Posts
High Availability (HA) in PaloAlto Firewall with reference command
- Get link
- X
- Other Apps
##################### HA #################################### >show high-availability state ##HA state/configuration/ Synchronization state >show high-availability state-synchronization ##Synchronization status/ >show high-availability control-link statistics ##control-link statistics >show high-availability transitions ##Transition Statistics counters >show high-availability interface ha1 ##HA interface state/counters/rx/tx/drop >show high-availability ha2_keepalive ##HA2 Keep-Alive statistics >show high-availability flap-statistics ...
[PfSense] pfBlocker-devel for filtering the DNS traffic/Geo based blocking/Custom domain blocking/MAXMIND Intelligence database
- Get link
- X
- Other Apps
JUNIPER SRX: SOURCE NAT (INTERFACE BASED SOURCE NAT)
- Get link
- X
- Other Apps
#########NAT Configuration######## >set security nat source rule-set NAT-IBN description source_nat >set security nat source rule-set NAT-IBN from zone untrust >set security nat source rule-set NAT-IBN to zone untrust >set security nat source rule-set NAT-IBN rule NAT-IBN-Rule description NAT_IBN_Rule >set security nat source rule-set NAT-IBN rule NAT-IBN-Rule match source-address 10.10.10.11/32 >set security nat source rule-set NAT-IBN rule NAT-IBN-Rule match destination-address 0.0.0.0/0 >set security nat source rule-set NAT-IBN rule NAT-IBN-Rule then source-nat interface #######Firewall Policy configuration######### >set security policies from-zone untrust to-zone untrust policy allow-win-server match source-address 10.10.10.11 >set security policies from-zone untrust to-zone untrust policy allow-win-server match destination-address any >set security policies from-zone untrust to-zone untrust policy allow-win-server match application any >set s...
[PfSense] OpenVPN server configuration with Linux client [Ubuntu]
- Get link
- X
- Other Apps
Import the CA certificate: openssl x509 -in pf-ca.pem -inform PEM -out pf-ca.crt sudo cp pf-ca.crt /usr/local/share/ca-certificates sudo update-ca-certificates Import the OpenVPN client configuration: sudo nmcli connection import type openvpn file [client].ovpn OpenVPN connection via cmd: sudo openvpn --config /path/to/config.ovpn
[CentOS/Rocky/RHEL] Forticlient installation
- Get link
- X
- Other Apps
Method 1: Rocky 8 (and newer), Centos 7 (and newer) and Redhat 7 (and newer) Install yum-utils: yum install yum-utils Add repo sudo yum-config-manager --add-repo https://repo.fortinet.com/repo/forticlient/7.4/centos/8/os/x86_64/fortinet.repo Install FortiClient sudo yum install forticlient Method 2: Direct RPM Download Link: Installation Download the FortiClient VPN RPM package from https://links.fortinet.com/forticlient/rhel/vpnagent - this will normally be downloaded to the Downloads folder in your user's home folder. In the file browser navigate to this folder and double click on the forticlient_vpn_X.XX.XXXX_x86_64.rpm file and click Install in the software install window. Configuration Launch FortiClient using the shield icon in the top bar and then click 'Configure VPN'. Ensure that SSL-VPN is selected, enter a connection name (e.g. FMRIB VPN) and then in the Remote Gateway box enter https://vpn.fmrib.ox.ac....