set syslog config “10.0.12.1”
set syslog config “10.0.12.1” facilities local0 local1
set syslog config “10.0.12.1” log traffic
set syslog config “10.0.12.1” transport tcp
set syslog src-interface untrust
set syslog enable
set log cli enable
Category Archives: Computer
Linux Serial Console – Grub
# If you change this file, run 'update-grub' afterwards to update # /boot/grub/grub.cfg. GRUB_DEFAULT=0 GRUB_TIMEOUT=1 GRUB_DISTRIBUTOR=`lsb_release -i -s 2> /dev/null || echo Debian` GRUB_CMDLINE_LINUX_DEFAULT="console=tty0 console=ttyS0,9600n8" # Uncomment to disable graphical terminal (grub-pc only) GRUB_TERMINAL=serial GRUB_SERIAL_COMMAND="serial --speed=9600 --unit=0 --word=8 --parity=no --stop=1" # The resolution used on graphical terminal # note that you can use only modes which your graphic card supports via VBE # you can see them in real GRUB with the command `vbeinfo' #GRUB_GFXMODE=640x480 # Uncomment if you don't want GRUB to pass "root=UUID=xxx" parameter to Linux #GRUB_DISABLE_LINUX_UUID=true
/etc/inittab
T0:2345:respawn:/sbin/getty -L ttyS0 9600 vt100
Exim
### auth/30_exim4-config_examples
plain:
driver = plaintext
public_name = PLAIN
client_send = "${if !eq{$tls_cipher}{}{\
^${extract{1}{::}\
{${lookup{$host}lsearch*{CONFDIR/passwd.client}{$value}fail}}}\
^${extract{2}{::}\
{${lookup{$host}lsearch*{CONFDIR/passwd.client}{$value}fail}}}\
}fail}"
login:
driver = plaintext
public_name = LOGIN
client_send = "${if !eq{$tls_cipher}{}{}fail}\
: ${extract{1}{::}\
{${lookup{$host}lsearch*{CONFDIR/passwd.client}{$value}fail}}} \
: ${extract{2}{::}\
{${lookup{$host}lsearch*{CONFDIR/passwd.client}{$value}fail}}}"
### transport/30_exim4-config_remote_smtp
remote_smtp:
debug_print = "T: remote_smtp for [EMAIL PROTECTED]"
driver = smtp
hosts_try_auth = DCsmarthost
### CONFDIR/passwd.client
smtp.1und1.com:m12345678-9:beispielpasswort
http://www.mail-archive.com/debian-user-german@lists.debian.org/msg67453.html
Cisco DHCP for secondary addresses
ip dhcp smart-relay
Subversion Homedir
Preparing the software:
apt-get install subversion libapache2-svn sudo mkdir /mnt/var/svn chown www-data:www-data -R /mnt/var/svn
Apache Config:
<Location /svn>
DAV svn
SVNParentPath /mnt/var/svn
<LimitExcept GET PROPFIND OPTIONS REPORT>
AuthType Basic
AuthName "Authorization Realm"
AuthUserFile /mnt/var/svn/svnauthusers.txt
Require valid-user
</LimitExcept>
</Location>
sudo htpasswd -c /mnt/var/svn/svnauthusers.txt patrick.preuss sudo chown www-data:www-data /mnt/var/svn/svnauthusers.txt
sudo svnadmin create /mnt/var/svn/patrick.preuss sudo chown www-data:www-data -R /mnt/var/svn/patrick.preuss
svn co http://10.0.12.10/svn/patrick.preuss
BASH inet_aton inet_ntoa
# aton and ntoa
function INET_NTOA() {
local IFS=. num quad ip e
num=$1
for e in 3 2 1; do
quad=$((256**$e))
ip[$((3-$e))]=$(($num/$quad))
num=$((num%quad))
done
ip[3]=${num}
echo "${ip[*]}"
}
function INET_ATON() {
local IFS=. ip num e
ip=($1)
for e in 3 2 1; do
num=$(($num+${ip[$((3-$e))]}*256**$e))
done
num=$(($num+${ip[3]}))
echo $(($num&0xFFFFFFFF))
}
Show windows cached credantials
rundll32.exe keymgr.dll, KRShowKeyMgr
i got my first juniper
It is a Netscreen 5gt. So now commands maybe usefull:
| Cisco IOS | Cisco PIX Cisco ASA |
Juniper Netscreen | Description |
|---|---|---|---|
| show configuration | show configuration | get config saved | get saved configuration |
