Friday, December 26, 2008
Solve Gantt Chart Problem
Basically, we just have to get rid the working time for the Christmas Eve and New Year Eve .
Commands
The traceroute command is used to discover the routes that packets actually take when traveling to their destination. The device (for example, a router or a PC) sends out a sequence of User Datagram Protocol (UDP) datagrams to an invalid port address at the remote host.
Show ip ospf database command
Tuesday, December 23, 2008
Debug IP Ospf Events
Monday, December 22, 2008
Still Cannot Ping Through !!!
uses of AUX port
For getting dial-in access to the router, you will need to connect a modem to the AUX port of the router using Cisco AUX cable. Then you will need to connect a telephone line to this modem. Once this is done, you can use any utility like Hyper Terminal to dial the number of the phone line and get console access to the router remotely.
Sunday, December 21, 2008
Differences between PIX 6.3 and 7.2
Some of the commands which are affected are shown below
•no
•show
•clear
Some examples areFor example, a single no access-list <access-list name> removes the following
commands in PIX Version 6.3:
access-list myaccesslist extended permit tcp host 10.175.28.97 host
10.180.210.209 eq 37000
access-list myaccesslist extended permit tcp host 10.175.28.97 host
10.180.210.68 eq 37000
access-list myaccesslist extended permit tcp host 10.175.28.98 host
10.180.210.68 eq 37000
But in PIX Security appliance Version 7.0, the preceding commands are removed by
using either the clear configure access-list <access-list name> command or by the following:
no access-list myaccesslist extended permit tcp host 10.175.28.97 host
10.180.210.209 eq 37000
no access-list myaccesslist extended permit tcp host 10.175.28.97 host
10.180.210.68 eq 37000
no access-list myaccesslist extended permit tcp host 10.175.28.98 host
10.180.210.68 eq 37000
CHECKING PIX Version
pix# show running-config
Mode used to configure.
We have also discovered that most users uses the
ASDM mode to configure PIX instead of the CLI mode.
The ASDM mode contains a simple user interface, while
the CLI is more of a command line interface
Adaptive Security Device Manager (ASDM)uses.
- Rapid Configuration:
Features such as in-line and drag-and-drop policy editing, auto
complete, configuration wizards, appliance software upgrades, and
online help enable trouble-free initial configuration and policy change
without issuing complex commands or worrying about syntax errors.- Powerful Diagnostics:
Features such as Packet Tracer, log-policy correlation, packet capture,
regular expression tester, and embedded log reference reduce
administrative overhead and increase operational efficiency.- Real-Time Monitoring:
Features such as device, firewall, content security, and IPS
dashboards; real-time graphing; and tabulated metrics enable rapid
response to security incidents and trend analysis.- Management Flexibility:
A lightweight and secure design enables remote management of multiple
security appliances while supporting a wide variety of operating
systems, including Microsoft Windows XP, Windows Vista, Windows 2003
Server, and MacOS X.Command Line Interface (CLI)Right now we uses, the CLI mode to configure the PIX configuration.
The next objective is to understand the configuration of NAT and PAT in PIX.
Thursday, December 18, 2008
What the Difference between Nagios-mysql and Nagios-pgsql?
Mysql:
- less features
- no transactions (transactions belong to oracle )
- use it for reading
- useless for Business critical appliactions
- Strange versioning 5.0.12 was beat 5.0.13 was offical release - do you know if you use a beta software
Postgresql
- more features
- stable
- more robust
- free for commercial use
But i still abit blur on the explanation, if can, can u explain to me what the difference ?
Re-drawn Physical Network Diagram
Sample TACACS configuration for cisco router
Sample PIX version 7 configuration
Hi Zheng Le and Jun Yi, Here are the sample of PIX configuration. As you can see, it's pretty much like the cisco IOS command. Please build your research upon this :)
Look at Ethernet2. Comparable to the router IOS, normally you keyed in encapsulation dot1q 20 (vlan number). In pix, you just need to create a subinterface (ethernet2.20)
and put in the keyword vlan 2o, give the interface a name, security level and ip address.
--------------- sample config ----------------------------------
pixfirewall(config)#interface Ethernet0
pixfirewall(config-if)#ip address 188.10.20.65 255.255.255.248
pixfirewall(config-if)#nameif outside
pixfirewall(config-if)#no shutdown
pixfirewall(config-if)#interface Ethernet1
pixfirewall(config-if)#ip address 192.168.0.193 255.255.255.224
pixfirewall(config-if)#nameif DMZ
pixfirewall(config-if)#security-level 50
pixfirewall(config-if)#no shutdown
pixfirewall(config-if)#interface Ethernet2
pixfirewall(config-if)#no shutdown
pixfirewall(config-if)#interface Ethernet2.10
pixfirewall(config-subif)#vlan 10
pixfirewall(config-subif)#ip address 192.168.0.129 255.255.255.192
pixfirewall(config-subif)#nameif Servers
pixfirewall(config-subif)#security-level 75
pixfirewall(config-subif)#interface Ethernet2.20
pixfirewall(config-subif)#vlan 20
pixfirewall(config-subif)#ip address 192.168.0.1 255.255.255.192
pixfirewall(config-subif)#nameif OfficeA
pixfirewall(config-subif)#security-level 100
pixfirewall(config-subif)#interface Ethernet2.30
pixfirewall(config-subif)#vlan 30
pixfirewall(config-subif)#ip address 192.168.0.241 255.255.255.240
pixfirewall(config-subif)#nameif GuestWired
pixfirewall(config-subif)#security-level 25
pixfirewall(config-subif)#interface Ethernet2.40
pixfirewall(config-subif)#vlan 40
pixfirewall(config-subif)#ip address 192.168.0.225 255.255.255.240
pixfirewall(config-subif)#nameif GuestWireless
pixfirewall(config-subif)#security-level 25
pixfirewall(config-subif)#interface Ethernet2.50
pixfirewall(config-subif)#vlan 50
pixfirewall(config-subif)#ip address 192.168.0.65 255.255.255.192
pixfirewall(config-subif)#nameif OfficeWireless
pixfirewall(config-subif)#security-level 100
----------------------end of sample config ------------------------------
PIX version 6.x and version 7.2
- Unrecognized command.
- Invalid input detected at '^' marker.
Certain commands used in version 6
- Ethernet port activation
the following command could not be excute as it is a Invalid input detected at '^' marker.
As for the solutions to obtain version 7 command, we search this websites
1 - http://www.cisco.com/en/US/docs/security/asa/asa72/command/reference/c1_72.html#wp2034121
2 - http://www.dslreports.com/faq/15785
Monday, December 15, 2008
Un-successful Ping resolved
The arrow on the right hand side shows the wrong connected (port 23)
The correct port to be connected is on the left hand side (port 3)
The reason why the ping from DMZ and Remote client doesn't work is because the connected PC is plugged to the wrong port in the switch. Therefore the client are in different vlan, this result ping as unsuccessfully as no trunking was done.
The PC used to ping was connected to port 23, which is under VLAN 10 used for Internet access.
The supposed port to be connect was port 3 which was VLAN 40. therfore the client connect to port 23 in VLAN 10 could not communicate with the gateway in VLAN 40.
Wednesday, December 10, 2008
Router Encapsulation dot1Q configuration!
Wednesday, December 3, 2008
Resolving "show vlan" status
Due to some error which we come across in the pass, we decided to clear all settings and configuration in the 2950 Switch.
We basically used this command "clear config all" followed by
Cat2950# write erase
Erasing the nvram filesystem will remove all files! Continue? [confirm]y[OK]
Erase of nvram: complete
Cat2950#
Cat2950# reload
After which we Delete the VLAN information from Flash or NVRAM, and reload the switch.
Next we key in the command to create the vlan database again.
Cat2950(vlan)# vtp transparent
Setting device to VTP transparent mode
Cat2950(vlan)# vlan 10 name Internet
VLAN 10 added:
Name: Internet
Cat2950(vlan)# vlan 20 name Security
VLAN 20 added:
Name: Security
Cat2950(vlan)#exit
Tuesday, December 2, 2008
VLSM calculation
The connection which branch out from PIX to E2 and E1, does it need to have separate calculation?
Thanks
NEVER SHOW VLAN !!!!
After i configure the vlan, when i type show vlan, those vlan that i previously add nv show !
but when i type "show run" it do show that the ports are assigned to each designated vlan !
MOST IMPORTANTLY.. the switch nv show green light.. it show orange light ! i type no shut for the port, but result still the same!
Monday, December 1, 2008
[guide] Syslog-ng guide and how to test it out
Here is the guide on how to configure cisco router for the syslog
Syslog Configuration and Cisco Devices
Syslog reserves facilities "local0" through "local7" for log messages received from remote servers and network devices. Routers, switches, firewalls and load balancers each logging with a different facility can each have their own log files for easy troubleshooting. The following examples will show how to have a different log file for each class of device.
If you have a large data center, then you may also want to switch off all logging to /var/log/messages as suggested above for the home/SOHO environment. In all the network device configuration examples below we are logging to the remote Linux logging server 192.168.1.100 which we set up in the previous section.
Cisco Routers
By default Cisco routers send syslog messages to their logging server with a default facility of local7. We won't set the facility in this case, but we can tell the router to timestamp the messages and make the messages have the source IP address of the loopback interface.
service timestamps log datetime localtime
no logging console
no logging monitor
logging 192.168.1.100 <== your log server IP
Catalyst CAT Switches running CATOS
By default Cisco switches also send syslog messages to their logging server with a default facility of local7. We won't change this facility either, therefore making routers and switches log to the same file.
set logging server enable
set logging server 192.168.1.100 <== your log server IP
set logging level all 5
set logging server severity 6
If you have any problem with the configuration, please post it to the comment box.
[guide] To solve the issue on the previous 2 posts
For the second issue, syslog-ng can be easily installed via apt-get
Just issue this command:
apt-get install syslog-ng
You should get the whole package including their dependencies installed.
Thursday, November 27, 2008
Latest Findings(1)
After reading some Syslog-ng, found out smt.
The thing is TLS - Transport layer security protocol.
Syslog-ng have this protocol that
encrypt the communication. TLS also allows the mutual authentication of the host
and the server using X.509 certificates.
TLS basically protocol allows applications to communicate across a network in a way designed to prevent eavesdropping, tampering, and message forgering. TLS ensures that data that send through the traffic is safe.
Internet Engineering Task Force (IETF)
Support new protocol standard for syslog-ng
IETF is is a large open international community of network designers, operators, vendors, and researchers concerned with the evolution of the Internet architecture and the smooth operation of the Internet. It is open to any interested individual.
The actual technical work of the IETF is done in its working groups, which are organized by topic into several areas (e.g., routing, transport, security, etc.). Much of the work is handled via mailing lists. The IETF holds meetings three times per year. They worked in a similar way like Wikipedia community.