Posts

High Availability (HA) in PaloAlto Firewall with reference command

Image
##################### HA #################################### >show high-availability state                            ##HA state/configuration/ Synchronization state >show high-availability state-synchronization            ##Synchronization status/ >show high-availability control-link statistics          ##control-link statistics  >show high-availability transitions                      ##Transition Statistics counters  >show high-availability interface ha1                    ##HA interface state/counters/rx/tx/drop >show high-availability ha2_keepalive                    ##HA2 Keep-Alive statistics >show high-availability flap-statistics            ...

[PfSense] pfBlocker-devel for filtering the DNS traffic/Geo based blocking/Custom domain blocking/MAXMIND Intelligence database

Image

JUNIPER SRX: SOURCE NAT (INTERFACE BASED SOURCE NAT)

Image
  #########NAT Configuration######## >set security nat source rule-set NAT-IBN description source_nat >set security nat source rule-set NAT-IBN from zone untrust >set security nat source rule-set NAT-IBN to zone untrust >set security nat source rule-set NAT-IBN rule NAT-IBN-Rule description NAT_IBN_Rule >set security nat source rule-set NAT-IBN rule NAT-IBN-Rule match source-address 10.10.10.11/32 >set security nat source rule-set NAT-IBN rule NAT-IBN-Rule match destination-address 0.0.0.0/0 >set security nat source rule-set NAT-IBN rule NAT-IBN-Rule then source-nat interface #######Firewall Policy configuration######### >set security policies from-zone untrust to-zone untrust policy allow-win-server match source-address 10.10.10.11 >set security policies from-zone untrust to-zone untrust policy allow-win-server match destination-address any >set security policies from-zone untrust to-zone untrust policy allow-win-server match application any >set s...

[PfSense] OpenVPN server configuration with Linux client [Ubuntu]

Image
  Import the CA certificate: openssl x509 -in pf-ca.pem -inform PEM -out pf-ca.crt sudo cp pf-ca.crt /usr/local/share/ca-certificates sudo update-ca-certificates Import the OpenVPN client configuration: sudo nmcli connection import type openvpn file [client].ovpn OpenVPN connection via cmd: sudo openvpn --config /path/to/config.ovpn

PfSense OpenVPN server with Windows client

Image

[CentOS/Rocky/RHEL] Forticlient installation

Image
  Method 1: Rocky 8  (and newer),  Centos 7 (and newer) and Redhat 7 (and newer) Install yum-utils: yum install yum-utils Add repo sudo yum-config-manager --add-repo  https://repo.fortinet.com/repo/forticlient/7.4/centos/8/os/x86_64/fortinet.repo Install FortiClient sudo yum install forticlient Method 2: Direct RPM Download Link: Installation Download the FortiClient VPN RPM package from  https://links.fortinet.com/forticlient/rhel/vpnagent  - this will normally be downloaded to the  Downloads  folder in your user's home folder. In the file browser navigate to this folder and double click on the forticlient_vpn_X.XX.XXXX_x86_64.rpm file and click Install in the software install window. Configuration Launch FortiClient using the shield icon in the top bar and then click 'Configure VPN'. Ensure that SSL-VPN is selected, enter a connection name (e.g. FMRIB VPN) and then in the Remote Gateway box enter https://vpn.fmrib.ox.ac....