This time I show you the Checkpoint “Application Control Signature Tool”. This tool allows you to create your own Apps and URL filtering signatures.
For example, I’m using it to block Torrent clients based on the User-Agent, but it is very versatile and you can use it in many ways.
Downloading the tool
Visit the following SK103051 and download it. … Read more
It is very important to keep your Checkpoint environment monitored. Given that it offers a wide variety of SNMP data, I have collected some of the (in my opinion) most useful OIDs MIBs. Altough I use Icinga and Grafana (as you can see the related outputs in this post), almost any monitoring system can be used to get … Read more
If you are in process of securing your web server or site, there are some tools and online resources that can help us a lot (in one of the following posts will show you some of them).
But simply using the command the fantastic nmap tool, another interesting feature is listing the available cipher suite certain site offers using the … Read more
Last monday I realized that the cpu was very high on one of my Checkpoint VSX nodes.
Looking at my Icinga graphs it seemed it started on friday at 3 o’clock:
Running a top directly on the VSX, I delimited the high to one of the virtual systems that runs on that VSX. In this image the fwk2 threads that … Read more
If you need to trace the HTTP request and response headers by capturing the related packets, you can use tcpdump in this way:
tcpdump -i ens192 -A -s 10240 'tcp port 80' | grep -v IP | egrep --line-buffered "..(GET |\.HTTP\/|POST |HEAD )|^[A-Za-z0-9-]+: " |sed -r 's/..(GET |HTTP\/|POST |HEAD )/\n\n\1/g'
For example, filtering tcp port 80 and 192.168.10.100 IP address:… Read more
Some time ago I was researching to find a good tool to create and manage IT documentation at work. These are the features that were essential for me:
- Editor Wysiwyg (not directly in markup language)
- Paste images directly (instead of first uploading it to insert it in the document).
- Team work: Full role and permission system. In case with LDAP
… Read more
Probably you have noticed It’s a pain when you have to access the boot menu of a virtual machine by pressing <ESC> button while in the VMWare BIOS POST screen. It clears so fast you have to press the button multiple times, but still very complicated (if you press it after when the boot menu has been displayed, it … Read more
In this 7th post of the Home Server series, after having configured a SSD drive, a working ESX environment and the RAID disks, let’s create our first virtual machine based on Debian Linux.
For the goal we want to achieve (hosting a web server, our personal files, personal streaming server, …) we do not even need the graphic … Read more
This is the 6th post of the “Home Server” series. In the last post we installed the ESX system in the SSD disk. The idea is to use 2 disks in Raid1 as data storage (RAID1 data mirroring. If one disk fails, you can still work with a single one until the failed is replaced without any data loss!).
… Read more
Due to the vulnerability that allows privilege escalation I wrote about in this post, Microsoft has released a cumulative update for all supported versions of Exchange Server (Exchange 2010, 2013, 2016 and 2019).
… Read more