023-44487: HTTP/2 Rapid Reset&nbsp;For a description of this vulnerability, see the following publications:<a href="https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack" target="_blank" rel="noreferrer noopener"> 

How it works: The novel HTTP/2 ‘Rapid Reset’ DDoS attack</a>&nbsp;<br><br>(Google)<a href="https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/" target="_blank" rel="noreferrer noopener">HTTP/2 Zero-Day vulnerability results in record-breaking DDoS attacks</a><br><br>

(Cloudflare)<a href="https://aws.amazon.com/security/security-bulletins/AWS-2023-011/" target="_blank" rel="noreferrer noopener">CVE-2023-44487 &#8211; HTTP/2 Rapid Reset Attack</a>&nbsp;(AWS)This advisory will be updated as additional information becomes available.<br><br>

This advisory is available at the following link:<br><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http2-reset-d8Kf32vZ">https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http2-reset-d8Kf32vZ</a><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http2-reset-d8Kf32vZ?emailclick=CNSemail" target="_blank" rel="noreferrer noopener">Read more&#8230;</a>Date:20-Oct-2023&nbsp;Title:<a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-curl-libcurl-D9ds39cV?emailclick=CNSemail" target="_blank" rel="noreferrer noopener"> cURL and libcurl Vulnerability Affecting Cisco Products: October 2023</a>Impact:HighDescription:On October 11, 2023, cURL released Version 8.4.0 of the cURL utility and the libcurl library. <br><br>

This release addressed two security vulnerabilities:&nbsp;CVE-2023-38545 – High Security Impact Rating (SIR)CVE-2023-38546 – Low SIRThis advisory covers CVE-2023-38545 only. <br><br>

For more information about this vulnerability, see the&nbsp;<a href="https://curl.se/docs/CVE-2023-38545.html">cURL advisory</a>. 

This advisory is available at the following link:<br><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-curl-libcurl-D9ds39cV">https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-curl-libcurl-D9ds39cV</a></td></tr></tbody></table></figure>
<p>The post <a href="https://www.lammle.com/post/curl-and-libcurl-vulnerability-affecting-cisco-products-october-2023/">cURL and libcurl Vulnerability Affecting Cisco Products: October 2023</a> appeared first on <a href="https://www.lammle.com">Todd Lammle, LLC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>HTTP/2 Rapid Reset Attack Affecting Cisco Products: October 2023</title>
		<link>https://www.lammle.com/post/http-2-rapid-reset-attack-affecting-cisco-products-october-2023/</link>
		
		<dc:creator><![CDATA[Todd Lammle]]></dc:creator>
		<pubDate>Sat, 21 Oct 2023 21:27:50 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://www.lammle.com/?p=182886</guid>

					<description><![CDATA[<p>Impact:High Description:On October 10, 2023, the following HTTP/2 protocol-level weakness, which enables a novel distributed denial of service (DDoS) attack technique, was disclosed:CVE-2023-44487: HTTP/2 Rapid Reset&#160;For a description of this...</p>
<p>The post <a href="https://www.lammle.com/post/http-2-rapid-reset-attack-affecting-cisco-products-october-2023/">HTTP/2 Rapid Reset Attack Affecting Cisco Products: October 2023</a> appeared first on <a href="https://www.lammle.com">Todd Lammle, LLC</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-table"><table><tbody><tr><td>Impact:High<br><br>

Description:On October 10, 2023, the following HTTP/2 protocol-level weakness, which enables a novel distributed denial of service (DDoS) attack technique, was disclosed:CVE-2023-44487: HTTP/2 Rapid Reset&nbsp;For a description of this vulnerability, see the following publications:<a href="https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack" target="_blank" rel="noreferrer noopener">How it works: The novel HTTP/2 ‘Rapid Reset’ DDoS attack</a><br><br><br><br>(Google)<a href="https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/" target="_blank" rel="noreferrer noopener">HTTP/2 Zero-Day vulnerability results in record-breaking DDoS attacks</a><br><br>

