<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Networking - Spheron1</title>
	<atom:link href="https://www.spheron1.uk/category/technical/networking/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.spheron1.uk</link>
	<description></description>
	<lastBuildDate>Thu, 07 Mar 2024 11:47:50 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>ProCurve SSH &#8211; no matching cipher found</title>
		<link>https://www.spheron1.uk/2018/09/24/procurve-ssh-no-matching-cipher-found/</link>
					<comments>https://www.spheron1.uk/2018/09/24/procurve-ssh-no-matching-cipher-found/#respond</comments>
		
		<dc:creator><![CDATA[digitaldisaster]]></dc:creator>
		<pubDate>Mon, 24 Sep 2018 10:48:09 +0000</pubDate>
				<category><![CDATA[HP ProCurve]]></category>
		<category><![CDATA[ciphers]]></category>
		<category><![CDATA[HP]]></category>
		<category><![CDATA[HPE]]></category>
		<category><![CDATA[OpenSSH]]></category>
		<category><![CDATA[ProCurve]]></category>
		<category><![CDATA[ProVision]]></category>
		<category><![CDATA[SSH]]></category>
		<guid isPermaLink="false">https://www.spheron1.uk/?p=971</guid>

					<description><![CDATA[<p>I recently ran into a strange problem where I suddenly couldn&#8217;t SSH to any of our HPE ProCurve 2800 series (2824, 2848) devices from either macOS or Linux. I&#8217;m still not really sure what started this as OpenSSH definitely hasn&#8217;t been updated recently on the Linux client device at the very least, so I don&#8217;t see any reason for the&#46;&#46;&#46;</p>
<p>The post <a href="https://www.spheron1.uk/2018/09/24/procurve-ssh-no-matching-cipher-found/">ProCurve SSH – no matching cipher found</a> first appeared on <a href="https://www.spheron1.uk">Spheron1</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>I recently ran into a strange problem where I suddenly couldn&#8217;t SSH to any of our HPE ProCurve 2800 series (2824, 2848) devices from either macOS or Linux. I&#8217;m still not really sure what started this as OpenSSH definitely hasn&#8217;t been updated recently on the Linux client device at the very least, so I don&#8217;t see any reason for the list of ciphers supported on the client to have changed.</p>
<p>Anyway, the error message given by the OpenSSH client was:</p>
<blockquote><p>Unable to negotiate with port 22: no matching cipher found. Their offer: des,3des-cbc</p></blockquote>
<p>These ProCurves are pretty old and their SSH support is rather limited (1024 bit keys for example), so it&#8217;s not hugely surprising that their supported ciphers are also old and crappy.<br />
Luckily, with OpenSSH you can specify the cipher(s) that you want to use on the command line when you&#8217;re connecting:</p>
<blockquote><p>ssh -c 3des-cbc</p></blockquote>
<p>This fixed the issue and lets me connect, but isn&#8217;t particularly convenient. However, you can also specify this in your ~/.ssh/config file so that it is applied automatically:</p>
<blockquote><p>Host &lt;blah&gt;<br />
Ciphers 3des-cbc</p></blockquote>
<p>Just enter one or more hosts to match against (separated by spaces) and OpenSSH will automatically apply the specified options when connecting to any of them.</p><p>The post <a href="https://www.spheron1.uk/2018/09/24/procurve-ssh-no-matching-cipher-found/">ProCurve SSH – no matching cipher found</a> first appeared on <a href="https://www.spheron1.uk">Spheron1</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.spheron1.uk/2018/09/24/procurve-ssh-no-matching-cipher-found/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CSF bugs and updates</title>
		<link>https://www.spheron1.uk/2016/06/25/csf-bugs-and-updates/</link>
					<comments>https://www.spheron1.uk/2016/06/25/csf-bugs-and-updates/#respond</comments>
		
		<dc:creator><![CDATA[digitaldisaster]]></dc:creator>
		<pubDate>Sat, 25 Jun 2016 23:06:55 +0000</pubDate>
				<category><![CDATA[Firewalls]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[ConfigServer]]></category>
		<category><![CDATA[ConfigServer Security and Firewall]]></category>
		<category><![CDATA[CSF]]></category>
		<category><![CDATA[iptables]]></category>
		<category><![CDATA[LFD]]></category>
		<category><![CDATA[netfilter]]></category>
		<category><![CDATA[Way to the Web]]></category>
		<guid isPermaLink="false">https://www.spheron1.uk/?p=856</guid>

