Author Archives: Paul Stewart, CCIE 26009 (Security)

About Paul Stewart, CCIE 26009 (Security)

Paul is a Network and Security Engineer, Trainer and Blogger who enjoys understanding how things really work. With over 15 years of experience in the technology industry, Paul has helped many organizations build, maintain and secure their networks and systems.

Viewing Cisco Proximity with SpectrumView

I wanted to share a quick trick for troubleshooting Cisco Proximity. For those that haven’t stumbled onto this particular technology, Proximity is a feature in Spark Connected and Traditional Cisco Video Endpoints that provides a pairing channel for screen sharing. … Continue reading

Posted in Uncategorized | Leave a comment

Firepower FMC API – Initial Observations

As many of you know, I am not a developer but I do occasionally hack stuff together. This article is just some of the initial things I have learned working with the Firepower Management Console API. A good place to … Continue reading

Posted in Uncategorized | Leave a comment

What’s Your Biggest Professional Challenge?

Now that we are in a new year (wow, it is hard to believe it is 2018), I want to ask a simple question. With what you are trying to accomplish at work or in your career, what is your … Continue reading

Posted in Uncategorized | 2 Comments

Reading EEPROM – Obtaining the GE Concord Express Installer Code

One of the more frustrating things for me is when someone, or some company, attempts to control me. Typically having the desire for less responsibility, I have no desire to control individuals in this way. Recently, I started looking into … Continue reading

Posted in Uncategorized | Comments Off on Reading EEPROM – Obtaining the GE Concord Express Installer Code

Displaying Pi Output on an LCD

A few weeks ago, I shared an article about leveraging the Meraki API and a Raspberry Pi to create a Dummy Light for My Network. Today’s article expands on this slightly by adding a 16×2 LCD Display for additional output flexibility. For … Continue reading

Posted in Uncategorized | Comments Off on Displaying Pi Output on an LCD

A Dummy Light for My Network

I’ve always heard the red lights in car dashboard referred to as Dummy Lights. One example might be the use of a light to indicate high temperature in lieu of a temperature gauge. Over the past few weeks, I’ve spent … Continue reading

Posted in Uncategorized | 3 Comments

Back In The Future

There are several good nuggets that can be found in this Ted Talk. I particularly like the impetus on local communities and the idea of a Business Plan contest for high school students. Innovation: Five Steps to Get Your Local … Continue reading

Posted in Uncategorized | Comments Off on Back In The Future

I Don’t Need a Car

You know, having conversations with teenagers can be a little annoying sometimes. One of mine (and I’ve heard others) keeps responding to my answers with “Why”. While this gets my blood circulating a little too fast in some contexts, getting … Continue reading

Posted in Uncategorized | Comments Off on I Don’t Need a Car

Cheap Stuff is not Cheap

I have often fallen for the temptation of buying cheap instead of buying quality. This might be a saw, a drill, a lawnmower or just about anything imaginable. When I look at what professionals use I see them buying well-known … Continue reading

Posted in Uncategorized | Comments Off on Cheap Stuff is not Cheap

Will Ransomware Die?

Ransomware has been one of the more prevalent security topics for past few years. Some probably think this form of digital destruction is here for the long haul. While this may be an accurate prediction, I can imagine a turn … Continue reading

Posted in Security | Tagged , | Comments Off on Will Ransomware Die?

Using Geolocation in Firepower Access Control Policies

The use of geolocation is fairly obvious in monitoring networks with Firepower Management Center. What may be less obvious is that Continents and Countries can also be specified as the source or destination of connections in an Access Control Policy. … Continue reading

Posted in Security | Tagged , | 2 Comments

Capture w/Trace in Firepower Threat Defense

A few days ago I wrote an article demonstrating the Packet Tracer feature for troubleshooting Firepower Threat Defense. Another very cool tool for troubleshooting is the Capture w/Trace Feature. The power of this tool comes from both capturing a PCAP file … Continue reading

Posted in Security | Tagged , | Comments Off on Capture w/Trace in Firepower Threat Defense