08-05-2011
cisco switch + firewall configuration upgrade
Hi experts,
I need to cope configuration from one switch/firewall to another switch/firewall.
I have copied running configs.
The question is do I have to clear the existing configuration on the dest. devices
Or can I copy it(replace) directly without clearing previous config ?
If clearing is needed how shall I do it?
PS : destination devices already contain configuration
Thanks
Last edited by hernand; 08-05-2011 at 08:47 AM..
7 More Discussions You Might Find Interesting
1. Ubuntu
Hi,
I installed Ubnutu on my old laptop which does have COMM port, I want to connect to Cisco switch, I have Cisco cable connected to laptop.
On Windows, I usually bring up "Hyper Terminal" how do I do it here?
Please advice. Thanks. (7 Replies)
Discussion started by: samnyc
7 Replies
2. Shell Programming and Scripting
Happy ThanksGiving guys,
I'm working on a script that will use nmap to enumerate a network for active cisco switches. Once the list is complete, we use sed to clean up the file (called nmapres) so it is only a list of IP addresses. Next I want to use a while statement to go down that list of... (6 Replies)
Discussion started by: mitch
6 Replies
3. Shell Programming and Scripting
I am having trouble working with SNMP module with perl. I am trying to get SNMP version of target system. I use following code to get it however it resturns error as "Argument "v6.0.1" isn't numeric in numeric lt (<) at ./chk_env_upd.pl line 447."
Get load table
my $resultat =... (1 Reply)
Discussion started by: dynamax
1 Replies
4. Infrastructure Monitoring
Hello all!
I am running Nagios 3.3.1 and I am trying to get it to monitor the ports on my Cisco Catalyst 3524-XL-PWR Managed Switch. But I keep getting "(Return code of 127 is out of bounds - plugin may be missing)" I have installed and compiled the plugins and the snmp services on the Ubuntu... (0 Replies)
Discussion started by: RossIV
0 Replies
5. IP Networking
I've setup my Linux system, running Scientific Linux and ser2net, as a terminal server for my Cisco switches.
Logon and have fun!!
telnet 72.205.54.70 49001
telnet 72.205.54.70 49002
telnet 72.205.54.70 49003
For topology and updates go to http://labswitch.blogspot.com. Thanks! (3 Replies)
Discussion started by: yoda9999
3 Replies
6. Hardware
Recently, I want to see how to get a hold of a report showing the output/ configuration on my Catalyst 2960S 24 GigE, 2 x 10G SFP+ LAN Base switch ( basically, a report stating if all ports are functioning or not). Any help would be greatly appreciated. Thank you!
Cisco WS-C2960S-24TD-L Switch... (1 Reply)
Discussion started by: Ayaerlee
1 Replies
7. IP Networking
Hi,I want connect my ASA 5510 firewall to a 3750 switch with RIP routing. Unfortunately,I am having issues passing the VPN subnet through rip to the 3750.I don't understand how the routing table is populated on the ASA. Any suggestions? (0 Replies)
Discussion started by: Ayaerlee
0 Replies
LEARN ABOUT DEBIAN
ipkungfu
ipkungfu(8) System Manager's Manual ipkungfu(8)
NAME
ipkungfu - An iptables-based firewall for Linux
SYNOPSIS
ipkungfu [ -c ] [ -t ] [ -d ] [ -h ] [ -v ] [ --quiet ] [ --panic ] [ --no-caching
DESCRIPTION
ipkungfu is an iptables-based Linux firewall. The primary design goals are security, ease of use, and performance, in that order. It takes
advantage of advanced features of iptables, tcpwrappers, and the Linux kernel. It also simplifies the configuration of internet connection
sharing, advanced routing, and other networking needs.
OPTIONS
-c (or --check)
Check whether ipkungfu is loaded, and report any command line options it may have been loaded with.
-t (or --test)
Runs a configuration test, and displays the results. Note that this does not test or display all configuration options. This
gives you an opportunity to verify that major configuration options are correct before putting them into action.
-d (or --disable)
Disables the firewall. It is important to know exactly what this option does. All traffic is allowed in and out, and in the
case of a gateway, all NATed traffic is forwarded (the option retains your connection sharing options). Custom rules are not
implemented, and deny_hosts.conf is ignored.
-f (or --flush)
Disables the firewall COMPLETELY. All rules are flushed, all chains are removed. Any port forwarding or internet connection
sharing will cease to work.
-h (or --help)
Displays brief usage information and exits.
-v (or --version)
Displays version information and exits.
--quiet Runs ipkungfu with no standard output
--panic Drops ALL traffic in all directions on all network interfaces. You should probably never use this option. The --panic option
is available for the highly unusual situation where you know that an attack is underway but you know of no other way to stop
it.
--failsafe If ipkungfu fails, --failsafe will cause all firewall policies to revert to ACCEPT. This is useful when working with ipkungfu
remotely, to prevent loss of remote access due to firewall failure.
--no-caching
Disables rules caching feature.
FILES
/etc/ipkungfu/ipkungfu.conf
/etc/ipkungfu/advanced.conf
/etc/ipkungfu/accept_hosts.conf
/etc/ipkungfu/deny_hosts.conf
/etc/ipkungfu/custom.conf
/etc/ipkungfu/log.conf
/etc/ipkungfu/redirect.conf
/etc/ipkungfu/services.conf
/usr/sbin/ipkungfu
/usr/share/doc/ipkungfu/AUTHORS
/usr/share/doc/ipkungfu/README
/usr/share/doc/ipkungfu/FAQ
/usr/share/doc/ipkungfu/ChangeLog
/usr/share/doc/ipkungfu/COPYING
SEE ALSO
iptables(8).
January 2003 ipkungfu(8)