3rd party VPN/Invalid ID information/No valid SA (Summary subnet sent)

Scenario 1 – Wrong IPsec IDs are negotiated during IKE Quick Mode: Symptoms: “Invalid ID information” log in SmartView Tracker when the Security Gateway initiates a Quick Mode. “No valid SA” logs in SmartView Tracker when creating IPsec VPN tunnel with an interoperable device. Remote Access Client cannot access internal resources over the Site-to-Site tunnelContinue reading “3rd party VPN/Invalid ID information/No valid SA (Summary subnet sent)”

CCNA/CCNP Security

0.0 Upload ASA software image without ASDM (CLI)(Using SCP)1.0 Creating objects on ASA from a file of IPs and Putting then in an object group (CLI)2.0 Packet Capture ASA (ASDM/CLI)2.1 ASA Packet capture (ASDM)3.0 ASA and ASDM Upgrade (ASDM)3.1 ASA and ASDM Compatibility Matrix4.0 Syslog (Cisco ASA)4.1 ASA syslog configuration (ASDM/CLI)5.0 ASA not allowing pingContinue reading “CCNA/CCNP Security”

Creating objects on ASA from a file of IPs and Putting then in an object group (CLI)

Power Shell Script (Run it straight from powershell prompt/file must be in the same directory): ASA: object-group network Log4j_BadIP_Grp foreach($ip in Get-Content ip1.txt) { Write-output “object network Log4j_BadIP_$ip” | Tee-Object -FilePath ‘C:\Users\fali\output_asa.txt’ -append Write-output “Description NOC-2682-Created by FAli(Nettitude) on 18/12/2021” | Tee-Object -FilePath ‘C:\Users\fali\output_asa.txt’ -append Write-output “host $ip” | Tee-Object -FilePath ‘C:\Users\fali\output_asa.txt’ -append Write-output “object-groupContinue reading “Creating objects on ASA from a file of IPs and Putting then in an object group (CLI)”

What is the Difference between Network, Cyber and Info Sec?

Network security, cybersecurity, and information security are all related concepts, but they have slightly different meanings and scopes. Network security refers to the protection of computer networks from unauthorized access or attacks. It involves the use of various hardware and software technologies to secure networks and prevent intruders from gaining access to sensitive information. NetworkContinue reading “What is the Difference between Network, Cyber and Info Sec?”