{"id":47,"date":"2015-04-21T05:52:16","date_gmt":"2015-04-21T05:52:16","guid":{"rendered":"http:\/\/www.safekom.pl\/blog\/?p=47"},"modified":"2015-04-21T05:52:16","modified_gmt":"2015-04-21T05:52:16","slug":"checkpoint-vpn-debug-splat","status":"publish","type":"post","link":"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-vpn-debug-splat\/","title":{"rendered":"Checkpoint vpn debug [Splat]"},"content":{"rendered":"<p>Pomocne komendy przy troubleshootingu VPN w Checkpoint w wersji SPLAT:<\/p>\n<p><code>vpn debug on - w\u0142\u0105czenie debug fazy 2<\/code><br \/>\n<code>vpn debug ikeon - w\u0142\u0105czenie debug fazy 1 <\/code><br \/>\n<code>vpn debug off - wy\u0142\u0105czenie debug dla fazy 1 <\/code><br \/>\n<code>vpn debug ikeoff - wy\u0142\u0105czenie dla fazy 2 <\/code><br \/>\n<code>cd $FWDIR\/log\/ - katalog gdzie znajduj\u0105 si\u0119 pliki z zapisem debugingu \u00a0\u00a0<\/code><br \/>\n<code>$FWDIR\/log\/ike.elg - plik z logiem debug dla fazy 1<\/code><br \/>\n<code>$FWDIR\/log\/vpnd.elg - plik z logiem debug dla fazy 2<\/code><\/p>\n<p>Pliki nale\u017cy pobra\u0107 winscp z urz\u0105dzenie na pc(serwer) gdzie mamy zainstalowany program\u00a0<a href=\"https:\/\/supportcenter.checkpoint.com\/supportcenter\/portal\/user\/anon\/page\/default.psml\/media-type\/html?action=portlets.DCFileAction&amp;eventSubmit_doGetdcdetails=&amp;fileid=8227\">CheckPoint InfoView<\/a>. Ja nie mia\u0142em mo\u017cliwo\u015bci przeniesienia plik\u00f3w &#8211; przenosi\u0142em za pomoc\u0105 pliku logu z putty.<\/p>\n<p>Tak ma\u0142a uwaga &#8211; pod Windows 7 najlepiej uruchomi\u0107 jako Administrator aplikacj\u0119<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pomocne komendy przy troubleshootingu VPN w Checkpoint w wersji SPLAT: vpn debug on &#8211; w\u0142\u0105czenie debug fazy 2 vpn debug ikeon &#8211; w\u0142\u0105czenie debug fazy 1 vpn debug off &#8211; wy\u0142\u0105czenie debug dla fazy 1 vpn debug ikeoff &#8211; wy\u0142\u0105czenie dla fazy 2 cd $FWDIR\/log\/ &#8211; katalog gdzie znajduj\u0105 si\u0119 pliki z zapisem debugingu \u00a0\u00a0 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"enabled":false},"version":2}},"categories":[8],"tags":[29,31,28,30],"class_list":["post-47","post","type-post","status-publish","format-standard","hentry","category-checkpoint","tag-checkpoint","tag-debug","tag-splat","tag-vpn"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Checkpoint vpn debug [Splat] - SafeKom Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-vpn-debug-splat\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Checkpoint vpn debug [Splat] - SafeKom Blog\" \/>\n<meta property=\"og:description\" content=\"Pomocne komendy przy troubleshootingu VPN w Checkpoint w wersji SPLAT: vpn debug on - w\u0142\u0105czenie debug fazy 2 vpn debug ikeon - w\u0142\u0105czenie debug fazy 1 vpn debug off - wy\u0142\u0105czenie debug dla fazy 1 vpn debug ikeoff - wy\u0142\u0105czenie dla fazy 2 cd $FWDIR\/log\/ - katalog gdzie znajduj\u0105 si\u0119 pliki z zapisem debugingu \u00a0\u00a0 [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-vpn-debug-splat\/\" \/>\n<meta property=\"og:site_name\" content=\"SafeKom Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/safekompl\" \/>\n<meta property=\"article:published_time\" content=\"2015-04-21T05:52:16+00:00\" \/>\n<meta name=\"author\" content=\"Micha\u0142 Iwa\u0144czuk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@MIwaczuk\" \/>\n<meta name=\"twitter:site\" content=\"@MIwaczuk\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"Micha\u0142 Iwa\u0144czuk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuta\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-vpn-debug-splat\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-vpn-debug-splat\/\"},\"author\":{\"name\":\"Micha\u0142 Iwa\u0144czuk\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/#\/schema\/person\/fd4cc931b624af4b7353d36d92ba7181\"},\"headline\":\"Checkpoint vpn debug [Splat]\",\"datePublished\":\"2015-04-21T05:52:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-vpn-debug-splat\/\"},\"wordCount\":65,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/#organization\"},\"keywords\":[\"checkpoint\",\"debug\",\"splat\",\"vpn\"],\"articleSection\":[\"Checkpoint\"],\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-vpn-debug-splat\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-vpn-debug-splat\/\",\"url\":\"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-vpn-debug-splat\/\",\"name\":\"Checkpoint