Showing posts with label ATT. Show all posts
Showing posts with label ATT. Show all posts

Wednesday, August 10, 2011

OPFacebook–Project Hack Facebook by Anonymous because Facebook sells and shares “private” data.

 

OK, so I wish I could get a poll going but how many of you readers out there think that launching a slimy Distributed Denial of Service (DDoS) attack against someone is actually a “hack”, but the group “Anonymous” looks to be loosely organizing an attack against Facebook because they feel that Facebook “Sells user information and data to government agencies and security firms”.  Now disregard that comment if they pull off a nice site defacement hack or prove some big security hole that will legitimately hinder the company.

Now here’s my beef.  If a government agency wanted some sort of data from Facebook, nobody can stop them.   A judge signs a warrant, the FBI/Other Agency serves the warrant to the company, the company must do ‘it’s best” to provide any information that was described in the warrant.  These warrants can be obtained quickly and using the USA Patriot Act, so would it really matter if they gave it up willingly? 

Regardless if they do this or not, why attack Facebook for it.  Are they just bored?  Trying to make some news?  From the reports I’ve read, it seems that the followers are limited at best and I’m unsure if they could actually pull it off, though they’ve DDoS some major players in the Multi-Tier WAN environment. 

Though I am really interested in what these Facebook junkies will do if the page times-out.  I mean watch out Charter/ATT tech support… The Internets are broken.

Resources the Peak my Interest for this Article:

Hacker group vows to 'kill Facebook' - CNN.com

Tuesday, August 2, 2011

How to configure a 2wire 2701HGV-B Modem with a FortiGate (ATT uVerse)

    Recently I was tasked with bringing a ATT uVerse client online with a new SBS server. They needed site-to-site VPN's between the sites as well as public services forwarded to their SBS server for things like RWW, SMTP, OWA, RDP, etc...

    We obtained a 5-block of Static IP addresses and off we went.

    After talking to the first 3 "Level 2" technicians, I was confident that I was to statically assign an IP address to my FortiGate 50b WIFI's WAN1 IP, then I could set it up with Static IP's.

    So I went ahead and did the obvious to setup a Static IP on my WAN1, configured Default Routes and Firewall policies. After logging on, I found that the www.ipchicken.com saw my static IP address and I thought I was set. Oh, how I was so wrong...

    After returning, I tried to access the Public IP of the Firewall to configure some services, even though I had Ping and HTTPS forwarding configured, I was unable to do either. After doing a sniff of the WAN1 interface, I found that the traffic was not making it to the WAN1. Obvious... A firewall.

    So I am making this quick guide so that you can save several hours. Here are VERY important details of how this has to work:

    • IF you assign a single STATIC IP address behind your network, you CAN NOT disable the firewall. This might be good if you have to have certain traffic come FROM an IP address, but don't want any inbound access to the device.

    • To disable the firewall, you will need to setup the device as a DHCP Client.

    • You will only be able to have 1 "Device" per Static IP when using DHCP.

    • With a FortiGate, it could be possible to have VDoms to get "multiple" devices, but dual WAN addresses are not supported for some reason.  I have tried and tested as well as found other complaining of the same issue.  I will dig up the reasons a very smart man has figured out shortly.

    • Once configured correctly, your Device will get a DHCP address from a PUBLIC block and not a private block, thus giving you a public IP on your firewall.

    • For network admins and network enthusiasts, this is a very confusing situation. But it is, what it is.

      Here is how I accomplished this.

          Basically here are the steps:

        1. Pending you have previously been using the ATT modem as a router before trying to install the FortiGate UTM Firewall, you will need to connect to the IP of the uVerse router.

        2. To find this, open a command prompt, and type 'ipconfig' The Gateway IP is your ATT uVerse Modem.

        3. Open a web-browser and type in the IP of the gateway. In this instance it is 192.168.6.254.

        4. Open Home Network and Advanced

        5. Configure a new IP and DHCP Pool on your ATT DSL Modem (2701HGV-B). Lets use 10.20.30.254/24 (255.255.255.0) with a DHCP Pool from (10.20.30.100 through 10.20.30.200), we'll only need 1 IP/device.