					<description><![CDATA[<p>ConfigServer Security and Firewall (CSF) is a great program for managing iptables/netfilter firewall rules on Linux servers and performing automated blocks based on various things such as brute force login attempts (check it out at http://www.configserver.com/cp/csf.html) and I really shouldn&#8217;t complain given that it&#8217;s free, but sometimes I really do wonder if ConfigServer/Way to the Web actually do any testing&#46;&#46;&#46;</p>
<p>The post <a href="https://www.spheron1.uk/2016/06/25/csf-bugs-and-updates/">CSF bugs and updates</a> first appeared on <a href="https://www.spheron1.uk">Spheron1</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>ConfigServer Security and Firewall (CSF) is a great program for managing iptables/netfilter firewall rules on Linux servers and performing automated blocks based on various things such as brute force login attempts (check it out at <a href="http://www.configserver.com/cp/csf.html">http://www.configserver.com/cp/csf.html</a>) and I really shouldn&#8217;t complain given that it&#8217;s free, but sometimes I really do wonder if ConfigServer/Way to the Web actually do any testing at all before releasing new versions!</p>
<ul>
<li>Version 9.00 released 23/06/2016 (<a href="http://blog.configserver.com/?p=2716">http://blog.configserver.com/?p=2716</a>)</li>
<li>Version 9.01 released 23/06/2016 (<a href="http://blog.configserver.com/?p=2718">http://blog.configserver.com/?p=2718</a>)</li>
<li>Version 9.02 released 23/06/2016 (<a href="http://blog.configserver.com/?p=2720">http://blog.configserver.com/?p=2720</a>)</li>
<li>Version 9.03 released 24/06/2016 (<a href="http://blog.configserver.com/?p=2722">http://blog.configserver.com/?p=2722</a>)</li>
<li>Version 9.04 released 24/06/2016 (<a href="http://blog.configserver.com/?p=2724">http://blog.configserver.com/?p=2724</a>)</li>
<li>Version 9.05 released 25/06/2016 (<a href="http://blog.configserver.com/?p=2726">http://blog.configserver.com/?p=2726</a>)</li>
<li>Version 9.06 released 25/06/2016 (<a href="http://blog.configserver.com/?p=2728">http://blog.configserver.com/?p=2728</a>)</li>
</ul>
<p>7 issues fixed in 6 bugfix releases (9.01 to 9.06) in 2 days! It&#8217;s a good job that the automatic update feature works properly&#8230;</p><p>The post <a href="https://www.spheron1.uk/2016/06/25/csf-bugs-and-updates/">CSF bugs and updates</a> first appeared on <a href="https://www.spheron1.uk">Spheron1</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.spheron1.uk/2016/06/25/csf-bugs-and-updates/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cumulus attacks on Juniper (again)</title>
		<link>https://www.spheron1.uk/2015/11/12/cumulus-attacks-on-juniper-again/</link>
					<comments>https://www.spheron1.uk/2015/11/12/cumulus-attacks-on-juniper-again/#respond</comments>
		
		<dc:creator><![CDATA[digitaldisaster]]></dc:creator>
		<pubDate>Thu, 12 Nov 2015 18:18:14 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[Juniper]]></category>
		<category><![CDATA[Cumulus]]></category>
		<category><![CDATA[Cumulus Linux]]></category>
		<category><![CDATA[Cumulus Networks]]></category>
		<category><![CDATA[EX]]></category>
		<category><![CDATA[Juniper EX]]></category>
		<category><![CDATA[Juniper Networks]]></category>
		<category><![CDATA[Juniper OCX]]></category>
		<category><![CDATA[Juniper QFX]]></category>
		<category><![CDATA[OCX]]></category>
		<category><![CDATA[QFX]]></category>
		<guid isPermaLink="false">https://www.spheron1.uk/?p=822</guid>

