Press "Enter" to skip to content

Building a 3S (Scalable, Stable and Secure) AWS Test Environment – Part 1

0

Gartner’s Magic Quadrant for Cloud Infrastructure as a Service, Worldwide June 2017.  According to Gartner, Amazon Web Services (AWS) has became as the undisputed leading cloud provider in the world. AWS is rated “the most mature, enterprise-ready provider, with the deepest capabilities for governing a large number of users and resources.” Gartner says it can satisfy the cool kids who want…

Cisco Router IKEv2 IPSec VPN Configuration

0

What is Differences between IKEv1 and IKE v2? 1. Different negotiation processes − IKEv1 IKEv1 SA negotiation consists of two phases. IKEv1 phase 1 negotiation aims to establish the IKE SA. This process supports the main mode and aggressive mode. Main mode uses six ISAKMP messages to establish the IKE SA, but aggressive mode uses only three. Therefore, aggressive mode…

Juniper Space Security Director Policy Hit Counts Not Updated Automatically

0

Issue Symptons: Normally, each firewall rule on the SRX auto-updates a snmp counter for hit-count, regardless of whether ‘count’ is configured or not.  Juniper Space Security Director periodically polls these OIDs and updates the hit-count.    In Junper Space 16.1 R1, the issue found is unable to view policy hit counts from Juniper Space Security Director, but SRX itself is…

Troubleshooting Cisco IPSec Site to Site VPN – “QM Rejected”

0

There was a VPN issue to troubleshoot recently. It was between Juniper SRX and Cisco Router. It seems straightforward but it took quite a long time to troubleshoot because of communication. All steps listed here for my future reference. Some other related posts: Troubleshooting Cisco IPSec Site to Site VPN – “reason: Unknown delete reason!” after Phase 1 Completed Troubleshooting…

Blogger Tips and Tricks

0

Here are some collections for bloggers from my pas blogger experience: 1. Adjust Right Sidebar margin width Sometimes, the space between main body posts section and right side bar is too wide. You may want to change it from 40px to 10 px. Here is the code I found from here: #sidebar-right-1{position: relative;left: 40px !important;} Add the code to Blogger Them Designer –…

Cisco Wireless Controller 5508 Configuration – Tips and Tricks

0

All basic configuration has been created from following related posts. This post will focus on some other configuration or troubleshooting happened in real environment. Relate Posts: Cisco Wireless Controller 5508 Configuration Step by Step – Part 1 (CLI and GUI) – Cisco Wireless Controller 5508 Configuration Step by Step – Part 2 (User/Machine Auth) – Cisco Wireless Controller 5508 Configuration Step by…

NSS Labs NGFW Security Value Map Report (2017, 2016, 2014, 2013, 2012, 2011)

0

  It is good to compare with Gartner Magic Quadrant for Enterprise Network Firewall (2017, 2016, 2015, 2014, 2013, 2011, 2010) or Gartner Magic Quadrant for UTM (2017, 2016, 2015, 2014, 2013, 2012, 2010,…) End users are finding that NGFWs are no longer as limiting in their performance or capability trade-offs as they once were. NSS Labs discovered that many enterprises are choosing…

Gartner Magic Quadrant for Cloud Infrastructure as a Service (Worldwide) (2017, 2016, 2015, 2014, 2013, 2012…)

1

In the context of this Magic Quadrant, cloud compute IaaS (hereafter referred to simply as “cloud IaaS” or “IaaS”) is defined as a standardized, highly automated offering, where compute resources, complemented by storage and networking capabilities, are owned by a service provider and offered to the customer on demand. The resources are scalable and elastic in near real time, and…

Gartner Magic Quadrant for SIEM Products (2016, 2015, 2014, 2013, 2012, 2011, 2010)

0

Gartner defines SIEM as a technology that aggregates data produced by security devices, network infrastructure and systems, and applications. Products in the security information and event management (SIEM) market analyze security event data and network flow data in real time for internal and external threat management. They collect, store, analyze and report on log data for incident response, forensics and…