<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" media="screen" href="/~d/styles/atom10full.xsl"?><?xml-stylesheet type="text/css" media="screen" href="http://feeds.feedburner.com/~d/styles/itemcontent.css"?><feed xmlns="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" xmlns:feedburner="http://rssnamespace.org/feedburner/ext/1.0"><id>tag:blogger.com,1999:blog-8606292508453252400</id><updated>2020-02-28T15:18:39.921-05:00</updated><category term="CheckPoint" /><category term="Juniper" /><category term="Linux" /><category term="Cisco" /><category term="Fortinet" /><category term="WAF" /><category term="one-liners" /><category term="BlackBerry" /><category term="Notes" /><category term="SQL" /><title type="text">Network Security Insider</title><subtitle type="html">Tidbits I&amp;#39;ve collected on various firewall and IDS/IPS technologies over the years. Linux, CheckPoint, Juniper Netscreen/SSG, Cisco ASA, Cisco IPS, &amp;amp; Sourcefire/Snort</subtitle><link rel="alternate" type="text/html" href="http://netsecinsider.blogspot.com/" /><link rel="next" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default?start-index=26&amp;max-results=25&amp;redirect=false" /><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="https://img1.blogblog.com/img/b16-rounded.gif" /></author><generator version="7.00" uri="http://www.blogger.com">Blogger</generator><openSearch:totalResults>55</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><atom10:link xmlns:atom10="http://www.w3.org/2005/Atom" rel="self" type="application/atom+xml" href="http://feeds.feedburner.com/NetworkSecurityInsider" /><feedburner:info uri="networksecurityinsider" /><atom10:link xmlns:atom10="http://www.w3.org/2005/Atom" rel="hub" href="http://pubsubhubbub.appspot.com/" /><entry><id>tag:blogger.com,1999:blog-8606292508453252400.post-4890308475001395571</id><published>2013-12-28T21:48:00.001-05:00</published><updated>2014-01-05T22:30:40.957-05:00</updated><title type="text">Myrtle Beach Homes/Condos</title><content type="html">&lt;span style="background-color: white; font-family: Trebuchet MS, sans-serif;"&gt;InfoSec friends, I have a new site -&amp;nbsp;&lt;span style="line-height: 18px;"&gt;&lt;b&gt;&lt;a href="http://www.midtownmyrtlebeach.com/" style="text-decoration: none;"&gt;www.midtownmyrtlebeach.com&lt;/a&gt;.&lt;/b&gt;&amp;nbsp;&lt;/span&gt;&lt;span style="line-height: 18px;"&gt;I look forward to helping you buy your dream ocean front home or condo in Myrtle Beach, South Carolina! If you've never been to Myrtle Beach, it's an awesome place to vacation, or to live!&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: Trebuchet MS, sans-serif;"&gt;&lt;span style="background-color: white;"&gt;&lt;span style="line-height: 18px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="background-color: white;"&gt;&lt;span style="line-height: 18px;"&gt;Scroll down for my posts on InfoSec, Security, Linux, Firewalls, and IDS/IPS.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;img src="http://feeds.feedburner.com/~r/NetworkSecurityInsider/~4/BrUqUlisMh4" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://netsecinsider.blogspot.com/feeds/4890308475001395571/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://netsecinsider.blogspot.com/2013/12/myrtle-beach-homescondos.html#comment-form" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/4890308475001395571" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/4890308475001395571" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/NetworkSecurityInsider/~3/BrUqUlisMh4/myrtle-beach-homescondos.html" title="Myrtle Beach Homes/Condos" /><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="https://img1.blogblog.com/img/b16-rounded.gif" /></author><thr:total>0</thr:total><feedburner:origLink>http://netsecinsider.blogspot.com/2013/12/myrtle-beach-homescondos.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-8606292508453252400.post-168168063927678696</id><published>2010-11-17T09:49:00.000-05:00</published><updated>2010-11-17T09:49:50.238-05:00</updated><title type="text">Helpful Bookmarks &amp; Links</title><content type="html">&lt;div class="MsoNormal"&gt;&lt;b&gt;&lt;span style="font-size: 10pt;"&gt;CheckPoint&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;span style="font-size: 10pt;"&gt;&lt;a href="https://supportcenter.checkpoint.com/" target="_blank"&gt;https://supportcenter.&lt;wbr&gt;&lt;/wbr&gt;checkpoint.com/&lt;/a&gt; - CheckPoint Support Site&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;span style="font-size: 10pt;"&gt;&lt;a href="http://www.cpug.org/" target="_blank"&gt;http://www.cpug.org/&lt;/a&gt; - CheckPoint User Group / Forums&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;span style="font-size: 10pt;"&gt;&lt;a href="http://www.tla.ch/TLA/FW/FW1FAQ.html" target="_blank"&gt;http://www.tla.ch/TLA/FW/&lt;wbr&gt;&lt;/wbr&gt;FW1FAQ.html&lt;/a&gt; - CheckPoint FAQ (old but good)&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;b&gt;&lt;span style="font-size: 10pt;"&gt;Cisco&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;span style="font-size: 10pt;"&gt;&lt;a href="https://supportforums.cisco.com/" target="_blank"&gt;https://supportforums.cisco.&lt;wbr&gt;&lt;/wbr&gt;com/&lt;/a&gt; - Cisco Support Forums&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;span style="font-size: 10pt;"&gt;&lt;a href="http://www.cisco.com/univercd/home/home.htm" target="_blank"&gt;http://www.cisco.com/univercd/&lt;wbr&gt;&lt;/wbr&gt;home/home.htm&lt;/a&gt; - Cisco Documentation&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;span style="font-size: 10pt;"&gt;&lt;a href="http://blogs.cisco.com/security" target="_blank"&gt;http://blogs.cisco.com/&lt;wbr&gt;&lt;/wbr&gt;security&lt;/a&gt; - Official Cisco Security Blog&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;span style="font-size: 10pt;"&gt;&lt;a href="http://ciskoblog.com/" target="_blank"&gt;http://ciskoblog.com/&lt;/a&gt; - Cisco Blog&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;span style="font-size: 10pt;"&gt;&lt;a href="http://blog.priveonlabs.com/sec_blog.php/cisco-security/cisco-security-agent/" target="_blank"&gt;http://blog.priveonlabs.com/&lt;wbr&gt;&lt;/wbr&gt;sec_blog.php/cisco-security/&lt;wbr&gt;&lt;/wbr&gt;cisco-security-agent/&lt;/a&gt; - Cisco Security Agent (CSA) Blog&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;span style="font-size: 10pt;"&gt;&lt;a href="http://tools.cisco.com/MySDN/Intelligence/searchSignatures.x" target="_blank"&gt;http://tools.cisco.com/MySDN/&lt;wbr&gt;&lt;/wbr&gt;Intelligence/searchSignatures.