          22E0AD427D5E88BE8A6CF932BBAB7FED841EB4C7

        6. When you click "Save" you will loose connection to this device. That is fine, just disconnect all devices except the WAN1 for the firewall

        7. IMPORTANT!!! Disconnect all devices from the ATT modem and only have your FortiGate WAN 1 Attached Only to the DSL/ATT Modem.

        8. Connect to your FortiGate firewall and login. If you do not know how to do this, please visit my other blog Using a Console Cable to configure a Fortinet Appliance. Change the "Internal Interface" what ever it may be in your situation to a Static or Manual IP. We will reuse our previous 192.168.6.254/24 address, so that we do not have to change any static device on the Internal network. It is suggested that if the IP subnet is 192.168.0.* or 192.168.1.*, to change to a different address. It is possible to use any address below 255 on the following schemes. (10.*.*.*, 192.168.*.*, or 172.16.*.*).

        9. Configure the FortiGate WAN1 with a DHCP Address, you should get an address of 10.20.30.*, it will likely be 100, but not always.

        10. Configure your Internal Interface with the old ATT Default Gateway (Or the Default Gateway of your choosing). In our instance it will be 192.168.6.254, please make sure to check Ping, SSH and HTPS, we might need these!

        11. Configure a simple Internal-->WAN1 policy with NAT enabled.

        12. Connect to the Fortigate Internal (Default Gateway) IP via https, using the IP we provided as the Internal IP. Login

        13. Open another browser page to connect to the ATT uVerse modem/router via http://10.20.30.254

        14. Clear the ATT Routers Machine Cache before starting by visiting the http://10.20.30.254/mdc

        15. On the Left column, go to Resets and click the first Item "Reset Local Network". This should clear your device list under http://10.20.30.254 (Home Network)

          CC57CE97DCA8880E53E206FF74BBA0F362BFEC65

        16. Go to the FortiGate Device https://192.168.6.254, Status-->Network-->Interface. Edit WAN1, and click "Renew" next to DHCP.

          48B9D017CC131E9AAE46FFB2A2B012C5F263BED7

        17. Go back to the ATT router and you should see the FortiGate device listed.

        18. Click Broadband Link-->Advanced

        19. On the left column, select "Routed Interface", Fill in the gateway provided by ATT as well as the subnet mask provided by them. Check the "Auto Open Firewall" checkbox. Click Save.

          A60BDD56C8241BA098A2AB5F35F61CE4A3AD03C6

        20. Click Home Network-->Advanced and then "Edit Address Allocation" on the right column.

          A60BDD56C8241BA098A2AB5F35F61CE4A3AD03C6[1]

        21. Inside of here, we will assign the Public IP to the FortiGate. For us Network Administrators, this is a VERY strange way of doing things. Please hang in there, we are almost done.

        22. Inside the "Edit Address Allocation" section, you should see your single device.

          3E0918FF226832F173B28470D378F930A3B4B2EA

        23. Click the Address Assignment and scroll up, on top of the scroll list, is a "Assign Public IP" option. Select this.

          46DD6A40D4042BE6FE34CC30F0FC0FDDD3F741EB

        24. Click WAN IP Mapping on the right side. This should have a dropdown with your Public IP blocks. Choose any that you wish to use.

          3A8D1BC2EB5A74256BA6C0F4730C191442C35BD4

        25. Uncheck the "Firewall" box to remove firewalling (finally).

          E23A69160BD90289EF70C187E2E322C110E1586E

        26. Go back to the FortiGate Interface and click Renew under WAN1. You may have to do this a few times, but after a few times, you should now have a Static Public IP address. 9A7FFABC7DB09704283A5C5725EC2CD4BAFBDC2D

         

        Thank you to all who read and you are welcome to those that learned and may have saved a day of research and calling horrible ATT support. 

         

        Enjoy!