Cisco vulnerability and dangerous filtering techniques