Monday, 18 December 2017
change between expert mode and clish on checkpoint firewall
what works for me
In CLISH -> type "expert"
In expert -> type "/etc/clish"
clish might be in a different location for you try "locate clish" "whereis clish"
Try "csh" or "/etc/csh"
On PH CP's
I had to do
cd $FWDIR
cd bin
cphaprob -a if
Tuesday, 12 December 2017
clear config on an interface cisco ASA
clear configure interface gigabitEthernet 0/4
Sets it back like this so be careful
interface GigabitEthernet0/4
shutdown
no nameif
no security-level
no ip address
Friday, 1 December 2017
setup syslog on cisco ASA
logging enable
logging timestamp
logging trap debugging
logging host INSIDE x.x.x.x
The format emblem keyword enables EMBLEM format logging for the syslog server with UDP only. The interface_name argument specifies the interface through which you access the syslog server. The syslog_ip argument specifies the IP address of the syslog server. The tcp[/ port ] or udp[/ port ] keyword and argument pair specify that the ASA and ASASM should use TCP or UDP to send syslog messages to the syslog server.
You can configure the ASA to send data to a syslog server using either UDP or TCP, but not both. The default protocol is UDP if you do not specify a protocol.
If you specify TCP, the ASA discover when the syslog server fails and as a security protection, new connections through the ASA are blocked. To allow new connections regardless of connectivity to a TCP syslog server, see Step 3. If you specify UDP, the ASA continue to allow new connections whether or not the syslog server is operational. Valid port values for either protocol are 1025 through 65535. The default UDP port is 514. The default TCP port is 1470.
logging trap debugging
Specifies which syslog messages should be sent to the syslog server. You can specify the severity level number (1 through 7) or name. For example, if you set the severity level to 3, then the ASA send syslog messages for severity levels 3, 2, and 1. You can specify a custom message list that identifies the syslog messages to send to the syslog server.
logging permit-hostdown
(Optional) If you negate this command and syslog server goes down then traffic stops flowing
logging facility 23
(Optional) Sets the logging facility to a value other than 20, which is what most UNIX systems expect.
logging buffered
Specifies which syslog messages should be sent to the internal log buffer, which serves as a temporary storage location. New messages are appended to the end of the list. When the buffer is full, that is, when the buffer wraps, old messages are overwritten as new messages are generated, unless you configure the ASA to save the full buffer to another location. To empty the internal log buffer, enter the clear logging buffer command.
logging buffer-size 16384
Changes the size of the internal log buffer. The buffer size is 4 KB.
logging savelog latest-logfile.txt
Saves the current log buffer content to the internal flash memory.
logging asdm debugging
logging console debugging
Specifies which syslog messages should be sent to the console port.
logging monitor debugging
Specifies which syslog messages should be sent to a Telnet or SSH session.
terminal monitor
Enables logging to the current session only. If you log out and then log in again, you need to reenter this command. To disable logging to the current session, enter the terminal no monitor command.
logging standby
send logs from the standby ASA as well
logging list
More here:
https://www.cisco.com/c/en/us/td/docs/security/asa/asa84/configuration/guide/asa_84_cli_config/monitor_syslog.html
setting up syslog on cisco router
archive
log config
logging enable
notify syslog contenttype plaintext
hidekeys
Send debugging logs to syslog
Send our origin id as our ip
Set facility to local0
Set source interfaces to gig0/0
Set logging host IP address of the syslog server
Switch logging on for all destinations
logging trap debugging
logging origin-id ip
logging facility local0
logging source-interface GigabitEthernet0/0
logging host x.x.x.x
logging on
Make sure your have routes to your syslog server
Also firewall rules, you need syslog (udp 514 open)
Friday, 17 November 2017
installing line cards cisco in 6500
Fully open ejector levers on the new sup
Sups should be installed in
slot5 or slot6
Remove slot cover
look inside and make sure there is enough clearance, look at cables from other slots and anything inside the 6500.
line up the card and slot it in, push in slowly
Push down and in on the levers, left one then the right one you should feel it click in.
The LEDs should be green we don't want orange or red that needs to be investigated.
Install line card
Same process as above. Cards should be hot swappable but its always a good idea to schedule a maintenance window for this work.
