Cisco ASA and Tacacs+

How to use Tacacs+ on Cisco ASA for Shell and Web Authentication Assume the Tacacs+ Servers are: Cisco ACS Server 1 10.120.10.11 Cisco ACS Server 2 10.120.10.12 If you have allready configured aaa for the ssh you might see something like Then you must first disable the aaa authentication and than add the new settings. …

Cisco ASA and SMTP

We recently bought so new Firewalls to replace to aged Cisco PIX515e with some new Gear. We decided to use Ciscos new Firewall flagship the Cisco ASA Devices. Everything was fine after the replacement, we transfered the configuration from the old boxes to the new with the help of the Cisco Security Manager. Later that …

Cisco WAAS and Tacacs+

How To use Tacacs+ with Cisco WAAS for Authentication. Configuration with the Central Manager Tacacs+ is configured in the Device Context at Configure > Security > AAA > TACACS+ Go to Configure > Security > AAA > Authentication Methods Go to Configure > Security > AAA > Command Authorization On the Accelerator CLI tacacs key …

DMVPN with Linux

I know since i discovered the DMVPN in 2004/5 this is a very intelligent combination of IPsec, GRE and NHRP. Many Thanks to the Guys at Cisco, Christoph, Frederick and all other. This week i discovered "opennhrp" on sourceforge. It took me a minute or two to have a VM with debian up and the …

Cisco Visio Icons

Recently i have been asked to hold a presentation about the network design we had developed for our key project. My Company had decided to unify the computing infrastucture and client enviroment for all relateted companies.  So i will do a presentation on Cisco WAAS Platform on Tuesday next week, and i needed uptodate visio stencils …

Cisco IOS CLI Modes

  Cisco IOS CLI Modes EXEC Prompt  Router> enable Privileged EXEC Prompt Router# configure terminal Gobal Configuration Mode Router(config)# interface FastEthernet0/0   Configuration Modes Interface Configuration Mode Router(config-if)#interface FastEthernet 0/0.1 SubInterface Configuration Mode Router(config-subif)# line console 0 Line Configuration Mode Router(config-line)#  Controller Configuration Mode Router(config-controller)# router rip Router Configuration Mode Router(config-router)#end

Packetcapture auf der WAAS

Kürzlich hab ich entdeckt das man auf der WAAS Packete mit schneiden kann. Auf der WAE ist tcpdump installiert, den kann man in der gewohnten weise zum sniffern gebrauchen. # tcpdump -s 0 -w /local1/out.pcap # copy disk ftp a.x.y.z / out.pcap /local1/out.pcap # delfile /local1/out.pcap Der Rest ist dann ganz normale Arbeit für wireshark.