| show running-config | show running-config | get config | get device configuration |
| save | to save changes to config | ||
| show version | show version | get system | gets system information, Netscreen mode |
| show ip inspect session | get session info | shows load on the firewall 85+ implies there will be some latency | |
| show interface sh ip interface |
get interface | shows interfaces, zones | |
| get address trust/unturst | shows defined network objects | ||
| show arp sh ip arp <interface> |
show arp | get arp | shows arp entries |
| show ip route | show route | get route | shows firewall routes |
| get service | shows firewall services | ||
| get group address | network groups | ||
| get group service | service groups | ||
| get policy in/out | shows applied firewall policies | ||
| get log traffic | shows firewall logs – options: based on src/dst/IP/port | ||
| no <command> | unset | to remove a config statement | |
| get user all | shows vpn users | ||
| get log event | shows vpn logs | ||
| get mip | shows one to one Nat’s | ||
| get vip | shows configured port forwarding rules | ||
| get route ip x.x.x.x | finds the specific route for an ip | ||
| set policy id xx | put you in a specific policy then you can add more objects it instead of creating a group |
Infoblox API
Download the API
wget –no-check-certificate https://10.0.136.180/api/dist/CPAN/authors/id/INFOBLOX/Infoblox-6.003000015125.tar.gz
Link depends on NIOS Version.
Windows 7 Packet Caputre
You have several options to capture packets on Windows 7 on is Wireshark the other is
netsh
[sourcecode]
C:\Users\rt01>netsh trace show scenarios
Verfügbare Szenarien (18):
AddressAcquisition : Problembehandlung in Zusammenhang mit der Adressenerfassung
DirectAccess : Problembehandlung in Zusammenhang mit DirectAccess
FileSharing : Allgemeine Datei- und Druckerfreigabeprobleme behandeln
InternetClient : Probleme mit der Webkonnektivität diagnostizieren
InternetServer : Behandeln von serverseitigen Webkonnektivitätsproblemen
L2SEC : Problembehandlung in Zusammenhang mit der Authentifizierung auf der 2. Schicht
LAN : Problembehandlung im Zusammenhang mit verkabelten LANs
Layer2 : Problembehandlung in Zusammenhang mit der Konnektivität auf der 2. Schicht
MBN : Problembehandlung in Zusammenhang mit mobilem Breitband
NDIS : Problembehandlung in Zusammenhang mit Netzwerkadaptern
NetConnection : Problembehandlung bei Netzwerkverbindungen
P2P-Grouping : Peer-zu-Peer-Gruppierungsprobleme behandeln
P2P-PNRP : Problembehandlung in Zusammenhang mit dem Peer Name Resolution-Protokoll (PNRP)
RemoteAssistance : Probleme mit der Windows-Remoteunterstützung behandeln
RPC : Probleme mit dem RPC-Framework beheben
WCN : Problembehandlung in Zusammenhang mit der Windows-Sofortverbindung
WFP-IPsec : Behandeln von Windows-Filterplattformproblemen und IPsec-bezogenen Problemen
WLAN : Problembehandlung in Zusammenhang mit drahtlosen LANs
[/sourcecode]
[sourcecode]
C:\Windows\system32>netsh trace start scenario=MBN capture=yes report=yes tracefile=c:\trace\trace.etl
Ablaufverfolgungskonfiguration:
Status: Wird ausgeführt
Ablaufverfolgungsdatei: C:\trace\trace.etl
Anfügen: Aus
Kreisförmig: Ein
Maximale Größe: 250 MB
Bericht: Ein
[/sourcecode]
[sourcecode]
netsh trace stop
[/sourcecode]
then you can use the Network Monitor NM