&lt;wbr&gt;&lt;/wbr&gt;x&lt;/a&gt; - Cisco Signature Lookup&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;span style="font-size: 10pt;"&gt;&lt;a href="https://www.cisco.com/cgi-bin/Support/OutputInterpreter/home.pl" target="_blank"&gt;https://www.cisco.com/cgi-bin/&lt;wbr&gt;&lt;/wbr&gt;Support/OutputInterpreter/&lt;wbr&gt;&lt;/wbr&gt;home.pl&lt;/a&gt; - Output Interpreter for show commands&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;b&gt;&lt;span style="font-size: 10pt;"&gt;Juniper&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;span style="font-size: 10pt;"&gt;&lt;a href="http://kb.juniper.net/" target="_blank"&gt;http://kb.juniper.net/&lt;/a&gt; - Juniper Knowledgebase&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;span style="font-size: 10pt;"&gt;&lt;a href="http://forums.juniper.net/" target="_blank"&gt;http://forums.juniper.net/&lt;/a&gt; - Juniper Forums&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;span style="font-size: 10pt;"&gt;&lt;a href="http://juniperhowto.com/" target="_blank"&gt;http://juniperhowto.com/&lt;/a&gt; - Juniper How-to Site&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;span style="font-size: 10pt;"&gt;&lt;a href="http://juniperhacks.wordpress.com/" target="_blank"&gt;http://juniperhacks.wordpress.&lt;wbr&gt;&lt;/wbr&gt;com/&lt;/a&gt; - Juniper Hacks Blog&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;b&gt;&lt;span style="font-size: 10pt;"&gt;Sourcefire&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;span style="font-size: 10pt;"&gt;&lt;a href="http://sourcefirefaq.blogspot.com/" target="_blank"&gt;http://sourcefirefaq.blogspot.&lt;wbr&gt;&lt;/wbr&gt;com/&lt;/a&gt; - Sourcefire Blog (old but good)&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;span style="font-size: 10pt;"&gt;&lt;a href="https://support.sourcefire.com/" target="_blank"&gt;https://support.sourcefire.&lt;wbr&gt;&lt;/wbr&gt;com/&lt;/a&gt; - Sourcefire Support&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;span style="font-size: 10pt;"&gt;&lt;a href="http://vrt-sourcefire.blogspot.com/" target="_blank"&gt;http://vrt-sourcefire.&lt;wbr&gt;&lt;/wbr&gt;blogspot.com/&lt;/a&gt; - Sourcefire VRT Blog&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;b&gt;&lt;span style="font-size: 10pt;"&gt;TippingPoint&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;span style="font-size: 10pt;"&gt;&lt;a href="https://tmc.tippingpoint.com/TMC" target="_blank"&gt;https://tmc.tippingpoint.com/&lt;wbr&gt;&lt;/wbr&gt;TMC&lt;/a&gt; - TippingPoint Knowledgebase and Threat Mgmt Center&lt;/span&gt;&lt;img src="http://feeds.feedburner.com/~r/NetworkSecurityInsider/~4/xQ5aOkhW_mg" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://netsecinsider.blogspot.com/feeds/168168063927678696/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://netsecinsider.blogspot.com/2010/11/helpful-bookmarks-links.html#comment-form" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/168168063927678696" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/168168063927678696" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/NetworkSecurityInsider/~3/xQ5aOkhW_mg/helpful-bookmarks-links.html" title="Helpful Bookmarks &amp; Links" /><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="https://img1.blogblog.com/img/b16-rounded.gif" /></author><thr:total>0</thr:total><feedburner:origLink>http://netsecinsider.blogspot.com/2010/11/helpful-bookmarks-links.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-8606292508453252400.post-3987504663658678470</id><published>2010-11-08T17:57:00.001-05:00</published><updated>2014-01-05T22:28:50.057-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco" /><title type="text">Troubleshooting High CPU on Cisco ASA</title><content type="html">&lt;div xmlns="http://www.w3.org/1999/xhtml"&gt;show cpu&lt;br /&gt;show processes cpu-usage&lt;br /&gt;&lt;br /&gt;**This will tell us which process is consuming the most CPU.&lt;br /&gt;&lt;br /&gt;**Dispatch Unit is the "packet processing" process of the ASA. If the Dispatch Unit is showing high utilization, take a packet capture (pcap) from the ASA and view it in Wireshark to see what traffic is causing the most load on the ASA.&lt;br /&gt;&lt;br /&gt;Enable CPU Profiling (to provide to Cisco TAC)&lt;br /&gt;cpu profile activate 5000&lt;br /&gt;&lt;br /&gt;Cisco ASA 8.2+:&lt;br /&gt;show cpu profile dump&lt;br /&gt;&lt;br /&gt;Pre 8.2:&lt;br /&gt;show cpu profile &lt;span id="BB_SIGN_BEGIN"&gt; &lt;/span&gt;&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/NetworkSecurityInsider/~4/-4mZwhBt9Oc" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://netsecinsider.blogspot.com/feeds/3987504663658678470/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://netsecinsider.blogspot.com/2010/11/troubleshooting-high-cpu-on-cisco-asa.html#comment-form" title="2 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/3987504663658678470" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/3987504663658678470" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/NetworkSecurityInsider/~3/-4mZwhBt9Oc/troubleshooting-high-cpu-on-cisco-asa.html" title="Troubleshooting High CPU on Cisco ASA" /><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="https://img1.blogblog.com/img/b16-rounded.gif" /></author><thr:total>2</thr:total><feedburner:origLink>http://netsecinsider.blogspot.com/2010/11/troubleshooting-high-cpu-on-cisco-asa.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-8606292508453252400.post-6670572921842291309</id><published>2010-11-06T22:22:00.001-04:00</published><updated>2014-01-05T22:29:36.023-05:00</updated><title type="text">Security Docs (Audio, Video, Text)</title><content type="html">&lt;div xmlns="http://www.w3.org/1999/xhtml"&gt;Excellent resources for security documentation including audio, video, and text.&lt;br /&gt;&lt;br /&gt;&lt;a href="http://secdocs.lonerunners.net/"&gt;http://secdocs.lonerunners.net/&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.sans.org/reading_room/"&gt;http://www.sans.org/reading_room/&lt;/a&gt;&lt;span id="BB_SIGN_BEGIN"&gt; &lt;/span&gt;&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/NetworkSecurityInsider/~4/nGnsZmjwVBA" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://netsecinsider.blogspot.com/feeds/6670572921842291309/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://netsecinsider.blogspot.com/2010/11/security-docs-audio-video-text.html#comment-form" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/6670572921842291309" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/6670572921842291309" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/NetworkSecurityInsider/~3/nGnsZmjwVBA/security-docs-audio-video-text.html" title="Security Docs (Audio, Video, Text)" /><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="https://img1.blogblog.com/img/b16-rounded.gif" /></author><thr:total>0</thr:total><feedburner:origLink>http://netsecinsider.blogspot.com/2010/11/security-docs-audio-video-text.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-8606292508453252400.post-8305465445387631349</id><published>2010-11-03T14:25:00.000-04:00</published><updated>2010-11-03T14:25:15.965-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Fortinet" /><title type="text">Fortinet - Free self-paced training online</title><content type="html">Fortinet Recorded webinar sessions (under Self-paced Online Training ) :&lt;br /&gt;&lt;a href="http://campus.training.fortinet.com/"&gt;http://campus.training.fortinet.com/&lt;/a&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="line-height: 25px;"&gt;&lt;span class="Apple-style-span" style="color: black; text-decoration: none;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="line-height: 25px;"&gt;&lt;span class="Apple-style-span" style="text-decoration: none;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;span class="Apple-style-span" style="text-decoration: none;"&gt;&lt;a class="courseLink" href="https://fortinet.webex.com/fortinet/lsr.php?AT=pb&amp;amp;SP=TC&amp;amp;rID=42164537&amp;amp;act=pb&amp;amp;rKey=0aced6d665e42bb2" style="text-decoration: none;" title="Click to Access"&gt;&lt;span class="Apple-style-span" style="color: black;"&gt;Customizing SSL VPN Portals&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="line-height: 25px;"&gt;&lt;span class="Apple-style-span" style="text-decoration: none;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;span class="Apple-style-span" style="color: black; text-decoration: none;"&gt;&lt;a class="courseLink" href="https://fortinet.webex.com/fortinet/lsr.php?AT=pb&amp;amp;SP=TC&amp;amp;rID=42164537&amp;amp;act=pb&amp;amp;rKey=0aced6d665e42bb2" style="text-decoration: none;" title="Click to Access"&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="line-height: 25px;"&gt;&lt;a class="courseLink" href="https://fortinet.webex.com/fortinet/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=35290227&amp;amp;rKey=a7c84cc5f677d013" style="text-decoration: none;" title="Click to Access"&gt;&lt;span class="Apple-style-span" style="color: black;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;Directory Services Integration using FSAE&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style="line-height: 25px;"&gt;&lt;a class="courseLink" href="https://fortinet.webex.com/fortinet/lsr.php?AT=pb&amp;amp;SP=TC&amp;amp;rID=42550762&amp;amp;act=pb&amp;amp;rKey=b88fff099a16f082" style="text-decoration: none;" title="Click to Access"&gt;&lt;span class="Apple-style-span" style="color: black;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;FortiAnalyzer Reporting&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="line-height: 25px;"&gt;&lt;a class="courseLink" href="http://campus.training.fortinet.com/mod/resource/view.php?inpopup=true&amp;amp;id=2995" style="text-decoration: none;" title="Click to Access"&gt;&lt;span class="Apple-style-span" style="color: black;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;FortiGate-One Technical Overview&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="line-height: 25px;"&gt;&lt;a class="courseLink" href="https://fortinet.webex.com/fortinet/lsr.php?AT=pb&amp;amp;SP=TC&amp;amp;rID=44114077&amp;amp;act=pb&amp;amp;rKey=940414a2f153b5c3" style="text-decoration: none;" title="Click to Access"&gt;&lt;span class="Apple-style-span" style="color: black;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;FortiGuard Web Filtering&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="line-height: 25px;"&gt;&lt;a class="courseLink" href="https://fortinet.webex.com/fortinet/lsr.php?AT=pb&amp;amp;SP=TC&amp;amp;rID=39869427&amp;amp;act=pb&amp;amp;rKey=a7e0e1fbc08174e8" style="text-decoration: none;" title="Click to Access"&gt;&lt;span class="Apple-style-span" style="color: black;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;FortiMail -- Authentication &amp;amp; Encryption&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="line-height: 25px;"&gt;&lt;a class="courseLink" href="https://fortinet.webex.com/fortinet/lsr.php?AT=pb&amp;amp;SP=TC&amp;amp;rID=41612427&amp;amp;act=pb&amp;amp;rKey=5ab5a7db7829e12b" style="text-decoration: none;" title="Click to Access"&gt;&lt;span class="Apple-style-span" style="color: black;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;FortiOS Troubleshooting&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="line-height: 25px;"&gt;&lt;a class="courseLink" href="https://fortinet.webex.com/fortinet/lsr.php?AT=pb&amp;amp;SP=TC&amp;amp;rID=44755027&amp;amp;act=pb&amp;amp;rKey=e42695dfb911e63d" style="text-decoration: none;" title="Click to Access"&gt;&lt;span class="Apple-style-span" style="color: black;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;High Availability Clusters - New !!!&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="line-height: 25px;"&gt;&lt;a class="courseLink" href="https://fortinet.webex.com/fortinet/lsr.php?AT=pb&amp;amp;SP=TC&amp;amp;rID=45702427&amp;amp;act=pb&amp;amp;rKey=4762338d32ad86ea" style="text-decoration: none;" title="Click to Access"&gt;&lt;span class="Apple-style-span" style="color: black;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;Introduction to FortiGate (101) - New !!!&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="line-height: 25px;"&gt;&lt;a class="courseLink" href="https://fortinet.webex.com/fortinet/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=34915057&amp;amp;rKey=867a06aec63f6070" style="text-decoration: none;" title="Click to Access"&gt;&lt;span class="Apple-style-span" style="color: black;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;Introduction to FortiManager&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="line-height: 25px;"&gt;&lt;a class="courseLink" href="https://fortinet.webex.com/fortinet/lsr.php?AT=pb&amp;amp;SP=TC&amp;amp;rID=45246227&amp;amp;act=pb&amp;amp;rKey=ec1b1681d98564cd" style="text-decoration: none;" title="Click to Access"&gt;&lt;span class="Apple-style-span" style="color: black;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;IPSec VPN Design and Troubleshooting&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="line-height: 25px;"&gt;&lt;a class="courseLink" href="https://fortinet.webex.com/fortinet/lsr.php?AT=pb&amp;amp;SP=TC&amp;amp;rID=40306997&amp;amp;act=pb&amp;amp;rKey=357805ecd3ed6134" style="text-decoration: none;" title="Click to Access"&gt;&lt;span class="Apple-style-span" style="color: black;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;Static Routing (Policy Routing, ECMP, RPF &amp;amp; Spillover)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="line-height: 25px;"&gt;&lt;a class="courseLink" href="https://fortinet.webex.com/fortinet/lsr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=46800927&amp;amp;rKey=38d0a4b3f03a25f9" style="text-decoration: none;" title="Click to Access"&gt;&lt;span class="Apple-style-span" style="color: black;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;Two-factor Authentication - NEW!!!&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="line-height: 25px;"&gt;&lt;a class="courseLink" href="https://fortinet.webex.com/fortinet/lsr.php?AT=pb&amp;amp;SP=TC&amp;amp;rID=39465327&amp;amp;rKey=9242b38878ce5eca&amp;amp;act=pb" style="text-decoration: none;" title="Click to Access"&gt;&lt;span class="Apple-style-span" style="color: black;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;What's New in 4.0 MR2 (Part1)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="line-height: 25px;"&gt;&lt;a class="courseLink" href="https://fortinet.webex.com/fortinet/lsr.php?AT=pb&amp;amp;SP=TC&amp;amp;rID=39732077&amp;amp;act=pb&amp;amp;rKey=bcc7fd515fa0c691" style="text-decoration: none;" title="Click to Access"&gt;&lt;span class="Apple-style-span" style="color: black;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;What's New in 4.0 MR2 (Part2)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/NetworkSecurityInsider/~4/5qFGPt2KQuQ" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://netsecinsider.blogspot.com/feeds/8305465445387631349/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://netsecinsider.blogspot.com/2010/11/fortinet-free-self-paced-training.html#comment-form" title="1 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/8305465445387631349" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/8305465445387631349" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/NetworkSecurityInsider/~3/5qFGPt2KQuQ/fortinet-free-self-paced-training.html" title="Fortinet - Free self-paced training online" /><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="https://img1.blogblog.com/img/b16-rounded.gif" /></author><thr:total>1</thr:total><feedburner:origLink>http://netsecinsider.blogspot.com/2010/11/fortinet-free-self-paced-training.