<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://cciesecblog.com/2024/11/02/how-to-connect-home-wifi-router-and-pan-firewall/</loc><image:image><image:loc>https://cciesecblog.com/wp-content/uploads/2024/11/screenshot-2024-11-01-at-15.59.35.png</image:loc><image:title>Screenshot 2024-11-01 at 15.59.35</image:title></image:image><image:image><image:loc>https://cciesecblog.com/wp-content/uploads/2024/11/screenshot-2024-11-01-at-16.00.28.png</image:loc><image:title>Screenshot 2024-11-01 at 16.00.28</image:title></image:image><image:image><image:loc>https://cciesecblog.com/wp-content/uploads/2024/11/screenshot-2024-11-01-at-16.00.15.png</image:loc><image:title>Screenshot 2024-11-01 at 16.00.15</image:title></image:image><lastmod>2024-11-02T05:46:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cciesecblog.com/paloalto-security-tips-and-configs/937-2/</loc><lastmod>2020-09-17T18:57:24+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cciesecblog.com/microsoft-azure/</loc><lastmod>2020-09-17T18:55:04+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cciesecblog.com/about/</loc><lastmod>2020-09-17T18:50:24+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cciesecblog.com/paloalto-security-tips-and-configs/paloalto-pcnse/</loc><lastmod>2018-11-13T17:25:33+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cciesecblog.com/paloalto-security-tips-and-configs/</loc><lastmod>2018-11-13T17:12:33+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cciesecblog.com/paloalto-security-tips-and-configs/setting-up-a-dns-sinkholing-feature-with-pan-firewall/</loc><image:image><image:loc>https://cciesecblog.com/wp-content/uploads/2018/10/alert.jpg</image:loc><image:title>alert</image:title></image:image><image:image><image:loc>https://cciesecblog.com/wp-content/uploads/2018/10/traffic02.jpg</image:loc><image:title>traffic02</image:title></image:image><image:image><image:loc>https://cciesecblog.com/wp-content/uploads/2018/10/traffic.jpg</image:loc><image:title>traffic</image:title></image:image><image:image><image:loc>https://cciesecblog.com/wp-content/uploads/2018/10/tcping.jpg</image:loc><image:title>tcping</image:title></image:image><image:image><image:loc>https://cciesecblog.com/wp-content/uploads/2018/10/nslook.jpg</image:loc><image:title>nslook</image:title></image:image><image:image><image:loc>https://cciesecblog.com/wp-content/uploads/2018/10/ip.jpg</image:loc><image:title>IP</image:title></image:image><image:image><image:loc>https://cciesecblog.com/wp-content/uploads/2018/10/sinkhole-rule.jpg</image:loc><image:title>sinkhole rule</image:title></image:image><lastmod>2018-10-17T18:01:06+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cciesecblog.com/paloalto-security-tips-and-configs-dynamic-blocking-list/</loc><lastmod>2018-06-15T15:56:34+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cciesecblog.com/paloalto-security-tips-and-configs/first-model-year-cars/</loc><lastmod>2018-04-27T15:09:43+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cciesecblog.com/ise-identity-services-engine/switch-configuration-to-support-aaa/</loc><lastmod>2017-10-19T16:03:31+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cciesecblog.com/cisco-and-sourcefire/cisco-asa-firepower-threat-defence/</loc><image:image><image:loc>https://cciesecblog.com/wp-content/uploads/2017/04/threat-defence1.jpg</image:loc><image:title>threat defence</image:title></image:image><lastmod>2017-04-18T14:51:58+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cciesecblog.com/ise-identity-services-engine/</loc><lastmod>2017-04-05T20:05:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cciesecblog.com/identity-management-notes/cisco-radius-acs-5-6-authentication-multiply-admin-roles/</loc><lastmod>2017-03-24T17:09:16+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cciesecblog.com/ios-firewall-notes/</loc><lastmod>2017-03-24T17:06:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cciesecblog.com/2017/03/24/ip-sla-icmp-on-cisco-routers/</loc><image:image><image:loc>https://cciesecblog.com/wp-content/uploads/2017/03/ipsla.jpg</image:loc><image:title>ipsla</image:title></