An interesting question came up the other day, we have multiple endpoints sending syslogs into a F5 VIP fronting a syslog collector…all on port 514. Our logging team wanted to change the port from 514...
Continue reading...F5 iRule — Syslog Cloning iRule with HSL or Sideband
HSL_syslog_cloning First lets create two(2) pools with a single node in each. These will be used in our iRule to clone the UDP datagram to both. pool_SyslogServer001 pool_SyslogServer001 Now that we created the two(2) pools...
Continue reading...Airflow, Azure and OAuth
NOTE: This is an incomplete article – I will continue to publish more as I can. I have provided the needed code for “webserver_config.py” I have not included information for the “App Registration” in Azure....
Continue reading...F5 iRule — No Pool Members Available Vanity Page
I wrote a iRule post located here, where I describe the essentials behind how beneficial iRules can be and the many use cases they have. I stumbled across a situation the other day for a...
Continue reading...Cisco ACL — Dedicated Internet Edge Drop Device
A dedicated drop device is a network appliance, usually a router or L3 switch that sites at the very edge of your network infrastructure. Beyond the firewall, and usually acts a as either layer 2...
Continue reading...Security Through Obscurity
Security Through Obscurity? This my first ever post and I feel it’s a pertinent one to mention. What is it and why is it bad? Security through obscurity can be said to be bad because...
Continue reading...The Remote Access VPN Battle — SSL vs IPSec VPN
I’ve recently posted two articles covering two different VPN connection methods. SSL Remote VPN and IPSec Remote VPN via Cisco ASA security applicance. In the article I promised I would go thru and do a...
Continue reading...Apt-Get HTTP Proxy — One-Liner
I have a few Debian servers that are behind a firewall and they don’t have direct access to the internet. “Protected Servers”. I occasionally have to update their packages via a web proxy in the...
Continue reading...PAC File and Web Proxy Auto-Configuration (WPAD) HowTo
Hello! I posted an article a while back on how to use a web proxy to block unwanted content. While this is good and fun, we need an easy way to configure clients to use...
Continue reading...Cisco AnyConnect SSL/TLS Trustpoint
I wanted to put together a quick tutorial for setting up a Cisco ASA – AnyConnect with SSL/TLS. I’ve done it a few times and I always have to re-lookup each step and the order...
Continue reading...
Recent Comments