I needed to be able allow a friend to browse the internet from my ISP to see something, so I figured how how to use a socks proxy with ssh and windows. Putting the whole thing in here. First we are going to exchange the ssh keys now we copy that to the linux server […]
Steve Borba
My notes, I hope they help you, feel free to comment/add to them
Category: Technology
list of commands
on the target server create an account that can’t run anything then create the autossh service of the source and exchange sshkeys
Without service running With Service running
A customer ask me if the PAN could automatically block an IP address if it triggers a threat log. At first I started to think that I could do it through an EDL and use Elastic Stack, but then I remembered the built-in actions on a log forwarding profile – that’s way easier. I decided […]
Arp Scan
Sometimes I do a change that causes a lot of config change, especially with re-ordering of the config. This will download config from the device, then you commit and download again, and then SORT! and compare. I usually do this on the stand-by device, and evaluate if I should do on the primary.
ssh in and run this to scan for the disk changes: Then run fdisk and delete and recreate the partition I found a way I like more with cfdisk “sudo cfdisk /dev/sda” then use the tui to go up and down for the partition, and left/right to go to “resize”, then the default is to […]
The URL block page on the PAN can be anything, but there is no real wizard to customize it – not even just to add a logo! Here are some easy things and some that are a little more complicated. First well just show how to update the block-page to use you company’s images. Go […]