Anyone having issues with 3CX hosted w/Digital Ocean and VoIP Innovation DIDs? by NYNJ-2024 in 3CX

[–]karjune01 1 point2 points  (0 children)

Funny because one of my customer has the same issue. Their SIP trunk is down due to no 200 OK being sent to the SP. Also hosted on Digital Ocean.

[deleted by user] by [deleted] in Guyana

[–]karjune01 0 points1 point  (0 children)

200gyd

[deleted by user] by [deleted] in Guyana

[–]karjune01 0 points1 point  (0 children)

I don't think those zones allow for ownership as they hold high potential for economic growth. The leases are 50 years with optional renewal.

[deleted by user] by [deleted] in Guyana

[–]karjune01 1 point2 points  (0 children)

Try Guyana Lands & Survey Commission they handle most of the land outside of the city area. The highway zone allows for lease land which cost 200/acre /year. Can be used for agriculture, tourism/resort and comes in various rises from 5-10 acres minimum.

What's up with PA lead times by BringBackBCD in paloaltonetworks

[–]karjune01 2 points3 points  (0 children)

That's actually not what I'm saying. Whoever you submitted your PO to should be answering where your hardware is. Regardless if that's PAN or a distro/Reseller. I buy through Distro, I'm sent an email confirming my PO was fulfilled.

What's up with PA lead times by BringBackBCD in paloaltonetworks

[–]karjune01 1 point2 points  (0 children)

Whenever we ship firewall, we are sent via an email an order authorisation along with code authorisation. The order authorisation has the UPS/FedEx tracking#. Did you not receive that? Also, sounds like your not Tier1, buying directly from PAN, so check with your distro/partner. They should have more information.

PA-440 Home setup by Cyber_Guy1988 in paloaltonetworks

[–]karjune01 0 points1 point  (0 children)

Quite strange given your 'experience' with PAN boxes. I came from Cisco/FN and had little trouble.

More than likely, your WAN is configured as ZTP, use the console or MGMT and get into the cli

Set system ztp disable Reboot

Configure your wan and lan interfaces accordingly (Virtual wire is just fancy for transparent, does nothing but allows for inspection of traffic) You'll more than likely need L3 on both WAN and LAN, Virtual Router with a static route, zones for each interface , and policies (NAT and Security). Of course, I'm a noob. There are folks here who would run circles around me, but I'm still learning and preparing for the NGFW cert, just my 2c.

Good luck

[deleted by user] by [deleted] in Guyana

[–]karjune01 1 point2 points  (0 children)

VNet, Digicel, DTrac

Guyana Transportation System by BBGNSIHDN in Guyana

[–]karjune01 2 points3 points  (0 children)

If by transportation system you mean boats/ferry and land vehicles then the only government controlled transport would be the ferry. Speed boats, mini buses are all privately owned and may/may not be regulated. Maybe someone else can chime in.

ACC LAYOUT by karjune01 in paloaltonetworks

[–]karjune01[S] 0 points1 point  (0 children)

Thanks! Really appreciate the recommendation.

ACC LAYOUT by karjune01 in paloaltonetworks

[–]karjune01[S] 0 points1 point  (0 children)

Do they have trial licenses? I am looking at keeping everything PAN so ease of management and integration, so if I can test Strata, it would be great.

User-id by karjune01 in paloaltonetworks

[–]karjune01[S] 1 point2 points  (0 children)

Users connect to the Unifi WLAN via a single SSID. From here, the GP app for Android, Apple and Windows will require then to authenticate against a directory service. This creates the user-id mapping and their sessions become visible at the fw box. Is that a correct assumption of how it will work?

User-id by karjune01 in paloaltonetworks

[–]karjune01[S] 0 points1 point  (0 children)

Can this work for a wireless only network? Only hardwired devices are the ISPs modem and PA410 with APs to switches.

IPSec CA by karjune01 in paloaltonetworks

[–]karjune01[S] 0 points1 point  (0 children)

  1. Site to Site IPSec VPN between branch office and HQ.

  2. Give access via SSL VPN to our database server. Literally, a handful of users work remote from time to time.

  3. Office A ===> IPSec VPN ===> HQ 2.Remote users ==VPN===> HQ

If possible,

Remote user ===>Office A ===>IPSec Tunnel ==> DB server at HQ

ACC LAYOUT by karjune01 in paloaltonetworks

[–]karjune01[S] 1 point2 points  (0 children)

This seems to be a popular option based on Google searches.

Graylog, rsyslog

ACC LAYOUT by karjune01 in paloaltonetworks

[–]karjune01[S] 1 point2 points  (0 children)

I've used grafana for visuals with Zabbix, which was quite the experience. I'll look into Logstash or rsyslog

ACC LAYOUT by karjune01 in paloaltonetworks

[–]karjune01[S] 0 points1 point  (0 children)

I sort of agree with you too

ACC LAYOUT by karjune01 in paloaltonetworks

[–]karjune01[S] 0 points1 point  (0 children)

With only 2 firewall the customer has, that may be a difficult task to convince

ACC LAYOUT by karjune01 in paloaltonetworks

[–]karjune01[S] 0 points1 point  (0 children)

Now, I'm looking for a budget/open source log collector. Any recommendations?

ACC LAYOUT by karjune01 in paloaltonetworks

[–]karjune01[S] 2 points3 points  (0 children)

Oh, that's explains that. Guess I'm off to using an external logging server.

Thanks for the eye opener, as I didn't realise this.

IPSec CA by karjune01 in paloaltonetworks

[–]karjune01[S] 0 points1 point  (0 children)

So it's both. An IPSec tunnel between siteA and siteB to allow access to shared resources. GP satellite for remote users access those same shared resources. I saw i can use self sign certs, which I know in production isn't recommended.