We feature technical articles across the entire IT spectrum - Networking, security, operating systems, cloud, and programming.

Tool – SSLReport

SSLReport provides the ability to scan a network and determine which hosts are running SSL/TLS based services and then query each of these servers/ports to determine which ciphers are supported. The output of this is then outputted within a CSV based format. Usage [root@william images]# bash sslreport.txt 10.1.1.0/23 home Checking for Binaries …..  *Successful execution … Read more

Brocade ADX – How to perform an image upgrade

Below shows the basic steps for upgrading a Brocade ADX. Copy Image First of all the image is copied from a TFTP server. Note : The option ‘secondary’ is used to ensure that the primary image is not overwritten. adx# copy tftp flash [tftp server ip] ASR12301c.bin secondary Check Flash Next, check the image has … Read more

Brocade ADX – Persistence

The Brocade ADX offers 2 main persistence methods ; sticky and cookie. Within this article we will look at both of these methods and the various configuration options of each one. Types Sticky With sticky traffic is sent to the same server based on the clients IP for duration of the sticky timeout duration. Sticky also … Read more

How to define a port range on a Juniper SRX

To create a range of ports within the SRX the following command is used. This example creates an application object named UDP-PORT-RANGE with a UDP port range of 5000-6999. set applications application UDP-PORT-RANGE protocol udp destination-port 5000-6999 Once created you can then add this to a group. This group can then be added to the necessary … Read more

Path MTU Discovery (PMTUD) / Path MTU Black Holes

What is MTU ? When sending traffic across a network, computers use something called an MTU (Maximum Transmission Unit). This (network interface) setting dictates the size of the largest frame it can send across the network. Below shows the MTU default, Network MTU(Bytes) X.25 576 IEEE 802.3/802.2 1492 Ethernet 1500 FDDI 4352 Token Ring 17914 … Read more

Mitigating DoS attacks on a Cisco ASA

Within this example we will configure modular policy framework to define a range of connection limits. This provides a basic means of protecting your environment against DoS attacks. Define Traffic First of all we define which traffic the MPF policy will be applied to. In the example below we exclude the host 8.8.8.8 whilst inspecting … Read more

How do I clear the Cisco ASA connection counters ?

Being that this command is slightly obscure I thought it was worth documenting. To clear the Cisco ASA connection counter the following command is used. cisco-asa(config)# clear resource usage resource conns

High CPU Usage on a Cisco CSS

Issue The Cisco CSS is showing a high level of CPU usage, even though the networking throughput does not appear excessively high nor is there a large number of EQL or DQL`s configured. CSS11501# sh system-resources cpu Chassis CPU Utilizations Module Name Module 5Sec 1Min 5Min —————————————————- CSS501-SCM-INT 1 90% 88% 75% CSS501-SSL-C-INT 2 0% … Read more

How to clone a MySQL database

 Below shows your the steps needed to clone a MySQL database. mysqladmin create [new db name] -u [username] –password=[password] && \mysqldump -u [username] —password=[password] [old db name] | mysql -u [username] –password=[password] -h [host] [new db name]