vpn debug [Splat] - SafeKom Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/#website\"},\"datePublished\":\"2015-04-21T05:52:16+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-vpn-debug-splat\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-vpn-debug-splat\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-vpn-debug-splat\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/www.safekom.pl\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Checkpoint vpn debug [Splat]\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/#website\",\"url\":\"https:\/\/www.safekom.pl\/blog\/\",\"name\":\"SafeKom Blog\",\"description\":\"Notatki Architekta i in\u017cyniera zwi\u0105zanego rozwi\u0105zaniami on-prem\",\"publisher\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.safekom.pl\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/#organization\",\"name\":\"SafeKom Blog\",\"url\":\"https:\/\/www.safekom.pl\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/05\/cropped-logo.png?fit=512%2C512&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/05\/cropped-logo.png?fit=512%2C512&ssl=1\",\"width\":512,\"height\":512,\"caption\":\"SafeKom Blog\"},\"image\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/safekompl\",\"https:\/\/x.com\/MIwaczuk\",\"https:\/\/www.linkedin.com\/in\/michaliwanczuk\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/#\/schema\/person\/fd4cc931b624af4b7353d36d92ba7181\",\"name\":\"Micha\u0142 Iwa\u0144czuk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cc6dda4ee8d21d1f254147e5ee6f5e38881b88a4a12a5774ca42380597e52014?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cc6dda4ee8d21d1f254147e5ee6f5e38881b88a4a12a5774ca42380597e52014?s=96&d=mm&r=g\",\"caption\":\"Micha\u0142 Iwa\u0144czuk\"},\"description\":\"Pasjonat komputerowy od zawsze oraz maniak w zakresie sieci, wirtualizacji oraz bezpiecze\u0144stwa IT. Kompetentny in\u017cynier z du\u017cym do\u015bwiadczeniem w realizacji projekt\u00f3w informatycznych i telekomunikacyjnych. Wieloletni administrator IT, kt\u00f3ry utrzymuje systemy informatyczne dostosowuj\u0105c je do wymog\u00f3w biznesowych z zapewnieniem dost\u0119pno\u015bci 24\/7\/365.\",\"url\":\"https:\/\/www.safekom.pl\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Checkpoint vpn debug [Splat] - SafeKom Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-vpn-debug-splat\/","og_locale":"pl_PL","og_type":"article","og_title":"Checkpoint vpn debug [Splat] - SafeKom Blog","og_description":"Pomocne komendy przy troubleshootingu VPN w Checkpoint w wersji SPLAT: vpn debug on - w\u0142\u0105czenie debug fazy 2 vpn debug ikeon - w\u0142\u0105czenie debug fazy 1 vpn debug off - wy\u0142\u0105czenie debug dla fazy 1 vpn debug ikeoff - wy\u0142\u0105czenie dla fazy 2 cd $FWDIR\/log\/ - katalog gdzie znajduj\u0105 si\u0119 pliki z zapisem debugingu \u00a0\u00a0 [&hellip;]","og_url":"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-vpn-debug-splat\/","og_site_name":"SafeKom Blog","article_publisher":"https:\/\/www.facebook.com\/safekompl","article_published_time":"2015-04-21T05:52:16+00:00","author":"Micha\u0142 Iwa\u0144czuk","twitter_card":"summary_large_image","twitter_creator":"@MIwaczuk","twitter_site":"@MIwaczuk","twitter_misc":{"Napisane przez":"Micha\u0142 Iwa\u0144czuk","Szacowany czas czytania":"1 minuta"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-vpn-debug-splat\/#article","isPartOf":{"@id":"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-vpn-debug-splat\/"},"author":{"name":"Micha\u0142 Iwa\u0144czuk","@id":"https:\/\/www.safekom.pl\/blog\/#\/schema\/person\/fd4cc931b624af4b7353d36d92ba7181"},"headline":"Checkpoint vpn debug [Splat]","datePublished":"2015-04-21T05:52:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-vpn-debug-splat\/"},"wordCount":65,"commentCount":0,"publisher":{"@id":"https:\/\/www.safekom.pl\/blog\/#organization"},"keywords":["checkpoint","debug","splat","vpn"],"articleSection":["Checkpoint"],"inLanguage":"pl-PL","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-vpn-debug-splat\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-vpn-debug-splat\/","url":"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-vpn-debug-splat\/","name":"Checkpoint