Skip to main content

Posts

Palo alto commands

  show system info                    / / shows the uptime , serial number , . . . show system environmentals          / / e .g . power supply failures show ntp show session info                    / / packet rate , number of sessions , fastpath active , etc . show session id < id > show interface { all | < interface - name > } show routing route                  / / routing table ( all routes ) show routing fib                    / / forwarding table ( only used routes ) show routing protocol < protocol > . . . show arp { all | < interface - name > } show neighbor interface { all | < interface - name > }    / / IPv6 neighbor cache show mac all                        / / only with layer 2 interfaces show jobs all show jobs id < id > show running resource - monitor        / / resource statistics show system resource follow          / /= "top" , CPU usage and processes show system disk - space           
Recent posts

Why XML

 Why Xml?  👀 Netconf using xml, nx-api r using xml.A lot of networking devices are using xml. we have a lot of field devices. Rest-conf also out there. 

Learning Remote access VPN

Pulled content from https://www.cisco.com/c/en/us/td/docs/security/asa/asa90/configuration/guide/asa_90_cli_config/vpn_groups.html how to configure VPN connection profiles (formerly called “tunnel groups” ) In summary, you first configure connection profiles to set the values for the connection. Then you configure group policies. These set values for users in the aggregate. Then you configure users, which can inherit values from groups and configure certain values on an individual user basis. This chapter describes how and why to configure these entities. A group is a collection of users treated as a single entity Users get their attributes from group policies . A connection profile identifies the group policy for a specific connection. If you do not assign a particular group policy to a user, the default group policy for the connection applies. The security appliance can apply attribute values from a variety of sources. It applies them according to th

F5 LTM & GTM learning

 Learning F5 and GTM☺ what is a Profile ?  a profile is an object that contains settings with values, for controlling the behavior of a particular type of network traffic, such as HTTP connections. Profiles also provide a way for you to enable connection and session persistence, and to manage client application authentication   F5 Link https://techdocs.f5.com/kb/en-us/products/big-ip_ltm/manuals/product/ltm-concepts-11-5-1/7.html

Learning GIT

Recently started to learn about Git.There are many version control websites .Some of the famous ones are 1. GitHub 2. Bitbucket (Atlassian ,Australian company) 3. Git lab I am watching the videos on Git by Corey Schafer , excellent content. Useful commands > git log --oneline > git log --oneline -3 , show last 3 commits git branch <branch name> git checkout <branch name> HEAD  - pointer to where we are making changes 

Cisco FTD 2140 using ASA image

Have got a project to migrate the current EOL ( End of Life ) Cisco ASA 51XX series firewall. The Documentation for this is not enough to migrate seemlessly. A few links which can help to ease the pain while trying to configure via remote ( other country) .Click on the below link. ASA on a FTD 2100 https://www.cisco.com/c/en/us/td/docs/security/firepower/630/fdm/fptd-fdm-config-guide-630/fptd-fdm-mgmt.html#id_32969 https://www.cisco.com/c/en/us/support/docs/security/firepower-2100-series/213519-configure-fdm-firepower-device-manageme.html delete ipv6 command was the below: >configure network ipv6 delete it deletes the "router" ipv6 setting, along with the ipv6 mgmt configuration. For the migration from ASA to FTD, if you are doing it manually, please refer the config guide to get the steps to configure the required things: https://www.cisco.com/c/en/us/td/docs/security/firepower/640/fdm/fptd-fdm-config-guide-640.html For FXOS cli commands: https://www.cisco.com/c/en/