Automate Backuping

This is tested on ASUS ROG G55VW, Xubuntu 18.04.

Automate Backuping From Remote Computer via SSH

Automate Disk Imaging on Ubuntu With DD and Cronjob

Note that DD copies byte by byte, that means even space that is not used. There is workaroud by writing zeros on not used disk space, but not included in this article.

First find out what you want to include in your image. You can list all your disks and partitions with command.

sudo lsblk -o NAME,FSTYPE,SIZE,MOUNTPOINT,LABEL
Continue reading

Project for Information Security Course: Clientless SSL VPN Connection

SSL Clientless VPN works as a secured tunnel from client to company’s LAN.

 

ASA2:
ciscoasa(config)#username matias password matiasrichterich
ciscoasa(config)#group-policy vpn internal
ciscoasa(config)#group-policy vpn attributes
ciscoasa(config-group-policy)#vpn-tunnel-protocol ssl-clientless
ciscoasa(config-group-policy)#webvpn
ciscoasa(config-group-webvpn)#url-list value Server4
ciscoasa(config-group-webvpn)#tunnel-group matiasvpn type remote-access
ciscoasa(config)#tunnel-group matiasvpn general-attributes
ciscoasa(config-tunnel-general)#default-group-policy vpn
ciscoasa(config-tunnel-general)#username matias attributes
ciscoasa(config-username)#vpn-group-policy vpn
ciscoasa(config-username)#exit
ciscoasa(config)#webvpn
ciscoasa(config-webvpn)#enable outside

 

https://www.cisco.com/c/en/us/td/docs/security/asa/asa72/configuration/guide/conf_gd/vpngrp.html
youtube.com/watch?v=O4IxyhgnLeU

Project for Information Security Course: Simulating Internet In Packet Tracer

Simulating Internet

By simulating Internet I mean creating a cloud which represents the action made by ISPs and other devices along the path to remote network’s target device. Continue reading

Project for Information Security Course: Connecting Devices and Configuring DHCP server

17.10.2018

Getting started

I thought that it would be important first step to plan the addressing scheme. I segmented every department in their own VLAN and every VLAN has it’s own host range. For getting known a little better with subnetting math, I didn’t assign easiest /24 bit masks for every subnet. For sake of complexity and training, subnets has /25, /26 or /30 bit long masks. Continue reading

Project for Information Security Course: Designing The Topology part 2

16.10.2018 22:32

Before we’re starting to actually even do anything, I have been thinking about the network’s core structure. I want to separate every department, but is it necessary to give every segment it’s own router? It seems to be costly, a lot of work to configure and maintain. What if we just put two layer 3 switches in middle of everything? Continue reading

Project for Information Security Course: Designing The Topology

Planning  the project

As a part of our Information Security Course in Haaga-Helia, we are going to implement a working topology in Cisco Packet Tracer software. We are working in group of three students.  As it is Information Security Course, our goal is to accomplish secure and fully working network. Continue reading