					<description><![CDATA[<p>I have a lot of time for Cumulus Networks &#8211; I think they&#8217;re doing some very cool and unique things with their Cumulus Linux operating system for switches and they genuinely have something different to offer, but when they publish blog posts like their one today (https://cumulusnetworks.com/blog/junipers-second-run-up-the-open-networking-mountain/) I lose a lot of respect for them. This seems to be nothing&#46;&#46;&#46;</p>
<p>The post <a href="https://www.spheron1.uk/2015/11/12/cumulus-attacks-on-juniper-again/">Cumulus attacks on Juniper (again)</a> first appeared on <a href="https://www.spheron1.uk">Spheron1</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>I have a lot of time for Cumulus Networks &#8211; I think they&#8217;re doing some very cool and unique things with their Cumulus Linux operating system for switches and they genuinely have something different to offer, but when they publish blog posts like their one today (<a href="https://cumulusnetworks.com/blog/junipers-second-run-up-the-open-networking-mountain/">https://cumulusnetworks.com/blog/junipers-second-run-up-the-open-networking-mountain/</a>) I lose a lot of respect for them.</p>
<p>This seems to be nothing more than a thinly veiled attack casting FUD (Fear, Uncertainty and Doubt) at a competitor &#8211; a knee-jerk reaction to a threat to their business. It actually reads pretty similarly to their blog post when Juniper originally announced the OCX range (https://cumulusnetworks.com/blog/juniper/). They&#8217;ve probably attacked other vendors in a similar manner.</p>
<p>For example, just by going to the main QFX5200 page on the Juniper web site (<a href="http://www.juniper.net/us/en/products-services/switching/qfx-series/qfx5200/">http://www.juniper.net/us/en/products-services/switching/qfx-series/qfx5200/</a>), I find:</p>
<blockquote><p>Open access to the standard Junos Linux kernel, enabled by the disaggregated version of the Junos software, allows users to install third-party Linux RPM packages and create guest containers and VMs with central resource management and programmable APIs.</p></blockquote>
<p>Yes that still needs a little more detail, but it answers at least some of the questions and all it took was a couple of clicks! Imagine what you could find out by actually speaking to someone familiar with the details&#8230;</p>
<p>I have a few questions of my own for Cumulus Networks;</p>
<ol>
<li>Did Cumulus Networks actually attempt to find out the answers to any of these points yourselves? If so, were you unable to find the details, or did you just not like what you found so decided to feign ignorance?</li>
<li>Will Cumulus Networks put their money where their mouth is and make sure that Cumulus Linux runs on the Juniper QFX5200 series of switches (assuming that Juniper are willing to co-operate)?</li>
<li>Does Cumulus Linux currently run on any switches powered by the Broadcom StrataXGS Tomahawk chipset? It doesn&#8217;t seem to be listed anywhere on the Cumulus Linux HCL that you so helpfully linked to from your blog post.</li>
<li>Does Cumulus Linux currently run on any switches which support 25G, 50G or 100G Ethernet ports? These also seem to be conspicuously absent from the Cumulus Linux HCL.</li>
<li>When will Cumulus Networks offer a fully featured MPLS implementation on their Cumulus Linux control plane?</li>
</ol><p>The post <a href="https://www.spheron1.uk/2015/11/12/cumulus-attacks-on-juniper-again/">Cumulus attacks on Juniper (again)</a> first appeared on <a href="https://www.spheron1.uk">Spheron1</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.spheron1.uk/2015/11/12/cumulus-attacks-on-juniper-again/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Upgrading to Junos 12.3 from before 10.4R2 on Juniper EX</title>
		<link>https://www.spheron1.uk/2015/10/19/upgrading-to-junos-12-3-from-before-10-4r2-on-juniper-ex/</link>
					<comments>https://www.spheron1.uk/2015/10/19/upgrading-to-junos-12-3-from-before-10-4r2-on-juniper-ex/#respond</comments>
		
		<dc:creator><![CDATA[digitaldisaster]]></dc:creator>
		<pubDate>Mon, 19 Oct 2015 09:42:14 +0000</pubDate>
				<category><![CDATA[Juniper]]></category>
		<category><![CDATA[EX4200]]></category>
		<category><![CDATA[jloader]]></category>
		<category><![CDATA[Juniper EX]]></category>
		<category><![CDATA[Juniper EX4200]]></category>
		<category><![CDATA[JUNOS]]></category>
		<guid isPermaLink="false">https://www.spheron1.uk/?p=818</guid>