Friday, 10 November 2017
Clearing cache for cisco amp
Removal of the FireAMP Cache and History Files on Windows
https://www.cisco.com/c/en/us/support/docs/security/sourcefire-fireamp-endpoints/118565-technote-fireamp-00.html#anc1
Clear Cache firepower FMC/sensor
Follow following steps to clear cache on DC and Sensor (from CSCuu81183):
Management Center:
SSH into the Management Center
Become root: sudo su -
# pmtool restartbyid SFDataCorrelator
# pmtool disablebyid SFDataCorrelator
# cd /etc/sf
# rm malw_cache_seed_file.dc
# pmtool enablebyid SFDataCorrelator
Firepower Device:
SSH into the Firepower device
Become root: sudo su -
# pmtool restartbyid SFDataCorrelator
# pmtool disablebyid SFDataCorrelator
# cd /etc/sf
# rm malw_cache_seed_file.sensor
# pmtool enablebyid SFDataCorrelator
# pmtool restartbytype snort
# pmtool disablebytype snort
# cd /var/sf/detection-engines/<uuid> (you can find the UUID for this step by running de_info.pl and copying the UUID for the Primary Detection Engine)
# rm -rf instance?*/malw_seed*
# pmtool enablebytype snort
Wednesday, 8 November 2017
Cisco umbrella install and setup doc's
https://docs.umbrella.com/product/umbrella/1-ad-integration-setup-overview/
Prereqs (firewall rules)
https://docs.umbrella.com/product/umbrella/2-prerequisites/
Setting up the VA's
https://docs.umbrella.com/product/umbrella/3-setup-dns-forwarding-with-your-vas/
Troubleshoot doc's:
On the DC's you need to run an script (connect to VA) and install a windows service so it can look in on AD users. You also need an OpenDNS_Connector user setup in AD.
In umbrella dashboard
AD server = Script (needs to be assigned to VA after its run)
AD Connector = service
Tuesday, 7 November 2017
destination NAT on cisco ASA over VPN
We wanted to reach 172.20.20.10 which is on the customer side but this conflicted with a network on our side.
Decided to use 172.22.20.10 as a NAT IP.
Changes on my side
object-group network MY_LAN
network-object 100.64.0.0 255.255.255.0
object-group network NAT_NET
network-object 172.22.20.0 255.255.255.0
Added below to VPN ACL
access-list CUST_VPN_ACL extended permit ip object-group MY_LAN object-group NAT_NET
no nat
nat (DMZ,OUTSIDE) source static MY_LAN MY_LAN destination static NAT_NET NAT_NET no-proxy-arp route-lookup
Customer side:
Added to vpn
access-list MYSIDE_VPN extended permit ip object-group NAT_NET object-group MY_LAN
HOST_REAL_IP = 172.20.20.10
HOST_XLATED_IP = 172.22.20.0 /24
nat (WIFI,OUTSIDE) source static HOST_REAL_IP HOST_XLATED_IP destination static MY_LAN MY_LAN
I could ping 172.22.20.10 and it responded.
Monday, 6 November 2017
test if a URL is blocked cisco umbrella
nslookup internetbadguys.com
Check the IP returned. If its one of the block IPs listed below
https://support.umbrella.com/hc/en-us/articles/115001357688-What-are-the-Cisco-Umbrella-Block-Page-IP-Addresses-
Friday, 3 November 2017
basic inside acl for cisco asa
service-object tcp destination eq www
service-object tcp destination eq https
service-object tcp destination eq ssh
service-object udp destination eq domain (check)
service-object tcp destination eq ftp-data
service-object tcp destination eq ftp
service-object tcp destination eq telnet
service-object tcp destination eq smtp
service-object tcp destination eq 123
service-object tcp destination eq rtsp
service-object tcp destination eq 873
service-object tcp destination eq 993
access-list INSIDE_OUT remark *** Allow ping ***
access-list INSIDE_OUT extended permit icmp any any
access-list INSIDE_OUT remark *** Allow standard ports out ***
access-list INSIDE_OUT extended permit object-group PORTS_ALLOWED_OUT any any
access-list INSIDE_OUT extended deny ip any any log
88 - kerberos
445 - microsoft DS
137 - netbios
Wednesday, 25 October 2017
Allow ssh access on cisco ASA
generate your rsa key pair (crypto key generate)
make sure you allow the public IP you are coming from
Make sure you have username setup
aaa authentication ssh console LOCAL
Always test before leaving site
Monday, 23 October 2017
packet capture on cisco router/switch
