Visio stencils for Cisco, Juniper, Fortinet, Checkpoint, Avaya Updated for 2020

Updated for 2020. Some links to download Microsoft Visio stencils of the most popular vendors. Juniper Cisco Avaya BlueCoat Fortinet Dell Requires registration Checkpoint happen not to have official stencils set, only Nokia appliances stuff can be found. So someone volunteered and using icons/press releases/PowerPoint presentations done by …



Where do I download the Checkpoint Splat/Gaia image

The answer is surprisingly simple – at the Checkpoint.com . On the home page there is a link to download their products Try Our Products (SPLAT, SmartDefense, Endpoint). You need a free General account in UserCenter, then you fill general questions form and get a link to download the real production …



8 Things to do before opening ticket with Checkpoint

I’ve been doing Checkpoint quite a lot, actually for years now. And this inevitably involves communicating with the Checkpoint Technical Assistance Centre (TAC) . And while you can easily come up with impression that it is pretty bad (look around at cpug.org for heated flames about that), my view …



Solaris interfaces – create assign delete

Working with interfaces in Solaris is pretty much the same as in Linux - you've got ifconfig, netstat,route. It looks in output a bit different but if you're used to the *BSD way of things you'll find yourself at home. So the most basic thing follows - bring interface up, assign …



How to choose the password that noone can guess and you cant remember

Of course you know what the good password should be - random letters including capitals, peppered with numbers and enhanced with printable control characters. The only problem with these recommendations is that there are very few people in the world that can memorize such incomprehensible sequence of chars. So if someone …



Top 10 usernames used in SSH brute force

As a follow up to yesterday's post I thought it would be interesting to know statistics of the usernames used in those brute force probes. Find below awk/sed script to get usernames for failed ssh login attempts from OpenSSH daemon and sort it for statistics. Also I attach the …



SSH brute force is on the rise, awk script to count failed SSH attempts

SSH brute forcing is still in high demand. I have , for my own testing and pleasure, virtual servers scattered around the world. All of them being of the Linux/BSD family I manage by SSH. Also I have on purpose no static IP at home for various reasons (saving me …



Change IP address on the interface without losing the connection

I happen from time to time to configure from scratch some Checkpoint UTM/Open Server that is thousand miles away. And from experience the best way to do it is when you have out-of-band fast access to the firewall. Of course not always such well-organized beforehand set up is available …



Schedule fw monitor to run unattended via cron

Not a groundbreaking idea but worth remembering that you can also run scheduled fw monitor using the cron. In case you have some problem occurring at the late night hours or you want to run debug at night when system is loaded less or put your case here this is …



SMTP inspection with policy-map in ASA

This is the first time I was disappointed by the cisco.com . I had a simple task at hand – configure SMTP inspection in ASA 8.0(3) and cisco.com documentation didn’t help me at all. But first the task:Secure internal mail server by preventing it from sending …