IT Security & Network Engineering Knowledge Base

Practical documentation and technical guides on network security, firewalls, Linux systems, monitoring, and automation.
We feature technical articles across the entire IT spectrum - Built from real-world experience and continuously updated.

Cisco ASA – How do VPN Filters work ?

Introduction Within this article we will look into how VPN filters work and also how to configure them on a Cisco ASA firewall. As the name suggests VPN filters provide the ability to permit or deny post-decrypted traffic after it exits a tunnel and pre-encrypted traffic before it enters a tunnel. Note : When the … Read more

Vyatta Unable to log into GUI: “Username or password is incorrect”

Issue When trying to access the GUI you may observe the following error, Username or password is incorrect.Failed to parse server data. Solution This is due to a bug with VSE 6.5 R2. Which is caused by the Vyatta Appliance not having an interface named ‘eth0’ present. To resolve this, Edit the file ’/config/config.boot’ via … Read more

Django – How can I pass a string from a URL to a view ?

Within Django the are 2 ways of using a URL parameter within a view. They are via URLConf or by using request.GET. URLConf With this method the URLConf file is configured to define your URL parameter via the use of regex. Say that we have a URL that is ‘www.domain.co.uk/user=value’ and we want to grab … Read more

MySQL – How to reset a forgotten Root password

I’m sure that we have all done it. Yep, that’s right you’ve forgotten the MySQL root password. Fear not my fellow conrade, with a few simple simple commands you will be back in control. Stop MySQL First of all stop MySQL. /etc/init.d/mysqld stop Connect to MySQL Next instruct MySQL to ignore the GRANT Tables. Then … Read more

BIGIP F5 LTM – Action on Service Down

Background “Action on Service Down” defines the action that should be taken once the pool member has been marked as “down” by the associated healthcheck, after it has been selected as the load balancing target for a connection. Configuration To configure “Action on Service Down” goto the GUI and then to ‘Local Traffic / Pools’. … Read more

Outlook 2010 – The ‘Delete Conversation’ Shortcut

After finding this amazing shortcut the other day I thought it worth sharing. To ignore a conversation (which moves them to the deleted items) use the shortcut <CTRL+DEL>. Further details can be found here http://office.microsoft.com/en-gb/outlook-help/ignore-all-email-messages-in-a-conversation-HA010361232.aspx

Vyatta – How to enable flow accounting

Flow accounting provides the ability to display statistics on your network traffic. And is defined on a per interface basis. Below shows you a quick summary on how to enable flow accounting and also how to view the statistics. Enable First of all flow accounting is enabled on each of the interfaces. vyatta@vyatta# set system … Read more

Vyatta – How to configure an IPSEC site to site VPN

Within this article we will show the necessary steps required to build a site to site IPSEC VPN. The following example consists of the following encryption domain:  Local  Remote Peer  2.2.2.2  1.1.1.1 Endpoint  192.168.3.0/24  172.16.0.0/16 NAT First of all 2 NAT rules are configured to ensure the traffic is not NAT`d. set nat source rule … Read more

Vyatta – How do I secure management access ?

In order to secure management access you will need to A) enable the firewall and B) create a firewall policy and assign this to your management interface. Enable Firewall First of all enable the firewall. set firewall                                         set firewall state-policy related action accept      set firewall state-policy established action accept   set firewall state-policy invalid action drop … Read more