SecureXL Process Details
SecureXL is a patented technology consisting of a software package with an API for the acceleration for multiple, intensive security operations. In addition to the IPS, SecureXL also accelerates operations…
WebUI port change doesn’t survive a firewall policy push or reboot
Change WebUI port to 4434 from Command line: webui disable webui enable 4434 Unfortunately after a cpstop/cpstart or reboot, the 4434 port will not survive. It rolled back to 443…
Route-based VPN between Juniper and Cisco
Another useful post for route-based vpn from http://x443.wordpress.com/page/5/ Cisco router configuration: crypto isakmp policy 1 encr aes 256 authentication pre-share group 5crypto isakmp invalid-spi-recoverycrypto isakmp keepalive 10crypto isakmp key 0…
Policy NAT-ing with overlap message – Order is important
Existing rule : static (dmz,outside) 200.147.90.89 172.17.1.3 netmask 255.255.255.255 There is a special situation come up today. When 172.17.1.3 access to another site 200.200.200.200 , it has to be nat-ed…
Checkpoint Domain Object
Was thinking to use Domain Object as a source in our firewall rule. After consulted with checkpoint support, it seems impossible if your domain object represented multiple ip addresses. SK42128…
Add static route in Smoothwall
Add static route in Smoothwall Firstly, edit the file /etc/rc.d/rc.netaddress.up Above the 'echo "setting up firewall ……."', add: /sbin route add -net destination netmask subnetmask gw gateway devdeviceinterface ————————————– Edit /etc/rc.d/rc.firewall.up After the section on "# Allow packets that…
no response when ping MS Cluster’s ip address – Solution
There is a Citrix cluster deployed in our environment. But cluster ip not working from an outside network, although working fine in same network. Checked MS doc – http://technet.microsoft.com/en-us/library/cc732592(WS.10).aspx troubleshooting NLB, foud…
SecureXL Vs CoreXL Vs ClusterXL (Some Checkpoint Terms)
From Checkpoint Sites: “SecureXL: Security acceleration Patented SecureXL is a technology interface that accelerates multiple, intensive security operations, including operations that are carried out by Check Point’s Stateful Inspection firewall.…
Steps to Set up Juniper Secure Access (SA) / SSL Virtual Appliance
This products looks similar as UAC products. http://www.juniper.net/support/products/sa/ 1. Download file SPE Virtual Appliance …