When I started at TD-K 10 years ago, the Cisco business was pretty much non-existent, and I was the very first networking employee. Back then it was unthinkable that we could reach “Gold” status within a few years, considering the very complex requirements that partners had to fulfill.
Friday, March 6, 2026
Mission Impossible: Cisco Preferred Networking Partner
Tuesday, September 23, 2025
CIS Benchmark Cisco Meraki: Network Inventory and Asset Management
This post is focusing on building the Center for Internet Security (CIS) Benchmark for Cisco Meraki. CIS is one of the most respected institutions when it comes to security standards, with CIS Controls being one of the most widely used resources for implementing and securing infrastructures. This benchmark is considered a prescriptive configuration recommendation for Cisco Meraki. This section of the Benchmark will focus on Inventory and Asset Management.
Why do we need a Benchmark?
Following the configuration guides can sometimes be complicated and without having a logical connection between the different documents, it's almost impossible to ensure that all the necessary security features are enabled. In order to streamline the security implementation, it is recommended to follow security standards. One of the most widely used security standards is CIS Controls, due to its very detailed and practical way of describing the technical and organizational safeguards to build a secure infrastructure. I decided to join CIS as an Editor and Subject-Matter Expert to help the community and the rest of the world.
Who is this benchmark for?
This benchmark is intended for system and application administrators, security specialists, auditors, help desk, and platform deployment personnel who plan to develop, deploy, assess, or secure solutions that incorporate Cisco Meraki equipment and solutions.
Network Inventory and Asset Management
Inventory Tracking
Fig.1 Organization Inventory
Audit Procedure
Log into the Meraki Dashboard, go to Organization -> Configure -> Inventory and verify that all claimed devices are in use and assigned to a network.
Mapping: CIS 8.1 Control 1.1, 1.2
Tagging and Naming Convention
Implementing device naming convention and device tagging helps in improving operations, troubleshooting and accountability. Without standardized naming, device management is inefficient, especially in larger deployments. In case of incidents, it is very difficult to identify devices and the troubleshooting process becomes slower. Using a well-defined naming and tagging schema helps the technical staff with operations and the compliance staff with meeting requirements. Maintaining the asset inventory, proper naming and tagging introduces extra overhead. The effort is outweighed by better visibility, reduced risk and more efficient operations. There is no service impact when implementing changes.
Audit Procedure
Verify if the organization has implemented a naming convention schema. Then log into the Meraki Dashboard.
Go to Organization -> Network -> Wireless -> List Verify that the wireless devices have proper naming and tags describing location and ownership.
Go to Organization -> Network -> Switching -> Switches Verify that the Switches have proper naming and tags describing location and ownership.
Go to Organization -> Network -> Security & SD-WAN -> Appliance Status Verify that the Firewalls have proper naming and tags describing location and ownership.
A similar approach should be followed with Mobile Gateways, Cameras and Sensors.
Mapping: CIS 8.1 Control 1.1
Unofficial recommendation.
- Documented schema - A document should be written with the structure, so existing and new engineers can easily understand the naming
- Uniqueness - Every device should have a name that is unique within the domain where it's used.
- Clarity - The name or tag should make sense and be easy to read.
- Scalability - The schema should provide the possibility to add new devices without the risk of running out of space
- Structure - The name should be split in sections, where each is representing a specific component.
Conclusion
Call-to-Action
References
https://documentation.meraki.com/General_Administration/Organizations_and_Networks/Organization_Menu/Manage_Tags
https://documentation.meraki.com/General_Administration/Organizations_and_Networks/Renaming_a_Network_or_Organization
https://developer.cisco.com/meraki/api-v1/update-device/
https://developer.cisco.com/meraki/api-v1/update-network/
Thursday, September 18, 2025
CIS Benchmark Cisco Meraki: Administrative and Dashboard Access
This post is focusing on building the Center for Internet Security (CIS) Benchmark for Cisco Meraki. CIS is one of the most respected institutions when it comes to security standards, with CIS Controls being one of the most widely used resources for implementing and securing infrastructures. This benchmark is considered a prescriptive configuration recommendation for Cisco Meraki. The first section of the Benchmark will focus on Administrative and Dashboard Access.
Why do we need a Benchmark?
