Check Point – SNMP – SHA1 Support in R81

Photo by Carl Solder on Unsplash

Check Point has removed SHA1 support from R81. It is possible to get SHA1 back. Applies up to R81.20 clish add snmp usm user myuser security-level authPriv auth-pass-phrase TEMP-AUTH-PHRASE privacy-pass-phrase TEMP-PRIV-PHRASE privacy-protocol AES authentication-protocol SHA512 expert dbset snmp:v3:user:myuser:auth:proto .1.3.6.1.6.3.10.1.1.3 clish set snmp usm user myuser security-level authPriv auth-pass-phrase REAL-AUTH-PHRASE privacy-pass-phrase REAL-PRIV-PHRASE

SSH Configuration

Some Notes about OpenSSH configuration that comes in handy for me. This is have settings applied on Host or Domain base, use jump servers where needed, find the console for a device or use deprecated encryption when needed. Basic Options Host Hostname Port User Apply Settings per domain Host *. Protocol 2 TCPKeepAlive yes ServerAliveInterval …

Fortigate – Policy lookup

Tests is there someone listening netstat -an | findstr 0.0.0.0:80 TCP 0.0.0.0:80 0.0.0.0:0 LISTENING UDP 0.0.0.0:80 *:* Powershell port test Test-NetConnection -ComputerName "10.55.113.101" -Port 80 -InformationLevel "Detailed" Lookup soure interface get router info routing-table details 10.255.2.250 Lookup the policy diagnose firewall iprope lookup 10.255.2.250 30000 10.137.2.104 80 tcp port1 matches policy id: 1039431 The policy …

Fortigate – Fortimanager install issues and backward compatiblity

We utilize FortiManager's Provision CLI Templates to establish common configurations on our Firewalls This approach is practical to ensure that these settings are consistently applied during every firewall installation. However, we encounter from time to time the issue with FortiManager, that the CLI Templates lack awareness of the Firewall's specific versions. Unfortunately, the FortiGate CLI …

Cisco Nexus – Policy Based Routes

Photo by Carl Solder on Unsplash

So after a while some basic Cisco stuff. Thanks Craig for being the Guy you are. We had to divert traffic some traffic to an dedicated line for Netscope, to an different Internet Line. configure terminal ip access-list pbr-netscope-over-second-provider permit 10.255.86.0 0.0.1.255 3.123.155.214 0.0.0.0 permit 10.255.86.0 0.0.1.255 3.123.215.247 0.0.0.0 permit 10.255.86.0 0.0.1.255 3.123.221.103 0.0.0.0 permit …