Admin

Author's details

Date registered: 25th July 2015

Latest posts

  1. Information Security RISK response strategies — 2nd February 2021
  2. Time to crack passwords — 2nd March 2020
  3. Connection throttling iRule — 23rd February 2020
  4. IPSec VPN on Cisco ASA — 6th April 2019
  5. Palo Alto WildFire explained — 6th April 2019

Author's posts listings

Jan 30

SDM Templates on Cisco switch

SDM IPv4

SDM (Switching Database Manager) is used on Cisco Catalyst switches to manage the memory usage of the TCAM. For example, a switch that is only used for switching won’t require any memory to store IPv4 routing information. On the other hand, a switch that is only used as a router won’t need much memory to …

Continue reading »

Jan 29

CDP and LLDP on Cisco catalyst switch

CDPvsLLDP

CDP and LLDP are both discovery protocols used to find information about first hop neighbor network devices. The Cisco Discovery Protocol (CDP) is a proprietary Data Link Layer protocol developed by Cisco Systems. It is used to share information about other directly connected Cisco equipment, such as the operating system version and IP address. CDP …

Continue reading »

Jan 29

Upgrading an Active/Standby Failover Configuration on Cisco ASA

In this article are listed steps to upgrade Cisco ASA firewall setup in Active/Standby Failover Configuration. We assume that console connection is not available and only remote SSH connectivity is possible. Note: During reload and failover you may be disconnected Prep work: – New image (asa825-51-k8.bin) is already loaded into Active and Standby unit. Upgrading …

Continue reading »

Oct 20

How to copy files to cisco ASA via SSH

There’s number of ways to copy files to Cisco ASA firewall. Most common example is TFTP we all learned to use on CCNA course or reading articles on the Internet. There’s are two issues to this method: First problem is security as TFTP use clear text transmission is not preferred method from security standpoint . …

Continue reading »

Oct 15

IPMI Security Best Practices

IPMI-Block-Diagram

Great document created by Dan Farmer regarding IPMI security and best practices. Must do read for all Sys Admins and Security Engineers. IPMI Security Best Practices

Oct 09

How to Enable IPSec Traffic Through a Firewall

IPSec does not disturb the original IP header and can be routed as normal IP traffic. Routers and switches in the data path between the communicating hosts simply forward the packets to their destination. However, when there is a firewall or gateway in the data path, IP forwarding must be enabled at the firewall for …

Continue reading »

Oct 06

Configuring IPsec or SSL VPN to Bypass ACLs

To permit any packets that come from an IPsec or SSL VPN tunnel without checking ACLs for the source and destination interfaces, enter the sysopt connection permit-vpn command in global configuration mode. You might want to bypass interface ACLs for IPsec or SSL VPN traffic if you use a separate VPN concentrator behind the ASA …

Continue reading »

Aug 26

Identity NAT vs NAT exempt on Cisco ASA

Identity NAT and NAT exempt are commonly considered the same kind of ‘no natting’ configuration when in practice both methods are configured slightly different as well as firewall’s internal processing. Identity NAT configuration nat (inside) 0 10.1.1.3 NAT Exempt configuration access-list NO_NAT extended permit ip 192.168.0.0 255.255.255.0 10.10.10.0 255.255.255.0 nat(inside) 0 access-list NO_NAT Identity NAT: …

Continue reading »

Aug 25

TCP connection flags on Cisco ASA

asa_tcp_connection_states

During troubleshooting connectivity issues on Cisco ASA firewall it’s useful to understand TCP flags displayed in connection table. Example of connection table: TCP connection stages with corresponding flags: Flag types with brief description available on ASA firewall:

Aug 25

POODLE attack

poodle attack

A POODLE attack is an exploit that takes advantage of the way some browsers deal with encryption. POODLE (Padding Oracle On Downgraded Legacy Encryption) is the name of the vulnerability that enables the exploit. POODLE can be used to target browser-based communication that relies on the Secure Sockets Layer (SSL) 3.0 protocol for encryption and …

Continue reading »

Older posts «

» Newer posts