Postingan

Menampilkan postingan dari Maret, 2019

GNU/Linux networking

Selain menggunakan Cisco,Mikrotik,Juniper untuk keperluan networking, kita juga bisa langsung melakukan konfigurasi menggunakan GNU/Linux. Misalnya menggunakan distro Debian dan beberapa pilihan packages untuk keperluan-keperluan berikut: Routing -Quagga Quagga adalah sebuah network routing yang bisa mengimplementasikan Open Shortest Path First (OSPF), Routing Information Protocol (RIP), Border Gateway Protocol (BGP) dan IS-IS untuk Unix-like platforms, particularly Linux, Solaris, FreeBSD dan NetBSD https://www.nongnu.org/quagga/ Tunnel GRE(Kernel module ip_gre) https://en.wikipedia.org/wiki/Iproute2 https://manpages.debian.org/stretch/iproute2/ip-tunnel.8.en.html VPN SSL VPN(openvpn)   https://openvpn.net / IPSec VPN(strongswan)  https://www.strongswan.org/ IPSec VPN(racoon ipsec-tools)  https://wiki.debian.org/IPsec https://wiki.gentoo.org/wiki/IPsec_L2TP_VPN_server PPPoE https://wiki.debian.org/PPPoE 802.1Q ...

Konfigurasi SSH Server di Windows

Kini SSH server (OpenSSH) sudah ada di Windows Server 2019 Rangkuman konfigurasi: Get-WindowsCapability -Online | ? Name -like 'OpenSSH*' Add-WindowsCapability -Online -Name OpenSSH.Client~~~~0.0.1.0 Add-WindowsCapability -Online -Name OpenSSH.Server~~~~0.0.1.0 Start-Service sshd Set-Service -Name sshd -StartupType 'Automatic' Get-NetFirewallRule -Name *ssh* Selengkapnya: https://docs.microsoft.com/en-us/windows-server/administration/openssh/openssh_overview

Konfigurasi Cisco VPN Anyconnect

Di tutorial ini tentang konfigurasi oleh karena itu perlu mengetahui juga tentang konsep VPN, VPN protocols, Remote Site, Site to site, Encryption(IPSEC,SSL), Authentication, Tunnel, Split tunnel, dll. Secara konsep semuanya sama cuman cara konfigurasi yang berbeda-beda di Linux ada software OpenVPN, Strongswan, dll. Di Windows ada RRAS.  Untuk konfigurasi kali ini tentang konfigurasi Cisco VPN Anyconnect, tutorial ini juga cuman ringkasan dengan harapan barangkali ada yang bermanfaat oleh karena itu perlu juga di crosscheck dengan ebook, tutorial dan sumber lainnya. Untuk konfigurasinya sederhana client akan melakukan koneksi ke VPN Server dalam hal ini Cisco ASA dengan Anyconnect nya, setelah client berhasil terkoneksi ke VPN Server maka bisa mengakses jaringan yang ada di belakang/internal Cisco ASA bisa jaringan LAN/DMZ. 1. Enable webvpn webvpn enable outside anyconnect image disk0:/... anyconnect enable tunnel-group-list enable 2. Make a pool and ob...

Configure VPN for client access (IKEV2 with machine certificate authentication)

Gambar
Example: VPN Configure VPN for client access. Use the IKEv2 protocol and make sure authentication is done by client certificate Use the IP range 172.16.0.50 – 172.16.0.79 The VPN clients should have access to all internal networks Note: Configure hostname, domain, name, IP, etc according to your project. Steps: 1. Configure machine certificate for router and client using Windows CA     Use template Workstation authentication (configure subject name format to Common name & DNS,  Application Policies to Server authentication  & Client authentication). 2. Configure VPN server using tools -> Routing and Remote access 3. Connect from client

How to Mount CIFS Shares from Windows Command Line

Connect Network Drive To map a network drive from windows command line: Click Start, and then click Run -> CMD Type the following, replacing Z: with drive letter you want to assign to the shared resource: net use Z: \\computer_name\share_name /PERSISTENT:YES Disconnect Network Drive To disconnect a mapped drive: Type the following, replacing Z: with drive letter of the shared resource: net use  Z: /delete

Basic VPN Site to Site (IKEV2) on Windows Server Core summary

Open Powershell Install Remote Access feature by Install-WindowsFeature RemoteAccess Install Remote Access PowerShell module by: Install-WindowsFeature RSAT-RemoteAccess-PowerShell Install the Routing feature by: Install-WindowsFeature Routing Type Restart-Computer to restart the computer. Install RemoteAccess VPN S2S Install-RemoteAccess -VpnType VpnS2S Add VPN S2S  Interface Add-VpnS2SInterface -Name "EDGE1" 131.107.0.20 -Protocol IKEv2 -AuthenticationMethod PSKOnly -SharedSecret "ABC" -IPv4Subnet 10.2.0.0/24:100  https://docs.microsoft.com/en-us/powershell/module/remoteaccess/add-vpns2sinterface?view=win10-ps Connect VPN S2S Interface https://docs.microsoft.com/en-us/powershell/module/remoteaccess/connect-vpns2sinterface?view=win10-ps Get VPN S2S Interface https://docs.microsoft.com/en-us/powershell/module/remoteaccess/get-vpns2sinterface?view=win10-ps Reference: https://docs.microsoft.com/en-us/powershell/module/remoteaccess...