Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
vty
Nov 8, 2007

oh dott, oh dott!

para posted:

I'm just starting to get into networking and Cisco. I've bought a book and have some other resources at my disposal, and I'm planning on taking the CCENT as soon as I finish reading and practicing the material.

My employer will be retiring a couple Cisco 2600 routers next week and has offered to give me one to help learn the IOS and setup a little lab at home. This is great, but while reading through the book there are several chapters coming up dealing with configuring and using switches. I do not believe the router has more than 2 or 3 ethernet ports, so I'm wondering if I should try to grab a switch on ebay?

Can anyone give me advise on what type of hardware I might want to look at (I can get a pretty decent switch on ebay for ~$50-70 it seems) for a small home lab setup for the CCENT and CCNA? Thanks.

fake edit: What I'm really looking at is if I should get a switch to learn with if I already have a router.

I personally think it's ridiculous to get hardware just for the CCNA.

If you're going to get hardware, get it for the CCNP (MPLS). 85% of the CCNA is subnetting and ACLs.

Adbot
ADBOT LOVES YOU

jwh
Jun 12, 2002

dongkeyotay posted:

If you're going to get hardware, get it for the CCNP (MPLS).

Is MPLS on the CCNP now? If so, what do they ask you to know?

A_Line
Nov 14, 2004
I'm looking to block all inbound traffic to one public host via ACLs but I'm not sure what syntax to use. Could someone point me in the right direction?

jwh
Jun 12, 2002

A_Line posted:

I'm looking to block all inbound traffic to one public host via ACLs but I'm not sure what syntax to use. Could someone point me in the right direction?

On an router, or an ASA/PIX?

On a router you could do:

access-list 100 deny ip any 1.2.3.4
access-list 100 permit ip any any

int fa0/0
ip access-group 100 in

Joss Laypeg
Oct 11, 2007
A psychotic is a guy who's just found out what's going on. - WSB

InferiorWang posted:

http://www.gns3.net/

It's a complete dynamips package with visual topology editor. You still need IOS binaries, but for some fake labbing, it looks very promising.

Not sure if it's poop sock worthy. I don't plan on finding out either.

I've tried it. One day it's going to be a very useful app, but at the moment it's very limited in features and more of an interesting concept than anything else. It couldn't even import or export a Dynagen config file when I looked at it last, and it also prevented you from using a lot of the standard Dynamips options if you chose to run it from GNS3. But the development seemed to be moving pretty fast and I wouldn't be surprised if they'd added a lot of the missing features by now. Definitely one to watch...

XakEp
Dec 20, 2002
Amor est vitae essentia

jwh posted:

Is MPLS on the CCNP now? If so, what do they ask you to know?

MPLS is CCIP territory, not CCNP.

ionn
Jan 23, 2004

Din morsa.
Grimey Drawer

Reefer Inc. posted:

I've tried it. One day it's going to be a very useful app, but at the moment it's very limited in features and more of an interesting concept than anything else. It couldn't even import or export a Dynagen config file when I looked at it last, and it also prevented you from using a lot of the standard Dynamips options if you chose to run it from GNS3. But the development seemed to be moving pretty fast and I wouldn't be surprised if they'd added a lot of the missing features by now. Definitely one to watch...

GNS3 actually generates dynagen config files when saving or loading (and is built on dynagen stuff to launch dynamips). And the graphical topology and general gui-ness sure is useful at times. It is still a bit too bug-riddled, but I'm sure it will get better.

mamboman
Jun 3, 2001

I miss you Bill..
I've got a weird VPN hairpinning problem on an ASA 5540.

I am using an ASA 5540 VPN edition to terminate VPN connections from software clients and PIX/ASA boxes using EasyVPN (in network extension mode).

I am trying to get the PIX/ASA remote networks and the VPN Clients to talk to each other (they both have no problems talking to the core) but intra-spoke communication is intermittent.

Just as an example, I was trying to ping from a client (192.168.200.4) to a remote network (192.168.8.1) and it wouldn't work, but when I initiated the ping from the remote network side (192.168.8.1) it started working "magically."

same-security-traffic permit intra-interface is enabled on the core pix.