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-8606292508453252400.post-385955258276168444</id><published>2010-11-03T14:20:00.002-04:00</published><updated>2010-11-03T14:20:47.366-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Fortinet" /><title type="text">Free Fortinet endpoint firewall with IPS and AV (FortiClient)</title><content type="html">&lt;b&gt;Free endpoint firewall with IPS and AV&lt;/b&gt;&lt;br /&gt;&lt;a href="http://forticlient.com/"&gt;http://forticlient.com/&lt;/a&gt;&lt;img src="http://feeds.feedburner.com/~r/NetworkSecurityInsider/~4/l68elOKc4ek" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://netsecinsider.blogspot.com/feeds/385955258276168444/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://netsecinsider.blogspot.com/2010/11/free-fortinet-endpoint-firewall-with.html#comment-form" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/385955258276168444" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/385955258276168444" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/NetworkSecurityInsider/~3/l68elOKc4ek/free-fortinet-endpoint-firewall-with.html" title="Free Fortinet endpoint firewall with IPS and AV (FortiClient)" /><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="https://img1.blogblog.com/img/b16-rounded.gif" /></author><thr:total>0</thr:total><feedburner:origLink>http://netsecinsider.blogspot.com/2010/11/free-fortinet-endpoint-firewall-with.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-8606292508453252400.post-4776129781575506801</id><published>2010-11-03T14:19:00.001-04:00</published><updated>2010-11-03T14:19:46.658-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Fortinet" /><title type="text">Packet Sniffing on a Fortinet/FortiGate Firewall</title><content type="html">&lt;a href="http://kb.fortinet.com/kb/viewContent.do?externalId=11186&amp;amp;sliceId=1#basic_command"&gt;http://kb.fortinet.com/kb/viewContent.do?externalId=11186&amp;amp;sliceId=1#basic_command&lt;/a&gt;&lt;img src="http://feeds.feedburner.com/~r/NetworkSecurityInsider/~4/E9SGNMinYZI" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://netsecinsider.blogspot.com/feeds/4776129781575506801/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://netsecinsider.blogspot.com/2010/11/packet-sniffing-on-fortinetfortigate.html#comment-form" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/4776129781575506801" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/4776129781575506801" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/NetworkSecurityInsider/~3/E9SGNMinYZI/packet-sniffing-on-fortinetfortigate.html" title="Packet Sniffing on a Fortinet/FortiGate Firewall" /><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="https://img1.blogblog.com/img/b16-rounded.gif" /></author><thr:total>0</thr:total><feedburner:origLink>http://netsecinsider.blogspot.com/2010/11/packet-sniffing-on-fortinetfortigate.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-8606292508453252400.post-9159355566770626268</id><published>2010-11-03T14:16:00.000-04:00</published><updated>2010-11-03T14:16:24.656-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="WAF" /><title type="text">Tips for troubleshooting Imperva WAF</title><content type="html">&lt;b&gt;Tips for troubleshooting Imperva WAF:&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;statistics.csv from Setup-&amp;gt;Gateways-&amp;gt;the relevant GW -&amp;gt; the rightmost panel.&amp;nbsp;&lt;/li&gt;&lt;li&gt;get-tech-info&lt;/li&gt;&lt;li&gt;cat /opt/SecureSphere/etc/patch_level&lt;/li&gt;&lt;li&gt;download "imperva-stats-script" from Imperva site, and run script for 24 hours.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/NetworkSecurityInsider/~4/OmFxhA39GmI" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://netsecinsider.blogspot.com/feeds/9159355566770626268/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://netsecinsider.blogspot.com/2010/11/tips-for-troubleshooting-imperva-waf.html#comment-form" title="1 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/9159355566770626268" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/9159355566770626268" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/NetworkSecurityInsider/~3/OmFxhA39GmI/tips-for-troubleshooting-imperva-waf.html" title="Tips for troubleshooting Imperva WAF" /><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="https://img1.blogblog.com/img/b16-rounded.gif" /></author><thr:total>1</thr:total><feedburner:origLink>http://netsecinsider.blogspot.com/2010/11/tips-for-troubleshooting-imperva-waf.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-8606292508453252400.post-8489971986342930273</id><published>2010-11-03T14:12:00.000-04:00</published><updated>2010-11-03T14:12:29.904-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="WAF" /><title type="text">WAF - Relevant Questions to Ask</title><content type="html">&lt;b&gt;Relevant Questions to Ask for Implementing a new WAF (Imperva, Breach, etc.)&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Web Server Information&lt;br /&gt;----------------------&lt;br /&gt;Application Name -&amp;nbsp;IP Address &amp;amp; Port&lt;br /&gt;SSL? (yes/no)&lt;br /&gt;IP Type (Legal/NAT/Load Balanced)&lt;br /&gt;Number of Physical Machines&lt;br /&gt;Network Throughput&lt;br /&gt;Web Server Vendor&lt;br /&gt;Web Server Operating System&lt;br /&gt;Web site type (static/dynamic)&lt;br /&gt;Application Server&lt;br /&gt;Web Application Vendor (custom, peoplesoft, etc..)&lt;br /&gt;Web Application Language (.net, java, etc)"&lt;span class="Apple-tab-span" style="white-space: pre;"&gt; &lt;/span&gt;&lt;br /&gt;Web Application Transactions per second&lt;br /&gt;&lt;br /&gt;Database Information&lt;br /&gt;------------------------------&lt;br /&gt;Database Name&lt;span class="Apple-tab-span" style="white-space: pre;"&gt; &lt;/span&gt;&lt;br /&gt;Machine Name or IP Address&lt;span class="Apple-tab-span" style="white-space: pre;"&gt;   &lt;/span&gt;&lt;br /&gt;Number of Database Servers (physical Database boxes)&lt;span class="Apple-tab-span" style="white-space: pre;"&gt; &lt;/span&gt;&lt;br /&gt;Network Throughput&lt;span class="Apple-tab-span" style="white-space: pre;"&gt; &lt;/span&gt;&lt;br /&gt;Database Vendor&lt;span class="Apple-tab-span" style="white-space: pre;"&gt; &lt;/span&gt;&lt;br /&gt;Database Operating System type&lt;span class="Apple-tab-span" style="white-space: pre;"&gt; &lt;/span&gt;&lt;br /&gt;Database Transactions per second&lt;img src="http://feeds.feedburner.com/~r/NetworkSecurityInsider/~4/klxSNg-QlMM" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://netsecinsider.blogspot.com/feeds/8489971986342930273/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://netsecinsider.blogspot.com/2010/11/waf-relevant-questions-to-ask.html#comment-form" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/8489971986342930273" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/8489971986342930273" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/NetworkSecurityInsider/~3/klxSNg-QlMM/waf-relevant-questions-to-ask.html" title="WAF - Relevant Questions to Ask" /><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="https://img1.blogblog.com/img/b16-rounded.gif" /></author><thr:total>0</thr:total><feedburner:origLink>http://netsecinsider.blogspot.com/2010/11/waf-relevant-questions-to-ask.