[Ruckus] Troubleshooting 802.1x (dot1x) authentication
Solution Verify that you have already applied the correct configuration. Below is an example of what I have done in my lab (truncated with only the RADIUS part) authentication auth-order…
Solution Verify that you have already applied the correct configuration. Below is an example of what I have done in my lab (truncated with only the RADIUS part) authentication auth-order…
Solution mgmt_cli -r true --format json show generic-objects class-name com.checkpoint.objects.classes.dummy.CpmiUser | jq .objects.name Note: there is no official API support for locally defined users, so "generic objects" have to be…
Solution #netstat -an | grep 18192 From the output above, you can see the IP address 10.0.1.1 is the management server IP address. But since I am running standalone mode,…
Problem You wanted to export Check Point logs to Splunk SIEM. Solution The steps of the configuration in Check Point to forward all its logs to Splunk SIEM were as…
Description One of the main features of Check Point Firewalls is stateful inspection. A packet will typically be dropped ‘out-of-state’ when a non-SYN packet arriving within inspect does not match…
Problem How to find details of the Check Point appliance hardware information with no physical access? Solution #dmiparse | grep ‘Product Name’ >> to get the model of the checkpoint…
Problem You wanted to enable LOM access in Check Point appliances. Solution Verify the channel number of the LOM module : # ipmitool lan print 1|8 Whichever number that returned…
CPU usage, process performance used for, RAM and swap usage, etc General real-time performance #fwaccel stats -s then fw ctl affinity -l -a -r -v Changing shell to bash #chsh…
Problem When you upgrade the cluster, the upgraded member will always be in the READY state (which means that it is ready to take over from the current cluster config).…
Problem You wanted to restrict the users who can authenticate to the Remote Access VPN and even though an access rule has been defined, the restricted users were still able…