Here is some of the relevant config:

access-list inside_nat0_outbound extended permit ip 10.0.0.0 255.0.0.0 10.1.129.0 255.255.255.192
access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 10.1.129.0 255.255.255.192
access-list inside_nat0_outbound extended permit ip 172.16.1.0 255.255.255.0 10.1.129.0 255.255.255.192
access-list inside_nat0_outbound extended permit ip 172.16.2.0 255.255.255.0 10.1.129.0 255.255.255.192
access-list inside_nat0_outbound extended permit ip any 10.1.131.0 255.255.255.224
access-list inside_nat0_outbound extended permit ip any 10.1.129.0 255.255.255.128
access-list inside_nat0_outbound extended permit ip any 10.1.129.0 255.255.255.192
access-list inside_nat0_outbound extended permit ip any 10.1.6.192 255.255.255.192
access-list inside_nat0_outbound extended permit ip 10.1.6.0 255.255.255.0 10.1.6.0 255.255.255.0
access-list inside_nat0_outbound extended permit ip 10.0.0.0 255.0.0.0 10.0.0.0 255.0.0.0
access-list inside_nat0_outbound extended permit ip 172.16.0.0 255.240.0.0 10.0.0.0 255.0.0.0
access-list inside_nat0_outbound extended permit ip 192.168.0.0 255.255.0.0 10.0.0.0 255.0.0.0
access-list inside_nat0_outbound extended permit ip 10.0.0.0 255.0.0.0 192.168.0.0 255.254.0.0
access-list inside_nat0_outbound extended permit ip 172.16.0.0 255.255.0.0 192.168.0.0 255.254.0.0
access-list inside_nat0_outbound extended permit ip 172.17.0.0 255.255.0.0 192.168.0.0 255.254.0.0
access-list inside_nat0_outbound extended permit ip 172.18.0.0 255.255.0.0 192.168.0.0 255.254.0.0
access-list inside_nat0_outbound extended permit ip 192.168.0.0 255.255.0.0 192.168.0.0 255.255.0.0

ip local pool VPN_CLIENTS 192.168.200.1-192.168.207.254 mask 255.255.248.0

global (outside) 1 209.17.173.11 netmask 255.255.255.0
global (outside) 101 209.17.173.9 netmask 255.255.255.192
global (DMZ) 101 209.17.173.9 netmask 255.255.255.192
global (DMZ) 2 192.168.1.8
nat (outside) 0 access-list inside_nat0_outbound
nat (inside) 0 access-list inside_nat0_outbound
nat (inside) 1 10.2.4.0 255.255.255.0
nat (inside) 101 172.18.1.0 255.255.255.0
nat (inside) 101 172.16.0.0 255.255.0.0
nat (inside) 101 10.0.0.0 255.0.0.0
nat (DMZ) 0 access-list inside_nat0_outbound


Help?

atticus
Nov 7, 2002

this is how u post~
:madmax::hf::riker:

jwh posted:

Is MPLS on the CCNP now? If so, what do they ask you to know?

Yes, the new CCNP exam (ISCW - replaced the BCRAN) now covers frame-mode MPLS.

Exam blueprint here.

As far as I know though, MPLS is still much more heavy in the CCIP certification track; there's still an entire exam dedicated to it.

jbusbysack
Sep 6, 2002
i heart syd

mamboman posted:

I've got a weird VPN hairpinning problem on an ASA 5540.

[config]

Help?

Run it through packet-tracer. Although what an issue may be is a same-interface routing issue, as ASA's dislike sending packets back out the same int it received it on. Also note - technically a VPN client is considered to live on the outside interface. But really, packet-tracer is your new best friend.

Boner Buffet
Feb 16, 2006
Can anyone think of any issues plugging a 10Base-T nic into a fast ethernet port? A UPS I'm looking at only has the option to add a 10BT card for SNMP abilities.

CheeseSpawn
Sep 15, 2004
Doctor Rope
For those of you who have taken a cisco netacademy class before and missed the 640-801 deadline, you should still be eligible to still take the old exam.