vpn debug [Splat] - SafeKom Blog","isPartOf":{"@id":"https:\/\/www.safekom.pl\/blog\/#website"},"datePublished":"2015-04-21T05:52:16+00:00","breadcrumb":{"@id":"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-vpn-debug-splat\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-vpn-debug-splat\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-vpn-debug-splat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/www.safekom.pl\/blog\/"},{"@type":"ListItem","position":2,"name":"Checkpoint vpn debug [Splat]"}]},{"@type":"WebSite","@id":"https:\/\/www.safekom.pl\/blog\/#website","url":"https:\/\/www.safekom.pl\/blog\/","name":"SafeKom Blog","description":"Notatki Architekta i in\u017cyniera zwi\u0105zanego rozwi\u0105zaniami on-prem","publisher":{"@id":"https:\/\/www.safekom.pl\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.safekom.pl\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/www.safekom.pl\/blog\/#organization","name":"SafeKom Blog","url":"https:\/\/www.safekom.pl\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/www.safekom.pl\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/05\/cropped-logo.png?fit=512%2C512&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/05\/cropped-logo.png?fit=512%2C512&ssl=1","width":512,"height":512,"caption":"SafeKom Blog"},"image":{"@id":"https:\/\/www.safekom.pl\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/safekompl","https:\/\/x.com\/MIwaczuk","https:\/\/www.linkedin.com\/in\/michaliwanczuk\/"]},{"@type":"Person","@id":"https:\/\/www.safekom.pl\/blog\/#\/schema\/person\/fd4cc931b624af4b7353d36d92ba7181","name":"Micha\u0142 Iwa\u0144czuk","image":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/www.safekom.pl\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cc6dda4ee8d21d1f254147e5ee6f5e38881b88a4a12a5774ca42380597e52014?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cc6dda4ee8d21d1f254147e5ee6f5e38881b88a4a12a5774ca42380597e52014?s=96&d=mm&r=g","caption":"Micha\u0142 Iwa\u0144czuk"},"description":"Pasjonat komputerowy od zawsze oraz maniak w zakresie sieci, wirtualizacji oraz bezpiecze\u0144stwa IT. Kompetentny in\u017cynier z du\u017cym do\u015bwiadczeniem w realizacji projekt\u00f3w informatycznych i telekomunikacyjnych. Wieloletni administrator IT, kt\u00f3ry utrzymuje systemy informatyczne dostosowuj\u0105c je do wymog\u00f3w biznesowych z zapewnieniem dost\u0119pno\u015bci 24\/7\/365.","url":"https:\/\/www.safekom.pl\/blog\/author\/admin\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p7i9ri-L","jetpack-related-posts":[{"id":44,"url":"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-vpn-splat-pomocne-komendy\/","url_meta":{"origin":47,"position":0},"title":"Checkpoint VPN [SPLAT] &#8211; pomocne komendy","author":"Micha\u0142 Iwa\u0144czuk","date":"27.04.2015","format":false,"excerpt":"dla tych co ci\u0105gle szukaj\u0105 jak ubi\u0107 lub wy\u015bwietli\u0107 faz\u0119 1 lub 2 w Checkpoincie dla po\u0142\u0105cze\u0144 VPN. Wy\u015bwietlenie \u00a0fazy 1 \u00a0dla konkretnego ip peera vpn shell \/show\/tunnels\/ike\/peer\/[peer IP] Wy\u015bwietlenie fazy 2\u00a0dla konkretnego ip peera vpn shell \/show\/tunnels\/ipsec\/peer\/[peer IP] Usuni\u0119cie fazy 1 dla konkretnego peera vpn shell \/tunnels\/delete\/IKE\/peer\/[peer IP] Usuni\u0119cie\u2026","rel":"","context":"In &quot;Checkpoint&quot;","block_context":{"text":"Checkpoint","link":"https:\/\/www.safekom.pl\/blog\/category\/checkpoint\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":171,"url":"https:\/\/www.safekom.pl\/blog\/cisco\/lab-ipsec-juniper-srx-cisco-router\/","url_meta":{"origin":47,"position":1},"title":"Lab &#8211; IPSEC Juniper SRX &#8211; Cisco router","author":"Micha\u0142 Iwa\u0144czuk","date":"21.08.2015","format":false,"excerpt":"Dzi\u015b postanowi\u0142em opisa\u0107 troch\u0119 labowania, temat ostatnio bardzo mocno przerabiany IPSEC. Poni\u017cej opisz\u0119 wariant policy base vpn, kt\u00f3ry jest bardzo elastyczny. Za\u0142o\u017cenia: Faza 1 aes256 sha-1 pfs g2 3600s Faza 2 aes256 sha-1 pfs g2 3600s Cisco Juniper SRX Sieci kt\u00f3re b\u0119d\u0105 podlega\u0142y szyfrowaniu 172.16.10.0\/24 10.10.10.0\/24 Cisco Juniper SRX Interfejs\u2026","rel":"","context":"In &quot;Cisco&quot;","block_context":{"text":"Cisco","link":"https:\/\/www.safekom.pl\/blog\/category\/cisco\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/08\/junos_multicolor_burst.png?fit=361%2C393&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":157,"url":"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-splat-upgrade\/","url_meta":{"origin":47,"position":2},"title":"Checkpoint [Splat] &#8211; upgrade_export &#8211; brakuje miejsca na partycji \/","author":"Micha\u0142 Iwa\u0144czuk","date":"10.05.2015","format":false,"excerpt":"ostatnio mia\u0142em do wykonania export konfiguracji przy podnoszeniu wersji checkpoint ale mia\u0142em za ma\u0142o miejsca na partycji \/ # df -hT Filesystem \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Type Size Used \u00a0Avail Use% Mounted on \/dev\/mapper\/vg_splat-lv_current\u00a0ext3 7.9G 5.7G 1.8G 76% \u00a0\/ \/dev\/sda1 \u00a0 \u00a0 \u00a0 \u00a0\u2026","rel":"","context":"In &quot;Checkpoint&quot;","block_context":{"text":"Checkpoint","link":"https:\/\/www.safekom.pl\/blog\/category\/checkpoint\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":647,"url":"https:\/\/www.safekom.pl\/blog\/lab\/lab_ipsec_palo_ciscoasa\/","url_meta":{"origin":47,"position":3},"title":"LAB &#8211;  IPSec Palo &#8211; Cisco ASA","author":"Micha\u0142 Iwa\u0144czuk","date":"23.03.2016","format":false,"excerpt":"Poni\u017cej pokazuj\u0119 jak zestawia\u0107 po\u0142\u0105czenie IPsec pomi\u0119dzy PaloAlto Networks a Cisco ASA. W mym przypadku oba urz\u0105dzenia s\u0105 w wersji wirtualnej ale konfiguracja ich odpowiada tak jak by\u015bmy konfigurowali urz\u0105dzenia fizyczne. Za\u0142o\u017cenia: Faza 1 aes256 sha-1 pfs g2 86400s Faza 2 aes256 sha-1 pfs g2 28800s Palo Cisco ASA Sieci\u2026","rel":"","context":"In &quot;Cisco&quot;","block_context":{"text":"Cisco","link":"https:\/\/www.safekom.pl\/blog\/category\/cisco\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/08\/Paloalto_logo.png?fit=566%2C680&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/08\/Paloalto_logo.png?fit=566%2C680&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/08\/Paloalto_logo.png?fit=566%2C680&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":1256,"url":"https:\/\/www.safekom.pl\/blog\/vmware\/home-lab-vcsa-6-5-instalacja\/","url_meta":{"origin":47,"position":4},"title":"Home LAB &#8211; VCSA 6.5 Instalacja","author":"Micha\u0142 Iwa\u0144czuk","date":"26.10.2016","format":false,"excerpt":"Jeszcze nie dawno pisa\u0142em jak zainstalowa\u0107 vCenter w wersji sz\u00f3stej. Dzi\u015b poka\u017c\u0119 jak zainstalowa\u0107 w wersji 6.5. Tak jak przy wersji wcze\u015bniejszej potrzebujemy ISO z vCenter, maszyn\u0119 w Windowsem z kt\u00f3rej odpalimy instalacj\u0119. Odpalamy instalator gdzie wybieramy Install W nowym oknie idziemy dalej w kolejnym oknie akceptujemy regulamin wybieramy model\u2026","rel":"","context":"In &quot;Lab&quot;","block_context":{"text":"Lab","link":"https:\/\/www.safekom.pl\/blog\/en\/category\/lab\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2016\/06\/vmware_cloud_logo.jpg?fit=648%2C429&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2016\/06\/vmware_cloud_logo.jpg?fit=648%2C429&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2016\/06\/vmware_cloud_logo.jpg?fit=648%2C429&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":105,"url":"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-user-expert\/","url_meta":{"origin":47,"position":5},"title":"Checkpoint [SPAT] user z uprawnieniami expert","author":"Micha\u0142 Iwa\u0144czuk","date":"04.05.2015","format":false,"excerpt":"Dodanie u\u017cytkownika z prawami expert: useradd -u 0 -g 0 -o -s \/bin\/bash <username> \u00a0 zmieniamy has\u0142o dla tego <username> \/usr\/bin\/passwd\u00a0<username> \u00a0","rel":"","context":"In &quot;Checkpoint&quot;","block_context":{"text":"Checkpoint","link":"https:\/\/www.safekom.pl\/blog\/category\/checkpoint\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/posts\/47","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/comments?post=47"}],"version-history":[{"count":0,"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/posts\/47\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/media?parent=47"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/categories?post=47"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/tags?post=47"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}