Search found 28 matches
- 27 Apr 2018, 08:56
- Forum: Feature Requests / Product Enhancements
- Topic: Allow IPv6 with cOS PPPoE
- Replies: 2
- Views: 4997
Re: Allow IPv6 with cOS PPPoE
Hello As mentioned in the support ticket we have forwarded your feedback to product management. For now we will not investigate the possibility to implement IPv6 support for PPPoE. The reasoning for this is that PPPoE have or has been being phased out in most countries and its hard to to motivate th...
- 27 Apr 2018, 08:41
- Forum: Feature Requests / Product Enhancements
- Topic: Make "groups" an object rather than a text field
- Replies: 1
- Views: 4138
Re: Make "groups" an object rather than a text field
Hello,
I have created a RFE with ID: COP-20964 where we will investigate the possibility to configure "User Auth Groups" as objects.
Best regards
Anton
I have created a RFE with ID: COP-20964 where we will investigate the possibility to configure "User Auth Groups" as objects.
Best regards
Anton
- 27 Apr 2018, 07:48
- Forum: Feature Requests / Product Enhancements
- Topic: Wildcards in cOS CLI
- Replies: 6
- Views: 9474
Re: Wildcards in cOS CLI
Hello John I understand what you mean, I have created a RFE with ID:COP-20963 to implement wildcard support in the following commands: ike -show ike -show -tunnel= ipsec -show ike -tunnel ike -delete ike -connect @anders s, what do you mean? Do you want to add SA information to the ike -tunnels comm...
- 19 Apr 2018, 10:11
- Forum: SG Discussions
- Topic: IPv6 via PPPoE
- Replies: 2
- Views: 3171
Re: IPv6 via PPPoE
Hi Michael
cOS core does not support IPv6 in PPPoE. That is why you can't see any IPv6 objects when configuring the PPPoE interface.
Best regards
Anton
cOS core does not support IPv6 in PPPoE. That is why you can't see any IPv6 objects when configuring the PPPoE interface.
Best regards
Anton
- 12 Feb 2018, 14:28
- Forum: SG How to's
- Topic: How to troubleshoot MTU related issues using Wireshark.
- Replies: 1
- Views: 36474
Re: How to troubleshoot MTU related issues using Wireshark.
How about UDP and fragmentation? UDP works in a different way than TCP, there is no SEQ numbers or ACK numbers. A UDP packet can only be split on the IP layer. This is called Fragmentation, a UDP packet will be fragmented if it’s bigger than the Maximum transmission unit (Note that this can happen ...
- 09 Feb 2018, 12:59
- Forum: SG How to's
- Topic: How to troubleshoot MTU related issues using Wireshark.
- Replies: 1
- Views: 36474
How to troubleshoot MTU related issues using Wireshark.
This How-to applies to: Clavister Security Gateway 12.x. and Wireshark 2.4.3+ Table of contents: • Objectives with this article. • Configure Wireshark to show the needed columns. • An explanation of Sequence numbers, MSS and MTU. • Example of Packet Captures that show potential MTU related issues. ...
- 17 Aug 2017, 16:23
- Forum: SG FAQ's
- Topic: Documentation for PhenixID MFA server.
- Replies: 0
- Views: 7091
Documentation for PhenixID MFA server.
This FAQ applies to:
Where can I find documentation about PhenixID MFA server?
Answer:
Currently all documentation about PhenixID MFA server can be found here: http://document.phenixid.net/
- PhenixID MFA Server 1.4.0 and up
Where can I find documentation about PhenixID MFA server?
Answer:
Currently all documentation about PhenixID MFA server can be found here: http://document.phenixid.net/
- 17 Aug 2017, 15:45
- Forum: SG How to's
- Topic: Protect L2TP/IPsec and SSL VPN with two factor authentication using PhenixID MFA server.
- Replies: 0
- Views: 12665
Protect L2TP/IPsec and SSL VPN with two factor authentication using PhenixID MFA server.
This How-to applies to: Clavister Security Gateway 12.x. and MFA 2.x Table of contents: •Objectives with this article. •Configuring SSL-VPN and L2TP/IPsec in the NGFW. •Configuring the MFA server. •Testing the login. Objectives with this article: This article assumes that you have a basic understan...
- 10 Aug 2017, 10:10
- Forum: SG How to's
- Topic: Protect cOS core Remote Management with two factor authentication using PhenixID MFA server.
- Replies: 1
- Views: 8216
Re: Protect cOS core Remote Management with two factor authentication using PhenixID MFA server.
Configuration for the extra Valves that we added: Make sure to change “connection_ref” according to your configuration. TokenValidationValve: { "otp_length": "6", "hotp_lookahead": "10", "provided_otp_param_name": "{{attributes.otp}}" } PropertySplitByIndexValve: { "source": "{{request.User-Passwor...
- 10 Aug 2017, 09:45
- Forum: SG How to's
- Topic: Protect cOS core Remote Management with two factor authentication using PhenixID MFA server.
- Replies: 1
- Views: 8216
Protect cOS core Remote Management with two factor authentication using PhenixID MFA server.
This How-to applies to: Clavister Security Gateway 12.x. and MFA 2.x Table of contents: • Objectives with this article. • Configuring HTTPS management with Radius authentication in the NGFW. • Configuring the MFA server. • Testing the login. Objectives with this article: This article will assume th...