					<description><![CDATA[<p>In the release notes for Junos 12.3 (http://www.juniper.net/techpubs/en_US/junos12.3/information-products/topic-collections/release-notes/12.3/topic-69605.html#pre-resilient-dual-root-upgrade-ex) on Juniper EX series switches, it says: Upgrading from Junos OS Release 10.4R2 or Earlier To upgrade to Junos OS Release 12.3 from Junos OS Release 10.4R2 or earlier, first upgrade to Junos OS Release 11.4 by following the instructions in the Junos OS Release 11.4 release notes. See Upgrading from Junos&#46;&#46;&#46;</p>
<p>The post <a href="https://www.spheron1.uk/2015/10/19/upgrading-to-junos-12-3-from-before-10-4r2-on-juniper-ex/">Upgrading to Junos 12.3 from before 10.4R2 on Juniper EX</a> first appeared on <a href="https://www.spheron1.uk">Spheron1</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>In the release notes for Junos 12.3 (<a href="http://www.juniper.net/techpubs/en_US/junos12.3/information-products/topic-collections/release-notes/12.3/topic-69605.html#pre-resilient-dual-root-upgrade-ex">http://www.juniper.net/techpubs/en_US/junos12.3/information-products/topic-collections/release-notes/12.3/topic-69605.html#pre-resilient-dual-root-upgrade-ex</a>) on Juniper EX series switches, it says:</p>
<blockquote><p><strong>Upgrading from Junos OS Release 10.4R2 or Earlier</strong></p>
<p>To upgrade to Junos OS Release 12.3 from Junos OS Release 10.4R2 or earlier, first upgrade to Junos OS Release 11.4 by following the instructions in the Junos OS Release 11.4 release notes. See Upgrading from Junos OS Release 10.4R2 or Earlier or Upgrading from Junos OS Release 10.4R3 or Later in the Junos OS 11.4 Release Notes .</p></blockquote>
<p>Unfortunately, Juniper don&#8217;t list any Junos releases older than 12.3R1 for the EX4200 (and possibly other EX series) on their download site.</p>
<p>After poking around the Juniper support site for a bit, I found technical bulletin TSB16151 (<a href="https://kb.juniper.net/InfoCenter/index?page=content&#038;id=TSB16151">https://kb.juniper.net/InfoCenter/index?page=content&#038;id=TSB16151</a>), which contains downloads for Junos 11.4R8-S1 on EX2200, EX3200, EX3300, EX4200, EX4500, EX6200, EX8200 and XRE-200.</p>
<p>With this and the jloader files from technical bulletin TSB15524 (<a href="http://kb.juniper.net/InfoCenter/index?page=content&#038;id=TSB15524">http://kb.juniper.net/InfoCenter/index?page=content&#038;id=TSB15524</a>), I was able to complete the upgrade successfully.</p><p>The post <a href="https://www.spheron1.uk/2015/10/19/upgrading-to-junos-12-3-from-before-10-4r2-on-juniper-ex/">Upgrading to Junos 12.3 from before 10.4R2 on Juniper EX</a> first appeared on <a href="https://www.spheron1.uk">Spheron1</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.spheron1.uk/2015/10/19/upgrading-to-junos-12-3-from-before-10-4r2-on-juniper-ex/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>4GB of RAM on a Juniper J-Series router (J6350)</title>
		<link>https://www.spheron1.uk/2012/05/02/4gb-of-ram-on-a-juniper-j-series-router-j6350/</link>
					<comments>https://www.spheron1.uk/2012/05/02/4gb-of-ram-on-a-juniper-j-series-router-j6350/#respond</comments>
		
		<dc:creator><![CDATA[digitaldisaster]]></dc:creator>
		<pubDate>Wed, 02 May 2012 22:41:05 +0000</pubDate>
				<category><![CDATA[Juniper]]></category>
		<category><![CDATA[J-series]]></category>
		<category><![CDATA[J2320]]></category>
		<category><![CDATA[J2350]]></category>
		<category><![CDATA[J4350]]></category>
		<category><![CDATA[J6350]]></category>
		<category><![CDATA[JTAC]]></category>
		<category><![CDATA[JUNOS]]></category>
		<category><![CDATA[RAM]]></category>
		<guid isPermaLink="false">https://www.spheron1.uk/?p=559</guid>

