Configuring cacti for 1-minute polling
Trickier than it sounds, just because there’s lots of moving parts. Here is a handy guide that gets all the notes right: http://www.tolaris.com/2013/07/09/cacti-and-1-minute-polling/
David PiniellaNetwork and Security Consulting
|
||
Configuring cacti for 1-minute polling2014.10.24
Trickier than it sounds, just because there’s lots of moving parts. Here is a handy guide that gets all the notes right: http://www.tolaris.com/2013/07/09/cacti-and-1-minute-polling/ Juniper MACSec Notes2014.10.16
MACSec is kind of neat (TL;DR for the impatient: layer-1 crypto on links).
CLI config:
Troubleshooting: additional reading:
There’s a Cisco version of this here: http://david.piniella.net/2015/11/cisco-macsec-notes/ Linux / Unix / VMS equivalencies2014.10.02
So you’re dumped in Brazil (VMS) and all you speak is English (Windows) and Spanish (Linux), how do you get by? A universal translator, of course: http://bhami.com/rosetta.html VMS There’s also a VMS to Unix cheat-sheet: http://www.physnet.uni-hamburg.de/physnet/vms-unix-commands.html and another: https://www.mpp.mpg.de/~huber/vmsdoc/unix_vms_cmd_xref.html setting security/ownership in VMS: http://labs.hoffmanlabs.com/node/1806 tiny gotchas that you might not expect:
$ create/directory [.tmp] $ copy dsa0: [.tmp]x.tmp $ copy dsa0: [.tmp]y.tmp $ copy dsa0: [.tmp]z.tmp This creates a directory, .tmp, and three files inside it, x.tmp, y.tmp, z.tmp. AIX AIX Cheat-sheet: http://bigcalm.tripod.com/aix/handycommands.htm AIX Cheat-sheet: http://www.tablespace.net/quicksheet/aix-quicksheet.pdf [PDF] AIX Cheat-sheet: http://www.vmexplore.com/aix-commands-cheat-sheet/ AIX documentation: http://publib.boulder.ibm.com/infocenter/pseries/v5r3/index.jsp AIX Admin’s blog, full of AIX tips and tricks: http://nixys.fr/blog/?tag=aix (I haven’t used it but it’s the type of quick and to-the-point howto that I find most useful.) a text file cheat-sheet — quick and dirty, no-nonsense: http://www.pimpworks.org/ibm/aix.txt
SOLARIS The biggest caveat when going to Solaris from Linux is that a lot of the tools you expect are missing (ie, not installed by default) or different (ie, you’re expecting GNU versions). The easiest way to deal is to install the gnu tools and set them in your path. That said, Solaris 10 is less of a PITA than older versions (9, 8….or heaven forfend: SunOS). Here is a fast and dirty “why doesn’t this work / how do I do this?” for Solaris: http://sysunconfig.net/unixtips/solaris.html IBM redbooks, learn it, love it: http://www.redbooks.ibm.com/redbooks/pdfs/sg247186.pdf [PDF] Lesser Known Solaris Features: http://www.c0t0d0s0.org/pages/lksfbook.html
Holder urges tech companies to leave device backdoors open for police – The Washington Post2014.10.01
via Holder urges tech companies to leave device backdoors open for police – The Washington Post.
TL;DR: “we need to snoop on everything, for the kids”. Shameless, spineless, embarassing. The Criminal Indictment That Could Finally Hit Spyware Makers Hard | WIRED2014.10.01
The indictment this week of the man behind an app designed for surreptitiously monitoring cellphone activity is only the second federal case filed against someone involved in the commercial sale of so-called spyware and stalkingware. But the case could have negative implications for others who make and sell similar snooping tools, experts hope. The case involves StealthGenie, a spy app for iPhones, Android phones and Blackberry devices that until last week was marketed primarily to people who suspected their spouse or lover of cheating on them but it also could be used by stalkers or perpetrators of domestic violence to track victims. The app secretly recorded phone calls and siphoned text messages and other data from a target’s phone, all of which customers of the software could view online until the government succeeded to temporarily close the Virginia-based site (.pdf) that hosted the stolen data. via The Criminal Indictment That Could Finally Hit Spyware Makers Hard | WIRED. IPSec Site-to-Site between a Palo Alto firewall and Cisco Router2014.09.26
Palo Alto side:1. create a tunnel interface: Network Tab > Interfaces > Tunnels 2. create IKE phase 1: (cisco calls it isakemp) Network > Network Profiles > IKE Crypto 3. create IKE phase 2: (cisco: “transform set”) Network > Network Profiles > IPSec Crypto 4. specify peer: Network > Network Profiles > IKE Gateway 5. Add an IPSec Tunnel: Network > IPSec Tunnels General Tab: Proxy ID tab: Cisco router side:1. Configure Phase-1 (“isakmp”) # conf t Change <<key>> to your preshared key and <<peer address>> to the other system’s IP address (e.g. the public address on the interface of the palo alto FW) NB: note that ISAKMP Phase 1 policy is defined globally. So if you have five different remote sites and configured five different ISAKMP Phase 1 policies (one for each remote router), when our router tries to negotiate a VPN tunnel with each site it will send all five policies and use the first match that is accepted by both ends. 2. configure phase-2 (“transform-set”, ACLs, crypto map) 2a. set an ACL to match the traffic that will be encrypted in the tunnel: The format is: (config)# access-list 100 permit ip 10.0.0.0 0.255.255.255 192.168.1.0 0.0.0.255 NB: If you’re NAT’ing outbound traffic, you need to disable NAT for the traffic that you want encrypted through the tunnel; deny via ACL, like so: (config)# ip nat inside source list 100 interface fastethernet0/2 overload The deny applies specifically to traffic from 10./8 to 192.168.1./24 and then permits 10./8 going anywhere else. 2b. set the transform set (aka phase 2) (config)# crypto ipsec transform-set IPSECSET esp-sha-hmac esp-aes 2c. set the crypto map to tie the elements together: (config)# crypto map IPSECMAP 1 ipsec-isakmp 3. Apply the crypto map to your outbound interface: (config)# interface FastEthernet0/2 And you’re done. useful commands: show crypto isakmp policy Cory Doctrow on the need for easy to use security mechanisms2014.09.18
Cory Doctrow via The Guardian:
via Privacy technology everyone can use would make us all more secure | Technology | theguardian.com.
That’s all well and good, but how do you do it? If you’re reading this, it’s a safe bet you’re at least interested in the idea of data security. But how do you implement this among the nontechnical? It’s easy enough to tell a group of technical people “install PGP, encrypt and sign everything, don’t use weak keys” etc. But how do you get your mom to use it? Or the 62-year-old accountant that prefers to not have to deal with computers except to buy things online and email old friends or distant relatives? |
SearchContactTechnical How-ToCategoriesArchivesRecent Posts |
|