What process is responsible for sending and receiving logs in the management server?
What process is responsible for sending and receiving logs in the management server? A. FWD B. CPM C. FWM D. CPD
The two procedures available for debugging in the firewall kernel are: i. fw ctl zdebug ii. fw ctl debug/kdebu
The two procedures available for debugging in the firewall kernel are: i. fw ctl zdebug ii. fw ctl debug/kdebug Choose the correct statement explaining the difference in the two. A. (i) Is used for general debugging, has a small buffer and is a quick way to set kernel debug flags to get an output via […]
Which command can be run in Expert mode to verify the core dump settings?
Which command can be run in Expert mode to verify the core dump settings? A. grep cdm /config/db/coredump B. grep cdm /config/db/initial C. grep $FWDIR/config/db/initial D. cat /etc/sysconfig/coredump/cdm.conf
Where do Protocol parsers register themselves for IPS?
Where do Protocol parsers register themselves for IPS? A. Passive Streaming Library B. Other handlers register to Protocol parser C. Protections database D. Context Management Infrastructure
During firewall kernel debug with fw ctl zdebug you received less information that expected.
During firewall kernel debug with fw ctl zdebug you received less information that expected. You noticed that a lot of messages were lost since the time the debug was started. What should you do to resolve this issue? A. Increase debug buffer; Use fw ctl debug -buf 32768 B. Redirect debug output file; Use fw […]
What are four main database domains?
A. System, Global, Log, Event B. System, User, Host, Network C. Local, Global, User, VPN D. System, User, Global, Log
How can you increase the ring buffer size to 1024 descriptors?
How can you increase the ring buffer size to 1024 descriptors? A. set interface eth0 rx-ringsize 1024 B. fw ctl int rx_ringsize 1024 C. echo rx_ringsize=1024>>/etc/sysconfig/sysctl.conf D. dbedit>modify properties firewall_properties rx_ringsize 1024
When debugging is enabled on firewall kernel module using the ‘fw ctl debug’ command with required options
When debugging is enabled on firewall kernel module using the ‘fw ctl debug’ command with required options, many debug messages are provided by the kernel that help the administrator to identify issues. Which of the following is true about these debug messages generated by the kernel module? A. Messages are written to a buffer and […]
An administrator receives reports about issues with log indexing and text searching regarding an existing Mana
An administrator receives reports about issues with log indexing and text searching regarding an existing Management Server. In trying to find a solution she wants to check if the process responsible for this feature is running correctly. What is true about the related process? A. fwm manages this database after initialization of the ICA B. […]
You are trying to establish a VPN tunnel between two Security Gateways but fail.
You are trying to establish a VPN tunnel between two Security Gateways but fail. What initial steps will you make to troubleshoot the issue? A. capture traffic on both tunnel members and collect debug of IKE and VPND daemon B. capture traffic on both tunnel members and collect kernel debug for fw module with vm, […]