					<description><![CDATA[<p>Officially the Juniper J-series routers such as the J6350 only supports a maximum 2GB of RAM. The J6350 comes with 1GB of RAM installed and if you want to add more then you have to buy your RAM from Juniper at inflated prices, however as the J-series are standard x86 machines with Netburst era Celeron and Pentium 4 processors you&#46;&#46;&#46;</p>
<p>The post <a href="https://www.spheron1.uk/2012/05/02/4gb-of-ram-on-a-juniper-j-series-router-j6350/">4GB of RAM on a Juniper J-Series router (J6350)</a> first appeared on <a href="https://www.spheron1.uk">Spheron1</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Officially the Juniper J-series routers such as the J6350 only supports a maximum 2GB of RAM. The J6350 comes with 1GB of RAM installed and if you want to add more then you have to buy your RAM from Juniper at inflated prices, however as the J-series are standard x86 machines with Netburst era Celeron and Pentium 4 processors you can simply install standard DDR400 RAM if you aren&#8217;t worried about being covered by JTAC support.</p>
<p>Not only does installing your own RAM save you a shedload of money compared to the Juniper equivalent part (JXX50-MEM-512M-S), but you can also exceed the &#8220;supported&#8221; 2GB maximum 4x512MB configuration, which provides additional memory to the control plane. The four memory slots present on a J6350 can take a 1GB DIMM each, however thanks to a 32bit architecture and mapping of the PCI bus into the same address space, you can only actually use 3.5GB of that 4GB.</p>
<p>The J-series routers are picky about what RAM they use however, so I like to stick to Crucial sticks; partly as that&#8217;s what Juniper use but mostly because I use Crucial elsewhere for their great customer service and a genuinely quality product. If you want to stick with a 2GB maximum then you can use Crucial part number CT2KIT6464Z40B, which provides 2x512MB sticks. Alternatively, Crucial part number CT2KIT12864Z40B provides 2x1GB sticks, allowing you to max the chassis out at 4GB across all four slots.</p>
<p>Once you&#8217;ve got all 4GB of memory installed in the chasis, boot the router up and from the JUNOS operational mode CLI issue the command &#8220;show chassis routing-engine&#8221; &#8211; you should see a total of 3584MB of memory split between 3008MB of control plane memory and 576MB of data plane memory. If you only opted for 2GB of memory then the 2048MB total will be split between 1472MB of control plane memory and 576MB of data plane memory.</p>
<p>Remember, you replace the RAM in your routers at your own risk and doing so will likely void your warranty as well as rending your system unspported by JTAC.</p><p>The post <a href="https://www.spheron1.uk/2012/05/02/4gb-of-ram-on-a-juniper-j-series-router-j6350/">4GB of RAM on a Juniper J-Series router (J6350)</a> first appeared on <a href="https://www.spheron1.uk">Spheron1</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.spheron1.uk/2012/05/02/4gb-of-ram-on-a-juniper-j-series-router-j6350/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Fortinet FortiOS firmware upgrade &#8211; Upload file is too big or invalid</title>
		<link>https://www.spheron1.uk/2011/06/05/fortinet-fortios-firmware-upgrade-upload-file-is-too-big-or-invalid/</link>
					<comments>https://www.spheron1.uk/2011/06/05/fortinet-fortios-firmware-upgrade-upload-file-is-too-big-or-invalid/#respond</comments>
		
		<dc:creator><![CDATA[digitaldisaster]]></dc:creator>
		<pubDate>Sun, 05 Jun 2011 13:29:54 +0000</pubDate>
				<category><![CDATA[Fortinet]]></category>
		<category><![CDATA[FortiAnalyser]]></category>
		<category><![CDATA[FortiGate]]></category>
		<category><![CDATA[FortiMail]]></category>
		<category><![CDATA[FortiManager]]></category>
		<category><![CDATA[FortiOS]]></category>
		<category><![CDATA[TFTP]]></category>
		<guid isPermaLink="false">https://www.spheron1.uk/?p=397</guid>

