IT Security & Network Engineering Knowledge Base

Practical documentation and technical guides on network security, firewalls, Linux systems, monitoring, and automation.
We feature technical articles across the entire IT spectrum - Built from real-world experience and continuously updated.

Mitigating DoS attacks on a Cisco ASA

Within this example we will configure modular policy framework to define a range of connection limits. This provides a basic means of protecting your environment against DoS attacks. Define Traffic First of all we define which traffic the MPF policy will be applied to. In the example below we exclude the host 8.8.8.8 whilst inspecting … Read more

How do I clear the Cisco ASA connection counters ?

Being that this command is slightly obscure I thought it was worth documenting. To clear the Cisco ASA connection counter the following command is used. cisco-asa(config)# clear resource usage resource conns

High CPU Usage on a Cisco CSS

Issue The Cisco CSS is showing a high level of CPU usage, even though the networking throughput does not appear excessively high nor is there a large number of EQL or DQL`s configured. CSS11501# sh system-resources cpu Chassis CPU Utilizations Module Name Module 5Sec 1Min 5Min —————————————————- CSS501-SCM-INT 1 90% 88% 75% CSS501-SSL-C-INT 2 0% … Read more

How to clone a MySQL database

 Below shows your the steps needed to clone a MySQL database. mysqladmin create [new db name] -u [username] –password=[password] && \mysqldump -u [username] —password=[password] [old db name] | mysql -u [username] –password=[password] -h [host] [new db name]

Brocade ADX – Content Switching Rewrite

A typical issue when SSL termination is performed on the load balancer is that URL redirects from the backend servers still contain a ‘http://’ prefix rather then ‘https://’ Within this article we will show the required commands for creating a Content Switching Policy that will rewrite any URL`s containing a ‘http://’ prefix to ‘https://’ for … Read more

Joomla – How to add a custom field

Within this tutorial, I will show you the necessary steps required to add a custom field named ‘Version’ to your Joomla site. This field will be displayed within both the administrator console and the published article. 1. Configure Database Within phpmyadmin run the following SQL command ALTER TABLE `jos_content` ADD `vers` VARCHAR( 255 ) NOT … Read more

BigIP F5 LTM – How to Create a Sorry Page with Image

Within this article we will show you the necessary steps required to create a sorry page (containing an image) that will be published when there are no available pool memebers for the spefic VIP (Virtual Server). Note : This example is based upon serving a png image. Encode Image First of the image that will … Read more

BigIP F5 LTM – TCP Syslog

The F5 LTM allows for the transmission of syslog messages using TCP connections via the use of the syslog-ng daemon. Syntax In order to configure TCP syslog the following command(s) are used, bigpipe syslog include ‘”destination d_tcp { tcp(\”<SYSLOG IP>\” port(<PORT>));};log { source(local);\ destination(d_tcp);};”‘bigpipe save all Confirmation To confirm the configuration has been added use … Read more

Cisco ASA: Traffic blocked when TCP syslog server is unreachable

Issue When the transport mechnism TCP is configured for Syslog (trap logging) and the Cisco ASA is unable to reach the designated syslog server, the security appliance will prevent any further new network sessions. Solution In order to ensure that the status of a TCP-based syslog server is irrelevant to new sessions the following command … Read more