Category: Configuration Example
Anti-virus / Anti-SPAM, Configuration Example, Proxy
TrendMicro IMSVA – reject unknown recipients via LDAP
With the configuration and implementation of an anti-virus, anti-spam solution, I always check if the security appliance has the option to block unknown recipients via LDAP. This prevents unnecessary e-mail from being sent to the backend servers. While configuring a TrendMicro IMSVA 8.0 I noticed that the LDAP option was available, as shown below. The … Read More
Configuration Example, Routing
Policy-based routing in a nutshell
Lately I received some questions about routing decisions and how to influence the routing decisions via access control lists. The following example shows a simple configuration for policy-based routing. The example uses the following logical setup: I configured two routers and connected each router to two PVC’s on the same ATM interface. I configured one … Read More
Configuration Example, Security
Tunneling sessions via Plink
Plink stands for PuTTY Link and is a command-line connection tool similar to Unix ssh. As a networking consultant I often need to support customers from remote locations. Access to their networking equipment is mostly blocked from unknown locations. Sometimes it is allowed to directly access networking equipment, like a company firewall, from a known … Read More
Cacti – Superlinks not working
After upgrading Cacti, like shown in the previous post, the Superlinks plugin stopped working correctly. When opening a Superlink tab I got a blank page in Google Chrome or a half page in Internet Explorer and Opera, like shown below. After some Googling I found the solution for this problem on a Cacti forum. The … Read More
Configuration Example, Management
Upgrade Cacti 0.8.x
A lot of people use the CactiEZ virtual appliance to install a running Cacti environment. The latest CactiEZ virtual appliance (CactiEZ v0.6) uses Cacti v0.8.7c with Plugin Architecture 2.2. Of course a lot of people are developing Cacti and the latest stable version is Cacti v0.8.7g with Plugin Architecture 2.8. I always have trouble with … Read More
Configuration Example, Security
Restore RSA 7.1 primary database and RADIUS config
A few days ago I was troubleshooting a problem with an ISA array after upgrading the VMware environment as you can read in this article. I had a same kind of problem with a RSA environment. After upgrading the VMware Tools and the Virtual Hardware, the RSA database didn’t start anymore. RSA noticed to much … Read More