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-8606292508453252400.post-7555254349832482047</id><published>2010-11-03T14:09:00.002-04:00</published><updated>2010-11-03T14:09:16.026-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="WAF" /><title type="text">Imperva WAF - Export Full Config from CLI</title><content type="html">Export the full config from the CLI of an Imperva WAF:&lt;br /&gt;&lt;br /&gt;--&lt;br /&gt;1) cd /tmp&lt;br /&gt;2) full_expimp.sh&lt;img src="http://feeds.feedburner.com/~r/NetworkSecurityInsider/~4/AQV9bS7kPAU" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://netsecinsider.blogspot.com/feeds/7555254349832482047/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://netsecinsider.blogspot.com/2010/11/imperva-waf-export-full-config-from-cli.html#comment-form" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/7555254349832482047" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/7555254349832482047" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/NetworkSecurityInsider/~3/AQV9bS7kPAU/imperva-waf-export-full-config-from-cli.html" title="Imperva WAF - Export Full Config from CLI" /><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="https://img1.blogblog.com/img/b16-rounded.gif" /></author><thr:total>0</thr:total><feedburner:origLink>http://netsecinsider.blogspot.com/2010/11/imperva-waf-export-full-config-from-cli.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-8606292508453252400.post-7916990786477515763</id><published>2010-11-03T14:07:00.000-04:00</published><updated>2010-11-03T14:07:36.868-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="CheckPoint" /><title type="text">IPSO CLISH Interface Examples</title><content type="html">&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;clish - interface command examples:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: small;"&gt;set interface eth1 speed 100M duplex full auto-advertise on&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;add interface eth1c0 address 12.12.12.12/28 enable&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;delete interface eth-s1p2c0 address&amp;nbsp;12.12.12.12&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;delete interface eth4c0 address&amp;nbsp;12.12.12.12&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;set static-route default nexthop gateway address&amp;nbsp;12.12.12.11&amp;nbsp;priority 1 on&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/NetworkSecurityInsider/~4/IKoFbAed-g8" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://netsecinsider.blogspot.com/feeds/7916990786477515763/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://netsecinsider.blogspot.com/2010/11/ipso-clish-interface-examples.html#comment-form" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/7916990786477515763" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/7916990786477515763" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/NetworkSecurityInsider/~3/IKoFbAed-g8/ipso-clish-interface-examples.html" title="IPSO CLISH Interface Examples" /><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="https://img1.blogblog.com/img/b16-rounded.gif" /></author><thr:total>0</thr:total><feedburner:origLink>http://netsecinsider.blogspot.com/2010/11/ipso-clish-interface-examples.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-8606292508453252400.post-3332658204713849459</id><published>2010-09-21T22:50:00.000-04:00</published><updated>2010-09-21T22:50:09.614-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="CheckPoint" /><title type="text">Nokia IPSO Status LEDs</title><content type="html">&lt;ul&gt;&lt;li&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif; font-size: small;"&gt;Solid blue Power - On&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif; font-size: small;"&gt;Solid yellow - Appliance is experiencing an internal voltage problem.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif; font-size: small;"&gt;Blinking yellow - Appliance is experiencing a temperature problem.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif; font-size: small;"&gt;Solid red - One or more fans are not operating properly.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif; font-size: small;"&gt;Blinking green - System activity indicator&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/NetworkSecurityInsider/~4/FmV0U4ajE9Y" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://netsecinsider.blogspot.com/feeds/3332658204713849459/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://netsecinsider.blogspot.com/2010/09/nokia-ipso-status-leds.html#comment-form" title="1 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/3332658204713849459" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/3332658204713849459" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/NetworkSecurityInsider/~3/FmV0U4ajE9Y/nokia-ipso-status-leds.html" title="Nokia IPSO Status LEDs" /><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="https://img1.blogblog.com/img/b16-rounded.gif" /></author><thr:total>1</thr:total><feedburner:origLink>http://netsecinsider.blogspot.com/2010/09/nokia-ipso-status-leds.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-8606292508453252400.post-1703002691428029333</id><published>2010-09-21T22:45:00.002-04:00</published><updated>2010-09-21T22:46:33.762-04:00</updated><title type="text">Peer-to-Peer (P2P) Ports</title><content type="html">&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;Kazaa, Grokster, Morpheous&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;TCP 1214&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;UDP 1214&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;eDonkey&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;TCP 4661-4672&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;UDP 4661-4672&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;WinMX &amp;amp; Napster&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;TCP 6257&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;UDP 6257&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;TCP 6699&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;UDP 6699&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;BitTorrent&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;TCP 6881-6889&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;TCP 6969&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;UDP 