Syslog Packet: The syslog packet size is limited to 1024 bytes and carries the following information: Facility Severity Hostname Timestamp Message — Syslog Port numbers: When sending messages using UDP the destination port is usually 514 When sending messages using TCP the destination port is usually 1468 — Syslog Message Format: Message This isContinue reading “Syslog (Cisco ASA)”
Author Archives: Farzand Ali
3rd party VPN/Invalid ID information/No valid SA (Summary subnet sent)
Scenario 1 – Wrong IPsec IDs are negotiated during IKE Quick Mode: Symptoms: “Invalid ID information” log in SmartView Tracker when the Security Gateway initiates a Quick Mode. “No valid SA” logs in SmartView Tracker when creating IPsec VPN tunnel with an interoperable device. Remote Access Client cannot access internal resources over the Site-to-Site tunnelContinue reading “3rd party VPN/Invalid ID information/No valid SA (Summary subnet sent)”
CCSA/CCSE
Nokia IPSO Checkpoint CLI Commands Checkpoint Commands1 Checkpoint Commands2 Checkpoint Commands3 0.0 CCSA R80 CBT Nuggets 0.1 Checkpoint Backward Compatibility Map 0.2 Checkpoint Firewall Packet Flow 1.0 How IPsec Site to Site VPN Tunnels Work 1.1 Remembering the 5 Things to Negotiate in IKE Phase 1 (IPsec) 1.2 How to Set Up a Site-to-Site VPNContinue reading “CCSA/CCSE”
CCNA/CCNP Security
0.0 Upload ASA software image without ASDM (CLI)(Using SCP)1.0 Creating objects on ASA from a file of IPs and Putting then in an object group (CLI)2.0 Packet Capture ASA (ASDM/CLI)2.1 ASA Packet capture (ASDM)3.0 ASA and ASDM Upgrade (ASDM)3.1 ASA and ASDM Compatibility Matrix4.0 Syslog (Cisco ASA)4.1 ASA syslog configuration (ASDM/CLI)5.0 ASA not allowing pingContinue reading “CCNA/CCNP Security”
Creating objects on ASA from a file of IPs and Putting then in an object group (CLI)
Power Shell Script (Run it straight from powershell prompt/file must be in the same directory): ASA: object-group network Log4j_BadIP_Grp foreach($ip in Get-Content ip1.txt) { Write-output “object network Log4j_BadIP_$ip” | Tee-Object -FilePath ‘C:\Users\fali\output_asa.txt’ -append Write-output “Description NOC-2682-Created by FAli(Nettitude) on 18/12/2021” | Tee-Object -FilePath ‘C:\Users\fali\output_asa.txt’ -append Write-output “host $ip” | Tee-Object -FilePath ‘C:\Users\fali\output_asa.txt’ -append Write-output “object-groupContinue reading “Creating objects on ASA from a file of IPs and Putting then in an object group (CLI)”
How to Create an IPSec Tunnel to AWS (Amazon Web Services) From a Palo Alto Firewall with Static Routing
How to Create an IPSec Tunnel to AWS (Amazon Web Services) From a Palo Alto Firewall with Static Routing
ACE/PCNSE
Palo Study Notes 0.0 Palo Alto CBT Nuggets0.1 Palo Alto Training Videos 1. How to Import and Export Address and Address Objects (CLI) (Creating objects from a file of IPs)2. How to Create an IPSec Tunnel to AWS (Amazon Web Services) From a Palo Alto Firewall with Static Routing3. Revert Firewall Configuration Changes (Revert toContinue reading “ACE/PCNSE”
How to Import and Export Address and Address Objects (CLI) (Creating objects from a file of IPs)
How to import export address and address objects Power Shell Script (Run it straight from powershell prompt/file must be in the same directory): Palo Script (object group is log4j) : foreach($ip in Get-Content ip1.txt) { Write-output “set address Log4j_BadIP_$ip ip-netmask $ip” | Tee-Object -FilePath ‘C:\Users\fali\output_palo.txt’ -append Write-output “set address-group log4j static Log4j_BadIP_$ip” | Tee-Object -FilePathContinue reading “How to Import and Export Address and Address Objects (CLI) (Creating objects from a file of IPs)”
What is the Difference between Network, Cyber and Info Sec?
Network security, cybersecurity, and information security are all related concepts, but they have slightly different meanings and scopes. Network security refers to the protection of computer networks from unauthorized access or attacks. It involves the use of various hardware and software technologies to secure networks and prevent intruders from gaining access to sensitive information. NetworkContinue reading “What is the Difference between Network, Cyber and Info Sec?”
Syslog on ASA
Syslog Packet: The syslog packet size is limited to 1024 bytes and carries the following information: Facility Severity Hostname Timestamp Message — Syslog Port numbers: When sending messages using UDP the destination port is usually 514 When sending messages using TCP the destination port is usually 1468 — Syslog Message Format: Message This isContinue reading “Syslog on ASA”