A Quick Test to Check Point Capsule Cloud Service
Not sure how many Checkpoint customers are using this service, but it is quite attractive when I heard about it. It will help your remote users connect with your global…
Error :%CERM-4-TX_BW_LIMIT: Maximum Tx Bandwidth limit of 85000 Kbps reached for Crypto functionality with securityk9 technology package license
This error message is coming in the one of our router’s log constantly. 081062: Feb 18 09:24:08.621 EST: %CERM-4-TX_BW_LIMIT: Maximum Tx Bandwidth limit of 85000 Kbps reached for Crypto functionality…
Basic Cisco Tacacs+ Configuration With Free Tacacs+ Software for Windows – Part 2
Part 1 has shown how to install the software Tacacs+ on a windows 2008 server and some fastest configuration to get it working with your Windows server administrators group. In…
Basic Cisco Tacacs+ Configuration With Free Tacacs+ Software for Windows – Part 1
Both RADIUS and TACACS+ provides centralized validation of users attempting to gain access to a both protocols supported network devices, which provides Authentication, Authorization, and Accounting (AAA) services on network…
Flexible Netflow (FnF) Configuration for PRTG
If you are still not knowing FnF (Flexible Netflow) technology, probably your Netflow knowledge did not get updated for last a couple of years. Basically Flexible Netflow allows user to…
Free Software Across the Great Firewall (免费翻墙软件)
All information are collected from Internet. From: https://pao-pao.net/article/111 从2015年1月1日开始的,Chinese GFW升级,很多免费翻墙软件相继失效. Here are some may still working: 1. 自*由*门 翻墙软件中的“常青树”。最新版本7.52依然好用,就是速度稍微慢了一点。 How to Use Link: 翻墙七种武器之多情环:自由门与无界 2. 无*界*浏*览*14.04 无界,几乎算作自由门的姐妹款,是由美国无界万国公司创建在GIFT技术平台上的免费软件,也是由海外法轮功学院所开发,和动态网同属于美国自由网络联盟,曾经被哈弗大学在2007年的研究调查中被评为“效果最好的翻墙工具”. Usage is same…
CVE-2015-0235: GHOST – A Critical Vulnerability in the Glibc Library
GHOST is a ‘buffer overflow’ bug affecting the gethostbyname() and gethostbyname2() function calls in the glibc library. If a remote attacker can make an application call to gethostbyname() or gethostbyname2(),…
Build NTP Windows Server for Network Devices (not Win32Time)
Based on Cisco Document (ID108076) Troubelshoot Network Time Protocol (NTP), Cisco devices are not able to Sync NTP to W32 Based Time Service. “Windows W32Time shows that it is an…
Configuration DHCP Relay in routing instance on Juniper SRX Devices
I was having DHCP Relay configured on SRX 240H Cluster devices, it was quite straightforward experience, and Juniper KB 15755 covered all points when I first configured it. It was…
Using PKI Build Route-Based IPSec VPN between Juniper SRX
There was a task to change IPSec authentication method from Pre-share key to PKI Certification based. It used on SRX240H and SRX1400 firewalls. This post records the steps and troubleshooting…
Monitoring Juniper SRX Firewall CPU, Memory and Flow Session Information from PRTG
While using PRTG to monitor our firewalls, we found by default it could not poll Juniper SRX’s CPU and flow information with auto discovery method. From command line, we are…
Archive Juniper STRM (IBM Qradar) Logs to remote server
Our Juniper STRM is running out of space after receiving more and more logs from Check Point management server and Juniper NSM. Since my STRM 500 only has about 400G…