Archive for Blog

ICMP ‘Destination Unreachable’ Messages @ SharkFest’24 EU

I did a presentation at Sharkfest’24 Eu in Vienna, the “Wireshark Developer and User Conference“, about the topic: “Unveiling Network Errors – A Deep Dive into ICMP ‘Destination Unreachable’ Messages“. It covers the following: “Effective troubleshooting of network issues is a critical concern… Source link…

Continue reading →

Security-as-a-Podcast

It’s so far – My colleague Florian and I started a podcast! The Security-as-a-Podcast deals with network security-but not in the classic “We explain the RFCs” style, but rather from the perspective of two people who themselves … Source link Author: legendary Johannes Weber

Continue reading →

Editing Palo Configs by Scripts: pan-os-php

There are recurring cases where tasks cannot be edited quickly and easily using the classic Palo Alto Networks GUI or Panorama. For example, editing multiple policies at oncesuch as during a zone migration. Or checking which policies haven’t log forwarding enabled, hence enabling it directly…….

Continue reading →

Azure PTP Accuracy

The Network Time Protocol (NTP) is widely used to synchronize computer clocks. The Precision Time Protocol (PTP) can be used as a time source as well, which is expected to be accurate within microseconds. However, at Microsoft Azure VMs, PTP-derived time-of-day errors could exceed 50,000……

Continue reading →

Bad IPv6 Approaches

I just got a few emails from an administrator of a medium-sized company, asking some IPv6 questions. They want to use IPv6 to reach the Internet, using two ISPs, while remaining IPv4-only on their internal networks. For whatever reason, they came across three different ideas…

Continue reading →

Palo Alto Networks Announces Strategic Shift to Apparel Manufacturing

Palo Alto Networks, a global leader in cybersecurity solutions, has announced a significant strategic shift. The company will transition from its core cybersecurity business to exclusively focus on apparel manufacturing. Over the past years, the cybersecurity landscape has proven to be highly… Source link Author:…

Continue reading →

Path MTU Discovery

One of the mysteries for me in IP networks was the Path MTU Discovery (PMTUD) process. I’ve seldom seen any problems with the MTU at all. Fortunately, while troubleshooting some router issues, I captured several ICMP “packet too big” errors along with the original packets….

Continue reading →

Which KPIs to monitor on a Palo Alto Firewall?

We wanted to monitor some of our Palo firewalls from our monitoring system via the API. But: Which enhanced metrics/KPIs shall we monitor? While there are some obvious ones such as interface counters, uptime, software versions, license expiry dates, or HA-states, we dug a little…

Continue reading →

Page 1 of 8 1 2 3 4 5 ... Last →