Thursday, December 18, 2008
What the Difference between Nagios-mysql and Nagios-pgsql?
Mysql:
- less features
- no transactions (transactions belong to oracle )
- use it for reading
- useless for Business critical appliactions
- Strange versioning 5.0.12 was beat 5.0.13 was offical release - do you know if you use a beta software
Postgresql
- more features
- stable
- more robust
- free for commercial use
But i still abit blur on the explanation, if can, can u explain to me what the difference ?
Re-drawn Physical Network Diagram
Sample TACACS configuration for cisco router
Sample PIX version 7 configuration
Hi Zheng Le and Jun Yi, Here are the sample of PIX configuration. As you can see, it's pretty much like the cisco IOS command. Please build your research upon this :)
Look at Ethernet2. Comparable to the router IOS, normally you keyed in encapsulation dot1q 20 (vlan number). In pix, you just need to create a subinterface (ethernet2.20)
and put in the keyword vlan 2o, give the interface a name, security level and ip address.
--------------- sample config ----------------------------------
pixfirewall(config)#interface Ethernet0
pixfirewall(config-if)#ip address 188.10.20.65 255.255.255.248
pixfirewall(config-if)#nameif outside
pixfirewall(config-if)#no shutdown
pixfirewall(config-if)#interface Ethernet1
pixfirewall(config-if)#ip address 192.168.0.193 255.255.255.224
pixfirewall(config-if)#nameif DMZ
pixfirewall(config-if)#security-level 50
pixfirewall(config-if)#no shutdown
pixfirewall(config-if)#interface Ethernet2
pixfirewall(config-if)#no shutdown
pixfirewall(config-if)#interface Ethernet2.10
pixfirewall(config-subif)#vlan 10
pixfirewall(config-subif)#ip address 192.168.0.129 255.255.255.192
pixfirewall(config-subif)#nameif Servers
pixfirewall(config-subif)#security-level 75
pixfirewall(config-subif)#interface Ethernet2.20
pixfirewall(config-subif)#vlan 20
pixfirewall(config-subif)#ip address 192.168.0.1 255.255.255.192
pixfirewall(config-subif)#nameif OfficeA
pixfirewall(config-subif)#security-level 100
pixfirewall(config-subif)#interface Ethernet2.30
pixfirewall(config-subif)#vlan 30
pixfirewall(config-subif)#ip address 192.168.0.241 255.255.255.240
pixfirewall(config-subif)#nameif GuestWired
pixfirewall(config-subif)#security-level 25
pixfirewall(config-subif)#interface Ethernet2.40
pixfirewall(config-subif)#vlan 40
pixfirewall(config-subif)#ip address 192.168.0.225 255.255.255.240
pixfirewall(config-subif)#nameif GuestWireless
pixfirewall(config-subif)#security-level 25
pixfirewall(config-subif)#interface Ethernet2.50
pixfirewall(config-subif)#vlan 50
pixfirewall(config-subif)#ip address 192.168.0.65 255.255.255.192
pixfirewall(config-subif)#nameif OfficeWireless
pixfirewall(config-subif)#security-level 100
----------------------end of sample config ------------------------------
PIX version 6.x and version 7.2
- Unrecognized command.
- Invalid input detected at '^' marker.
Certain commands used in version 6
- Ethernet port activation
the following command could not be excute as it is a Invalid input detected at '^' marker.
As for the solutions to obtain version 7 command, we search this websites
1 - http://www.cisco.com/en/US/docs/security/asa/asa72/command/reference/c1_72.html#wp2034121
2 - http://www.dslreports.com/faq/15785
Monday, December 15, 2008
Un-successful Ping resolved
The arrow on the right hand side shows the wrong connected (port 23)
The correct port to be connected is on the left hand side (port 3)
The reason why the ping from DMZ and Remote client doesn't work is because the connected PC is plugged to the wrong port in the switch. Therefore the client are in different vlan, this result ping as unsuccessfully as no trunking was done.
The PC used to ping was connected to port 23, which is under VLAN 10 used for Internet access.
The supposed port to be connect was port 3 which was VLAN 40. therfore the client connect to port 23 in VLAN 10 could not communicate with the gateway in VLAN 40.