I was checking out the prepcenter to try and see some of the new test questions when I stumbled back into the netacademy site. I decided to log back in and check out the site. I found access to packet tracer and the coupon voucher for the old exam. I took this class at least 1.5 years ago.

Thrilled, I tried to schedule an exam by phone in the upcoming week and it worked. If you have the code and a netacademy id, you should be good to go. I won't mind looking over the new material after I pass the exam. cheers

Tremblay
Oct 8, 2002
More dog whistles than a Petco

mamboman posted:

I've got a weird VPN hairpinning problem on an ASA 5540.

I am using an ASA 5540 VPN edition to terminate VPN connections from software clients and PIX/ASA boxes using EasyVPN (in network extension mode).

I am trying to get the PIX/ASA remote networks and the VPN Clients to talk to each other (they both have no problems talking to the core) but intra-spoke communication is intermittent.

Just as an example, I was trying to ping from a client (192.168.200.4) to a remote network (192.168.8.1) and it wouldn't work, but when I initiated the ping from the remote network side (192.168.8.1) it started working "magically."

same-security-traffic permit intra-interface is enabled on the core pix.

Here is some of the relevant config:

access-list inside_nat0_outbound extended permit ip 10.0.0.0 255.0.0.0 10.1.129.0 255.255.255.192
access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 10.1.129.0 255.255.255.192
access-list inside_nat0_outbound extended permit ip 172.16.1.0 255.255.255.0 10.1.129.0 255.255.255.192
access-list inside_nat0_outbound extended permit ip 172.16.2.0 255.255.255.0 10.1.129.0 255.255.255.192
access-list inside_nat0_outbound extended permit ip any 10.1.131.0 255.255.255.224
access-list inside_nat0_outbound extended permit ip any 10.1.129.0 255.255.255.128
access-list inside_nat0_outbound extended permit ip any 10.1.129.0 255.255.255.192
access-list inside_nat0_outbound extended permit ip any 10.1.6.192 255.255.255.192
access-list inside_nat0_outbound extended permit ip 10.1.6.0 255.255.255.0 10.1.6.0 255.255.255.0
access-list inside_nat0_outbound extended permit ip 10.0.0.0 255.0.0.0 10.0.0.0 255.0.0.0
access-list inside_nat0_outbound extended permit ip 172.16.0.0 255.240.0.0 10.0.0.0 255.0.0.0
access-list inside_nat0_outbound extended permit ip 192.168.0.0 255.255.0.0 10.0.0.0 255.0.0.0
access-list inside_nat0_outbound extended permit ip 10.0.0.0 255.0.0.0 192.168.0.0 255.254.0.0
access-list inside_nat0_outbound extended permit ip 172.16.0.0 255.255.0.0 192.168.0.0 255.254.0.0
access-list inside_nat0_outbound extended permit ip 172.17.0.0 255.255.0.0 192.168.0.0 255.254.0.0
access-list inside_nat0_outbound extended permit ip 172.18.0.0 255.255.0.0 192.168.0.0 255.254.0.0
access-list inside_nat0_outbound extended permit ip 192.168.0.0 255.255.0.0 192.168.0.0 255.255.0.0

ip local pool VPN_CLIENTS 192.168.200.1-192.168.207.254 mask 255.255.248.0

global (outside) 1 209.17.173.11 netmask 255.255.255.0
global (outside) 101 209.17.173.9 netmask 255.255.255.192
global (DMZ) 101 209.17.173.9 netmask 255.255.255.192
global (DMZ) 2 192.168.1.8
nat (outside) 0 access-list inside_nat0_outbound
nat (inside) 0 access-list inside_nat0_outbound
nat (inside) 1 10.2.4.0 255.255.255.0
nat (inside) 101 172.18.1.0 255.255.255.0
nat (inside) 101 172.16.0.0 255.255.0.0
nat (inside) 101 10.0.0.0 255.0.0.0
nat (DMZ) 0 access-list inside_nat0_outbound


Help?

