Troubleshooting Cisco IPSec Site to Site VPN – “IPSec policy invalidated proposal with error 32”
There was vpn set up recently using Cisco Router to connect Check Point firewall. It seems quite simple task but “IPSec policy invalidated proposal with error 32” made me go…
Real-Time Cyber Attack Threat Map
More and more security companies use a webpage to show their monitored global security events such as the Live Status of Cyber Attacks being launched from where and who is…
CentOS Basic Configuration
The CentOS Project is a community-driven free software effort focused on delivering a robust open source ecosystem. For users, CentOS offers a consistent manageable platform that suits a wide variety…
F5 BigIP LTM v11.5.3 Virtual Appliance HA Configuration – Part 2
This post is second part for configuring F5 BigIP LTM v11.5.3 High Availability. You can find other related posts in this blog: F5 Big IP 2000s Appliance Initial Configuration F5…
Check Point R80 Public Released to Download – SK108623
Check Point R80 Security Management Server is released on March 31 2016 in SK108623. R80 Upgrade Verification Service Check Point Community Exchange Point Upgrade/Download Wizard R80 Downloads SmartConsole GUI client…
F5 BigIP LTM v11.5.3 Virtual Appliance HA Configuration – Part 1
BIG-IP Virtual Edition (VE) is a version of the BIG-IP system that runs as a virtual machine. Supported modules include Local Traffic Manager, BIG-IP DNS (formerly Global Traffic Manager), Application…
Cisco IOS Command Tips and Tricks – Part 1
Since the list is getting longer and longer, I am splitting it into two posts: Cisco IOS Command Tips and Tricks – Part 1 Cisco IOS Command Tips and Tricks…
Mobile Iron Sentry VM Installation
What is Mobile Iron Sentry? Mobile Iron Centry provides access control for email. Sentry connects to Microsoft ActiveSync-enabled email systems such as Microsoft Exchange, IBM Lotus Notes, Google Gmail, and…
Ransomware Locked Files on My Test Machine
One of my test machines which I am using to download and test software from Internet was hit by Ransomware recently. Check out what it did to my machine. In…
How Firewalls (Security Gateways) Handle the Packets? (Traffic Flow)
Different firewall (security gateway) vendor has different solution to handle the passing traffic. This post compiles some useful Internet posts that interpret major vendors’ solutions including:1. Checkpoint2. Palo Alto3. Fortigate4.…
Check Point R80 Management Installation – Part 2 – SmartConsole
In “Check Point R80 Management Installation – Part 1 – Basic Installation“, we can see the steps for installing R80 is similar as previous version. This pose will present how…
Check Point R80 Management Installation – Part 1 – Basic Installation
Check Point finally announced their R80 Security Management from their website and also by email. Here is the email I got on March 2nd. One Step Ahead Discover R80 We…