ip access-list extended CAP_ACL
permit ip host x host y
*** Setup buffer
monitor capture buffer CAP_BUFF circular
*** Filter the buffer with the ACL
monitor capture buffer CAP_BUFF filter access-list CAP_ACL
*** Setup the cap point and on what interface
monitor capture point ip cef CAP_POINT fa0/0 both
*** Assign the buffer to point
monitor capture point associate CAP_POINT CAP_BUFF
*** Show the setup
show monitor capture buffer CAP_BUFF
*** Start the cap
monitor capture point start CAP_POINT
*** Send the test traffic
send test traffic ping or telnet on the port etc
*** Stop the cap
monitor capture point stop CAP_POINT
*** show brief
show monitor capture buffer CAP_BUFF brief
*** export the capture to tftp server
monitor capture buffer CAP_BUFF export tftp://10.50.50.22/mycap.pcap
*** Open the pcap in wireshark
Thursday, 12 October 2017
list of DHCP options and other voice bits
https://www.iana.org/assignments/bootp-dhcp-parameters/bootp-dhcp-parameters.xhtml
Common options
option 3 = router
option 6 = DNS servers
option 15 = domain_name
option 150 = TFTP server
option 128 = PXE - undefined (vendor specific)
Vendor options
some phone systems use their own option for example
nortel use 128 and 191
How to set options
You can set them on the domain controller under DHCP -> Scope -> scope options
Cisco phone registration process
Step 1: Phone Loads Software (Image) and Starts the Configuration Process
Step 2a: Phone Sends DHCP Request
Step 2b: DHCP Server Sends DHCP Response
Step 3a: Phone Sends TFTP Request for a Configuration File
Step 3b: TFTP Server Sends the Default Configuration File
Step 4a: TFTP Server Sends the Specific Configuration File of the Phone
Step 4b: Phone Registration Finishes
Check voice vlan is allow and native vlan matches
Cisco
switchport mode trunk
switchport trunk allowed vlan 102
switchport trunk native vlan 102
3Com on other side
port trunk permit vlan 102 (allowed vlan)
port trunk pvid vlan 102 (native vlan)
Wednesday, 4 October 2017
Upgrading the firepower
New method is FMC, deploy, sensor, deploy.
Step1
Update your VDB and geolocation to the latest.
Run a backup and download
Its a good idea to take screenshots of ACL and other policy settings rules just in case.
Since 6.2 you need to upgrade FMC first, then sensor.
To upgrade from the web GUI the FMC sh upgrade file can be downloaded here
Downloads Home > Products > Security > Firewalls > Firewall Management > Firepower Management Center > Virtual Appliance > FireSIGHT System Software-6.2.0
See here
Network sensor sh files available here
Downloads Home > Products > Security > Firewalls > Next-Generation Firewalls (NGFW) > ASA 5500-X with FirePOWER Services > ASA 5525-X with FirePOWER Services > FirePOWER Services Software for ASA-6.2.0
see here
In later versions you can run a readiness check first. Most logs are found in /var/log/sf
From version 6.3.0 you can upgrade direct to major versions
Lets say we are on 6.2.1 and want to go to 6.4.0.2
We can upgrade directly to 6.4.0 and then up to 6.4.0.2
Remember you need to deploy after each install.
Wednesday, 27 September 2017
enable Microsoft NLB on cisco switch
Some things we need from the server admin first
Real servers IP + MAC
Cluster (virtual) IP + MAC
real server1: 192.168.64.11
real server2 192.168.64.12
cluster ip: 192.168.64.13
Confirm the mac addresses and see what vlan they are on
sh arp | i 192.168.64.11
sh arp | i 192.168.64.12
See what ports those mac addresses are seen on (if its a trunk to another switch then you'll have to do same config over there)
sh mac address-table | i xxxx.xxxx.xxxx
sh mac address-table | i yyyy.yyyy.yyyy
Create static mapping for the cluster IP to cluster MAC
arp 192.168.64.13 zzzz.zzzz.zzzz ARPA
Create static mapping for cluter mac to the ports where the real servers are
mac-address-table static zzzz.zzzz.zzzz vlan 64 interface GigabitEthernet5/1
You should be able to ping the cluster IP now (you might have to visit other switches)
ping 192.168.64.13
Thursday, 21 September 2017
troubleshooting wifi networks
Check controller, check uptime.