You need a nat (outside) statement to translate VPNC IPs to globals. ie. nat (outside) 1 <RA VPN Subnet> netmask <mask>

also you say same sec intra is on the core PIX... It needs to be on this ASA since it is terminating the tunnels (unless I misread that bit).

brent78
Jun 23, 2004

I killed your cat, you druggie bitch.
I have a pair of ASA 5520's protecting a cluster of around 40 servers. I want to create a class-map that will rate limit SSH and FTP connections by source IP to 5 per minute to cut down on dictionary attacks and the like. Can someone help be find the configuration I'm looking for?

Tremblay
Oct 8, 2002
More dog whistles than a Petco

brent78 posted:

I have a pair of ASA 5520's protecting a cluster of around 40 servers. I want to create a class-map that will rate limit SSH and FTP connections by source IP to 5 per minute to cut down on dictionary attacks and the like. Can someone help be find the configuration I'm looking for?

Not sure that is possible. Best way I can think to do something like that is to use auth proxy. For FTP the ASA can do inline authentication. However we don't do inline for SSH, IIRC. Do these need to be publicly accessible? If its only employees that need access just force them to connect to VPN first.

Spazz
Nov 17, 2005

So I'm not far enough into my cirriculum to know who to work with this yet, but I have a 2511-DC that I got and I have a LOT of equipment I plan to learn off of. Is there a way to configure Async 1-16 to plug into the CONSOLE port to manage multiple pieces of equipment via SSH or other means? Or am I just pissing into the wind?

Love the thread, guys.

CrazyLittle
Sep 11, 2001





Clapping Larry

Spazz posted:

So I'm not far enough into my cirriculum to know who to work with this yet, but I have a 2511-DC that I got and I have a LOT of equipment I plan to learn off of. Is there a way to configure Async 1-16 to plug into the CONSOLE port to manage multiple pieces of equipment via SSH or other means? Or am I just pissing into the wind?

Love the thread, guys.

Yeah that's a bit of a pipe dream. The Async port isn't RS232 serial, and at the very least won't let you connect to it directly to send/recieve plaintext. You're better off chasing down a serial console server like a Lantronix device or whatnot.

Okay so I'm totally off about that point. I thought you were talking about a serial wic.

Anyways you'll need an octal cable. Here's one on eBay: http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=320199361010

CrazyLittle fucked around with this message at 19:28 on Dec 29, 2007

inignot
Sep 1, 2003

WWBCD?

Spazz posted:

So I'm not far enough into my cirriculum to know who to work with this yet, but I have a 2511-DC that I got and I have a LOT of equipment I plan to learn off of. Is there a way to configure Async 1-16 to plug into the CONSOLE port to manage multiple pieces of equipment via SSH or other means? Or am I just pissing into the wind?

Love the thread, guys.

It will work fine, that's how everyone sets up a console server for a CCIE study lab.

http://www.cisco.com/en/US/products/hw/routers/ps233/products_data_sheet09186a008009204c.html
http://mail.cynico.net/~hucke/network/notes-2511.html

XakEp
Dec 20, 2002
Amor est vitae essentia

Spazz posted:

So I'm not far enough into my cirriculum to know who to work with this yet, but I have a 2511-DC that I got and I have a LOT of equipment I plan to learn off of. Is there a way to configure Async 1-16 to plug into the CONSOLE port to manage multiple pieces of equipment via SSH or other means? Or am I just pissing into the wind?

Love the thread, guys.

I've personally setup mine so it'll do it, and I've used it. Works great.

mamboman
Jun 3, 2001

I miss you Bill..

Tremblay posted:

You need a nat (outside) statement to translate VPNC IPs to globals. ie. nat (outside) 1 <RA VPN Subnet> netmask <mask>

also you say same sec intra is on the core PIX... It needs to be on this ASA since it is terminating the tunnels (unless I misread that bit).

The PIXes are just remote network boxes with network extension mode. The core ASA is terminating all the tunnels and has the same sec intra command enabled. I tried putting a global address on but I get no joy

karttoon
Apr 11, 2006
-?-
Is there any particular reason "sh int status" just comes up blank? Using IOS (tm) C2600 Software (C2600-JK9S-M), Version 12.3(21), RELEASE SOFTWARE (fc2) on a 2610XM router.

atticus
Nov 7, 2002

this is how u post~
:madmax::hf::riker:

karttoon posted:

Is there any particular reason "sh int status" just comes up blank? Using IOS (tm) C2600 Software (C2600-JK9S-M), Version 12.3(21), RELEASE SOFTWARE (fc2) on a 2610XM router.

"sh int status" only works on switch platforms, use "sh ip int bri" instead.

atticus fucked around with this message at 04:03 on Dec 30, 2007

mamboman
Jun 3, 2001

I miss you Bill..

mamboman posted:

The PIXes are just remote network boxes with network extension mode. The core ASA is terminating all the tunnels and has the same sec intra command enabled. I tried putting a global address on but I get no joy


Ok. I kinda found what the problem was (http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080734db7.shtml) and i needed to put something in the ACL.

But now I get IPSEC Spoof Detected when running packet-trace

karttoon
Apr 11, 2006
-?-

atticus posted:

"sh int status" only works on switch platforms, use "sh ip int bri" instead.

I use sh int status on our routers at work all day. Also, sh ip int bri doesn't include duplex/speed/port type which is what I want. 'sh int <int> status' returns a blank line too.

atticus
Nov 7, 2002

this is how u post~
:madmax::hf::riker:

karttoon posted:

I use sh int status on our routers at work all day. Also, sh ip int bri doesn't include duplex/speed/port type which is what I want. 'sh int <int> status' returns a blank line too.

I've just tried it on at least 3 of our production routers (2800s) and I get the same results. I tried it on two 6509's and two 3750 stacks and it works fine. What's the platform that you're having success on at work?

jbusbysack
Sep 6, 2002
i heart syd

mamboman posted:

Ok. I kinda found what the problem was (http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080734db7.shtml) and i needed to put something in the ACL.

But now I get IPSEC Spoof Detected when running packet-trace

Thats fine, its because the ASA treats it like a real packet - without any flow, or sequence numbers it assumes someone is running a packet-injection attack on you.

jbusbysack
Sep 6, 2002
i heart syd

atticus posted:

I've just tried it on at least 3 of our production routers (2800s) and I get the same results. I tried it on two 6509's and two 3750 stacks and it works fine. What's the platform that you're having success on at work?

It seems that 2800's with switch WIC cards work with Show int status.
flash:c2800nm-advipservicesk9-mz.124-11.T2.bin which is a 2811 modular router it works on, while a 2811 with the same code version but without a switchcard does not have that functionality.

jbusbysack fucked around with this message at 07:48 on Dec 30, 2007

mamboman
Jun 3, 2001

I miss you Bill..

jbusbysack posted:

Thats fine, its because the ASA treats it like a real packet - without any flow, or sequence numbers it assumes someone is running a packet-injection attack on you.

Hm, well the ping still doesn't work.

jbusbysack
Sep 6, 2002
i heart syd

mamboman posted:

Hm, well the ping still doesn't work.

Post the packet-trace for both directions (client to remote network, and vice versa)

mamboman
Jun 3, 2001

I miss you Bill..

jbusbysack posted:

Post the packet-trace for both directions (client to remote network, and vice versa)

Was just about to do that >< Found something interesting.
code:
FROM REMOTE PIX using EasyVPN (192.168.7.1) :: to Remote VPN Client


Phase: 1
Type: FLOW-LOOKUP
Subtype:
Result: ALLOW
Config:
Additional Information:
Found no matching flow, creating a new flow

Phase: 2
Type: ROUTE-LOOKUP
Subtype: input
Result: ALLOW
Config:
Additional Information:
in   192.168.200.10  255.255.255.255 outside

Phase: 3
Type: ROUTE-LOOKUP
Subtype: input
Result: ALLOW
Config:
Additional Information:
in   0.0.0.0         0.0.0.0         outside

Phase: 4
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group acl_outside_in in interface outside
access-list acl_outside_in extended permit ip 192.168.0.0 255.255.0.0 192.168.200.0 255.255.248.0
Additional Information:

Phase: 5
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:

Phase: 6
Type: INSPECT
Subtype: np-inspect
Result: ALLOW
Config:
Additional Information:

Phase: 7
Type: DEBUG-ICMP
Subtype:
Result: ALLOW
Config:
Additional Information:

Phase: 8
Type: NAT-EXEMPT
Subtype:
Result: ALLOW
Config:
nat (outside) 0 access-list inside_nat0_outbound outside
  match ip outside 192.168.0.0 255.255.0.0 outside 192.168.0.0 255.255.0.0
    NAT exempt
    translate_hits = 2017, untranslate_hits = 2017
Additional Information:

Phase: 9
Type: NAT-EXEMPT
Subtype: rpf-check
Result: ALLOW
Config:
nat (outside) 0 access-list inside_nat0_outbound outside
  match ip outside 192.168.0.0 255.255.0.0 outside 192.168.0.0 255.255.0.0
    NAT exempt
    translate_hits = 2017, untranslate_hits = 2017
Additional Information:

Phase: 10
Type: NAT
Subtype:
Result: ALLOW
Config:
nat (outside) 10 192.168.7.0 255.255.255.0
  match ip outside 192.168.7.0 255.255.255.0 outside any
    dynamic translation to pool 10 (209.17.173.61 [Interface PAT])
    translate_hits = 0, untranslate_hits = 0
Additional Information:

Phase: 11
Type: NAT
Subtype: host-limits
Result: ALLOW
Config:
nat (outside) 10 192.168.7.0 255.255.255.0
  match ip outside 192.168.7.0 255.255.255.0 outside any
    dynamic translation to pool 10 (209.17.173.61 [Interface PAT])
    translate_hits = 0, untranslate_hits = 0
Additional Information:

Phase: 12
Type: VPN
Subtype: encrypt
Result: ALLOW
Config:
Additional Information:

Phase: 13
Type: NAT
Subtype: rpf-check
Result: ALLOW
Config:
nat (outside) 10 192.168.200.0 255.255.248.0
  match ip outside 192.168.200.0 255.255.248.0 outside any
    dynamic translation to pool 10 (209.17.173.61 [Interface PAT])
    translate_hits = 0, untranslate_hits = 0
Additional Information:

Phase: 14
Type: FLOW-CREATION
Subtype:
Result: ALLOW
Config:
Additional Information:
New flow created with id 26819557, packet dispatched to next module

Result:
input-interface: outside
input-status: up
input-line-status: up
output-interface: outside
output-status: up
output-line-status: up
Action: allow


FROM VPN CLIENT TO REMOTE PIX :: 192.168.200.10 or whatever 


Phase: 1
Type: FLOW-LOOKUP
Subtype:
Result: ALLOW
Config:
Additional Information:
Found no matching flow, creating a new flow

Phase: 2
Type: ROUTE-LOOKUP
Subtype: input
Result: ALLOW
Config:
Additional Information:
in   0.0.0.0         0.0.0.0         outside

Phase: 3
Type: ROUTE-LOOKUP
Subtype: input
Result: ALLOW
Config:
Additional Information:
in   192.168.200.10  255.255.255.255 outside

Phase: 4
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group acl_outside_in in interface outside
access-list acl_outside_in extended permit ip 192.168.200.0 255.255.248.0 192.168.0.0 255.255.0.0
Additional Information:

Phase: 5
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:

Phase: 6
Type: CP-PUNT
Subtype:
Result: ALLOW
Config:
Additional Information:

Phase: 7
Type: VPN
Subtype: ipsec-tunnel-flow
Result: ALLOW
Config:
Additional Information:

Phase: 8
Type: INSPECT
Subtype: np-inspect
Result: ALLOW
Config:
Additional Information:

Phase: 9
Type: DEBUG-ICMP
Subtype:
Result: ALLOW
Config:
Additional Information:

Phase: 10
Type: NAT-EXEMPT
Subtype:
Result: ALLOW
Config:
nat (outside) 0 access-list inside_nat0_outbound outside
  match ip outside 192.168.0.0 255.255.0.0 outside 192.168.0.0 255.255.0.0
    NAT exempt
    translate_hits = 2015, untranslate_hits = 2015
Additional Information:

Phase: 11
Type: NAT-EXEMPT
Subtype: rpf-check
Result: ALLOW
Config:
nat (outside) 0 access-list inside_nat0_outbound outside
  match ip outside 192.168.0.0 255.255.0.0 outside 192.168.0.0 255.255.0.0
    NAT exempt
    translate_hits = 2015, untranslate_hits = 2015
Additional Information:

Phase: 12
Type: NAT
Subtype:
Result: ALLOW
Config:
nat (outside) 10 192.168.200.0 255.255.248.0
  match ip outside 192.168.200.0 255.255.248.0 outside any
    dynamic translation to pool 10 (209.17.173.61 [Interface PAT])
    translate_hits = 0, untranslate_hits = 0
Additional Information:

Phase: 13
Type: NAT
Subtype: host-limits
Result: ALLOW
Config:
nat (outside) 10 192.168.200.0 255.255.248.0
  match ip outside 192.168.200.0 255.255.248.0 outside any
    dynamic translation to pool 10 (209.17.173.61 [Interface PAT])
    translate_hits = 0, untranslate_hits = 0
Additional Information:

Phase: 14
Type: NAT
Subtype: rpf-check
Result: ALLOW
Config:
nat (outside) 10 192.168.7.0 255.255.255.0
  match ip outside 192.168.7.0 255.255.255.0 outside any
    dynamic translation to pool 10 (209.17.173.61 [Interface PAT])
    translate_hits = 0, untranslate_hits = 0
Additional Information:

Phase: 15
Type: FLOW-CREATION
Subtype:
Result: ALLOW
Config:
Additional Information:
New flow created with id 26818541, packet dispatched to next module

Result:
input-interface: outside
input-status: up
input-line-status: up
output-interface: outside
output-status: up
output-line-status: up
Action: drop
Drop-reason: (ipsec-spoof) IPSEC Spoof detected


------
Notice that the packet from the VPN Client to the remote PIX network does not go through an encrypt process. Hmm.

mamboman
Jun 3, 2001

I miss you Bill..
Well.. i don't know what I did but I am getting a different output from packet trace now.

Phase: 14
Type: VPN
Subtype: encrypt
Result: DROP
Config:
Additional Information:
Forward Flow based lookup yields rule:
out id=0x4e4c070, priority=70, domain=encrypt, deny=false
hits=27, user_data=0x0, cs_id=0x7bdbd68, reverse, flags=0x0, protocol=0
src ip=192.168.200.0, mask=255.255.248.0, port=0
dst ip=192.168.0.0, mask=255.255.0.0, port=0



It will drop the VPN packets going from software client to PIX remote networks, but not vice-versa. I am not quite sure which rule it is looking up though, because I am using EasyVPN client mode.

ionn
Jan 23, 2004

Din morsa.
Grimey Drawer

jbusbysack posted:

It seems that 2800's with switch WIC cards work with Show int status.
flash:c2800nm-advipservicesk9-mz.124-11.T2.bin which is a 2811 modular router it works on, while a 2811 with the same code version but without a switchcard does not have that functionality.

The L2 switch interface modules work with "sh int status", since that is switch hardware. The built-in "real" FastEthernet interfaces aren't present in the output, are they?

jbusbysack
Sep 6, 2002
i heart syd

ionn posted:

The L2 switch interface modules work with "sh int status", since that is switch hardware. The built-in "real" FastEthernet interfaces aren't present in the output, are they?

Correct. Since it's strictly a switch-based command, only the linecard ports are displayed in the output.

Spazz
Nov 17, 2005

Stupid question: What does the XM mean on the tail of router models? ie: 2620 vs 2620XM.

