I finally solved the Gantt Chart Problem. All thanks to Mr Wagio.
Basically, we just have to get rid the working time for the Christmas Eve and New Year Eve .
Friday, December 26, 2008
Commands
Traceroute Command
The traceroute command is used to discover the routes that packets actually take when traveling to their destination. The device (for example, a router or a PC) sends out a sequence of User Datagram Protocol (UDP) datagrams to an invalid port address at the remote host.
Show ip ospf database command
To display lists of information related to the OSPF database for a specific router
Show ip ospf neighbor command
-Neighbor ID the router ID of the neighbor router. The router ID is the highest IP address or the highest ip address among loopback addresses
-The Pri field indicates the priority of the neighbor router. The router with the highest priority becomes the designated router (DR).
-The State field indicates the functional state of the neighbor router
-The Dead Time field indicates the amount of time remaining that the router waits to receive an OSPF hello packet from the neighbor before declaring the neighbor down
-The Address field indicates the IP address of the interface to which this neighbor is directly connected.
-The Interface field indicates the interface on which the OSPF neighbor has formed adjacency.
Tuesday, December 23, 2008
Debug IP Ospf Events
To display information on Open Shortest Path First (OSPF)-related events, such as adjacencies, flooding information, designated router selection, and shortest path first (SPF) calculation, use the debug ip ospf events command in privileged EXEC mode. To disable debugging output, use the no form of this command.
Monday, December 22, 2008
Still Cannot Ping Through !!!
uses of AUX port
AUX cable is black. AUX port is usually used to get dial-in access to the router.
For getting dial-in access to the router, you will need to connect a modem to the AUX port of the router using Cisco AUX cable. Then you will need to connect a telephone line to this modem. Once this is done, you can use any utility like Hyper Terminal to dial the number of the phone line and get console access to the router remotely.
For getting dial-in access to the router, you will need to connect a modem to the AUX port of the router using Cisco AUX cable. Then you will need to connect a telephone line to this modem. Once this is done, you can use any utility like Hyper Terminal to dial the number of the phone line and get console access to the router remotely.
Sunday, December 21, 2008
Differences between PIX 6.3 and 7.2
I have discovered the differences in the PIX command between PIX version 6.3 and 7.2
Some of the commands which are affected are shown below
Some of the commands which are affected are shown below
•no
•show
•clear
Some examples areFor example, a single no access-list <access-list name> removes the following
commands in PIX Version 6.3:
access-list myaccesslist extended permit tcp host 10.175.28.97 host
10.180.210.209 eq 37000
access-list myaccesslist extended permit tcp host 10.175.28.97 host
10.180.210.68 eq 37000
access-list myaccesslist extended permit tcp host 10.175.28.98 host
10.180.210.68 eq 37000
But in PIX Security appliance Version 7.0, the preceding commands are removed by
using either the clear configure access-list <access-list name> command or by the following:
no access-list myaccesslist extended permit tcp host 10.175.28.97 host
10.180.210.209 eq 37000
no access-list myaccesslist extended permit tcp host 10.175.28.97 host
10.180.210.68 eq 37000
no access-list myaccesslist extended permit tcp host 10.175.28.98 host
10.180.210.68 eq 37000
CHECKING PIX Version
pix# show running-config
Mode used to configure.
We have also discovered that most users uses the
ASDM mode to configure PIX instead of the CLI mode.
The ASDM mode contains a simple user interface, while
the CLI is more of a command line interface
Adaptive Security Device Manager (ASDM)uses.
- Rapid Configuration:
Features such as in-line and drag-and-drop policy editing, auto
complete, configuration wizards, appliance software upgrades, and
online help enable trouble-free initial configuration and policy change
without issuing complex commands or worrying about syntax errors.- Powerful Diagnostics:
Features such as Packet Tracer, log-policy correlation, packet capture,
regular expression tester, and embedded log reference reduce
administrative overhead and increase operational efficiency.- Real-Time Monitoring:
Features such as device, firewall, content security, and IPS
dashboards; real-time graphing; and tabulated metrics enable rapid
response to security incidents and trend analysis.- Management Flexibility:
A lightweight and secure design enables remote management of multiple
security appliances while supporting a wide variety of operating
systems, including Microsoft Windows XP, Windows Vista, Windows 2003
Server, and MacOS X.Command Line Interface (CLI)Right now we uses, the CLI mode to configure the PIX configuration.
The next objective is to understand the configuration of NAT and PAT in PIX.
Subscribe to:
Posts (Atom)