Category Archives: At a Glance

Short posts that mostly contain a nice picture that show something technical without many words.

Juniper Secure Access At-a-Glance Featured Image

Juniper Secure Access: Easy Deployment Poster

For a beginner, the configuration of a Juniper Secure Access SA/MAG device is not that simple. There are too many options and links that must be filled in. Though there are quite detailed configuration guides I was missing a “quick start” figure to see which profiles, roles, etc. must be set in order to have a simple login and group membership environment.

Here comes my at-a-glance poster for the Junos Pulse Secure Access Service (SSL-VPN).

Continue reading Juniper Secure Access: Easy Deployment Poster

DHCP Featured Image

DHCP Sequences: Broadcast vs. Unicast

I missed a sequence diagram for DHCP which not only shows the four basic messages (DISCOVER, OFFER, REQUEST, ACK), but also the used source/destination addresses and ports, the type of connection (unicast/broadcast), the differences between the initial and the renewing messages, and the needed firewall rules for allowing DHCP traffic to/from the own interface or to/from a DHCP relay agent.

Here it comes! 🙂

Continue reading DHCP Sequences: Broadcast vs. Unicast

Palo Alto Vsys Shared Gateway - featured image

Palo Alto: Vsys & Shared Gateway – Zones, Policies, and Logs

It was not easy for me to understand the type of zones and “from – to” policy definitions when working with a Palo Alto firewall that has multiple vsys’s and a shared gateway. I was missing an at-a-glance picture that shows which zones to use. (Though this document describes the whole process quite good.) So, here it comes…

Continue reading Palo Alto: Vsys & Shared Gateway – Zones, Policies, and Logs

PFS Featured Image

At a Glance: Perfect Forward Secrecy (PFS)

During the last few months the concept of Perfect Forward Secrecy (PFS) was presented on many newspapers and guidelines. This concept is related to the session key generation for SSL/TLS as well as for IPsec tunnels. And even though many of these articles describe the benefit of PFS, I was still missing a picture that shows the main difference between the classical key exchange via RSA and the exchange via Diffie-Hellman with PFS. So, here comes my poster. 😉

Continue reading At a Glance: Perfect Forward Secrecy (PFS)

HTTP heise.de with proxy featured image

At a Glance: HTTP Proxy Packets vs. Normal HTTP Packets

I am currently in touch with a few HTTP proxy installations. As every time when troubleshooting network issues, I am looking with Wireshark on the network and trying to understand the different packets.

Here is a short overview of the differences between HTTP requests that are sent directly to the destination and HTTP requests that are sent via a proxy.

Continue reading At a Glance: HTTP Proxy Packets vs. Normal HTTP Packets

False Positive etc featured image

At a Glance: False Positive etc.

I am always struggling with the definition of a “false positive” though it should be easy. Since I love figures that point out the most important facts I drew one concerning the false positive etc. structure. It is based on the example of a malware detection in which an engine decides whether a piece of software is a malware or not. Here it is:

Continue reading At a Glance: False Positive etc.