Following the configuration guides can sometimes be complicated and without having a logical connection between the different documents, it's almost impossible to ensure that all the necessary security features are enabled. In order to streamline the security implementation, it is recommended to follow security standards. One of the most widely used security standards is CIS Controls, due to its very detailed and practical way of describing the technical and organizational safeguards to build a secure infrastructure. I decided to join CIS as an Editor and Subject-Matter Expert to help the community and the rest of the world.
Who is this benchmark for?
This benchmark is intended for system and application administrators, security specialists, auditors, help desk, and platform deployment personnel who plan to develop, deploy, assess, or secure solutions that incorporate Cisco Meraki equipment and solutions.
Administrative and Dashboard Access
Administrative Accounts
There are 2 basic types of dashboard administrators: Organization and Network. Organization administrators have access to the entire organization with all the networks, while network administrators are limited to the individual networks and their devices. We need to make sure to use named accounts that are not shared, in order to minimize the risk of unauthorized access and ensure accurate audit trails. We also need to go through the list periodically and revoke access as necessary.
Fig.2 Administrative and Dashboard Access (Beta)
Audit Procedure
Log into the Meraki Dashboard, go to Organization -> Configure -> Administrators, and go through the list to make sure there are no shared logins, like "info", "support", "VendorX" etc.
Mapping: CIS 8.1 Control 5.
Network Admin Accounts
Network access need to be granted only where required, preferably in read-only mode. If network-level administrators are granted more privileges than required, they may accidentally or maliciously alter configurations across the networks that they have been granted access to. This can cause service outages, security policy violations or exposure of sensitive data. It is necessary to do periodical review and revoke unnecessary access.
Audit Procedure
Log into the Meraki Dashboard, go to Organization -> Configure -> Administrators, and go through the list of network accounts to make sure there are no shared logins, like "info", "support", "vendorX" etc.
Mapping: CIS 8.1 Control 5
Role-Based Access Control
Accounts with higher privileges than necessary pose significant security risks. Implementing Role-Based Access Control reduces the attack surface. Failure to implement proper role-based controls in the Meraki Dashboard increases the risk of unauthorized or excessive administrative access. Overprivileged accounts can cause accidental or malicious changes to the organization. Organizational data might also be exposed.
Audit Procedure
Log into the Meraki Dashboard, go to Organization -> Configure -> Administrators, verify the organization and network level access for all accounts, with focus on the custom role assignments. Audit Camera access permissions. Verify if the existing roles match the documented process of the organization for assigning role-based access account. Compare results to the last dated role-based access control audit.
Mapping: CIS 8.1 Control 6.8
Multi-Factor Authentication
Enforcing Two-Factor Authentication protects from unauthorized access in case the password of the administrator is compromised. This reduces the risk of account takeover, unauthorized configuration changes and security breaches.If two-factor authentication (2FA) is not enforced for all Meraki Dashboard logins, accounts are only protected by passwords, which can be targeted with phishing, credential stuffing, and brute-force attacks. A compromised administrator account without MFA can provide attackers with full access to network configurations, client data, and security policies, leading to potential service disruption and security breaches.
Audit Procedure
Log into the Meraki Dashboard, go to Organization -> Settings -> Security. Verify that "Two-Factor authentication" is enabled. Go to Organization -> Configure -> Administrators and verify that users are using 2FA.
Mapping: CIS 8.1 Control 5.2
Audit Logs
Audit Procedure
Log into the Meraki Dashboard, Go to Organization → Monitor → Change Log. Verify that audit logs are being collected. Audit logs can also be fetched through API to external systems like a SIEM. Verify that the periodical review procedure is in place.
Mapping: CIS 8.1 Control 8.2
Conclusion
Call-to-Action
References
Managing
Dashboard Administrators and Permissions (Modernized View) - Cisco Meraki
Documentation
https://documentation.meraki.com/General_Administration/Other_Topics/Two-Factor_Authentication
Friday, February 28, 2025
Ethical Hacker: Why should you learn networking?
Ethical Hacker: Why should you learn networking?
Networking is arguably the most vital component of the current internet and IT infrastructure, the backbone of today’s technology. Imagine a world where computers, servers and other IT systems wouldn't be able to communicate with each other. That would basically kill the modern internet and most of the technology as we know it. As an ethical hacker, your job is to understand the logic behind networking, because that’s how you find vulnerabilities and misconfigurations.
