Tags » Firewall

Palo Alto NGFW use case two: Virtual Wire mode (vWire)

Last time we saw how to deploy the Palo Alto NGFW in a tap mode, so we could verify our security policy would work. The main drawback of this mode is that we cannot interfere with a traffic in any way. 712 more words

Security

XLVII

Is freedom of expression possible without freedom of Information ?

There is a Great Firewall between China and the rest of the world.

Think again.

Asia

Quick subnetting reference

 

CIDR block           Subnet Mask                 IP Quantity   

/32                         255.255.255.255            1   

/31                         255.255.255.254            2   

/30                         255.255.255.252            4   

/29                         255.255.255.248            8   

/28                         255.255.255.240            16   

/27                         255.255.255.224            32   

/26                         255.255.255.192            64   

/25                         255.255.255.128            128   

/24                         255.255.255.0                256   

/23                         255.255.254.0                512   

/22                         255.255.252.0                1024   

/21                         255.255.248.0                2048   

/20                         255.255.240.0                4096   

/19                         255.255.224.0                8192   

/18                         255.255.192.0                16384   

/17                         255.255.128.0                32768   

/16                         255.255.0.0                    65536   

/15                         255.254.0.0                    131072   

/14                         255.252.0.0                    262144   

/13                         255.248.0.0                    524288   

/12                         255.240.0.0                    1048576   

/11                         255.224.0.0                    2097152   

/10                         255.192.0.0                    4194304   

/9                            255.128.0.0                   8388608   

/8                            255.0.0.0                       16777216   

/7                            254.0.0.0                       33554432   

/6                            252.0.0.0                       67108864   

/5                            248.0.0.0                       134217728   

/4                            240.0.0.0                       268435456   

/3                            224.0.0.0                       536870912   

/2                            192.0.0.0                       1073741824   

/1                            128.0.0.0                       2147483648  

Linux

VMware Network Virtualization Blog: Getting Started with VMware NSX Part I – Preparation

This short series will focus on how virtualization administrators and network engineers alike can easily and efficiently deploy VMware NSX and network virtualization into their existing environments. 42 more words

Cloud Computing

"There is no inside" - How to get the most from your firewall

Firewalls seem like a fixture of IT security, having been used for more than 15 years in most business environments to protect our internal assets from the scary nasties that are out there on the big bad internet. 731 more words

Featured

"Excellent demo"

As I was leaving, the vice president of procurement shook my hand and said, “Thank you for coming today. Good job. Excellent demo.”

Was he being polite or sarcastic? 563 more words

Blogging

Troubleshooting AV Edge in Lync 2010 Server -Part 1

Troubleshooting Av edge is very difficult especially, if do not where to start .In my experience while working on many Edge Deployments, Even having assigned correct certificate, created correct DNS entries and have opened port on Firewall. 381 more words

Lync 2010