We feature technical articles across the entire IT spectrum - Networking, security, operating systems, cloud, and programming.

ASA Capture Examples

Below are a couple of ASA caputre examples. This is meant for more of a copy and paste function then an overall capture tutorial. access-list based access-list capture1-acl permit ip host [ip] host [ip]capture capture1 type access-list capture1-acl interface [interface] host / port based capture capture2 [interface] match ip host [ip] host [ip]capture capture3 [interface] … Read more

How does traceroute calculate asymmetric routing ?

This was a question i raised a while ago but never ended up getting round to creating an article. So as we know the basics of traceroute is that it sends out a bunch of UDP packets each packet with a TTL 1 higher then the previous one. When the hop receives the packet and … Read more

How do I configure IPv6 in Windows XP ?

In this article we will show you the steps involved in configuring you Windows XP device with IPv6. All commands should be run via the command prompt. Enable IPv6 ipv6 install Configure IP If you are not using Stateful or Stateless IPv6 address Autoconfiguration you can manually configure your settings using the following commands : … Read more

Netscreen IPv6 Tunnel Guide

Below shows you the steps on how to configure a tunnel that will encapsulate your IPv6 traffic within an IPv4 tunnel. Please Note : Below uses the Zone Work which is the equivalent to Trust and contains eth1. Ethernet3 is the untrust interface. Enable IPv6 Add the following command and then reboot your device, set … Read more

Check Point Tool – dbdel ver3.1

Fir3net.com is pleased to release dbdel ver3.1. This is basically a wrapper for Check Points existing dbver tool, but allows you to remove 100`s of Database Revisions with one simple command string. Unlike dbver where you have to add each database revision id. This allows you to add the amount your want to remove and … Read more

The Netscreen Proxy ID problem

A proxy-ID is used during phase 2 of Internet Key Exchange (IKE) Virtual Private Network (VPN) negotiations. Both ends of a VPN tunnel either have a proxy-ID manually configured (route-based VPN), or simply use a combination of source IP, destination IP and service in a tunnel policy. When phase 2 of IKE is negotiated, each … Read more

Solaris Upgrade Export “Error: Failed to execute ‘gtar -c -C”

When running an upgrade_export on a Solaris Smart Centre you may receive the following error :     Compressing the files… gtar: Only wrote 2047 of 10240 bytes to export.tgz.tar gtar: Error is not recoverable: exiting now     Error: Failed to execute ‘gtar -c -C “/opt/CPsuite-R65/fw1/tmp/upgrade_temp_dir” -f “export.tgz.tar” .’ command [ 26409     1]@#######[10 May 15:35:27] Compress: … Read more

What is a Floating Route ?

A floating route uses a higher preference to ensure that it is used a primary route.  In the event of the floating route being removed from the routing table (due to Dynamic Routing or an Interface going down) the other route takes preference and is used. set route [dst ip]/[mask] vrouter [vr name] preference [perf]

How do I create an IPSO backup via clish ?

The following will show you how to save a full IPSO backup via the clish CLI. This will backup all of the operating system configuration such as routes, proxy arps, interface settings etc. Backup  This will create a backup within the  /var/backup/ directory called ipso-backup_[date].tgz clish -c “set backup manual filename ipso-backup”clish -c “set backup … Read more

Change an IP address on a IPSO Nokia Firewall via clish

Below shows you the commands required to change the IP address of an interface within clish on a IPSO Nokia gateway, add interface eth1c0 address IP [NEW IP]/[NETMASK] delete interface eth1c0 address [OLD IP] set interface eth1 speed 100M duplex full active on set interface eth1c0 enable Below gives you an example : nokia-firewall[admin]# clish … Read more