Check controller and AP uplinks
Are WLANs properly segregated ?
Download and install Inssider and review other networks. Around. Watch during the time of the issue are other networks appearing ?
Signal strength (db)
closer to 0 is better
acceptable range
-30 to -90
I get -40 when right beside the AP
-30 to -50 = good
-60 to -70 = decent
you want at east -75
-70 to -90 will work but performance will be bad
Are clients 2.4G or 5G ? Is there lots of networks on 2 but 5 is free ?
Are all devices compatible
If you are still having issues. You can look at other radio waves interfering but need more hardware (see inssider and wispy)
Wednesday, 20 September 2017
failed to locate egress interface for ... on cisco asa
needed management-access INSIDE
I could ssh over the VPN
I could still connect the ASDM over the public IP
https://supportforums.cisco.com/t5/vpn/failed-to-locate-egress-interface/td-p/2323400
Wednesday, 13 September 2017
DNS checking website
useful for checking if 3rd party has created the txt record or not when setting up SSL certs with godaddy.
the txt record needs to be created on the main .domain.com not subdomain.domain.com
Thursday, 24 August 2017
stacking cisco switches
- Visual inspection of the racks
- Can we space the stack 1u apart from each member
- Usually need one 3m stack cable (top<->bottom), do we need to more ?
- Do we have power is it normal plug or female power cable ?
- Are power cables cisco notch or not ?
• Put the ears on get the stack going (See building the stack below)
• Provision and set priority (See building the stack below)
• If we have dual power supplies, can the racks accommodate the extra cables?
• Check the front of the rack, could the switch be replaced are there any network cables in the way?
• Is there room to install the new stack with a space between each switch?
• Check the back of the rack, keep in mind new switches are longer and stack cables come out further, can the switch be replaced, any cables in the way?
• Get a backup of the config on the current stack
• Take note of VLANs and trunk ports
Next site visit
• Convert the config
• Install the new switches in the rack
• Swap over cables
• Deal with any issues after end user testing
Building the stack
All switches need to be on the same licence and software before they will form a stack.
Boot one switch at a time and run the licence command below and check the software version.
Download and update the software version to latest stable release recommended by cisco if required.
It will need a reboot after running it. Also switch provision / priority.
WR and shut them all down.
Connect stack cables, boot master first, 10 seconds and boot the rest
Commands
license right-to-use activate ipservices all acceptEULA
switch 1 provision ws-c3850-48p (? Get the switch make by sh ver and enter that here)
switch 2 provision ws-c3850-48p
conf t
switch 1 priority 15
switch 2 priority 14
Top left to bottom right
right to next left
right to next lefts
continue until finished
Power stack cabling
Yellow cable -> yellow port
Green -> green
Copying the bin file from tftp server on my laptop to switch
copy tftp://10.56.3.200/cat3k_caa-universalk9.16.03.03.SPA.bin flash:
Install modes
Bundle Mode = BIN FILE
The switch can't boot an image over 400mb. The later images are nearly 500mb. Bundle mode the bin file is extracted into memory on boot. Install mode the bin file is extracted to several packages with a packages.conf pointing to the packages. Install mode is the recommended.
Converting BUNDLE -> INSTALL
request platform software package expand switch 1 file flash:cat3k_caa-universalk9.16.03.03.SPA.bin to flash:
Copy the bin and extract on all switches in the stack
Set your boot to packages.conf
boot system switch all flash:packages.conf
Enable the stack port
In rare cases the switch might ship with stack port disabled
switch 1 stack port 1 enable
sh switch
Auto upgrade other switches
software auto-upgrade
wr
Stack show commands
show switch
show switch 2
show switch detail
show switch nei
show switch stack-ports
show switch stack-ports summary - to see cable lengths
show redundancy
show redundancy state
More on upgrading the stack
https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3850/software/release/16-8/release_notes/ol-16-8-3850.html#id_67699
Saturday, 12 August 2017
renumbering switch stacks
set all its other values
Boot up second switch set it as backup (pri 14)
and other values
Create the stack between the two devices.
