Previously I posted about how to do a packet capture on a Cisco ASR1000 platform, here I show you how to do a Cisco IOS Packet Capture which is possible on IOS based router’s for example a Cisco ISR 1921. First we need to specify the traffic we are interested in seeing in an ACL;
If you have mistakingly configured the wrong timezone in Cisco ACS during the build, and are concerned about changing the timezone in a production environment – you should be! I attempted this on ACS 5.8, only to spend a few hours restoring the server. My second attempt however, after conversing with TAC, went a lot
This post explains the multiple options for addressing your IPv6 endpoints including SLAAC, DHCPv6 and DHCP relay to a Microsoft Windows Based DHCP Server For a simple deployment you might be used to using the router or switch as a local DHCP server, in v4 this was rather simple as per the example configuration below;
Running packet capture on a router is, in my opinion, one of the best features Cisco provide. Most Cisco router platforms have the facility to run a packet capture on the box and here I demonstrate how to carry one out on any ASR1k platform such as the ASR1001, ASR1002, ASR1002x etc. First, we should
Whilst Cisco’s type 7 passwords are incredibly easy to decrypt (PacketLife Tools is my goto), Type 5 passwords are currently not reversible… that does not however mean they are not susceptible to brute force attacks. Whilst its reasonably impractical to brute force a router’s login due to the amount of time it would take for
This little used feature (at least in my experience) is actually quite useful and works with all ASA versions. The Cisco ASA 55xx Firewalls are actually able to send you an email based on *any* syslog’s that may be generated. This is very useful when you don’t run a syslog server, or just want some
Throughout all my posts I will be using IP addressing that is purposefully reserved globally for use in documentation, these ranges are; 192.0.2.0/24 (TEST-NET-1) 198.51.100.0/24 (TEST-NET-2) 203.0.113.0/24 (TEST-NET-3) You can read more about this in RFC5737 and I generally use these ranges to document internet connectivity in addition to the standard RFC1918 addressing for internal
I have a template that I apply each and every time I configure a Cisco router or switch. I find it disheartening that a lot of people don’t take the care and attention to disable unused services and secure the used one’s properly. You only have to do a simple search on SHODAN (free login