(Cloudflare)<a href="https://aws.amazon.com/security/security-bulletins/AWS-2023-011/" target="_blank" rel="noreferrer noopener">CVE-2023-44487 &#8211; HTTP/2 Rapid Reset Attack</a>&nbsp;(AWS)This advisory will be updated as additional information becomes available.<br><br>

This advisory is available at the following link:<br><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http2-reset-d8Kf32vZ">https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http2-reset-d8Kf32vZ</a></td></tr></tbody></table></figure>
<p>The post <a href="https://www.lammle.com/post/http-2-rapid-reset-attack-affecting-cisco-products-october-2023/">HTTP/2 Rapid Reset Attack Affecting Cisco Products: October 2023</a> appeared first on <a href="https://www.lammle.com">Todd Lammle, LLC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>No CCNA Exam changes for 2023</title>
		<link>https://www.lammle.com/post/no-ccna-exam-changes-for-2023/</link>
					<comments>https://www.lammle.com/post/no-ccna-exam-changes-for-2023/#comments</comments>
		
		<dc:creator><![CDATA[Todd Lammle]]></dc:creator>
		<pubDate>Tue, 20 Jun 2023 17:31:18 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://www.lammle.com/?p=172400</guid>

					<description><![CDATA[<p>In a video posted on YouTube by renowned CCNA Educator David Bombal, Director of Cisco Certifications Yusuf Bhaiji announced that there will be no changes in the CCNA Exam for...</p>
<p>The post <a href="https://www.lammle.com/post/no-ccna-exam-changes-for-2023/">No CCNA Exam changes for 2023</a> appeared first on <a href="https://www.lammle.com">Todd Lammle, LLC</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>In a video posted on YouTube by renowned CCNA Educator David Bombal, Director of Cisco Certifications Yusuf Bhaiji announced that there will be no changes in the CCNA Exam for 2023. He did go on to say that changes will be made each year, but only minimal (cosmetic) changes.</p>



<p>You can view the full video here &#8211; <br><a href="https://youtu.be/10WfQNCu4Q4 ">https://youtu.be/10WfQNCu4Q4 </a></p>
<p>The post <a href="https://www.lammle.com/post/no-ccna-exam-changes-for-2023/">No CCNA Exam changes for 2023</a> appeared first on <a href="https://www.lammle.com">Todd Lammle, LLC</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.lammle.com/post/no-ccna-exam-changes-for-2023/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>Field Notice: FN &#8211; 72468 &#8211; ASA and Firepower Software: Some Applications Might Cause Traceback and Reload on Cisco Secure Firewall 2100 Series Security Appliances &#8211; Software Upgrade Recommended</title>
		<link>https://www.lammle.com/post/field-notice-fn-72468-asa-and-firepower-software-some-applications-might-cause-traceback-and-reload-on-cisco-secure-firewall-2100-series-security-appliances-software-upgrade-recommended/</link>
		
		<dc:creator><![CDATA[Todd Lammle]]></dc:creator>
		<pubDate>Fri, 02 Jun 2023 15:09:08 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://www.lammle.com/?p=170346</guid>

					<description><![CDATA[<p>Problem DescriptionSome versions of Adaptive Security Appliance (ASA) and Firepower software might cause a traceback and reload condition for the Cisco Secure Firewall 2100 Series security appliances. BackgroundA traceback and...</p>
<p>The post <a href="https://www.lammle.com/post/field-notice-fn-72468-asa-and-firepower-software-some-applications-might-cause-traceback-and-reload-on-cisco-secure-firewall-2100-series-security-appliances-software-upgrade-recommended/">Field Notice: FN &#8211; 72468 &#8211; ASA and Firepower Software: Some Applications Might Cause Traceback and Reload on Cisco Secure Firewall 2100 Series Security Appliances &#8211; Software Upgrade Recommended</a> appeared first on <a href="https://www.lammle.com">Todd Lammle, LLC</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong>Problem Description</strong><br>Some versions of Adaptive Security Appliance (ASA) and Firepower software might cause a traceback and reload condition for the Cisco Secure Firewall 2100 Series security appliances.</p>



