Configuration guides for IT Administrators
⏱︎
Read time:
This article, tells you how to restrict Cyberoam GUI access to certain IPs from LAN, so what to do, if you want to restrict to specific Public IPs from WAN. Create a Host Group (named here as WAN IP Access Group) with list of Public IP addresses that you want to provide access, then create WAN-LOCAL access…
⏱︎
Read time:
[wpdevart_youtube]J_zISa69nts[/wpdevart_youtube]
⏱︎
Read time:
It took almost 2 days for me to resolve this problem -> traffic didn’t pass through the IPSec tunnel in Cyberoam firewall. I read most of KB articles in Cyberoam that talks about it. I grouped here all the checklists that you need to verify. Log shows EST-P1: Peer did not accept any proposal sent, Message ID 17853 1.Define the subnets…

⏱︎
Read time:
[wpdevart_youtube]NaSLHokze6E[/wpdevart_youtube] Our video tutorial missed to clarify few information, so we explained here 10.150.102.1 and 10.150.180.1 are IPs of SVI configured on the switches. 10.150.200.253 is an interface on Cisco ASA firewall, being Guest WLAN, we have not configured SVI on the switch and let ASA handle DHCP Server and lease IPs. You should necessarily have…
⏱︎
Read time:
Step 1: Configure Phase 1 and Phase 2 In ASA of both sides Phase 1: IKE policy In Phase 1, single bi-directional SA (Security Association) is created between VPN peers and is a control channel for Phase-1 keepalives, DH-Key Calculation and Phase-2 SA creation and rekey. ciscoasa(config)# crypto ikev1 policy 10 ciscoasa(config-ikev1-policy)# authentication pre-share…
⏱︎
Read time:
F5 LACP Configuration: In both F5 boxes, configure LACP as shown in the screenshot Cisco Switch Configuration: Both these Cisco switches are stacked and it supports multi-chassis port-channel, i.e. creating port-channel between Ethernet interfaces of different switches. Set all these interface to default settings, this is to avoid mismatch on interface configuration causing failure of ether-channel formation. (config)# default int…
⏱︎
Read time:
The default administrator password of HG8247, Home Gateway – Fibre to the Home is Username: telecomadmin Password: admintelecom Below is one example of port forwarding in HG8247 device, it is same for other ports/applications. To port forward VPN traffic on a device (IP address as 192.168.100.3) located behind HG8247 router, you need to open UDP ports 500 and 4500…
⏱︎
Read time:
Below is successfully working configuration to configure Cisco 887 router interface as WAN port, remember that you cannot make these FastEthernet interfaces as L3 (no switchport) and you cannot assign IP address to these interfaces, so instead create SVI as we did below. Configure inside interface as “ip nat inside” and outside interface as “ip nat…
⏱︎
Read time:
Configuration of Facebook Wi-Fi in Cisco Meraki: In Cisco Meraki dashboard, navigate to Wireless > SSIDs > edit settings of Access Control. Then configure as below Under Addressing and traffic option, choose Bridge mode: Make clients part of the LAN. This option let clients receive IP address from your local DHCP server, probably thats your ADSL router…

⏱︎
Read time:
We are using WebLogic Server at the backend and F5 LTM load balancer at front. Our SSL certificate is offloaded in F5 and users see https in their browser. But while looking at the packets (using F12) in the user computer and also in the logs of Weblogic server, everything was recorded as http instead of…

I’m Lucas Brey, a travel blogger sharing practical guides, hidden gems, and honest tips from the road. Follow along for smart itineraries, great food finds, and stories worth bookmarking.