I recently experienced a situation where an attempted push of firewall configuration was failing for a single production HA firewall. The error being received when attempting the push was the following: The validation error can be fixed by simply performing
Network Design – VDSL
Introduction I’ve been through many network designs over the years and pretty much every UK ISP. A great design I settled on for business grade VDSL connections was by utilising a separate router on the front end with firewall behind.
Updating Netfilter Firewall Rules
Very rarely do I have to do any modification of Linux netfilter firewall rules directly using iptables. I generally use Debian based Linux distributions personally e.g. Ubuntu which come preinstalled with UFW as an abstraction layer to iptables but there
Palo Alto Useful Links and Commands
I’m forever needing docs for Palo Alto considering that is now my weapon of choice in the fight against bad actors. The problem is that it can sometimes take me an age to find some of those useful docs that
Firewall Vendor Transitioning
Introduction This is quite a complex topic and can still be a tricky one to get right but I have developed a proven methodology that can be used very successfully.I have now used this methodology multiple times to transition from
OSPFv3 Authentication Palo Alto to Cisco Router
Introduction OSPFv3 authentication is quite generally quite straightforward to configure between two Cisco devices. There are some great posts regarding this topic, in fact one of the best I’ve read is by the great Jeremy Stretch. http://packetlife.net/blog/2008/sep/3/ospfv3-authentication/ The issue I
Palo Alto Dual WAN branch office to Netscreen HQ
Introduction The deployment of dual WAN firewall solutions in branch offices is often required to ensure fail-over for unreliable WAN connections. This type of deployment however can add additional complexity compared to a full BGP setup using capable routers. With
Sophos UTM9 Reset Used IP count
Introduction If you’ve got the Sophos UTM up and running in your home network then you may come across this issue at some point. I was using UTM9’s web protection for quite some time and suddenly starting receiving emails to
Juniper Netscreen Site-to-Site VPN Rekey
Introduction The problem I was having was as follows. 3 Juniper devices in a hub and spoke topology, 1 HQ and 2 Branch. The 2 Branch firewalls were actually just basically identical configs in one branch on separate DSL lines.
SCP Example Cisco ASA to Linux
Introduction I’m adding this here cause sometimes I’m dense and I forget the command. Command Examples copy running-config scp://dave@myVM/home/dave/running-config-scp Source filename [running-config]? Address or name of remote host [myVM]? Destination username [dave]? Destination filename [home/dave/running-config-scp]? Cryptochecksum: 5b1178ff 4db70c26 45645f8f 7ec33023