So where do you learn networking from?
The golden standard for learning the basics is Cisco CCNA. While it doesn’t teach you anything about hacking, it helps with understanding the fundamentals of how networks are built. It covers one of the many domains you have to master to become a great ethical hacker.
How can an ethical hacker use networking knowledge?
Let's look at some of the attacker tactics and techniques in the MITRE ATT&CK framework, one of the most widely used knowledge bases, and compare some of the tactics and techniques to the topics addressed in the CCNA blueprint. The CCNA topics are only scratching the surface, since hacking is not the focus, but there is a ton of useful information to build solid knowledge on many protocols exploited by hackers. While there is no 1-to-1 mapping between the attack techniques and the CCNA blueprint topics, we can find a few crossing points between the two.
Network Reconnaissance & Scanning (MITRE Tactic: Reconnaissance & Discovery)
Ethical hackers gather intelligence on a target using IP addressing, subnets, VLANs, and open ports.
Tools like Nmap, Wireshark, and Netcat help with network mapping.
CCNA Topics:
1.0 Network Fundamentals – Understanding IP addressing, subnets and VLANs helps hackers map networks.
2.0 Network Access – Layer 2 discovery (CDP, LLDP, ARP) - Protocols used for reconnaissance.
3.0 IP Connectivity - Routing Concepts and layer 3 protocols (OSPF, Static Routing) - Identification of network topologies.
MITRE Techniques:
T1595 – Active Scanning (Port & Service Discovery)
T1046 – Network Service Scanning
T1018 – Remote System Discovery
T1071 – Application Layer Protocol for Command & Control
Exploiting Network Vulnerabilities (MITRE Tactic: Initial Access & Execution)
Attackers exploit weaknesses in TCP/IP, HTTP, FTP, and SSH to gain unauthorized access. MITM attacks like ARP poisoning and DNS spoofing can intercept or redirect network traffic.
CCNA Topics:
2.0 Network Access - (Telnet, SSH, HTTP, HTTPS)
4.0 IP Services - Understanding NAT, DNS, SSH
5.0 Security Fundamentals - Understanding
Device Security - Administrative Access, Device Hardening.
MITRE Techniques:
T1189 – Drive-by Compromise
T1203 – Exploitation for Client Execution
T1557 – Man-in-the-Middle (MITM)
T1040 – Network Sniffing
Wireless Attacks (MITRE Tactic: Credential Access & Privilege Escalation)
Wi-Fi hacking targets weak encryption (WEP, WPA, WPA2) and uses deauthentication attacks.
CCNA Topics:
5.0 Security Fundamentals (WLAN, WPA, SSID, Authentication)
MITRE Techniques:
T1602 – Network Sniffing for Credentials
T1556 – Modify Authentication Process
T1078 – Valid Accounts
Post-Exploitation & Data Exfiltration (MITRE Tactic: Lateral Movement & Exfiltration)
Once inside a network, ethical hackers move laterally using pivoting, port forwarding, and VPN tunneling. DNS tunneling and C2 servers are used for exfiltrating data.
CCNA Topics:
IP Connectivity - Routing Concepts - helps with pivoting and lateral movement.
Network Automation - Learning basic scripting, which could help with exfiltration techniques.
MITRE Techniques:
T1570 – Lateral Tool Transfer
T1095 – Non-Application Layer Protocol (ICMP, UDP for Covert C2)
T1048 – Exfiltration Over Alternative Protocol (DNS Tunneling)
T1071.004 – Exfiltration Over C2 Channel
Conclusion
Networking is the backbone of the modern technology. Whether you are an ethical hacker, IT technician or security analyst, understanding how networks work will make you more effective in doing your daily job. CCNA being the golden standard in learning networking is one of the certifications to consider for building the fundamental knowledge in protocols, infrastructure and communication.
References
Wednesday, January 29, 2025
CCIE Coffee Blog: #29174 Arijan Jashari
Meet our Third Guest: Arijan Jashari
Arijan is a truly dedicated networking engineer, with over 20 years of experience. His passion for math and coming in contact with telecommunications in the early days became the catalyst for the upcoming long and prosperous journey in networking. Cisco CCIE has had a tremendous impact in his career and opened up many doors for him in the tech industry. Arijan has worked for global companies like Juniper, Nike, LibertyGlobal and most recently UBS, where he has a Network Reliability Engineer, Director role.