<p><strong>Background</strong><br>A traceback and reload condition for the Cisco Secure Firewall 2100 Series security appliances might occur for applications that use the App-Cache process. The traceback and reload condition is due to a memory management issue that might occur for these applications.</p>



<p>In order to display a summary of applications that use the App-Cache process, enter the CLI command show memory app-cache. See the Cisco Secure Firewall ASA Series Command Reference or the Cisco Secure Firewall Threat Defense Command Reference for additional information.</p>



<p><strong>Problem Symptom</strong><br>The Cisco Secure Firewall 2100 Series security appliance reloads and indicates thread name &#8216;lina&#8217; as the faulting thread.</p>



<p>This advisory can be found at the following link:<br><a href="https://www.cisco.com/c/en/us/support/docs/field-notices/724/fn72468.html">https://www.cisco.com/c/en/us/support/docs/field-notices/724/fn72468.html</a></p>
<p>The post <a href="https://www.lammle.com/post/field-notice-fn-72468-asa-and-firepower-software-some-applications-might-cause-traceback-and-reload-on-cisco-secure-firewall-2100-series-security-appliances-software-upgrade-recommended/">Field Notice: FN &#8211; 72468 &#8211; ASA and Firepower Software: Some Applications Might Cause Traceback and Reload on Cisco Secure Firewall 2100 Series Security Appliances &#8211; Software Upgrade Recommended</a> appeared first on <a href="https://www.lammle.com">Todd Lammle, LLC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cisco FXOS Software and UCS Manager Software Configuration Backup Static Key Vulnerability</title>
		<link>https://www.lammle.com/post/cisco-fxos-software-and-ucs-manager-software-configuration-backup-static-key-vulnerability/</link>
		
		<dc:creator><![CDATA[Todd Lammle]]></dc:creator>
		<pubDate>Tue, 30 May 2023 11:40:32 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://www.lammle.com/?p=170229</guid>

					<description><![CDATA[<p>SummaryA vulnerability in the backup configuration feature of Cisco UCS Manager Software and in the configuration export feature of Cisco FXOS Software could allow an unauthenticated attacker with access to...</p>
<p>The post <a href="https://www.lammle.com/post/cisco-fxos-software-and-ucs-manager-software-configuration-backup-static-key-vulnerability/">Cisco FXOS Software and UCS Manager Software Configuration Backup Static Key Vulnerability</a> appeared first on <a href="https://www.lammle.com">Todd Lammle, LLC</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong>Summary</strong><br>A vulnerability in the backup configuration feature of Cisco UCS Manager Software and in the configuration export feature of Cisco FXOS Software could allow an unauthenticated attacker with access to a backup file to decrypt sensitive information stored in the full state and configuration backup files.</p>



<p>This vulnerability is due to a weakness in the encryption method used for the backup function. An attacker could exploit this vulnerability by leveraging a static key used for the backup configuration feature. A successful exploit could allow the attacker to decrypt sensitive information that is stored in full state and configuration backup files, such as local user credentials, authentication server passwords, Simple Network Management Protocol (SNMP) community names, and other credentials.</p>



<p>This advisory can be found at the following link:<br><a href="https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-ucsm-bkpsky-H8FCQgsA.html">https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-ucsm-bkpsky-H8FCQgsA.html</a></p>
<p>The post <a href="https://www.lammle.com/post/cisco-fxos-software-and-ucs-manager-software-configuration-backup-static-key-vulnerability/">Cisco FXOS Software and UCS Manager Software Configuration Backup Static Key Vulnerability</a> appeared first on <a href="https://www.lammle.com">Todd Lammle, LLC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Field Notice: FN &#8211; 72466 &#8211; Identity Services Engine – Passive ID WMI Provider Fails After Windows Server KB500442 Installation &#8211; Configuration Change Recommended</title>
		<link>https://www.lammle.com/post/field-notice-fn-72466-identity-services-engine-passive-id-wmi-provider-fails-after-windows-server-kb500442-installation-configuration-change-recommended-2/</link>
		
