8 More Discussions You Might Find Interesting
1. IP Networking
Q: "Does Cisco 1921 router support,, act as an endpoint for, site to site VPNs using IPSec? If so, how many? "
A: If you get the Cisco 1921/k9 with the security services bundle then it will have built in security features. Cisco, typically includes IP Sec tunnels I believe as part of that... (0 Replies)
Discussion started by: Ayaerlee
0 Replies
2. IP Networking
Hey everyone,
I have a few question.
1. Is it possible to display cisco 'show run' output command to the application ??
2. And is there any ways to log in to the router instead of using telnet from telnet application???
Thanks in advance (0 Replies)
Discussion started by: franzramadhan
0 Replies
3. IP Networking
Hello all,
I have set up dhcpd on a linux box for serving subnets on multiple vlans configured on a Cisco 6500 with ip helper of the dhcp server. Servers get dhcp leases just fine, however, some machines lose their connection for reboot or what not and I can not get their lease back even though... (0 Replies)
Discussion started by: closedown
0 Replies
4. IP Networking
Hello,
Does anyone know where I can find configuration information on setting up
a dial in VPN on Cicso IOS for a bunch of servers.
Could not seem to find anything in search engines.
Thanks (0 Replies)
Discussion started by: photon
0 Replies
5. IP Networking
I have a zebra router configured....which is working correctly......But I want zebra to not send the data to multicast address 224.0.0.5.....but directly only to my IP...Is there a way to do this....I read that in NBMA networks the message are not sent to the multicast address.
Any idea or any... (2 Replies)
Discussion started by: cosmic_egg
2 Replies
6. IP Networking
Dear All,
I have worked with xDSL routers working in bridged mode, and linux behind them working as a Firewall utilizing IPTABLES. My question is, how this will change if the xDSL router is replaced with a Cisco Router?
I mean to ask that, can I assign a public ip on the linux machine, which... (0 Replies)
Discussion started by: tmm
0 Replies
7. Shell Programming and Scripting
All
Please help, i will telnet to router to obain the ping status and compare, if higher than normal latency, i will have further action..
if i do the telent and in perl script then ....
e.g the result i obtain from the router will be =' Success rate is 100 percent (5/5), round-trip... (4 Replies)
Discussion started by: optimus
4 Replies
8. UNIX for Advanced & Expert Users
Hi All,
I am connected to a cisco router and I want to know the hostname of this router.
I connect as telnet <IPADDRESS>
and the prompt shows
vpnaccess-bristol>
But I want to know the full hostname of the router how can i do that.
When i type the hostname command the following... (3 Replies)
Discussion started by: rahulrathod
3 Replies
RAPOLICY(1) General Commands Manual RAPOLICY(1)
NAME
rapolicy - compare a argus(8) data file/stream against a Cisco Access Control List.
COPYRIGHT
Copyright (c) 2000-2003 QoSient. All rights reserved.
SYNOPSIS
rapolicy -r argus-file [ra options]
DESCRIPTION
Rapolicy reads argus data from an argus-file list, and tests the argus data stream against a Cisco access control list configuration file,
printing out records that represent activity that would violate the policy. Rapolicy can be used to indicate access control violations, as
well as test new access control definitions prior to installing them in a router.
OPTIONS
Rapolicy, like all ra based clients, supports a large number of options. Options that have specific meaning to rapolicy are:
-f <Cisco ACL file> Print records that violate the policy.
-D 0 (default) Print records that violate the policy.
-D 1 Print records and the violated ruleset.
-D 2 Print all records and the ruleset that matched.
See ra(1) for a complete description of ra options.
EXAMPLE INVOCATION
rapolicy -r argus.file
CISCO ACL SYNTAX
There does not seem to be authoritative Cisco-ACL-Documentation, nor ACL syntax standardization. Because Cisco has been know to improve
its ACL rules syntax, rapolicy is known to work with Cisco ACL router defintions up to July, 2002.
A Cisco ACL configuration file consists of a collection of any number of ACL statements, each on a separte line. The syntax of an ACL
statement is:
ACL = "access-list" ID ACTION PROTOCOL SRC DST NOTIFICATION
ID = Number
ACTION = permit | deny
PROTO = protocol name | protocol number
SRC | DST = ADDRESS [PORTMATCH]
ADDRESS = any | host HOSTADDR | HOSTADDR HOSTMASK
HOSTADDR = ipV4 address
HOSTMASK = matching-mask
PORTMATCH = PORTOP PORTNUM | range PORTRANGE
PORTOP = eq | lt | gt | neq | established
PORTRANGE = PORTNUM PORTNUM
PORTNUM = TCP or UDP port value (unsigned decimal from 0 to 65535)
EXAMPLE CONFIGURATION
This example Cisco Access Control List configuration is provided as an example only. No effort has been made to verify that this example
Access Control List enforces a useful access control policy of any kind.
#allow www-traffic to webserver
access-list 102 permit tcp any 193.174.13.99 0.0.0.0 eq 80
#allow ftp control connection to server
access-list 102 permit tcp any 193.174.13.99 0.0.0.0 eq 21
#allow normal ftp
access-list 102 permit tcp any 193.174.13.99 0.0.0.0 eq 20
#allow ftp passive conncetions in portrange 10000 to 10500
access-list 102 permit tcp any host 193.174.13.99 range 10000 10500
#dummy example
access-list 102 permit tcp host 193.174.13.1 eq 12345 host 193.174.13.2 range 12345 23456
#deny the rest
access-list 102 deny tcp any any
#same thing in other words:
access-list 102 deny tcp 0.0.0.0 255.255.255.255 0.0.0.0 255.255.255.255
AUTHORS
Carter Bullard (carter@qosient.com).
Olaf Gellert (gellert@pca.dfn.de).
SEE ALSO
ra(1), rarc(5), argus(8)
22 July 2002 RAPOLICY(1)