set syslog config “10.0.12.1”
set syslog config “10.0.12.1” facilities local0 local1
set syslog config “10.0.12.1” log traffic
set syslog config “10.0.12.1” transport tcp
set syslog src-interface untrust
set syslog enable
set log cli enable
Category Archives: Computer
Linux Serial Console – Grub
# If you change this file, run 'update-grub' afterwards to update # /boot/grub/grub.cfg. GRUB_DEFAULT=0 GRUB_TIMEOUT=1 GRUB_DISTRIBUTOR=`lsb_release -i -s 2> /dev/null || echo Debian` GRUB_CMDLINE_LINUX_DEFAULT="console=tty0 console=ttyS0,9600n8" # Uncomment to disable graphical terminal (grub-pc only) GRUB_TERMINAL=serial GRUB_SERIAL_COMMAND="serial --speed=9600 --unit=0 --word=8 --parity=no --stop=1" # The resolution used on graphical terminal # note that you can use only modes which your graphic card supports via VBE # you can see them in real GRUB with the command `vbeinfo' #GRUB_GFXMODE=640x480 # Uncomment if you don't want GRUB to pass "root=UUID=xxx" parameter to Linux #GRUB_DISABLE_LINUX_UUID=true
/etc/inittab
T0:2345:respawn:/sbin/getty -L ttyS0 9600 vt100
Exim
### auth/30_exim4-config_examples plain: driver = plaintext public_name = PLAIN client_send = "${if !eq{$tls_cipher}{}{\ ^${extract{1}{::}\ {${lookup{$host}lsearch*{CONFDIR/passwd.client}{$value}fail}}}\ ^${extract{2}{::}\ {${lookup{$host}lsearch*{CONFDIR/passwd.client}{$value}fail}}}\ }fail}" login: driver = plaintext public_name = LOGIN client_send = "${if !eq{$tls_cipher}{}{}fail}\ : ${extract{1}{::}\ {${lookup{$host}lsearch*{CONFDIR/passwd.client}{$value}fail}}} \ : ${extract{2}{::}\ {${lookup{$host}lsearch*{CONFDIR/passwd.client}{$value}fail}}}" ### transport/30_exim4-config_remote_smtp remote_smtp: debug_print = "T: remote_smtp for [EMAIL PROTECTED]" driver = smtp hosts_try_auth = DCsmarthost ### CONFDIR/passwd.client smtp.1und1.com:m12345678-9:beispielpasswort
http://www.mail-archive.com/debian-user-german@lists.debian.org/msg67453.html
Cisco DHCP for secondary addresses
ip dhcp smart-relay
Subversion Homedir
Preparing the software:
apt-get install subversion libapache2-svn sudo mkdir /mnt/var/svn chown www-data:www-data -R /mnt/var/svn
Apache Config:
<Location /svn> DAV svn SVNParentPath /mnt/var/svn <LimitExcept GET PROPFIND OPTIONS REPORT> AuthType Basic AuthName "Authorization Realm" AuthUserFile /mnt/var/svn/svnauthusers.txt Require valid-user </LimitExcept> </Location>
sudo htpasswd -c /mnt/var/svn/svnauthusers.txt patrick.preuss sudo chown www-data:www-data /mnt/var/svn/svnauthusers.txt
sudo svnadmin create /mnt/var/svn/patrick.preuss sudo chown www-data:www-data -R /mnt/var/svn/patrick.preuss
svn co http://10.0.12.10/svn/patrick.preuss
BASH inet_aton inet_ntoa
# aton and ntoa function INET_NTOA() { local IFS=. num quad ip e num=$1 for e in 3 2 1; do quad=$((256**$e)) ip[$((3-$e))]=$(($num/$quad)) num=$((num%quad)) done ip[3]=${num} echo "${ip[*]}" } function INET_ATON() { local IFS=. ip num e ip=($1) for e in 3 2 1; do num=$(($num+${ip[$((3-$e))]}*256**$e)) done num=$(($num+${ip[3]})) echo $(($num&0xFFFFFFFF)) }
Show windows cached credantials
rundll32.exe keymgr.dll, KRShowKeyMgr
i got my first juniper
It is a Netscreen 5gt. So now commands maybe usefull:
Cisco IOS | Cisco PIX Cisco ASA |
Juniper Netscreen | Description |
---|---|---|---|
show configuration | show configuration | get config saved | get saved configuration |