Now add other switches to the stack and give them numbers etc.
set start priorty
provision switch 1 ws-3850-u etc
switch 2 renumber switch 1
Once you swap switch numbers you can't swap them again
Make the swaps you can
write mem
reload (takes about 10mins on 3850)
Check again
sh switch
Move the remaining switches
Wednesday, 26 July 2017
Cisco ASA some hardening commands
If you are using ssh key-exchange group dh-group14-sha1 you may get a warning "the first key-exchange algorithm supported by the server is". Change this to
Authentication
Telnet
Disable aggressive mode VPNs (PSK is transferred in plain text)
crypto ikev1 am-disable
crypto isakmp am-disable
SSL/TLS
SSL and TLS both get called SSL as a general term.
TLS has replaced SSL.
Latest version of TLS (at time of writing) is v1.2 and you should be using this everywhere. If possible.
Anyconnect 3.x doesn't support tlsv1.2, only anyconnect 4.x does.
Use tlsv1.2 when acting as a server (you need anyconnect 4.x for tlsv1.2)
ssl server-version tlsv1.2
Use tlsv1.2when acting as a client (you need anyconnect 4.x for tlsv1.2)
ssl client-version tlsv1.2
Select SSL ciphers for outbound connections (these may change over time)
ssl cipher default custom "DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA:AES128-SHA:AES256-SHA"
Inbound tlsv1 (negate this command to disable tlsv1)
ssl cipher tlsv1 fips
Inbound tlsv1.1 ciphers (negate this command to disable tlsv1.1)
ssl cipher tlsv1.1 fips
Inbound tlsv1.2 ciphers (this is the one you should use)
ssl cipher tlsv1.2 fips
Inbound dtlsv1 (used by anyconnect 4.x)
ssl cipher dtlsv1 custom "DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA:AES128-SHA:AES256-SHA"
Turn on RPF (block spoofing)
ip verify reverse-path interface interface_name
Remove old VPN encryption/hashing algorithms
3des and sha1 have been broken.
eg no crypto ipsec ikev1 transform-set LOW esp-3des esp-sha-hmac
Keep in mind if you have VPNs that use this transform set LOW and you removed it, you would break all of those VPNs. You should migrate them to the latest algorithms. That can turn into a bit of a project dealing with 3rd parties trying to get them to update their VPN settings.
Find and remove "permit ip any any" type rules
Its a common one to find a FULL_INTERNET_ACCESS_GROUP or IT_ADMINS that should be removed. Another common thing people like to do is remove the global NAT so no one has internet access. You provide a NAT to your proxy server (and other servers that need a public IP), deploy the proxy with GPO forcing everyone to use the proxy. You can run into issues here with software updates and licensing etc. Most modern proxies can allow MS and adobe updates. If you are forced to use a full access group it should be time based or regularly checked that its disabled. It should only be used as a last resort. Vendors should be able to provider what ports/IPs their software needs access to to update and license.
Cisco active adviser
install desktop app
install dot net 4.6.2
needs java also but was not asked
must have access to all network gear on (create FW rules)
SSH (tcp 22)
HTTPS (tcp 443)
HTTP (tcp 80)
Telnet (tcp 23)
add login username + password
for enable password leave the username space blank
can use subnets 192.168.0.0/24
It takes about 4 days to scan a /16 network
If the host name is blank it is probably part of a switch stack
commands run by CAA (all show commands so no risk)
show arp
show cdp neighbors
show health-monitor
show inventory
show ip int brief
show int description
show mac address-table [synchronize statistics]
show module switch [1|2]
show running-config [all]
show switch
show system
show tech-support wireless (if successful also then runs "show tech-support")
show version
show vtp [status|password]
It has some issues logging into older devices.
Wednesday, 12 July 2017
tunnel interface not working gre
Even though settings are correct the tunnel interface seems to be holding onto old settings
Remove the tunnel interface and put it back with a different name
SSL cert decorder
Monday, 10 July 2017
SAN certs
Wildcard cert = *.domain.com
Unlimited sub domains.
SAN cert = up.domain.com
to.domain.com
five.domain.com
in-these.domain.com
certs.domain.com
Up to 5 sub domains
Generally used with phone systems
Some companies use them to cover their standard sub domains
webmail.domain.com
mx.domain.com
remote.domain.com
read csr information in linux
Extract information from the CSR
$ openssl req -in shellhacks.com.csr -text -noout
Verify the signature
$ openssl req -in shellhacks.com.csr -noout -verify
Whom the certificate will be issued to?
$ openssl req -in shellhacks.com.csr -noout -subject
Show the public key
$ openssl req -in shellhacks.com.csr -noout -pubkey
get public ip from cmd on windows
You can also use this script to write it to a file. Then you can use bginfo to display it on the desktop.
'<script language="vbscript">
' Set the URL where we can get the public IP
const URL = "http://ifconfig.me/all.xml"
set xmldoc = CreateObject("Microsoft.XMLDOM")
xmldoc.async=false
xmldoc.load(URL)
' Loop to get the public IP from the XML
for each x in xmldoc.documentElement.childNodes
if x.NodeName = "ip_addr" then
myip = x.text
end if
next
' echo for testing
'wscript.echo myip
'Output IP to file so bginfo can read it
Set objFSO=CreateObject("Scripting.FileSystemObject")
outFile="P:\Users\jack\Documents\scripts\ext-ip.txt"
Set objFile = objFSO.CreateTextFile(outFile,True)
objFile.Write myip
objFile.Close
Wednesday, 5 July 2017
static port nat on cisco router
int dialer 1
ip nat outside
int inside
ip nat inside
ip nat inside source static tcp 192.168.4.10 8080 interface dialer 1 8080
This will nat the public IP of dialer1 port 8080 to 192.168.4.10 port 8080
Tuesday, 4 July 2017
IOException when trying to connect cisco IPS with Cisco IME
I already had tried updating java and adding the IP to the java security exceptions list but it didn't resolve.
The fix was as follows:
Log into the ASA and go into enable mode
Run "Session ips console" to get into the IPS
tls generate-key
Log back into IPS via the Cisco IME software
https://popravak.wordpress.com/2014/03/10/ioexception-when-trying-to-connect-to-cisco-ips/
I had to get updated lic file from 'licensing@cisco.com' and manually apply it.
Once that was done I manually uploaded the latest signature file (wouldn't apply without updated license)
I found that auto updates won't work unless you have at least version 7.1(11)E4 this is because cisco switched to using SHA2. You need to update the software on the IPS to resolve.
Updating the IPS
Backup your config first (need IP config etc)
Update the secondary ASA/IPS
Need to setup again
Apply license
Apply signature
Failover
Update the primary ASA/IPS
Failback
Make sure to update the secondary ASA first
http://www.cisco.com/c/en/us/support/docs/security/intrusion-prevention-system/116155-configure-product-00.html#anc9
Make sure to download the correct file for your ASA. I had 5515 and needed the .aip file.
https://software.cisco.com/download/release.html?mdfid=283674966&flowid=24482&softwareid=282549758&release=7.1(11)E4&relind=AVAILABLE&rellifecycle=&reltype=all
Enter the sw-module module ips recover configure image disk0:/imagename.aip
Thursday, 29 June 2017
tnsping works but connectivity fails TNS-12502
tnsping worked but connecting to the database failed.
This oracle setup used some VIPs (Scan IPs) and real DB server IP's.
Only access to the scan IP's was requested so FW was blocking the rest.
TNS-12502 error was returned from the server.
The way I could see it working in the packet captures was the client connects to the scan ip which returns the IP of the real DB server, then the client connects to the real DB server IP.
So TNSping worked, however when they tried to connect to the DB server it failed
To resolve grant access to all VIPs and real server IPs
Wednesday, 7 June 2017
configure BVI (bridge-group) on ASA5506X
Step 2: Take a backup of your current config, If you have already created your inside interface you need to clear it out. You will lose some other config when you do this (NAT, DHCP etc).
Step3 : Create the BVI virtual interface (the number will match the bridge-group number we use later to assign ports)
interface BVI2
nameif inside
security-level 100
ip address 10.32.11.254 255.255.255.0
Step 4: Assign other ports to the bridge group (bridge-group 2 matches with BVI2 interface number) you need to give each port a nameif or it won’t work (don’t ask me how I know that)
interface GigabitEthernet1/2
bridge-group 2
nameif inside_1
security-level 100
interface GigabitEthernet1/8
bridge-group 2
nameif inside_2
security-level 100
Step 5: Setup your DHCP / ACL’s / NATs again as it might have gotten cleared out
dhcpd address 10.32.11.10-10.32.11.199 inside
dhcpd dns 10.32.0.4 10.32.0.5 interface inside
dhcpd enable inside
Tuesday, 30 May 2017
system info on linux
Gives a good overview of the system
Monday, 22 May 2017
source NAT on juniper SSG
The policy should be at the top so other rules won't overlap/interfere.