		<dc:creator><![CDATA[Todd Lammle]]></dc:creator>
		<pubDate>Fri, 26 May 2023 17:17:32 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://www.lammle.com/?p=170130</guid>

					<description><![CDATA[<p>Problem DescriptionCisco Identity Services Engine (ISE) Passive Identity (Passive ID) services that use the Windows Management Instrumentation (WMI) provider will fail after Windows Server KB500442 or later is installed. BackgroundThe...</p>
<p>The post <a href="https://www.lammle.com/post/field-notice-fn-72466-identity-services-engine-passive-id-wmi-provider-fails-after-windows-server-kb500442-installation-configuration-change-recommended-2/">Field Notice: FN &#8211; 72466 &#8211; Identity Services Engine – Passive ID WMI Provider Fails After Windows Server KB500442 Installation &#8211; Configuration Change Recommended</a> appeared first on <a href="https://www.lammle.com">Todd Lammle, LLC</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong>Problem Description</strong><br>Cisco Identity Services Engine (ISE) Passive Identity (Passive ID) services that use the Windows Management Instrumentation (WMI) provider will fail after Windows Server KB500442 or later is installed.</p>



<p><strong>Background</strong><br>The Distributed Component Object Model (DCOM) Remote Protocol is a protocol that is used in communication between the ISE Primary Passive ID node and the Domain Controller that shares the authentication events with ISE. Hardening changes in DCOM through Windows Server KB500442 or later were required to address vulnerability CVE-2021-26414. After the vulnerability is fixed, ISE will lack permissions to fetch the specific Kerberos events that are necessary for Passive ID services when the WMI provider is used.</p>



<p><strong>Problem Symptom</strong><br>After any Windows Server update that contains the fix for CVE-2021-26414 is installed, Passive ID services that use the WMI provider will fail. The domain controller side will display an error message similar to this:</p>



<p><em>Next error: “The server-side authentication level policy does not allow the user DOMAIN\username SID (S-X-X-X-X-X-X-X) from address xxx.xxx.xxx.xxx to activate DCOM server. Please raise the activation authentication level at least to RPC_C_AUTHN_LEVEL_PKT_INTEGRITY in client application”</em></p>



<p>This advisory can be found at the following link:<br><a href="https://www.cisco.com/c/en/us/support/docs/field-notices/724/fn72466.html">https://www.cisco.com/c/en/us/support/docs/field-notices/724/fn72466.html</a></p>
<p>The post <a href="https://www.lammle.com/post/field-notice-fn-72466-identity-services-engine-passive-id-wmi-provider-fails-after-windows-server-kb500442-installation-configuration-change-recommended-2/">Field Notice: FN &#8211; 72466 &#8211; Identity Services Engine – Passive ID WMI Provider Fails After Windows Server KB500442 Installation &#8211; Configuration Change Recommended</a> appeared first on <a href="https://www.lammle.com">Todd Lammle, LLC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>High performance connectivity on your next flight</title>
		<link>https://www.lammle.com/post/high-performance-connectivity-on-your-next-flight/</link>
		
		<dc:creator><![CDATA[Todd Lammle]]></dc:creator>
		<pubDate>Wed, 24 May 2023 11:44:58 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://www.lammle.com/?p=170045</guid>

					<description><![CDATA[<p>Cisco works together with KID-Systeme and Airbus to bring digital solutions such as USB power and wi-fi to the aircraft cabin. Cisco has been working with these two for almost...</p>
<p>The post <a href="https://www.lammle.com/post/high-performance-connectivity-on-your-next-flight/">High performance connectivity on your next flight</a> appeared first on <a href="https://www.lammle.com">Todd Lammle, LLC</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Cisco works together with KID-Systeme and Airbus to bring digital solutions such as USB power and wi-fi to the aircraft cabin. Cisco has been working with these two for almost 20 years to keep devices connected at 30,000 feet.</p>



<p>Cisco spoke with Martin Schirrmacher regarding these challenges and how Cisco technology uses these devices connected securely.</p>