6881-6889&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;Gnutella (Bearshare, Limewire)&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;TCP 6346, 6347, 6348&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;UDP 6346, 6347, 6348&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;Napster&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;TCP 4444, 5555, 6666, 7777, 8888&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;UDP 4444, 5555, 6666, 7777, 8888&lt;/span&gt;&lt;/span&gt;&lt;img src="http://feeds.feedburner.com/~r/NetworkSecurityInsider/~4/QwDylG47p50" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://netsecinsider.blogspot.com/feeds/1703002691428029333/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://netsecinsider.blogspot.com/2010/09/peer-to-peer-p2p-ports.html#comment-form" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/1703002691428029333" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/1703002691428029333" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/NetworkSecurityInsider/~3/QwDylG47p50/peer-to-peer-p2p-ports.html" title="Peer-to-Peer (P2P) Ports" /><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="https://img1.blogblog.com/img/b16-rounded.gif" /></author><thr:total>0</thr:total><feedburner:origLink>http://netsecinsider.blogspot.com/2010/09/peer-to-peer-p2p-ports.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-8606292508453252400.post-2362691856010586812</id><published>2010-09-21T22:43:00.002-04:00</published><updated>2010-09-21T22:43:52.668-04:00</updated><title type="text">tcpdump for ARP packets</title><content type="html">&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;tcpdump -lnni eth2 ether proto 0x0806&lt;/span&gt;&lt;/span&gt;&lt;img src="http://feeds.feedburner.com/~r/NetworkSecurityInsider/~4/Vyn1gbubiek" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://netsecinsider.blogspot.com/feeds/2362691856010586812/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://netsecinsider.blogspot.com/2010/09/tcpdump-for-arp-packets.html#comment-form" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/2362691856010586812" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/2362691856010586812" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/NetworkSecurityInsider/~3/Vyn1gbubiek/tcpdump-for-arp-packets.html" title="tcpdump for ARP packets" /><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="https://img1.blogblog.com/img/b16-rounded.gif" /></author><thr:total>0</thr:total><feedburner:origLink>http://netsecinsider.blogspot.com/2010/09/tcpdump-for-arp-packets.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-8606292508453252400.post-6279450117339193309</id><published>2010-09-07T22:29:00.001-04:00</published><updated>2010-09-07T23:04:05.148-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco" /><title type="text">Enable AIP-SSM IPS Inspection on ASA</title><content type="html">&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;policy-map global_policy&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;class ips_class_map&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;ips inline fail-open&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt; &lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;Or for passive:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;ips promiscuous fail-open&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/span&gt;&lt;img src="http://feeds.feedburner.com/~r/NetworkSecurityInsider/~4/Zt7blppKfXo" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://netsecinsider.blogspot.com/feeds/6279450117339193309/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://netsecinsider.blogspot.com/2010/09/enable-aip-ssm-ips-inspection-on-asa.html#comment-form" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/6279450117339193309" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/6279450117339193309" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/NetworkSecurityInsider/~3/Zt7blppKfXo/enable-aip-ssm-ips-inspection-on-asa.html" title="Enable AIP-SSM IPS Inspection on ASA" /><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="https://img1.blogblog.com/img/b16-rounded.gif" /></author><thr:total>0</thr:total><feedburner:origLink>http://netsecinsider.blogspot.com/2010/09/enable-aip-ssm-ips-inspection-on-asa.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-8606292508453252400.post-5955603355216317339</id><published>2010-09-07T22:09:00.002-04:00</published><updated>2010-09-07T22:09:16.879-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco" /><title type="text">Clear ACL Hit Counters</title><content type="html">&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;clear access-list &amp;lt;access-list name&amp;gt; counters&lt;/span&gt;&lt;/span&gt;&lt;img src="http://feeds.feedburner.com/~r/NetworkSecurityInsider/~4/CAW71_qKVMQ" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://netsecinsider.blogspot.com/feeds/5955603355216317339/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://netsecinsider.blogspot.com/2010/09/clear-acl-hit-counters.html#comment-form" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/5955603355216317339" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/5955603355216317339" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/NetworkSecurityInsider/~3/CAW71_qKVMQ/clear-acl-hit-counters.html" title="Clear ACL Hit Counters" /><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="https://img1.blogblog.com/img/b16-rounded.gif" /></author><thr:total>0</thr:total><feedburner:origLink>http://netsecinsider.blogspot.com/2010/09/clear-acl-hit-counters.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-8606292508453252400.post-6703309957011072412</id><published>2010-09-07T22:00:00.002-04:00</published><updated>2010-09-07T22:00:44.668-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco" /><title type="text">Enable VPN Keep Alive on Cisco ASA VPN Tunnel</title><content type="html">&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;Cisco PIX/ASA 7.x and later, for the tunnel group named 10.1.1.1&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;asa(config)#tunnel-group 10.1.1.1 ipsec-attributes&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;asa(config-tunnel-ipsec)#isakmp keepalive threshold 15 retry 10&lt;/span&gt;&lt;/span&gt;&lt;img src="http://feeds.feedburner.com/~r/NetworkSecurityInsider/~4/CeRdMwbLTVg" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://netsecinsider.blogspot.com/feeds/6703309957011072412/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://netsecinsider.blogspot.com/2010/09/enable-vpn-keep-alive-on-cisco-asa-vpn.html#comment-form" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/6703309957011072412" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/6703309957011072412" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/NetworkSecurityInsider/~3/CeRdMwbLTVg/enable-vpn-keep-alive-on-cisco-asa-vpn.html" title="Enable VPN Keep Alive on Cisco ASA VPN Tunnel" /><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="https://img1.blogblog.com/img/b16-rounded.gif" /></author><thr:total>0</thr:total><feedburner:origLink>http://netsecinsider.blogspot.com/2010/09/enable-vpn-keep-alive-on-cisco-asa-vpn.