Archive

Posts Tagged ‘CISCO’

Recovering an IOS using TFTP and Xmodem

July 8th, 2009 No comments

Have you lost or corrupted an IOS?  These procedures descibe:

  • How to recover an IOS from rommon using TFTP
  • How to recover an IOS from switch: prompt using Xmodem Read more…
Categories: CISCO Tags:

Difference Between STP BPDU Guard and STP Root Guard

July 8th, 2009 No comments

BPDU guard and root guard are similar, but their impact is different. BPDU guard disables the port upon BPDU reception if PortFast is enabled on the port. Read more…

Categories: CISCO Tags:

Configure SSH on Cisco Router

July 8th, 2009 No comments

This is the minimum configuration needed to support inbound SSH sessions on a router (you might want to add transport input ssh to the line configuration if you want to disable telnetaccess to the router): Read more…

Categories: CISCO, Security Tags:

QoS – Throttle Bandwidth Based on the Time of Day

July 8th, 2009 No comments

Scenario: Say a device in your network performs incremental backups out to a server on the internet.  These backups consume bandwidth and ruin the quality of your VoIP calls.  You wish to throttle the bandwidth for this server traffic between 6 and 10pm (when you feel you need good phone quality). Read more…

Categories: CISCO Tags:

TCL Script to ping a number of IPs

July 8th, 2009 No comments

This is a handy TCL scipt if you need to ping lots of IP addresses.  If your router supports TCL you can:

Enable TCL on router: R1#tclsh

Quit TCL: R1#tclquit

TCL SCRIPT FOLLOWS: Read more…

Categories: CISCO Tags:

Setup MRTG to monitor QoS Policies

July 3rd, 2009 No comments

NOTE: investigate “snmp mib persistant” command on IOS.

here is a “how to” for monitoring QoS with MRTG: Read more…

Categories: MRTG Tags: ,

Configure TACACS+ for Admin Logins

July 3rd, 2009 No comments

How to configure IOS device for authentication to TACACS server for administrative logins: Read more…

Categories: CISCO, Security Tags:

Recovering Hidden PIX Pre-Shared Keys / Passwords

July 3rd, 2009 No comments

The latest Cisco TAC Newsletter had an interesting tip on recovering hidden pre-shared keys (which I’ve needed to do many times). So simple, it’s brilliant :) here’s the reprint: Read more…

Categories: CISCO, Security Tags: ,

IOS Configuration Lock

July 3rd, 2009 No comments

How to avoid two people making changes to the configuration at the same time

The only command you need to use is the configuration mode exclusive {auto | manual} from global configuration mode.

  • The auto keyword automatically locks the configuration session whenever the configure terminal command is used and this is the default option.
  • The inverse manual keyword allows you to choose to lock the configuration session manually or simply leave it unlocked.

Here is how to do it: Read more…

Categories: CISCO Tags:

Annotating Troubleshooting Sessions

July 3rd, 2009 No comments

When capturing log sessions during an outage or debug session it’s crucial to keep a history of what was done when and in what order. This helps in post mortem analysis after the event or session is over. There are a couple of standard things to do to help this such as:

  • NTP time sync all devices in the network to get them on a single time source
  • Enable syslog for all devices in the network
  • Allocate some local log space on each local device based on a percentage of free memory available on the device
  • Always have trend graphs from some polling mechanism for CPU levels, memory usage, traffic rates, etc.

In addition to these here are a few other tips that really help TAC analyse log and debug sessions that are collected: Read more…

Categories: CISCO Tags: