Archive

Archive for the ‘CISCO’ Category

WCCP Service Groups

August 7th, 2010 No comments

The routers and WAEs participating in the same service constitute a service group. A service group defines a set of characteristics about what types of traffic should be intercepted, as well as how the intercepted traffic should be handled. There are two types of service groups:

  • Well-known services
  • Dynamic services

Well-known services, also referred to as static services, have a fixed set of characteristics that are known by both IOS and WCCPv2 client devices. Read more…

Categories: Network Design Tags:

Active versus Passive FTP

July 21st, 2010 No comments

Active FTP:

In active mode FTP the client connects from a random unprivileged port (N > 1023) to the FTP server’s command port, port 21. Then, the client starts listening to port N+1 and sends the FTP command PORT N+1 to the FTP server. The server will then connect back to the client’s specified data port from its local data port, which is port 20.

From the server-side firewall’s standpoint, to support active mode FTP the following communication channels need to be opened:

* FTP server’s port 21 from anywhere (Client initiates connection)
* FTP server’s port 21 to ports > 1023 (Server responds to client’s control port)
* FTP server’s port 20 to ports > 1023 (Server initiates data connection to client’s data port)
* FTP server’s port 20 from ports > 1023 (Client sends ACKs to server’s data port)

Passive FTP:

In order to resolve the issue of the server initiating the connection to the client a different method for FTP connections was developed. This was known as passive mode, or PASV, after the command used by the client to tell the server it is in passive mode.

In passive mode FTP the client initiates both connections to the server, solving the problem of firewalls filtering the incoming data port connection to the client from the server. When opening an FTP connection, the client opens two random unprivileged ports locally (N > 1023 and N+1). The first port contacts the server on port 21, but instead of then issuing a PORT command and allowing the server to connect back to its data port, the client will issue the PASV command. The result of this is that the server then opens a random unprivileged port (P > 1023) and sends the PORT P command back to the client. The client then initiates the connection from port N+1 to port P on the server to transfer data.

Active-vs-Passive-FTP

From the server-side firewall’s standpoint, to support passive mode FTP the following communication channels need to be opened:

* FTP server’s port 21 from anywhere (Client initiates connection)
* FTP server’s port 21 to ports > 1023 (Server responds to client’s control port)
* FTP server’s ports > 1023 from anywhere (Client initiates data connection to random port specified by server)
* FTP server’s ports > 1023 to remote ports > 1023 (Server sends ACKs (and data) to client’s data port)

ftp-active-passive-mode

Categories: Network Design, Security Tags:

Riverbed Steelhead through Cisco ASA

July 20th, 2010 No comments

Introduction

Riverbed Steelhead as WAN accelerator is deployed in WAN environment when traffic between WAN network (i.e. MPLS, Frame Relay) need to be optimized, hence creating so-called “WAN acceleration”. With “standard” WAN network consists of WAN routers and LAN switches, typically the Riverbed Steelhead is in place inline between the WAN routers and LAN switches.  The f9llowing is an illustration: Read more…

Categories: CISCO Tags:

IOS Image Verification

July 13th, 2010 No comments

The Image Verification feature, added in Cisco IOS Software Releases 12.3(4)T, 12.0(26)S, and 12.2(18)S, builds on the MD5 File Validation functionality to more easily allow network administrators to verify the integrity of an image file that is loaded on the Cisco IOS file system of a device. Read more…

Categories: CISCO Tags:

Case Study – Largest VoIP Deployment in the Industry (Cisco’s own VoIP Network)

May 21st, 2010 No comments

This PDF describes the deployment strategy in detail, including planning, deployment and lessons learned.  A very useful document if you are planning a large VoIP upgrade or installation.  VIEW PDF

Categories: Network Design, Voice over IP Tags:

Configuring IPSec tunnel between two LANs using the same subnet

May 15th, 2010 No comments

How to set up an IPSec tunnel between two LANs using the same subnet.

Conflicting LAN IP subnets can cause difficulties when routing through a tunnel.  This configuration uses NAT to overcome the problem of duplicate addresses: Read more…

Categories: CISCO, Network Design, Security Tags: ,

NetFlow Export

May 9th, 2010 No comments

NetFlow Export Version Formats

For all export versions, the NetFlow export datagram consists of a header and a sequence of flow records. The header contains information such as sequence number, record count, and system uptime. Read more…

Categories: CISCO, Network Management Tags:

Voice – Packet Overhead

April 27th, 2010 No comments

Planning for Voice over IP requires an understanding of the various headers added when transporting packetised voice, espcially over an IPSec VPN: Read more…

Categories: Network Design, QoS, Voice over IP Tags: , ,

The Capture Buffer (or “sniffing”) on Cisco IOS

April 25th, 2010 No comments

A great alternative to SPAN and RSPAN, is to use the actual IOS itself as the packet sniffer! Capture traffic from the CLI and when you need to, export the data as a “.cap” (Wireshark, etc) file. to your PC. Read more…

Categories: CISCO Tags:

QoS – Ingress and Egress Queuing using 2Q3T or 1P1Q3T

April 20th, 2010 No comments

1P1Q3T – ingress queuing
As switch platforms have architectures based on oversubscription, they have been engineered to guarantee QoS by protecting critical traffic trying to access the backplane/stack-ring via ingress queuing. Read more…

Categories: CISCO, QoS Tags: