Brocade ADX: HTTP Packets Dropped when using Pipelining & CSW

Symptoms When enabling CSW and running HTTP pipelining you may experience a breakdown in your HTTP session. Issue When enabling CSW on a Virtual Server pipelining is enabled on the designated port by default. The issue occurs when a second GET request comes in before the first GET/POST answer is fully received from the server (this … Read more

ASA – Anyconnect (Basic Setup)

Within this article we will configure a basic Anyconnect setup. The Anyconnect client provides the ability to securly connect to your LAN via TLS/DTLS (TLS over UDP). Enable WebVPN asa84(config)# webvpnasa84(config-webvpn)# enable outsideINFO: WebVPN and DTLS are enabled on ‘outside’.asa84(config-webvpn)# anyconnect image disk0:/anyconnect-win-2.5.2014-k9.pkgERROR: The specified AnyConnect Client image does not exist.asa84(config-webvpn)# anyconnect enableasa84(config-webvpn)# exit Create User … Read more

Juniper SRX – How to configure a trunk/access port

On the SRX Branch Series each interface can be configured as either layer 2 or layer 3. These are shown below : Routed Ports – Layer 3 (inet) Bridge – Layer 2 (only used for transparent mode) Ethernet-switching – Layer 2 (switchport) Within this article we will look at how to configure a trunk and … Read more

BIG-IP F5 LTM – Geolocation

One great feature of the F5 Local Traffic Manager is ability to distribute traffic basic on its geographical location. This feature was introduced within v10.1 thanks to F5`s partnership with Neustar (previously) Quova. The geolocation component uses a (local) IP geolocation database (on the F5) to determine the geographically location of the IP address. To … Read more

Brocade ADX – How to Configure SSL/TLS

The Brocade ADX offers 2 ways to configure SSL. These are, SSL (Termination) – Allows for SSL termination at the loadbalancer so that unencrypted traffic can be sent onto the backend servers. This is also known as client side encryption/decryption. SSL Proxy – Allows for the Brocade ADX to decrypt and then re-encrypt the traffic … Read more

Brocade ADX – Policy-Based Server Load Balancing

Policy-Based Server Load Balancing (PB-SLB) provides the ability to distribute traffic based on the source IP address of the client. There are 2 ways in which to configure PB-SLB. You can either pull a list of IP`s from a TFTP server or define the IP`s directly on the ADX.This example is based on defining the … Read more

How do I tab multiple lines within VI ?

Within this article we will looking at the steps required to tab multiple lines within VI.This feature is great for ensuring readability, when editing indent based languages such as Python or just programming in general. Steps Press “<SHIFT> + v” to enter VISUAL LINE mode. Select the text you wish to indent but using either … Read more

What are NS Record’s ?

NS (Name Server) Records are used within the Domain Name System (DNS) to determine which name servers are authoritative for a domain. NS records also provide name server delegation. Example Within this example we have a domain named example.com. The parent zone (.com) will contain the NS records for this zone.  Now, if we wanted to … Read more

Cisco ASA & Juniper Netscreen VPN Overlapping Encryption Domains

Purpose The purpose of this article is to describe the various steps required to create a site to site VPN between a Cisco ASA and a Juniper Netscreen when both sides have overlapping subnets. Example Within this example each side will have an endpoint of 192.168.10.0/24. Because of this both sides will present their endpoint … Read more