We feature technical articles across the entire IT spectrum - Networking, security, operating systems, cloud, and programming.

PIX / ASA 8.0(4)16 – Site to Site VPN Sample Config

Below is a sample config for 2 site to site vpns from a PIX running 8.0(4)16. One peer being 192.168.2.100, and the other 192.168.1.100. Please note : This isn’t a tutorial but merely just a sample config that can be used as a reference point.     isakmp enable outside    isakmp policy 10          encryption des         … Read more

Denying Instant Messenger Protocols via Policy Based Rule’s

Below is a list of the main Instant Messenger applications (including ports and destinations) for the denial of use via policy based rules. Please note : With creating policy based rules the following rules will be required, Destination any with a service port of the below ports (excluding http and https) Destination of the below … Read more

-bash: /dev/null: Permission Denied

Issue After creating a new user account you may find that on login you recieve the following error, -bash: /dev/null: Permission denied -bash: /dev/null: Permission denied -bash: /dev/null: Permission denied  Solution /dev/null is a character special device which should have read+write permissions for everybody.Run the following to confirm the current permissions for /dev/null, ls -l … Read more

ESXi – Connecting to a named pipe

Within this article we will be creating a named serial pipe on 2 machines to allow us to connect to a virtual machines serial port. In this example we will use hyperterminal on a virtual XP machine to connect to the serial port of another virtual machine (in this case SUSE Linux) Adding a serial … Read more

Netscreen – Rule Processing Order

Rule Processing Order The general processing order is as follows, Look for a policy between the ingress and egress zones If no policy is found (in step 1), search for a Global policy If no Global policy is found and if the ingress zone is same as the egress zone, apply the intra-zone block i.e … Read more

ESX Convertor (Windows 7) – The session is not authenticated

When trying to authenticate, and convert machines within your VMware convertor you recieve the following error :      The session is not authenticated Fix Close VMware Convertor Goto ‘Start / Run’ and type services.msc. Restart the services VMware vCenter Converter Agent and VMware vCenter Converter Server Relaunch VMware Convertor. Still have Issues ? If this … Read more

ESX Convertor – The session is not authenticated

Issue When trying to authenticate, and convert machines within your VMware convertor you recieve the following error :        The session is not authenticated Fix Within windows go into your task manger and kill all of your VMware convertor processes that are currently running. Reference http://communities.vmware.com/thread/195575 Still have Issues ? If this has still not … Read more

Netscreen – Changing your Duplex settings

This article was written based on the ns5gt. By default all interfaces are set to auto negotiate. Show Duplex ns5gt-> get interface trust port phy Port 1:  link is up, 100 Mbps, auto negotiated to full duplex Port 2:  link is up, 100 Mbps, auto negotiated to full duplex Port 3:  link is up, 100 … Read more

Check Point – Enabling Gratious ARP (Failover)

If you firewall isn’t Gratuitous ARPing when it fails over, you will need to edit the file $FWDIR/boot/modules/fwkern.conf, and add the following line (if it doesn’t exist create it), fwha_use_arp_packet_queue=1 Then reboot the machine.