Thanks :(

ragzilla
Sep 9, 2005
don't ask me, i only work here


Spazz posted:

Stupid question: What does the XM mean on the tail of router models? ie: 2620 vs 2620XM.

Thanks :(

I don't know that it stands for anything, but the XM routers came out after the 2600 series, replacing them for the most part. The major difference is new proc / support for more memory/flash/WICs.

para
Nov 30, 2006
This may be a question for its own thread, but what kind of admin tools do you guys prefer?

I haven't really gotten into the IOS yet (I'm new to networking in general), but when I do it might be helpful to know what kinds of tools are the most efficient and feature rich. Do you just use the terminal and use telnet/ssh, or do you use something a little more specific to the task.

For analyzing network traffic I've read of the NetFlow protocol and a program called Scrutinizer, but I've been told that it only logs traffic through the router in one direction (I've forgotten if he said it was either in or out) and it seems rather pointless to not have both if you are looking at network utilization.

Also telnet and ssh don't seem to let me redirect std input into them so I can't send a bunch of prewritten commands to the router. If I want to run a bunch of prewritten commands on a router and perhaps capture the output (equivalent to '# cat input.txt | ssh admin@router > output.txt' if ssh would let me do that) what would be the choice method of doing it?

I hope this question wasn't too long for this thread. Thanks.

ragzilla
Sep 9, 2005
don't ask me, i only work here


para posted:

Also telnet and ssh don't seem to let me redirect std input into them so I can't send a bunch of prewritten commands to the router. If I want to run a bunch of prewritten commands on a router and perhaps capture the output (equivalent to '# cat input.txt | ssh admin@router > output.txt' if ssh would let me do that) what would be the choice method of doing it?

I hope this question wasn't too long for this thread. Thanks.

You probably want to look into a tool called RANCID (from shrubbery networks), in particular, the 'clogin' command distributed with it: http://www.shrubbery.net/rancid/man/clogin.1.html

atticus
Nov 7, 2002

this is how u post~
:madmax::hf::riker:

para posted:

This may be a question for its own thread, but what kind of admin tools do you guys prefer?

I haven't really gotten into the IOS yet (I'm new to networking in general), but when I do it might be helpful to know what kinds of tools are the most efficient and feature rich. Do you just use the terminal and use telnet/ssh, or do you use something a little more specific to the task.

For analyzing network traffic I've read of the NetFlow protocol and a program called Scrutinizer, but I've been told that it only logs traffic through the router in one direction (I've forgotten if he said it was either in or out) and it seems rather pointless to not have both if you are looking at network utilization.

Also telnet and ssh don't seem to let me redirect std input into them so I can't send a bunch of prewritten commands to the router. If I want to run a bunch of prewritten commands on a router and perhaps capture the output (equivalent to '# cat input.txt | ssh admin@router > output.txt' if ssh would let me do that) what would be the choice method of doing it?

I hope this question wasn't too long for this thread. Thanks.

What do you mean when you say "send pre-written commands to the router"? If you're looking for something interactive, I know that people have had good luck with Expect scripts, however you should just be able to paste a bunch of commands from notepad into your console or ssh session, and IOS should interpret them sequentially...

jwh
Jun 12, 2002

para posted:

For analyzing network traffic I've read of the NetFlow protocol and a program called Scrutinizer, but I've been told that it only logs traffic through the router in one direction (I've forgotten if he said it was either in or out) and it seems rather pointless to not have both if you are looking at network utilization.

Version 5 NetFlow flows are unidirectional, and are built on packet ingress. In practice, all this really means is that you'll want to apply NetFlow on all of your interfaces that a bidirectional flow could traverse. In other words, so long as you have NetFlow enabled on all of the interfaces, you won't "miss" any utilization information.

Adbot
ADBOT LOVES YOU

Ratmtattat
Mar 10, 2004
the hairdryer

I have a question. Has anybody had experience with Cisco's Clean Access stuff? I'm having an issue with laptops right now and was told that there is a client that will automatically connect with credentials to an access point upon startup, but nobody is helpful and will tell me what it is or where to get it. Has anybody heard of this or knows what it is?

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply