MarkD Cybersecurity Overlord ✭✭✭
Reactions
Comments
-
My sarcastic side says unplug it from the network The whole Idea behind Nmap is to identify devices, it may not respond to ping but it will to an ARP, NMAP is matching the MAC address to the Vendor The MAC of an interface can be overridden.
-
Management access over the VPN will need to be enabled for access to the Firewall UI, at least with that you have a fighting chance of debugging the "other" side
-
NSV inside Azure VNET, enable IKE NAT traversal on on both sides ( IPSEC VPN advanced) - use IKEV2 if possible The initial IKE message IKE_SA_INIT to port 500 will include the Payload (41) NAT _DETECTION_SOURCE_IP Payload (41) NAT _DETECTION_DESTINATION _IP it will then negotiate the NAT traversal In Azure you are behind a…
-
leave the firewall to be a firewall - BUT bandwidth limitation is per physical interface
-
no you cant on the sub interface only the physical.
-
on the ISP router/modem
-
create an address object for DNS server and add that to the VPN instead of the X0 subnet. you could always add rules afterwards
-
So on your switch, you have your 2 access ports one on VLAN 2 connected to X0 and the other on VLAN 5 Connected to X1 and their native VLANS are configured?
-
maybe something to look at unless its already set.
-
you may want to check out the Aruba Support pages for Instant on What are the ports that needs to be allowed on Firewall in order to bring up Aruba Instant ON APs? | Everything Instant On
-
We always use the Windows NPS with the extension for Azure MFA with the push notification for approval.
-
https://www.sonicwall.com/techdocs/pdf/switch-administration_guide.pdf pages 47 and 48 cover Link aggregation and Port trunking.
-
You will need to add the specific route on the VNET in order to pass traffic back to via the NSV. https://docs.microsoft.com/en-us/azure/virtual-network/virtual-networks-udr-overview
-
I dont believe this is possible directly on the applicance, you may want to look at a third part product to alert. but you will still need to manually correlate to the relevant connection in order to terminate. https://www.fastvue.co/employee-internet-usage-reporting/#downloadtrials
-
If I understand the VPN server you refer to is "out on the internet, external to your environment" Have you implemented Firewall rules that permit the VPN through the firewall? I'll make the assumption is an IPSEC VPN Here is the MS article Troubleshoot Always On VPN | Microsoft Docs specifically 809 points to UDP 500 and…