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-8606292508453252400.post-2923365277011731402</id><published>2010-09-07T21:56:00.000-04:00</published><updated>2010-09-07T21:56:31.963-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="CheckPoint" /><category scheme="http://www.blogger.com/atom/ns#" term="Linux" /><title type="text">Copy many routes from one Linux box to another</title><content type="html">&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;span class="Apple-style-span" style="font-family: Georgia, 'Times New Roman', serif;"&gt;netstat -rn | grep ^[0-9] | awk '{printf "route add -net %-15s gw %-15s netmask %s\n", $1, $2, $3}' | sort &amp;gt; routing_table&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/NetworkSecurityInsider/~4/n0uvb1fSzZM" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://netsecinsider.blogspot.com/feeds/2923365277011731402/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://netsecinsider.blogspot.com/2010/09/copy-many-routes-from-one-linux-box-to.html#comment-form" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/2923365277011731402" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/2923365277011731402" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/NetworkSecurityInsider/~3/n0uvb1fSzZM/copy-many-routes-from-one-linux-box-to.html" title="Copy many routes from one Linux box to another" /><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="https://img1.blogblog.com/img/b16-rounded.gif" /></author><thr:total>0</thr:total><feedburner:origLink>http://netsecinsider.blogspot.com/2010/09/copy-many-routes-from-one-linux-box-to.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-8606292508453252400.post-1732827001675739818</id><published>2010-09-07T21:52:00.001-04:00</published><updated>2010-09-07T21:52:27.268-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="CheckPoint" /><title type="text">CheckPoint Log Buffer Full</title><content type="html">&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif; font-size: small;"&gt;1. Create or modify (if the file exists) the $FWDIR/boot/modules/fwkern.conf file on the Security gateway.&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;2. Add the entry fw_log_bufsize=xxxxx, where xxxx is the desired size in bytes (default = 81920) -&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif; font-size: small;"&gt;try to set it to 163840.&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;3. Reboot the Security gateway&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;Add the following to fwstart.conf:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;----&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;$FWDIR/bin/fw ctl debug -buf 8192&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;fw ctl kdebug -f &amp;gt; /var/log/console.log &amp;amp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;echo "fw debug messages go to /var/log/console.log"&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;div&gt;--&lt;/div&gt;&lt;div&gt;&lt;div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;http://www.networking-tips.net/?p=323&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;http://www.cpug.org/forums/nokia-ipso/2385-log-buffer-full-errors.html&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/NetworkSecurityInsider/~4/FyBmjtinjEQ" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://netsecinsider.blogspot.com/feeds/1732827001675739818/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://netsecinsider.blogspot.com/2010/09/checkpoint-log-buffer-full.html#comment-form" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/1732827001675739818" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/1732827001675739818" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/NetworkSecurityInsider/~3/FyBmjtinjEQ/checkpoint-log-buffer-full.html" title="CheckPoint Log Buffer Full" /><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="https://img1.blogblog.com/img/b16-rounded.gif" /></author><thr:total>0</thr:total><feedburner:origLink>http://netsecinsider.blogspot.com/2010/09/checkpoint-log-buffer-full.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-8606292508453252400.post-8761272612703439846</id><published>2010-09-07T21:48:00.002-04:00</published><updated>2010-09-07T21:48:58.367-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="CheckPoint" /><title type="text">Commands to Troubleshoot CheckPoint HA Interface Issues</title><content type="html">&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;fw ctl iflist&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;cat $FWDIR/conf/discntd.if (interfaces commented out for HA monitoring)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;cphaprob state&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;cphaprob -a if&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;cphaprob list&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/NetworkSecurityInsider/~4/ZGbrymXqgBg" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://netsecinsider.blogspot.com/feeds/8761272612703439846/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://netsecinsider.blogspot.com/2010/09/commands-to-troubleshoot-checkpoint-ha.html#comment-form" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/8761272612703439846" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/8761272612703439846" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/NetworkSecurityInsider/~3/ZGbrymXqgBg/commands-to-troubleshoot-checkpoint-ha.html" title="Commands to Troubleshoot CheckPoint HA Interface Issues" /><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="https://img1.blogblog.com/img/b16-rounded.gif" /></author><thr:total>0</thr:total><feedburner:origLink>http://netsecinsider.blogspot.com/2010/09/commands-to-troubleshoot-checkpoint-ha.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-8606292508453252400.post-7855808551979645323</id><published>2010-09-07T21:47:00.001-04:00</published><updated>2010-09-07T21:47:55.320-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="CheckPoint" /><title type="text">Clear CheckPoint NAT and State Table</title><content type="html">&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;fw tab -t sam_blocked_ips -x&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;fw tab -t fwx_alloc -x&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;fw tab -t connections -x&lt;/span&gt;&lt;/span&gt;&lt;img src="http://feeds.feedburner.com/~r/NetworkSecurityInsider/~4/_DFaido84Wc" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://netsecinsider.blogspot.com/feeds/7855808551979645323/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://netsecinsider.blogspot.com/2010/09/clear-checkpoint-nat-and-state-table.html#comment-form" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/7855808551979645323" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/7855808551979645323" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/NetworkSecurityInsider/~3/_DFaido84Wc/clear-checkpoint-nat-and-state-table.html" title="Clear CheckPoint NAT and State Table" /><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="https://img1.blogblog.com/img/b16-rounded.gif" /></author><thr:total>0</thr:total><feedburner:origLink>http://netsecinsider.blogspot.com/2010/09/clear-checkpoint-nat-and-state-table.