					<description><![CDATA[<p>If you receive an &#8220;Upload file is too big or invalid&#8221; error message when trying to upload a new FortiOS image to your Fortinet device via the web interface, then the first thing to try is giving the device a quick reboot in order to free up memory to hold the uploaded copy of the firmware image. If this doesn&#8217;t&#46;&#46;&#46;</p>
<p>The post <a href="https://www.spheron1.uk/2011/06/05/fortinet-fortios-firmware-upgrade-upload-file-is-too-big-or-invalid/">Fortinet FortiOS firmware upgrade – Upload file is too big or invalid</a> first appeared on <a href="https://www.spheron1.uk">Spheron1</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>If you receive an &#8220;Upload file is too big or invalid&#8221; error message when trying to upload a new FortiOS image to your Fortinet device via the web interface, then the first thing to try is giving the device a quick reboot in order to free up memory to hold the uploaded copy of the firmware image.</p>
<p>If this doesn&#8217;t fix the problem, then I&#8217;ve had much more success with running the update process from command line, although this does require you to have the new FortiOS image on a TFTP server so that the Fortinet device can download it. Once you have issued the command, the device will download the new image and reboot.</p>
<p>The exact command varies depending on the deice type, for example FortiGate devices have the option of FTP or TFTP downloads, whilst FortiMail devices can only download new FortiOS images via TFTP.</p>
<p>For a FortiGate device:</p>
<blockquote><p>exec restore image tftp <file> <server></p></blockquote>
<p>For a FortiManager device running FortiOS 3.x:</p>
<blockquote><p>exec restore image <file> <server></p></blockquote>
<p>For a FortiManager device running FortiOS 4.x:</p>
<blockquote><p>exec restore image tftp <file> <server></p></blockquote>
<p>For a FortiAnalyser device running FortiOS 3.x:</p>
<blockquote><p>exec restore image <file> <server></p></blockquote>
<p>For a FortiAnalyser device running FortiOS 4.x:</p>
<blockquote><p>exec restore image tftp <file> <server></p></blockquote>
<p>For a FortiMail device running FortiOS 3.x:</p>
<blockquote><p>exec restore image <file> <server></p></blockquote>
<p>For a FortiMail device running FortiOS 4.x:</p>
<blockquote><p>exec restore image tftp <file> <server></p></blockquote>
<p>Depending on the device and FortiOS version, you may have other file transfer options such as FTP available to you. Devices registered with a FortiManager can also update their FortiOS image by downloading a new one from the FortiManager unit.</p>
<p>If you are still having problems getting the new FortiOS firmware image onto your Fortinet device, then you can also download a FortiOS image via TFTP from within the Fortinet bootloader/BIOS using the serial console.</p>
<p>Connect a serial console to your device and reboot it, then interrupt the boot sequence when prompted. In the menu, select the option to download a new FortiOS firmware image and provide the file name, server IP address and local IP address.</p>
<p>Right at the start of the bot process, you should see a message along the line of:</p>
<blockquote><p>Press any key to display configuration menu&#8230;</p></blockquote>
<p>Once you have pressed a key, then the following configuration menu should appear:</p>
<blockquote><p>[G]:  Get firmware image from TFTP server.<br />
[F]:  Format boot device.<br />
[B]:  Boot with backup firmware and set as default.<br />
[I]:  Configuration and information.<br />
[Q]:  Quit menu and continue to boot with default firmware.<br />
[H]:  Display this list of options.</p>
<p>Enter G,F,B,I,Q,or H:</p></blockquote>
<p>At the configuration menu, type &#8220;G&#8221; and press enter and you will be asked to enter the details needed to TFTP a new image to your Fortinet device:</p>
<blockquote><p>Enter TFTP server address [192.168.1.168]:<br />
Enter local address [192.168.1.188]:<br />
Enter firmware image file name [image.out]:</p></blockquote>
<p>You will need to be on the same subnet as the TFTP server in order to do this.</p><p>The post <a href="https://www.spheron1.uk/2011/06/05/fortinet-fortios-firmware-upgrade-upload-file-is-too-big-or-invalid/">Fortinet FortiOS firmware upgrade – Upload file is too big or invalid</a> first appeared on <a href="https://www.spheron1.uk">Spheron1</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.spheron1.uk/2011/06/05/fortinet-fortios-firmware-upgrade-upload-file-is-too-big-or-invalid/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>RouterOS slow learning BGP routes with Winbox open</title>
		<link>https://www.spheron1.uk/2011/04/28/routeros-slow-learning-bgp-routes-with-winbox-open/</link>
					<comments>https://www.spheron1.uk/2011/04/28/routeros-slow-learning-bgp-routes-with-winbox-open/#respond</comments>
		
		<dc:creator><![CDATA[digitaldisaster]]></dc:creator>
		<pubDate>Thu, 28 Apr 2011 10:01:31 +0000</pubDate>
				<category><![CDATA[Mikrotik RouterOS]]></category>
		<category><![CDATA[BGP]]></category>
		<category><![CDATA[MikroTik]]></category>
		<category><![CDATA[RouterOS]]></category>
		<category><![CDATA[Winbox]]></category>
		<guid isPermaLink="false">https://www.spheron1.uk/?p=388</guid>

					<description><![CDATA[<p>After banging my head against a wall waiting for a RouterOS powered router to re-learn the 330,000 routes that currently make up the global routing table, I was surprised to find that seemingly Winbox slows the learning of BGP routes to a crawl. Closing Winbox allowed the router to process the entire global routing table in the normal minute or&#46;&#46;&#46;</p>
<p>The post <a href="https://www.spheron1.uk/2011/04/28/routeros-slow-learning-bgp-routes-with-winbox-open/">RouterOS slow learning BGP routes with Winbox open</a> first appeared on <a href="https://www.spheron1.uk">Spheron1</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>After banging my head against a wall waiting for a RouterOS powered router to re-learn the 330,000 routes that currently make up the global routing table, I was surprised to find that seemingly Winbox slows the learning of BGP routes to a crawl. Closing Winbox allowed the router to process the entire global routing table in the normal minute or so, including passing through some complex filters.</p>
<p>It would seem that in RouterOS 4.x at least, the router is pushing details of all learned routes to any Winbox clients connected and slowing itself to a crawl in the process. I haven&#8217;t had a chance to verify if this affects all versions of RouterOS 4.x yet or test it on RouterOS 5.x</p><p>The post <a href="https://www.spheron1.uk/2011/04/28/routeros-slow-learning-bgp-routes-with-winbox-open/">RouterOS slow learning BGP routes with Winbox open</a> first appeared on <a href="https://www.spheron1.uk">Spheron1</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.spheron1.uk/2011/04/28/routeros-slow-learning-bgp-routes-with-winbox-open/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Fortinet SSL VPN interface limitations</title>
		<link>https://www.spheron1.uk/2011/03/26/fortinet-ssl-vpn-interface-limitations/</link>
					<comments>https://www.spheron1.uk/2011/03/26/fortinet-ssl-vpn-interface-limitations/#respond</comments>
		
