Detecting IP conflict in Windows Server Environment??

Ensuring that all services are up and operating without any disruptions is crucial in a data centre setting. If you are utilising a DHCP server, it is crucial to ensure that you do not have duplicate IP addresses or IP conflicts, especially in server environments, as this will disrupt your vital services. How can IP conflicts be avoided? Keeping an eye on the distribution of IP addresses Preserving an IPAM system in real time Setting up static IP addresses on important servers that are not covered by DHCP or using DHCP IP reservations....

2 min · Adil

Ensuring Security: How to Verify Threat IDs 95187, 95189, and 95191 are Reset in Palo Alto Using Postman

Recently, CVE-2024-3400 has emerged as a significant vulnerability affecting Palo Alto devices, raising concerns about the integrity of network security. In response, it’s crucial to not only address the vulnerability but also ensure the effective reset of associated threat IDs. In this blog post, we’ll delve into how to verify the reset of Threat IDs 95187, 95189, and 95191 in Palo Alto devices using Postman, bolstering your network’s defenses against potential exploits....

2 min · Adil

How to add Cisco Meraki Catalyst 9300 to your Meraki Dashboard?

To add a Cisco Catalyst 9300 switch to the Meraki dashboard, follow these steps: Obtain the Cloud ID of your Cisco Catalyst 9300 switch. This is typically available on the device Navigate to Organization Inventory: Go to the Organization tab in the left-hand menu. Click on Inventory. Claim the Device: Click on the Claim button. Enter the Cloud ID of your Catalyst 9300 switch. The Cloud ID can usually be found on a label on the switch or in the switch’s local management interface....

1 min · Adil

Increasing Wireless Network Security with Radius and RadSec in Meraki Dashboard

Centralised Authentication, Authorization, and Accounting (AAA) in networks is facilitated by the RADIUS (Remote Authentication Dial-In User Service) protocol, which is extensively utilised for VPNs and Wi-Fi. But there is no security when using UDP with standard RADIUS. Using TCP and creating secure TLS (Transport Layer Security) connections, RadSec (RADIUS Security) improves RADIUS. User credentials are shielded from interception and manipulation by this encrypted and secure transmission method. For today’s sophisticated networks, RadSec is perfect since it not only increases security but also dependability and scalability....

2 min · Adil

Optimising AWS Network Architecture: Utilising Centralized NAT Gateway using Transit Gateway Design

Many of the apps you deploy in your environment will simply need outbound internet access to download libraries, patches, and OS upgrades, among other things. The best way to accomplish this is to use a network address translation (NAT) gateway, to protect your production ec2 instances from exposing to the outside world. You may securely manage all of your outgoing internet communication from a single location with this hub-and-spoke setup....

3 min · Adil

Zero Day CVE-2024-3400 - How to verify if the Threat ID 95187 is applied?

What is Zero Day CVE-2024-3400? A command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Fixes for PAN-OS 10.2, PAN-OS 11.0, and PAN-OS 11.1 are in development and are expected to be released by April 14, 2024. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability....

2 min · Adil