<p>Read the full article here –<br><a href="https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2023/m02/you-are-now-free-to-roam-devices connectedabout-the-cabin.html">https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2023/m02/you-are-now-free-to-roam-devices connectedabout-the-cabin.html</a></p>
<p>The post <a href="https://www.lammle.com/post/high-performance-connectivity-on-your-next-flight/">High performance connectivity on your next flight</a> appeared first on <a href="https://www.lammle.com">Todd Lammle, LLC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Field Notice: FN &#8211; 72511 &#8211; RSA Keys Less Than 2048 Bits Are Not Supported for SSH in Cisco IOS XE Release 17.11.1 and Later &#8211; Workaround Provided</title>
		<link>https://www.lammle.com/post/field-notice-fn-72511-rsa-keys-less-than-2048-bits-are-not-supported-for-ssh-in-cisco-ios-xe-release-17-11-1-and-later-workaround-provided/</link>
		
		<dc:creator><![CDATA[Todd Lammle]]></dc:creator>
		<pubDate>Fri, 19 May 2023 11:17:00 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://www.lammle.com/?p=169862</guid>

					<description><![CDATA[<p>Problem Description In releases earlier than Cisco IOS XE Release 17.11.1, RSA keys less than 2048 bits can be used for the SSH server on the device. In Cisco IOS...</p>
<p>The post <a href="https://www.lammle.com/post/field-notice-fn-72511-rsa-keys-less-than-2048-bits-are-not-supported-for-ssh-in-cisco-ios-xe-release-17-11-1-and-later-workaround-provided/">Field Notice: FN &#8211; 72511 &#8211; RSA Keys Less Than 2048 Bits Are Not Supported for SSH in Cisco IOS XE Release 17.11.1 and Later &#8211; Workaround Provided</a> appeared first on <a href="https://www.lammle.com">Todd Lammle, LLC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Problem Description</strong><br />
In releases earlier than Cisco IOS XE Release 17.11.1, RSA keys less than 2048 bits can be used for the SSH server on the device.</p>
<p>In Cisco IOS XE Release 17.11.1 and later, RSA keys less than 2048 bits are denied for use with SSH by default due to its weak cryptographic properties. Cisco recommends to use stronger RSA keys that are at least 2048 bits. In order to continue to use RSA keys less than 2048 bits for SSH, explicit configuration is required. Without such a configuration change, SSH service on the device is disabled and SSH sessions to the device will fail. This results in loss of remote access to the device through SSH.</p>
<p><strong>Background</strong><br />
In Cisco IOS XE Release Bengaluru 17.6.1 and later, configuration of RSA keys less than 2048 bits for SSH generates a warning about a RSA key size compliance violation, but it does not impact SSH operations to the device. This warning message is displayed when a weak RSA key pair is used for SSH.</p>
<pre>%SSH-5-SSH_COMPLIANCE_VIOLATION_RSA_KEY_SIZE: SSH RSA Key Size compliance violation detected. Kindly note that the usage of keys smaller than 2048 bits will be deprecated in the upcoming releases. Please revise your key configuration accordingly to avoid service impact.</pre>
<p>In Cisco IOS XE Release 17.11.1 and later, RSA keys less than 2048 bits are denied by default and require explicit configuration to be allowed.</p>
<p>This advisory can be found at the following link:<br />
<a href="https://www.cisco.com/c/en/us/support/docs/field-notices/725/fn72511.html">https://www.cisco.com/c/en/us/support/docs/field-notices/725/fn72511.html</a></p>
<p>The post <a href="https://www.lammle.com/post/field-notice-fn-72511-rsa-keys-less-than-2048-bits-are-not-supported-for-ssh-in-cisco-ios-xe-release-17-11-1-and-later-workaround-provided/">Field Notice: FN &#8211; 72511 &#8211; RSA Keys Less Than 2048 Bits Are Not Supported for SSH in Cisco IOS XE Release 17.11.1 and Later &#8211; Workaround Provided</a> appeared first on <a href="https://www.lammle.com">Todd Lammle, LLC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