show running-config | show running-config | get config | get device configuration |
save | to save changes to config | ||
show version | show version | get system | gets system information, Netscreen mode |
show ip inspect session | get session info | shows load on the firewall 85+ implies there will be some latency | |
show interface sh ip interface |
get interface | shows interfaces, zones | |
get address trust/unturst | shows defined network objects | ||
show arp sh ip arp <interface> |
show arp | get arp | shows arp entries |
show ip route | show route | get route | shows firewall routes |
get service | shows firewall services | ||
get group address | network groups | ||
get group service | service groups | ||
get policy in/out | shows applied firewall policies | ||
get log traffic | shows firewall logs – options: based on src/dst/IP/port | ||
no <command> | unset | to remove a config statement | |
get user all | shows vpn users | ||
get log event | shows vpn logs | ||
get mip | shows one to one Nat’s | ||
get vip | shows configured port forwarding rules | ||
get route ip x.x.x.x | finds the specific route for an ip | ||
set policy id xx | put you in a specific policy then you can add more objects it instead of creating a group |
Infoblox API
Download the API
wget –no-check-certificate https://10.0.136.180/api/dist/CPAN/authors/id/INFOBLOX/Infoblox-6.003000015125.tar.gz
Link depends on NIOS Version.
Windows 7 Packet Caputre
You have several options to capture packets on Windows 7 on is Wireshark the other is
netsh
[sourcecode]
C:\Users\rt01>netsh trace show scenarios
Verfügbare Szenarien (18):
AddressAcquisition : Problembehandlung in Zusammenhang mit der Adressenerfassung
DirectAccess : Problembehandlung in Zusammenhang mit DirectAccess
FileSharing : Allgemeine Datei- und Druckerfreigabeprobleme behandeln
InternetClient : Probleme mit der Webkonnektivität diagnostizieren
InternetServer : Behandeln von serverseitigen Webkonnektivitätsproblemen
L2SEC : Problembehandlung in Zusammenhang mit der Authentifizierung auf der 2. Schicht
LAN : Problembehandlung im Zusammenhang mit verkabelten LANs
Layer2 : Problembehandlung in Zusammenhang mit der Konnektivität auf der 2. Schicht
MBN : Problembehandlung in Zusammenhang mit mobilem Breitband
NDIS : Problembehandlung in Zusammenhang mit Netzwerkadaptern
NetConnection : Problembehandlung bei Netzwerkverbindungen
P2P-Grouping : Peer-zu-Peer-Gruppierungsprobleme behandeln
P2P-PNRP : Problembehandlung in Zusammenhang mit dem Peer Name Resolution-Protokoll (PNRP)
RemoteAssistance : Probleme mit der Windows-Remoteunterstützung behandeln
RPC : Probleme mit dem RPC-Framework beheben
WCN : Problembehandlung in Zusammenhang mit der Windows-Sofortverbindung
WFP-IPsec : Behandeln von Windows-Filterplattformproblemen und IPsec-bezogenen Problemen
WLAN : Problembehandlung in Zusammenhang mit drahtlosen LANs
[/sourcecode]
[sourcecode]
C:\Windows\system32>netsh trace start scenario=MBN capture=yes report=yes tracefile=c:\trace\trace.etl
Ablaufverfolgungskonfiguration:
Status: Wird ausgeführt
Ablaufverfolgungsdatei: C:\trace\trace.etl
Anfügen: Aus
Kreisförmig: Ein
Maximale Größe: 250 MB
Bericht: Ein
[/sourcecode]
[sourcecode]
netsh trace stop
[/sourcecode]
then you can use the Network Monitor NM