VPN Debugging Commands to extract .elg and .xml files for troubleshooting

  fwaccel off (turn SecureXL off) vpn debug trunc vpn debug on vpn debug on TDERROR_ALL_ALL=5 Replicate the issue or wait for some time for VPN re-establishment vpn debug off vpn debug trunc off fwaccel on (turn SecureXL on) upload the following files to Checkpoint TAC so that they can run it inside their IKEContinue reading “VPN Debugging Commands to extract .elg and .xml files for troubleshooting”

Steps: Adding HA devices to Panorama

1. Enable Config Sync (untick on both)(commit). 2. Specify Panorama Server on HA Firewalls and Enable Policy, Objects and Templates options (commit). 3. Add Firewalls as Manages devices in Panorama using serial numbers (Tick Group HA Peers) (commit Panorama). 4. Import Device configuration to Panorama (Post Rule/Leave ticked) (Primary) 5. Import Device configuration to PanoramaContinue reading “Steps: Adding HA devices to Panorama”

Why Conduct Pen Test?

Why conduct a penetration test? An organisation should carry out a penetration test: In response to the impact of a serious breach on a similar organisation; To comply with a regulation or standard, such as the PCI DSS (Payment Card Industry Data Security Standard) or the EU GDPR (General Data Protection Regulation); To ensure the security of newContinue reading “Why Conduct Pen Test?”

Upload ASA software image without ASDM (CLI)(Using SCP)

(use pscp for windows) https://www.chiark.greenend.org.uk/~sgtatham/putty/latest.html ASA: ssh scopy enable PC: pscp C:\Users\fali\Desktop\asa964-17-lfbff-k8.SPA ABCCorp@196.29.167.170:disk0:asa964-17-lfbff-k8.SPA (use pscp -1 …… for version 1) ASA:  no boot system disk0:/asa952-6-lfbff-k8.SPA boot system disk0:/asa964-17-lfbff-k8.SPA boot system disk0:/asa952-6-lfbff-k8.SPA wr mem reload in 8:00

RA VPN Profiles and Policies Flow (Pre and Post Login)

1.DAP rules (Dynamic Access Policy)(NAC)(e.g. if firewall present on client machine etc.) 2.User Profile rules (User Account)(e.g. Two simultanous logins) 3.User Profile Group rules (Group Policy attached to the User profile)(e.g. WebTypeACL) 4.Connection Profile Group rules (selected at pre-login based on URL, Alias or Cert)(e.g. no http from portal) DefaultWebVPNGroup DefaultRAGroup Custom connection profile 5.DfltGrpPolicyContinue reading “RA VPN Profiles and Policies Flow (Pre and Post Login)”

Capture and Monitor traffic Checkpoint

# fw accel off (Turn Off secureXL) # tcpdump -nei eth1-08 port 22 or 23 -w /var/log/FTP_tcpd_ethx.pcap # tcpdump -nei Mgmt port 22 or 23 -w /var/log/FTP_tcpd_ethy.pcap # fw monitor -p all -e ‘accept host(10.50.x.);’ # fw monitor -e “accept src=10.200.7.30 and dst=172.24.32.101;” # fw monitor -e “accept dst=10.200.7.30 and src=172.24.32.101;” # fw monitor -pContinue reading “Capture and Monitor traffic Checkpoint”

Debug ip scp

debug ip scp To troubleshoot secure copy (SCP) authentication problems, use the debug ip scp command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug ip scp no debug ip scp Syntax Description This command has no arguments or keywords. Command Modes Privileged EXEC Command History Release Modification 12.2(2)T This command was introduced. 12.0(21)S This command was integrated intoContinue reading “Debug ip scp”