June 22, 2018

Category: Administration

Cisco :: ISE 2.3 Device Administration using TACACS+

In this article, I will cover network device administration using TACACS+ on Cisco’s Identity Services Engine. Accompanied with a video demonstration, I will also list the TACACS+ configuration required for Cisco’s ASAv. Configure the Network Device/s In the video demonstration, I have used the ASAv as the network device I would like ISE to administer. […]

Ansible :: Creating a Test Environment

In this article, I will go over the basics of what is required to get Ansible up and running so that you can create and run your own playbooks. I assume those that are reading this have at least some knowledge of what Ansible is, what languages it uses and the benefits of using Ansible. […]

Labs :: ASAv with VMware Workstation

In this article, I would like to demonstrate by video how we can lab with the virtual Adaptive Security Appliance (ASAv) by just the use of VMware Workstation. We will achieve this by creating virtual networks in VMware Workstation and then connecting to the Adaptive Security Device Manager (ASDM) using our physical machine. As mentioned […]

How secure is IEEE802.1x?

I’m a huge fan of deploying “dot1x”.  With very little configuration (a Windows NPS server, a little group policy and some access switch commands) you can authenticate every device that connects to your network.  Unlike MAC based security, dot1x ensures that your devices must be successfully authenticated by a centralised RADIUS server before they are […]

VMWare :: Clone a VM without vCenter

VMWare ESXi is a great free tool for any home lab, but something that is missing is the ability to clone VMs – a feature reserved for customers with vCenter. Well, there is a relatively straight forward process that will enable you to duplicate your VMs and I will show you how in this post. […]

PowerShell :: export DNS zones to a hosts file

Picture the scene!  Your data centre has caught fire so you grab you disaster recovery jump kit and run off to the standby site to start powering things up.  Whether you are using VMware SRM, Veeam replication or block level SAN replication you are going to need to connect to some servers / appliances right? […]

PowerShell :: output email addresses from Active Directory

Hopefully you’ve landed here from my series on macro malware and you need to output a list of all you users email addresses to send them some dummy phishing emails for educational purposes.  If not and you need to output a list of all your email addresses in Active Directory then you’re still in the […]

Add the email subject to your Postfix logs

To record the email subject in the Postfix logs, simply add the following line to your Postfix header checks file: /^subject:/ INFO With this done, restart the Postfix service.  On Centos that is with the following command: service postfix restart That’s it! Or is it?  If you haven’t enabled header checks yet you need to do […]

BASH :: A quick script to help you search Postfix logs

Have you ever has to grep through mail logs on Postfix?  What you quickly find is there are two problems which quickly become really irritating: You grep based on email address and so only get the lines relevant to that email address.  Sounds obvious but that means if you search for a sender, you won’t […]

BASH :: check the Postfix mail queues for Nagios

Here is a tiny bash script that will check your Postfix mail queue and exit the code dependant on the result.  Often mail relays sit in the background not really ever breaking and therefore never being monitored.  I wrote this little check so the IT team would be the first to know if mail started […]
Page 2 of 3«123 »

Subscribe to SYNACK via Email