		<dc:creator><![CDATA[digitaldisaster]]></dc:creator>
		<pubDate>Sat, 26 Mar 2011 14:54:52 +0000</pubDate>
				<category><![CDATA[Fortinet]]></category>
		<category><![CDATA[FortiGate]]></category>
		<category><![CDATA[SSL VPN]]></category>
		<category><![CDATA[VPN]]></category>
		<guid isPermaLink="false">https://www.spheron1.uk/?p=375</guid>

					<description><![CDATA[<p>There seem to be some interface related limitations with the SSL VPN implementation on Fortinet&#8217;s FortiGate firewall devices which prevent you from connecting to the Fortinet SSL VPN on the IP address of an interface other than the one which your traffic enters the firewall on. In other words, even with the appropriate rules configured in the firewall policy to&#46;&#46;&#46;</p>
<p>The post <a href="https://www.spheron1.uk/2011/03/26/fortinet-ssl-vpn-interface-limitations/">Fortinet SSL VPN interface limitations</a> first appeared on <a href="https://www.spheron1.uk">Spheron1</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>There seem to be some interface related limitations with the SSL VPN implementation on Fortinet&#8217;s FortiGate firewall devices which prevent you from connecting to the Fortinet SSL VPN on the IP address of an interface other than the one which your traffic enters the firewall on.</p>
<p>In other words, even with the appropriate rules configured in the firewall policy to allow your traffic to pass through the FortiGate between the interface that it is received on and the interface which that SSL VPN traffic is destined for, the FortiGate unit doesn&#8217;t respond.</p>
<p>I have been able to verify that this bug/feature is present in the latest build of FortiOS 3.0, but haven&#8217;t been able to test with any of the FortiOS 4.0 releases yet.</p>
<p>In my case, this was a problem because the WAN interface has a private IP address on it with a block of public IP addresses routed to the unit and in use on the LAN interface. In the end I worked around this by routing a single additional public address to the unit and configuring it as a secondary address on the WAN interface with a /32 subnet mask. The SSL VPN could then be accessed from this public IP address.</p><p>The post <a href="https://www.spheron1.uk/2011/03/26/fortinet-ssl-vpn-interface-limitations/">Fortinet SSL VPN interface limitations</a> first appeared on <a href="https://www.spheron1.uk">Spheron1</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.spheron1.uk/2011/03/26/fortinet-ssl-vpn-interface-limitations/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cisco DHCP snooping with a Cisco DHCP relay (ip helper) and DHCP option-82</title>
		<link>https://www.spheron1.uk/2010/11/03/cisco-dhcp-snooping-with-a-cisco-dhcp-relay-ip-helper-and-dhcp-option-82/</link>
					<comments>https://www.spheron1.uk/2010/11/03/cisco-dhcp-snooping-with-a-cisco-dhcp-relay-ip-helper-and-dhcp-option-82/#respond</comments>
		
		<dc:creator><![CDATA[digitaldisaster]]></dc:creator>
		<pubDate>Wed, 03 Nov 2010 09:25:06 +0000</pubDate>
				<category><![CDATA[Cisco]]></category>
		<category><![CDATA[Catalyst]]></category>
		<category><![CDATA[Cisco Catalyst]]></category>
		<category><![CDATA[Cisco IOS]]></category>
		<category><![CDATA[DHCP]]></category>
		<category><![CDATA[DHCP option 82]]></category>
		<category><![CDATA[DHCP relay]]></category>
		<category><![CDATA[DHCP snooping]]></category>
		<category><![CDATA[giaddr]]></category>
		<category><![CDATA[IOS]]></category>
		<category><![CDATA[ip helper]]></category>
		<category><![CDATA[option-82]]></category>
		<category><![CDATA[SVI]]></category>
		<category><![CDATA[Switched VLAN interface]]></category>
		<guid isPermaLink="false">https://www.spheron1.uk/?p=294</guid>

