Network topology with graphviz

March 16, 2012

5

I am lazy that’s the truth, I will not paint with a microsoft Visio and not even with dia any networking topologies. It must be possible to do it with a program. A good question would be, how much time we need for a program and how much would it be if we would do […]

save and rotate backups

March 16, 2012

0

This is a really simply and of course my first script to copy firewall backups to a remote server and rotate the backups. – The script generate log files and list the files that were modified (copied or deleted). – The first part of the script checks on the remote server the old backups and […]

Timestamps of a file

March 16, 2012

1

For example to make a correct log file rotation or backup rotation or other kind of file rotation it is good to understand what kind of timestamp a file has and which one can be affected and how it can be affected. Here are documented the basic 3 linux commands that can be used to […]

Posted in: Linux, Security, tools

Export and import the trustpoint

March 16, 2012

0

To test something in a Lab with another firewall or migrate a whole VPN with certificate to another ASA firewall we have a possibility to migrate the certificate of the firewall to another one. To do it so easily on a Checkpoint firewall  will be always just a dream… The exported data holds the followings: […]

Posted in: ASA, Cisco, Security, VPN

Backup the Firewall

February 16, 2012

0

The Firewall backup can be done manually day by day if we have sufficient work force or can be done automatically. In IPSO it is with the GUI and with the CLI very easy, but some question remains even if we read the official doks about it. I play again with CLI, if you need […]

Tagged: ,
Posted in: Backup, Checkpoint, IPSO, Security

How to loose everything and get it back

December 29, 2011

0

I had a dualboot laptop with windows XP and Ubuntu 11.10. I had the following partitions for Ubuntu: partition for “/boot”. This was the boot partition root partition “/” swap partition and an ntfs partition for windows and another one for the data. After installing XP I have lost the partitions table and the windows […]

Tagged:
Posted in: Troubleshooting

Security tools with ddwrt and optware – Part II.

November 10, 2011

0

..!OPEnvPN!.. This is madness! It is the simpliest and cheapest ssl vpn solution I have ever seen and I can use it on my ddwrt router. I have documented here what and how I did, just in case I need it later, but shortly it is an openvpn setting on ddwrt router with certificate authentication. […]

Tagged: ,
Posted in: ddwrt, Linux, Security

Migrate one CMA from a Provider-1 R70.40 to another Provider-1

November 8, 2011

1

I wanted to do some tests with only one CMA of our live Provider1 in Lab, that is why I tried to migrate just one piece. I could do a complete mds backup and restore in Lab, but if the provider has a lot of CMAs then it requires in Lab the same Hardware or […]

What is this, a cheese? the checkpoint ports

November 7, 2011

0

I have not seen such a Server with soo much opened ports like a Provider1. The communications on those ports are encrypted, but they are opened to everybody on the Lan of that server, so it should be strongly adviced to plan for a Checkpoint Firewall Management a separated Management LAN. The processes are documentet […]

Security tools with ddwrt and optware – Part III.

November 6, 2011

0

privoxy I am too tired to write about privoxy so I just copy the description from privoxy.org: “Privoxy is a non-caching web proxy with advanced filtering capabilities for enhancing privacy, modifying web page data and HTTP headers, controlling access, and removing ads and other obnoxious Internet junk. Privoxy has a flexible configuration and can be […]

Tagged: ,
Posted in: ddwrt, Linux, Security