Upgrading Check Point Gateway Cluster (R77.30)
Install / Upgrade Checkpoint Full HA (Gateway and Management) is the old post for installing or upgrading to R77.10. This post is recorded for R77.30 upgrading purpose with more details…
Learning, Sharing, Creating
Install / Upgrade Checkpoint Full HA (Gateway and Management) is the old post for installing or upgrading to R77.10. This post is recorded for R77.30 upgrading purpose with more details…
Configuring high availability requires two identical ASAs connected to each other through a dedicated failover link and, optionally, a Stateful Failover link. The health of the active interfaces and units…
Check Point Management Server is not only the central policy management place for Check Point products, but also holds all Check Point gateways logs. In real environment, external third party…
I were using TFTPD32 to transfer a image to Cisco 3560 switch. It was fine at the beginning then when it was almost done I got lots of O errors.…
During working on Juniper products, such as SRX, NSM and Space, sometimes, there are minor alarms in the system and it requires some actions to clear those alarms based on…
For Branch switches, please check Comparison of Cisco Switches: (2960 vs 3560), (Cisco 3560 X vs 3650 vs 3750-X vs 3850) Cisco 2900, 3900, and 4000 (4300 and 4400) Series…
1. Basic Commands man : manualls :List Directory Contentspwd :print working directorycd :change directorymkdir :Make directorycp :Copymv :Movefind and locate and whereiskill passwd :Passwordmd5sum :Compute and Check MD5 Message Digesthistory…
Worked on a used cisco switch 2960 which has been configured password. Following steps have been recorded how to get into recover mode. 1. Connect Console Cable Cisco provides a…
Junos Space is a comprehensive network management solution that simplifies and automates management of Juniper’s switching, routing, and security devices. To those security administrator who like command line, they will…
IPsec is a framework of open standards that provides data confidentiality, data integrity, and data authentication among participating peers. It provides these security services at the IP layer; it uses…
Digital certificates as an authentication method for IPSec VPNs is becoming increasingly popular for both remote access and site-to-site deployments. The use of digital certificates requires some form of PKI…
Pre-shared keys and digital certificates are two primary authentication methods in IKE that can be used in the context of IPSec VPN deployments. Digital certificates provide a means to digitally…