Configuration Example, Routing, Security, Switching

Secure HSRP configuration

René Jorissen on July 25, 2008 2 Comments • Tags: #authenticate #cdp #clear #dtp #hsrp #keystring #md5 #preempt #priority #spoofing #standby #text #timeout #wireshark #yersinia

A friend of mine works for a well known auditing and penetration testing company in the Netherlands. Recently we were talking about how he starts looking for flaws in network infrastructures. My friend told me that the first thing he does is simply starting WireShark and start looking at all the packets he receives. By … Read More

Proxy

Automatic Log In Reverse Proxy with FBA

René Jorissen on July 10, 2008 2 Comments • Tags: #2006 #authenticate #automatic #based #fba #form #in #isa #log #owa #post #proxy #reverse #statement

Recently I configured another ISA 2006 server as reverse proxy to publish the Exchange 2007 OWA environment on a secure way to the internet. The customer where I configured the reverse proxy is migrating from Novell GroupWise to Microsoft Exchange. During the migration period, the customer has specific requirements when connecting to the webmail environment … Read More

Proxy, Security

ISA 2006 Authentication over HTTP

René Jorissen on July 8, 2008 0 Comments • Tags: #12250 #2003 #2007 #403 #authenticate #block #code #error #exchange #forwarding #http #over #owa #proxy #requests #require #reverse

I implemented different ISA 2006 Reverse Proxy servers in conjunction with Microsoft Exchange 2003 or Windows Exchange 2007. Today I configured ISA 2006 with Exchange 2007. I configured the Reverse Proxy server as I did always. And the connection from outside the network works perfectly. On the internal Exchange server I configured Basic and Integrated … Read More

Security

Wired 802.1X

René Jorissen on June 24, 2008 0 Comments • Tags: #8021x #authenticate #bypass #iab #inaccessible #wired

The session about wired 802.1X deployment was really interesting. I was stunned about the information I already knew after my testing with MAC Authentication Bypass last week. Of course the speaker had more configuration options when configuring the switch ports. Important for me to hear where the ways for deploying 802.1X in environments. It isn’t … Read More