image:image><lastmod>2017-03-24T17:03:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cciesecblog.com/test-page/wap-connectivity-issues/</loc><lastmod>2016-08-29T22:15:58+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cciesecblog.com/paloalto-security-tips-and-configs/pa-how-to-get-listing-of-globalprotect-users/</loc><lastmod>2016-05-16T16:55:24+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cciesecblog.com/some-notes-from-my-studying-journey/cisco-switch-stack-power-setup/</loc><lastmod>2016-04-17T16:18:29+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cciesecblog.com/asa-firewalls-notes/</loc><lastmod>2015-08-28T20:45:34+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cciesecblog.com/2015/08/28/asa-8-2-packet-flow-through-an-asa-firewall/</loc><lastmod>2023-02-15T20:45:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cciesecblog.com/some-notes-from-my-studying-journey/wondering-about-vrf/</loc><image:image><image:loc>https://cciesecblog.com/wp-content/uploads/2015/06/capture.jpg</image:loc><image:title>Capture</image:title></image:image><lastmod>2015-06-25T16:20:48+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cciesecblog.com/some-notes-from-my-studying-journey/configuring-dmvpn/</loc><lastmod>2015-06-17T14:29:54+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cciesecblog.com/some-notes-from-my-studying-journey/gre-configuring-point-to-point-vpn-tunnel-via-gre-unprotected-and-protected/</loc><lastmod>2015-06-11T18:35:54+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cciesecblog.com/cisco-and-sourcefire/</loc><lastmod>2015-04-14T21:37:43+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cciesecblog.com/cisco-and-sourcefire/troubleshooting-asa-firepower-modules/</loc><lastmod>2015-04-13T05:33:08+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cciesecblog.com/2015/02/15/nat-post-ios-version-8-3/</loc><image:image><image:loc>https://cciesecblog.com/wp-content/uploads/2015/02/sc5.jpg</image:loc><image:title>SC5</image:title></image:image><image:image><image:loc>https://cciesecblog.com/wp-content/uploads/2015/02/sc4.jpg</image:loc><image:title>SC4</image:title></image:image><image:image><image:loc>https://cciesecblog.com/wp-content/uploads/2015/02/sc3.jpg</image:loc><image:title>SC3</image:title></image:image><image:image><image:loc>https://cciesecblog.com/wp-content/uploads/2015/02/sc2.jpg</image:loc><image:title>SC2</image:title></image:image><image:image><image:loc>https://cciesecblog.com/wp-content/uploads/2015/02/screenclip2.jpg</image:loc><image:title>ScreenClip[2]</image:title></image:image><lastmod>2015-07-01T02:23:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cciesecblog.com/paloalto-security-tips-and-configs/accredited-configuration-engineer-ace-exam/</loc><lastmod>2015-02-02T06:29:57+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cciesecblog.com/identity-management-notes/</loc><lastmod>2014-10-28T05:02:55+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cciesecblog.com/2014/08/11/pki-theory/</loc><lastmod>2014-08-20T19:48:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cciesecblog.com/2014/08/07/rip-and-beyond/</loc><lastmod>2014-08-07T16:21:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cciesecblog.com/2014/07/09/ip-sla-on-asa-firewalls/</loc><lastmod>2020-04-30T15:32:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cciesecblog.com/2014/07/25/asa-identity-ad-firewall-features/</loc><lastmod>2014-07-25T16:22:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cciesecblog.com/2014/07/22/asa-object-group-access-lists/</loc><lastmod>2019-02-21T11:20:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cciesecblog.com/2014/07/21/asa-global-access-list/</loc><lastmod>2015-05-24T17:26:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cciesecblog.com/2014/07/14/asa-port-ether/</loc><lastmod>2018-09-08T05:56:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cciesecblog.com/2014/07/14/asa-basic-interface-configuration/</loc><lastmod>2014-07-14T15:45:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cciesecblog.com/some-notes-from-my-studying-journey/threat-identification-and-mitigation-notes/</loc><lastmod>2014-07-03T18:03:19+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cciesecblog.com/some-notes-from-my-studying-journey/basic-system-hardening-and-availability-notes/</loc><lastmod>2014-07-03T18:03:09+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cciesecblog.com/pki-vpn-anyconnect-l2l-notes/</loc><lastmod>2014-07-03T18:02:56+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cciesecblog.com/test-page/</loc><lastmod>2014-07-03T18:02:35+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cciesecblog.com/some-notes-from-my-studying-journey/ips-wsa-notes/</loc><lastmod>2014-07-03T18:01:42+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cciesecblog.com/some-notes-from-my-studying-journey/</loc><lastmod>2014-07-03T18:01:11+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cciesecblog.com/2013/12/04/switch-port-security/</loc><lastmod>2022-10-04T17:41:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cciesecblog.com/2013/12/03/dynamic-trunking-protocol/</loc><lastmod>2013-12-03T17:10:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cciesecblog.com/2013/11/05/class-class-map-policy-map/</loc><lastmod>2013-11-27T17:42:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cciesecblog.com/2013/11/27/how-to-use-the-cisco-asa-built-in-packet-capture-tool/</loc><lastmod>2013-11-27T17:16:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cciesecblog.com/2013/11/26/bgp-2/</loc><image:image><image:loc>https://cciesecblog.com/wp-content/uploads/2013/11/screenclip1.jpg</image:loc><image:title>ScreenClip</image:title></image:image><image:image><image:loc>https://cciesecblog.com/wp-content/uploads/2013/11/screenclip.jpg</image:loc><image:title>ScreenClip</image:title></image:image><lastmod>2013-11-26T16:17:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cciesecblog.com/2013/10/25/preventing-udp-flood-attack/</loc><lastmod>2013-10-25T15:25:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cciesecblog.com/2013/10/18/bgp/</loc><lastmod>2013-10-18T16:14:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cciesecblog.com/2013/10/16/eigrp-authentication/</loc><lastmod>2013-10-16T15:54:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cciesecblog.com/2013/10/07/configuring-ospf-on-routers/</loc><lastmod>2013-10-11T15:32:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cciesecblog.com/2013/10/06/packet-capture-on-asa-using-cli/</loc><lastmod>2013-10-06T20:44:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cciesecblog.com/2013/10/06/how-to-use-netsh-scripting-to-change-ip-address/</loc><lastmod>2024-03-01T07:44:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cciesecblog.com/2013/10/06/enter-commands-more-efficiently-with-cisco-command-aliases/</loc><lastmod>2013-10-06T20:22:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cciesecblog.com/2013/10/06/asa-8-4x-redundant-interfaces-and-port-channel-configurations/</loc><lastmod>2013-10-06T20:07:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cciesecblog.com/2013/10/06/how-to-configure-enhanced-object-group-in-asa-8-x-and-up/</loc><lastmod>2013-10-06T18:59:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cciesecblog.com/2013/10/06/configuring-asa-in-multi-mode-activeactive/</loc><lastmod>2013-10-06T18:59:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cciesecblog.com/2013/10/03/basic-configuration-for-asa-5505-running-ios-8-4-and-higher/</loc><lastmod>2013-10-05T19:20:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cciesecblog.com/2013/10/03/configuring-failover-on-asa-version-8-4-and-up/</loc><lastmod>2014-05-20T18:45:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cciesecblog.com/2013/10/05/allow-ping-and-tracert-thru-asa-and-debug-icmp/</loc><lastmod>2013-10-05T19:18:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cciesecblog.com/2013/10/02/configure-ripv2-on-routers-using-clear-text-and-md5-hash-for-authc/</loc><lastmod>2013-10-05T19:17:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cciesecblog.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2024-11-02T05:46:59+00:00</lastmod></url></urlset>