Knowing first hand how the war in Kosovo has impacted so many Albanians, it is truly remarkable that Arijan has been able to keep focus on networking, by starting the certification journey only 2 years after the war. I had a chat with Arijan about his career journey.
1. Career Inspiration:
What sparked your interest in networking and technology? Who or what has been your biggest inspiration in your career?
Like many of us in high school, I was unsure about my career path. However, one thing was clear, that I loved math. It came naturally to me, and I enjoyed solving problems. In 1996, I decided to study applied mathematics but soon realized that my true passion lay not in pure math but in its applications within computer science, particularly in number theory, equations. This realization led me toward technology, but my journey wasn’t straightforward, after the war in 1999 I worked as an interpreter for the U.S. military, during that time, I noticed that telecommunications played a crucial role in everything they did, this sparked my fascination with networking and computer systems. By 2001 I was certain that this was the field I wanted to dedicate my career to. Because I enjoyed the preparation process, I pursued multiple CCIE and JNCIE tracks.
2. CCIE Certification Experience:
Can you describe your experience while preparing for the CCIE exam? How did you balance study with other commitments?
Preparing for the CCIE exam while managing other responsibilities was incredibly challenging. When I began my preparation in 2006, I was working full-time and raising two young children. My wife took on most of the family responsibilities, allowing me to focus on work and studying. I dedicated every spare moment to preparation.
On my first attempt, I felt confident about my lab work, but unfortunately, I didn’t pass. It was a tough moment, but instead of discouraging me, it strengthened my determination to succeed.
3. Professional Achievements:
What are some key achievements or milestones in your career since obtaining your CCIE certification?
Earning my CCIE certification was one of the biggest milestones in my career. The preparation itself was a transformative experience, I spent long hours in the lab fully immersed in learning, and truly enjoying the process. The knowledge and expertise I gained opened countless doors. I was invited to multiple job interviews and received numerous offers. Achieving my CCIE certification marked a turning point in my career, giving me the recognition and credibility to take on more advanced roles in networking.
4. Challenges and Overcoming Them:
What have been some significant challenges in your career, and how did you overcome them?
One of the most significant challenges I faced was deciding the direction of my career. In 2001, I was torn between pursuing mathematics, computer systems, programming, or networking. It was a difficult decision, but I ultimately realized that my passion lay in networking and systems.
Committing to this path was the best decision I made, shaping my entire professional journey. I started with CCNA, then progressed to CCNP and MCSE. Soon after, in 2003, I began teaching a CCNA class at Cisco Academy in Gjilan, which further solidified my expertise in networking.
5. Impact of CCIE on Career:
How has being a CCIE-certified professional impacted your career trajectory or opportunities?
The CCIE certification solidified my focus on networking and positioned me as an expert in the field. Achieving such a prestigious certification brings immense recognition and unlocks incredible opportunities. It’s a challenging journey but once you accomplish it opportunities start knocking at your door.
6. Life Lessons from the CCIE Journey:
What are some important life lessons you’ve learned during your journey to and after achieving CCIE certification?
One of the most valuable lessons I’ve learned is the importance of following what you truly enjoy. However, I also realized that long hours of studying, especially sitting for extended periods, can take a toll on your health. Maintaining a balance is crucial.
The CCIE certification offers multiple career paths, and even if you don’t end up taking the exam, the learning journey itself is invaluable. It taught me the significance of perseverance, discipline, and the joy of continuous learning.
7. Personal Growth and Development:
How do you continue to grow and develop professionally? Are there specific areas or technologies you’re currently focused on?
Currently, I’m focusing on automation and development, particularly leveraging AI to build innovative solutions. At the same time, I’m prioritizing a better balance between professional growth and family life, something I struggled with in the past but now deeply value.
Conclusions:
Arijan is one of the stars of the CCIE HoF for Albania and Kosovo, truly dedicated to networking. He decided to focus 100% on the networking field and used Cisco certifications combined with Juniper to support the journey. Having a clear plan and persistence in over 20 years in networking has clearly shaped his own career. Continuous learning is a crucial part of his career, and even today he is improving his skills with all the new AI developments in the field. The networking field can be quite demanding, but Arijan has found the key to have a balance between the career and family life.



.jpg)