					<description><![CDATA[<p>By default, the Cisco DHCP snooping code on the Cisco Catalyst switches inserts option-82 into the DHCP packet but sets giaddr to 0.0.0.0, which causes the Cisco DHCP relay (ip helper) to drop all DHCP packets from a Cisco switch configured with DHCP snooping. To work around this, you can either disable the insertion of Option-82 on the switch performing&#46;&#46;&#46;</p>
<p>The post <a href="https://www.spheron1.uk/2010/11/03/cisco-dhcp-snooping-with-a-cisco-dhcp-relay-ip-helper-and-dhcp-option-82/">Cisco DHCP snooping with a Cisco DHCP relay (ip helper) and DHCP option-82</a> first appeared on <a href="https://www.spheron1.uk">Spheron1</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>By default, the Cisco DHCP snooping code on the Cisco Catalyst switches inserts option-82 into the DHCP packet but sets giaddr to 0.0.0.0, which causes the Cisco DHCP relay (ip helper) to drop all DHCP packets from a Cisco switch configured with DHCP snooping.</p>
<p>To work around this, you can either disable the insertion of Option-82 on the switch performing the DHCP snooping with:</p>
<blockquote><p>no ip dhcp snooping information option</p></blockquote>
<p>Or alternatively you can configure the Cisco device acting as the DHCP relay to trust DHCP packets with giaddr set to 0.0.0.0. This can either be done on all interfaces with the global command</p>
<blockquote><p>ip dhcp relay information trust-all</p></blockquote>
<p>Or on a per-interface basis with</p>
<blockquote><p>ip dhcp relay information trusted </p></blockquote>
<p>Remember, if you are applying the trust to a specific interface then it has to be the layer 3 interface with the IP helper on it (such as an SVI) and not the layer 2 interface that the DHCP packets are received on.</p><p>The post <a href="https://www.spheron1.uk/2010/11/03/cisco-dhcp-snooping-with-a-cisco-dhcp-relay-ip-helper-and-dhcp-option-82/">Cisco DHCP snooping with a Cisco DHCP relay (ip helper) and DHCP option-82</a> first appeared on <a href="https://www.spheron1.uk">Spheron1</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.spheron1.uk/2010/11/03/cisco-dhcp-snooping-with-a-cisco-dhcp-relay-ip-helper-and-dhcp-option-82/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>SSH on a HP ProCurve</title>
		<link>https://www.spheron1.uk/2010/07/04/ssh-on-a-hp-procurve/</link>
					<comments>https://www.spheron1.uk/2010/07/04/ssh-on-a-hp-procurve/#respond</comments>
		
		<dc:creator><![CDATA[digitaldisaster]]></dc:creator>
		<pubDate>Sun, 04 Jul 2010 15:32:15 +0000</pubDate>
				<category><![CDATA[HP ProCurve]]></category>
		<category><![CDATA[HP]]></category>
		<category><![CDATA[ProCurve]]></category>
		<category><![CDATA[SCP]]></category>
		<category><![CDATA[SFTP]]></category>
		<category><![CDATA[SSH]]></category>
		<category><![CDATA[telnet]]></category>
		<category><![CDATA[TFTP]]></category>
		<guid isPermaLink="false">https://www.spheron1.uk/?p=230</guid>

					<description><![CDATA[<p>By default HP ProCurve devices (like most switches) use telnet and TFTP (Trivial File Transfer Protocol) for management access, firmware upgrades and config backups. As these are both unencrypted protocols, it is a good idea to switch to using SSH and SCP/SFTP in order to secure your management access and all important configuration, which you can do with the following&#46;&#46;&#46;</p>
<p>The post <a href="https://www.spheron1.uk/2010/07/04/ssh-on-a-hp-procurve/">SSH on a HP ProCurve</a> first appeared on <a href="https://www.spheron1.uk">Spheron1</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>By default HP ProCurve devices (like most switches) use telnet and TFTP (Trivial File Transfer Protocol) for management access, firmware upgrades and config backups. As these are both unencrypted protocols, it is a good idea to switch to using SSH and SCP/SFTP in order to secure your management access and all important configuration, which you can do with the following commands from configure mode:</p>
<blockquote><p>crypto key generate ssh<br />
ip ssh<br />
ip ssh version 2<br />
ip ssh filetransfer</p></blockquote>
<p>This generates the keys that SSH requires, forces SSH to use the newer version two of the protocol and enables SCP/SFTP support for copying files to and from the flash.</p>
<p>As soon as you enable SSH filetransfer (basically SCP/SFTP) support then TFTP is disabled, but you have to disable telnet access manually in configuration mode with:</p>
<blockquote><p>no telnet-server</p></blockquote><p>The post <a href="https://www.spheron1.uk/2010/07/04/ssh-on-a-hp-procurve/">SSH on a HP ProCurve</a> first appeared on <a href="https://www.spheron1.uk">Spheron1</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.spheron1.uk/2010/07/04/ssh-on-a-hp-procurve/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Object Caching 26/57 objects using Redis
Page Caching using Disk: Enhanced 
Lazy Loading (feed)
Database Caching 3/27 queries in 0.025 seconds using Redis

Served from: spheron1.uk @ 2026-04-28 23:38:20 by W3 Total Cache
-->