Top Security Events / Vulnerabilities in 2018, 2017, 2016, 2015, 2014
Here is a list of top vulnerabilities found since 2015, which I am still working on to compile them together. It will come from different sources and includes those which…
Learning, Sharing, Creating
Here is a list of top vulnerabilities found since 2015, which I am still working on to compile them together. It will come from different sources and includes those which…
Continue with previous post “Installation and Configuration of Sophos Enterprise Console 5.1 in your Networks – 1. Installation” Steps: After the installation of the Sophos Enterprise Console you had logged…
This post is a detail documentation how to install Sophos Enterprise Console 5.1 in your networks. Pre-Requirements: copy the Sophos Enterprise Console to the Server (ProdInstall\Sophos\Sophos Console\sec_5.1.exe) check if you…
My previous post (Juniper SRX DB mode (Debug mode)) described a situation which is one of firewall cluster members got stuck into DB mode. Although it was fixed eventually by…
Our network environment is completely supported by Cisco switches from 2960, 4500, 3850 ,etc. Virtual environment is using Citrix Xen and Vmware products. Starting from a couple of months ago…
Our Sophos Management Server is installed behind a Palo Alto firewall, which is used to centrally update and manage all internal Sophos clients. After new installation of this Sophos Management…
Summary: ACI is an open-source, centralized policy model that connects to all components of the data center and controls the network and information flow. ACI is a principle of action…
Check Point and Microsoft has a test drive for R80.10 lab. The lab has been designed very well to understand Check Point architecture and features To summarize what I have…
An Intrusion Detection and Prevention (IDP) policy lets you selectively enforce various attack detection and prevention techniques on the network traffic passing through your SRX Series. The SRX Series offer…
Palo Alto Networks has developed Virtualized Firewalls VM series to run in virtual environment. Here is the list for supported hypervisors from its website: The VM-Series supports the exact same…
One request came up for a simple internet SIP connection to SIP provide Goldline. There are VoIP devices involved in this task, such as Cisco Router AS5350 and IP PBX,…
Cisco IKEv1 is still popular in VPN configuration. Most of my vpn configuration is based on IKE v1 although there are more demands for v2. I had a post “Cisco…