viernes, 12 de septiembre de 2025

CISCO. Wifi Security. ISOLATION

Purpose

Isolate the elements of a Wi-Fi network from each other.


In Cisco-managed wireless environments (such as those using Wireless LAN Controllers, or WLCs), client isolation refers to preventing devices connected to the same wireless network from communicating directly with each other. This is typically achieved through features like:

  • P2P Blocking (Peer-to-Peer Blocking): Found in the advanced settings of a WLAN profile. When enabled (e.g., set to Drop), it blocks direct communication between WiFi clients connected to the same access point managed by the same WLC.

  • AP Isolation (common in consumer-grade or SMB routers): Prevents clients connected to the same access point from seeing or interacting with each other. This is useful in public or shared environments like cafés, hotels, or conferences, where you want to prevent attacks like ARP spoofing or traffic sniffing.

Steps

While there isn’t a literal command called ISOLATION, the effect is achieved through configurations such as:

  • P2P Blocking Action in the WLAN settings → can be set to Drop or Forward.

  • On switches, a similar effect is achieved using switchport protected, but in WiFi it’s handled at the SSID and controller level.

recommended for

  • In public or shared networks where clients shouldn’t interact.

  • In enterprise environments with strict security policies.

  • To protect IoT or smart devices that don’t need to communicate with each other.

by GoN | Published: Oct 2025 | Last Updated:

TOOLS. EXELS joins columns

 Excel Spanish version.


Purpose

Os pongo algunos ejemplo útiles para unificar información siguiendo diferentes criterios.


Exemples


Para unir los valores de la columna B cuando en la columna A aparece el texto "Submitted Data",:

=UNIRCADENAS(";" ; VERDADERO ; FILTRAR(B1:B100 ; ESNUMERO(HALLAR("Submitted Data" ; A1:A100))))

 

Para unir los valores de la columna B cuando en la columna A aparece el texto "Submitted Data" y en la columna D aparece "1-ESP",

=UNIRCADENAS(";" ; VERDADERO ; FILTRAR(B1:B100 ;(A1:A100="Submitted Data")*(D1:D100="1-ESP")))

 

Para unir los valores de la columna B cuando en la columna A NO aparezca el texto "Submitted Data"

=UNIRCADENAS(";" ; VERDADERO ; FILTRAR(B1:B100 ; A1:A100<>"Submitted Data"))

  

Para unir los valores de la columna B cuando en la columna A NO aparezca el texto "Submitted Data" y en la columna D aparezca "1-ESP"

=UNIRCADENAS(";" ; VERDADERO ; FILTRAR(B2:B1500 ;(A2:A1500<>"Submitted Data")*(D2:D1500="1-ESP")))


by GoN | Published: Oct 2025 | Last Updated:

Mobile Security. Business manager. Justify changing your phone.

Recommendation for replacing the cell phone of a senior official in the company.


In companies, especially large ones, very few people have access to privileged information. Occasionally, security breaches or important data leaks occur, the source of which is impossible to trace.


Many of our executives not only manage business issues through their phones, but sometimes also participate in other forums as consultants, managers, politicians, etc.


In these cases, the cell phones they use are not just personal tools, but strategic resources for operational continuity and ensuring functional availability in crisis scenarios.


The mobile devices of senior executives are prime targets for malicious actors. Regularly updating them allows us to eliminate potential malware persistence that goes undetected with conventional antivirus, prevent hardware vulnerabilities (such as compromised chips or outdated firmware) from remaining in use, and ensure that devices are free of physical or logical backdoors that could have been introduced during international travel, Wi-Fi access (especially uncontrolled ones), or in uncontrolled environments. In short, it's about eliminating accumulated attack vectors.


Newer mobile models incorporate more secure processors, with dedicated security enclaves, and better support for encryption, advanced biometrics, and multi-factor authentication. In regulated environments (ISO 27001, ENS, GDPR, etc.), this practice can be considered a proactive measure for protecting personal and corporate data.


The cost of a security incident on an executive mobile phone can be exponentially higher (data breach, blackmail, loss of reputation) than replacing the device.


In some companies, whether to use the latest model or as a precaution, this practice is done sporadically.

 

by GoN | Published: Oct 2025 | Last Updated: