Friday, December 26, 2008

Solve Gantt Chart Problem

I finally solved the Gantt Chart Problem. All thanks to Mr Wagio.
Basically, we just have to get rid the working time for the Christmas Eve and New Year Eve .
















Commands

Traceroute Command

The traceroute command is used to discover the routes that packets actually take when traveling to their destination. The device (for example, a router or a PC) sends out a sequence of User Datagram Protocol (UDP) datagrams to an invalid port address at the remote host.

Show ip ospf database command



To display lists of information related to the OSPF database for a specific router


Show ip ospf neighbor command


Use the show ip ospf neighbor command to observe the neighbor data structure.


-Neighbor ID the router ID of the neighbor router. The router ID is the highest IP address or the highest ip address among loopback addresses


-The Pri field indicates the priority of the neighbor router. The router with the highest priority becomes the designated router (DR).


-The State field indicates the functional state of the neighbor router


-The Dead Time field indicates the amount of time remaining that the router waits to receive an OSPF hello packet from the neighbor before declaring the neighbor down


-The Address field indicates the IP address of the interface to which this neighbor is directly connected.


-The Interface field indicates the interface on which the OSPF neighbor has formed adjacency.




Tuesday, December 23, 2008

Debug IP Ospf Events


To display information on Open Shortest Path First (OSPF)-related events, such as adjacencies, flooding information, designated router selection, and shortest path first (SPF) calculation, use the debug ip ospf events command in privileged EXEC mode. To disable debugging output, use the no form of this command.

Configure OSPF between BR and RR


We configured the OSPF between BR and RR which authenticate area 0 with the message-digest key md5 password ospfsercret .

Monday, December 22, 2008

Still Cannot Ping Through !!!




Mr Wagio, after we change to crossover cable, the result is still the same, still cannot ping each other. We try to troubleshoot on the cable, we test it and the cable no problem ! Really dono what is the problem. The error is still the same ... Alot of ??????.


(This is the error again !)


uses of AUX port

AUX cable is black. AUX port is usually used to get dial-in access to the router.

For getting dial-in access to the router, you will need to connect a modem to the AUX port of the router using Cisco AUX cable. Then you will need to connect a telephone line to this modem. Once this is done, you can use any utility like Hyper Terminal to dial the number of the phone line and get console access to the router remotely.

Sunday, December 21, 2008

Differences between PIX 6.3 and 7.2

I have discovered the differences in the PIX command between PIX version 6.3 and 7.2
Some of the commands which are affected are shown below

•no

•show

•clear

Some examples are

For example, a single no access-list <access-list name> removes the following

commands in PIX Version 6.3:

access-list myaccesslist extended permit tcp host 10.175.28.97 host
10.180.210.209 eq 37000
access-list myaccesslist extended permit tcp host 10.175.28.97 host
10.180.210.68 eq 37000
access-list myaccesslist extended permit tcp host 10.175.28.98 host
10.180.210.68 eq 37000

But in PIX Security appliance Version 7.0, the preceding commands are removed by

using either the clear configure access-list <access-list name> command or by the following:

no access-list myaccesslist extended permit tcp host 10.175.28.97 host
10.180.210.209 eq 37000
no access-list myaccesslist extended permit tcp host 10.175.28.97 host
10.180.210.68 eq 37000
no access-list myaccesslist extended permit tcp host 10.175.28.98 host
10.180.210.68 eq 37000


CHECKING PIX Version

pix# show running-config


Mode used to configure.

We have also discovered that most users uses the
ASDM mode to configure PIX instead of the CLI mode.

The ASDM mode contains a simple user interface, while
the CLI is more of a command line interface

Adaptive Security Device Manager (ASDM)uses.

  • Rapid Configuration:
    Features such as in-line and drag-and-drop policy editing, auto
    complete, configuration wizards, appliance software upgrades, and
    online help enable trouble-free initial configuration and policy change
    without issuing complex commands or worrying about syntax errors.
  • Powerful Diagnostics:
    Features such as Packet Tracer, log-policy correlation, packet capture,
    regular expression tester, and embedded log reference reduce
    administrative overhead and increase operational efficiency.
  • Real-Time Monitoring:
    Features such as device, firewall, content security, and IPS
    dashboards; real-time graphing; and tabulated metrics enable rapid
    response to security incidents and trend analysis.
  • Management Flexibility:
    A lightweight and secure design enables remote management of multiple
    security appliances while supporting a wide variety of operating
    systems, including Microsoft Windows XP, Windows Vista, Windows 2003
    Server, and MacOS X.
Command Line Interface (CLI)
Right now we uses, the CLI mode to configure the PIX configuration.

The next objective is to understand the configuration of NAT and PAT in PIX.