Introduction I’ve been through many network designs over the years and pretty much every UK ISP. A great design I settled on for business grade VDSL connections was by utilising a separate router on the front end with firewall behind.
Very rarely do I have to do any modification of Linux netfilter firewall rules directly using iptables. I generally use Debian based Linux distributions personally e.g. Ubuntu which come preinstalled with UFW as an abstraction layer to iptables but there
I’m forever needing docs for Palo Alto considering that is now my weapon of choice in the fight against bad actors. The problem is that it can sometimes take me an age to find some of those useful docs that
Introduction This is quite a complex topic and can still be a tricky one to get right but I have developed a proven methodology that can be used very successfully.I have now used this methodology multiple times to transition from
Introduction OSPFv3 authentication is quite generally quite straightforward to configure between two Cisco devices. There are some great posts regarding this topic, in fact one of the best I’ve read is by the great Jeremy Stretch. http://packetlife.net/blog/2008/sep/3/ospfv3-authentication/ The issue I
Introduction The deployment of dual WAN firewall solutions in branch offices is often required to ensure fail-over for unreliable WAN connections. This type of deployment however can add additional complexity compared to a full BGP setup using capable routers. With
Introduction If you’ve got the Sophos UTM up and running in your home network then you may come across this issue at some point. I was using UTM9’s web protection for quite some time and suddenly starting receiving emails to
Introduction The problem I was having was as follows. 3 Juniper devices in a hub and spoke topology, 1 HQ and 2 Branch. The 2 Branch firewalls were actually just basically identical configs in one branch on separate DSL lines.
Introduction I’m adding this here cause sometimes I’m dense and I forget the command. Command Examples copy running-config scp://dave@myVM/home/dave/running-config-scp Source filename [running-config]? Address or name of remote host [myVM]? Destination username [dave]? Destination filename [home/dave/running-config-scp]? Cryptochecksum: 5b1178ff 4db70c26 45645f8f 7ec33023
Introduction This is a reminder for me where to find the commands because there is a bug in the web gui that means whenever you try to apply an action-group it will implement it with a next-hop address and next-hop