Technology is amazing. It drastically reduces the size of the world. I love that I get to work with it every day. It’s just a little before 1 AM here in Montgomery, Alabama. I just finished assisting a friend in Saudi Arabia with their FortiGate issue. This friend I met through this site. Think about […]
Moving CMDB to a separate Database Host It is desirable to move the CMDB (postgres) database to a separate host for the following reasons: In larger deployments, reduce the database server load on the supervisor node in order to allow more resources for application server and other backend modules Whenever high availability for CMDB data […]
IPSec IPSec Statistics reports the usages and states of your configured IPSec Security Associations (See “IPSec”). Go to Statistics > IPSec, a select bar and two statistics tables are displayed. Selector Select the combination of Mode and Phase 1 here, and then the statistics of related IPSec SAs are reported. IPSec Mode Select the mode, […]
Short video answer to a question a user sent me about the best ways to block internet traffic for specific machines and devices.
Please tell me the technician on the phone for my client was incorrect when he said that Meraki is incapable of doing address translation over an IPSec tunnel when the other side is not a meraki device……That is enough to make you want to throw your head into a wall. Not sure how a vendor […]
Use zones and save your sanity! This video goes into some basic zone deployment to help consolidate policy and reduce the number of interface pairs on your policy page.
One of the things that I see a lot of people doing is leaving their policies super vague. This is all fun and games in a home environment where you don’t have any critical data but if you are running your business in this manner you may have issues coming up soon. Make your policies […]
This video is a brief introduction on how to create a Remote Access (Split Tunnel) IPSec tunnel so that remote users can IPSec into the network and access resources.