Tag: Cisco

Cisco IOS Packet Capture

Previously I posted about how to do a packet capture on a Cisco ASR1000 platform, here I show you how to do a Cisco IOS Packet Capture which is possible on IOS based router’s for example a Cisco ISR 1921. First we need to specify the traffic we are interested in seeing in an ACL;

Change the timezone in Cisco ACS 5.x

If you have mistakingly configured the wrong timezone in Cisco ACS during the build, and are concerned about changing the timezone in a production environment – you should be! I attempted this on ACS 5.8, only to spend a few hours restoring the server. My second attempt however, after conversing with TAC, went a lot

Cisco ASR1000 Packet Capture

Running packet capture on a router is, in my opinion, one of the best features Cisco provide. Most Cisco router platforms have the facility to run a packet capture on the box and here I demonstrate how to carry one out on any ASR1k platform such as the ASR1001, ASR1002, ASR1002x etc. First, we should

How to crack Cisco Type 5 (MD5) Passwords

Whilst Cisco’s type 7 passwords are incredibly easy to decrypt (PacketLife Tools is my goto), Type 5 passwords are currently not reversible… that does not however mean they are not susceptible to brute force attacks. Whilst its reasonably impractical to brute force a router’s login due to the amount of time it would take for

Cisco ASA, Email Alerts

This little used feature (at least in my experience) is actually quite useful and works with all ASA versions. The Cisco ASA 55xx Firewalls are actually able to send you an email based on *any* syslog’s that may be generated. This is very useful when you don’t run a syslog server, or just want some

Documentation IP Address's

Throughout all my posts I will be using IP addressing that is purposefully reserved globally for use in documentation, these ranges are; 192.0.2.0/24 (TEST-NET-1) 198.51.100.0/24 (TEST-NET-2) 203.0.113.0/24 (TEST-NET-3) You can read more about this in RFC5737 and I generally use these ranges to document internet connectivity in addition to the standard RFC1918 addressing for internal

Basic Cisco Template

I have a template that I apply each and every time I configure a Cisco router or switch. I find it disheartening that a lot of people don’t take the care and attention to disable unused services and secure the used one’s properly. You only have to do a simple search on SHODAN (free login