09-04-2011
overwrite the startup config and reboot
You can overwrite the startup config and reboot the device. If you are doing your work remotely that is the only safe way. The config will not become active until you reboot. copy tftp start should work.
7 More Discussions You Might Find Interesting
1. Ubuntu
Hi,
I installed Ubnutu on my old laptop which does have COMM port, I want to connect to Cisco switch, I have Cisco cable connected to laptop.
On Windows, I usually bring up "Hyper Terminal" how do I do it here?
Please advice. Thanks. (7 Replies)
Discussion started by: samnyc
7 Replies
2. Shell Programming and Scripting
Happy ThanksGiving guys,
I'm working on a script that will use nmap to enumerate a network for active cisco switches. Once the list is complete, we use sed to clean up the file (called nmapres) so it is only a list of IP addresses. Next I want to use a while statement to go down that list of... (6 Replies)
Discussion started by: mitch
6 Replies
3. Shell Programming and Scripting
I am having trouble working with SNMP module with perl. I am trying to get SNMP version of target system. I use following code to get it however it resturns error as "Argument "v6.0.1" isn't numeric in numeric lt (<) at ./chk_env_upd.pl line 447."
Get load table
my $resultat =... (1 Reply)
Discussion started by: dynamax
1 Replies
4. Infrastructure Monitoring
Hello all!
I am running Nagios 3.3.1 and I am trying to get it to monitor the ports on my Cisco Catalyst 3524-XL-PWR Managed Switch. But I keep getting "(Return code of 127 is out of bounds - plugin may be missing)" I have installed and compiled the plugins and the snmp services on the Ubuntu... (0 Replies)
Discussion started by: RossIV
0 Replies
5. IP Networking
I've setup my Linux system, running Scientific Linux and ser2net, as a terminal server for my Cisco switches.
Logon and have fun!!
telnet 72.205.54.70 49001
telnet 72.205.54.70 49002
telnet 72.205.54.70 49003
For topology and updates go to http://labswitch.blogspot.com. Thanks! (3 Replies)
Discussion started by: yoda9999
3 Replies
6. Hardware
Recently, I want to see how to get a hold of a report showing the output/ configuration on my Catalyst 2960S 24 GigE, 2 x 10G SFP+ LAN Base switch ( basically, a report stating if all ports are functioning or not). Any help would be greatly appreciated. Thank you!
Cisco WS-C2960S-24TD-L Switch... (1 Reply)
Discussion started by: Ayaerlee
1 Replies
7. IP Networking
Hi,I want connect my ASA 5510 firewall to a 3750 switch with RIP routing. Unfortunately,I am having issues passing the VPN subnet through rip to the 3750.I don't understand how the routing table is populated on the ASA. Any suggestions? (0 Replies)
Discussion started by: Ayaerlee
0 Replies
APF(1) General Commands Manual APF(1)
NAME
apf - easy iptables based firewall system
SYNOPSIS
apf
DESCRIPTION
This manual page documents briefly the apf command. This manual page was written for the Debian distribution because the original program
does not have a manual page.
Advanced Policy Firewall (APF) is an iptables (netfilter) based firewall system designed around the essential needs of today's Internet
deployed servers and the unique needs of custom deployed Linux installations. The configuration of APF is designed to be very informative
and present the user with an easy to follow process, from top to bottom of the configuration file. The management of APF on a day-to-day
basis is conducted from the command line with the 'apf' command, which includes detailed usage information and all the features one would
expect from a current and forward thinking firewall solution.
OPTIONS
apf follow the usual GNU command line syntax, with long options starting with two dashes (`-'). A summary of options is included below.
-s|--start
load all firewall rules
-r|--restart
stop (flush) & reload firewall rules
-l|--list
list all firewall rules
-t|--status
output firewall status log
-e|--refresh
refresh & resolve dns names in trust rules
-a <HOST CMT|--allow <HOST COMMENT>
add host (IP/FQDN) to allow_hosts.rules and immediately load new rule into firewall
-d <HOST CMT|--deny <HOST COMMENT>
add host (IP/FQDN) to deny_hosts.rules and immediately load new rule into firewall
-u <HOST>|--remove <HOST>
remove host from [glob]*_hosts.rules and immediately remove rule from firewall
-o|--ovars
output all configuration options
COPYRIGHT
Copyright (C) 1999-2007, R-fx Networks <proj@r-fx.org>
Copyright (C) 2007, Ryan MacDonald <ryan@r-fx.org> This program may be freely redistributed under the terms of the GNU GPL
This manual page was written by Giuseppe Iuculano <giuseppe@iuculano.it>, for the Debian project (but may be used by others).
August 17, 2008 APF(1)