top of page
Backup configuration
Create a backup of the current firewall configuration. This backup will act as a fail-safe mechanism in case anything goes wrong during the firmware update process

(Backup Configuration Image)
Case Study Unauthorized Configuration Changes
-
Problem
-
Unauthorized access to a firewall result in malicious configuration changes that compromise a client Company
-
Solution
-
Configuration Restoration
-
TCNT Team leveraged the latest configuration backup, which was taken before the breach, to restore the firewall to its previous secure state. This process ensured that any unauthorized changes made by the hacker were overwritten by the trusted configuration
-
Check logs file for threat
-
Unauthorized login attempts
-
Identify login attempt. This includes details such as IP address, usernames and timestamps and number of failed login attempts.
-

HA (High Availability) Health
-
Active-Passive Configuration
-
In an active-passive configuration, one firewall device is designated as the active node, responsible for processing and forwarding network traffic. The other firewall devices in the cluster are in a standby state, standing by as backups.
-

(Active-Passive Image)
-
Synchronization & HA
-
The active firewall continuously synchronizes its state and configuration with the passive firewall devices. This synchronization ensures that the passive nodes are up-to-date and ready to take over the active role if needed.
-
HA clusters communicate with each other through a heartbeat mechanism. They constantly exchange signals to verify each other's availability and health status.
-

(Synchronization & Heartbeat Image)
Case Study
Ensuring Network Continuity with Firewall High Availability
-
Problem Statement
-
Hardware failure or unexpected disruptions on Firewall will interrupt network operations.
-
Troubleshoot
-
High Availability Response
-
As the primary firewall went down, the secondary firewall detected the absence of heartbeat signals within the predefined timeframe. It swiftly assumed control and took over the network responsibilities, including handling VPN connections and managing internet traffic.
-
bottom of page