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-8606292508453252400.post-1319836538588611459</id><published>2010-09-07T21:44:00.001-04:00</published><updated>2010-09-07T21:46:27.043-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="CheckPoint" /><title type="text">Troubleshoot traffic to an IP thru a CheckPoint Firewall</title><content type="html">&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;fw monitor -e "src=172.16.1.1 or dst=172.16.1.1;" &amp;gt; /tmp/fwmon-172.16.1.1.out &amp;amp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;tcpdump -w /tmp/traffic.cap -lnni any host 172.16.1.1 &amp;amp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;fw ctl zdebug drop &amp;gt; /tmp/conn.dbg &amp;amp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;fw log -ftn | egrep 172.16.1.1 &amp;gt;&amp;gt; /tmp/fw-log-172.16.1.1.log &amp;amp;&lt;/span&gt;&lt;/span&gt;&lt;img src="http://feeds.feedburner.com/~r/NetworkSecurityInsider/~4/T0OtbTZJ02E" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://netsecinsider.blogspot.com/feeds/1319836538588611459/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://netsecinsider.blogspot.com/2010/09/how-to-debug-checkpoint-connection.html#comment-form" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/1319836538588611459" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/1319836538588611459" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/NetworkSecurityInsider/~3/T0OtbTZJ02E/how-to-debug-checkpoint-connection.html" title="Troubleshoot traffic to an IP thru a CheckPoint Firewall" /><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="https://img1.blogblog.com/img/b16-rounded.gif" /></author><thr:total>0</thr:total><feedburner:origLink>http://netsecinsider.blogspot.com/2010/09/how-to-debug-checkpoint-connection.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-8606292508453252400.post-385940674553040535</id><published>2010-09-07T21:38:00.002-04:00</published><updated>2010-09-07T21:38:22.955-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="CheckPoint" /><title type="text">List the Top Connections on a CheckPoint Firewall</title><content type="html">&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;fw tab -t connections -u -f &amp;gt;&amp;gt; conns.txt&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;cat conn-ips.txt | sort | uniq -c | sort -n&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/NetworkSecurityInsider/~4/0Y5e6Ww-X2U" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://netsecinsider.blogspot.com/feeds/385940674553040535/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://netsecinsider.blogspot.com/2010/09/list-top-connections-on-checkpoint.html#comment-form" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/385940674553040535" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/385940674553040535" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/NetworkSecurityInsider/~3/0Y5e6Ww-X2U/list-top-connections-on-checkpoint.html" title="List the Top Connections on a CheckPoint Firewall" /><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="https://img1.blogblog.com/img/b16-rounded.gif" /></author><thr:total>0</thr:total><feedburner:origLink>http://netsecinsider.blogspot.com/2010/09/list-top-connections-on-checkpoint.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-8606292508453252400.post-5269785874281093661</id><published>2010-09-07T21:36:00.002-04:00</published><updated>2010-09-07T21:36:46.771-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="CheckPoint" /><title type="text">How to run a CheckPoint Debug</title><content type="html">&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;fw ctl debug 0&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;fw ctl debug -buf 10000&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;fw ctl debug -m drop conn packet&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;fwaccel dbg -m general all&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;fw ctl kdebug -f &amp;gt;&amp;amp; fwconnchain.elg&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;Ctrl+C to stop the debug&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;fw ctl debug 0&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;NOKIA:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif; font-size: small;"&gt;fw ctl debug 0&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;fw ctl debug -buf 8192&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;fw ctl debug + conn link drop&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;fw ctl kdebug -f &amp;gt;&amp;amp; fwconnchain.elg&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;fw ctl debug 0&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/NetworkSecurityInsider/~4/7MnnqE3u24A" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://netsecinsider.blogspot.com/feeds/5269785874281093661/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://netsecinsider.blogspot.com/2010/09/how-to-run-checkpoint-debug.html#comment-form" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/5269785874281093661" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/5269785874281093661" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/NetworkSecurityInsider/~3/7MnnqE3u24A/how-to-run-checkpoint-debug.html" title="How to run a CheckPoint Debug" /><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="https://img1.blogblog.com/img/b16-rounded.gif" /></author><thr:total>0</thr:total><feedburner:origLink>http://netsecinsider.blogspot.com/2010/09/how-to-run-checkpoint-debug.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-8606292508453252400.post-2252336529155374584</id><published>2010-09-07T21:34:00.002-04:00</published><updated>2010-09-07T21:34:49.816-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="CheckPoint" /><title type="text">Command to list CheckPoint Installed Products</title><content type="html">&lt;span class="Apple-style-span" style="font-family: 'Trebuchet MS', sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;cpprod_util CPPROD_GetKeyValues products 0&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/NetworkSecurityInsider/~4/5bg8bKcFleQ" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://netsecinsider.blogspot.com/feeds/2252336529155374584/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://netsecinsider.blogspot.com/2010/09/command-to-list-checkpoint-installed.html#comment-form" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/2252336529155374584" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/8606292508453252400/posts/default/2252336529155374584" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/NetworkSecurityInsider/~3/5bg8bKcFleQ/command-to-list-checkpoint-installed.html" title="Command to list CheckPoint Installed Products" /><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="https://img1.blogblog.com/img/b16-rounded.gif" /></author><thr:total>0</thr:total><feedburner:origLink>http://netsecinsider.blogspot.com/2010/09/command-to-list-checkpoint-installed.html</feedburner:origLink></entry></feed>
