Showing posts with label Technology. Show all posts
Showing posts with label Technology. Show all posts

Wednesday, June 1, 2022

CISA, the Federal Bureau of Investigation (FBI), the Department of Treasury, and the Financial Crimes Enforcement Network (FinCEN)

CISA, the Federal Bureau of Investigation (FBI), the Department of Treasury, and the Financial Crimes Enforcement Network (FinCEN) have released a joint Cybersecurity Advisory (CSA) to provide information on the Karakurt data extortion group. Karakurt actors steal data and threaten to auction it off or release it to the public unless they receive payment of the demanded ransom.

https://us-cert.cisa.gov/ncas/current-activity/2022/06/01/karakurt-data-extortion-group

Friday, May 6, 2022

Tech Tip Fortigate

 If you are like me the industry standard has turned to MFA (Multi Factor Authentication) for Administrative Accounts or connecting via VPN. 

I like and use Fortinet and the FortiGate's NGFW Systems. I was having issues with using LDAP accounts being able to bypass vpn connections with just the standard Windows Account. To be honest it would allow them to connect without a token never even prompting them for the token. 

You have to turn set username-sensitivity disable under the users profile in the CLI. 

Here is an example. 


Hope this helps some admins it was kind of a head scratcher for me. 


Python Cheat Sheet

 



Thursday, May 5, 2022

Microsoft warns Exchange Online basic auth will be disabled

 Microsoft warned customers today that it will start disabling Basic Authentication in random tenants worldwide on October 1, 2022.

This reminder comes after the company's September announcement and after seeing that there are still lots of customers who haven't yet moved their clients and apps to Modern Authentication.

Full Story @ https://www.bleepingcomputer.com/news/microsoft/microsoft-warns-exchange-online-basic-auth-will-be-disabled/?fbclid=IwAR3ujn2Ao-RzIaD27spzlU4fjVqUyv83nPAqPnrMTgPsrGo6VsjH92JesDs


Tuesday, January 12, 2021

Cloud or No Cloud?

 

Since the whole political thing has happened, Cloud computing companies have flexed their muscles. If you do not agree with them, they “do the woke thing” and turn your account off and businesses/lifestyle must change.

Well yes, they are a private company and can control user information they processed to what you see. At the same time, they listen or record keywords in your conversations though the microphones, searches to solicitate products to you. Then sell that information to advertisers to create a data pool for them to focus on you.

So, they as big tech data warehouses sell your information as the Dark Web sells your personal information. I can go buy a credit card on the Dark Web if your credit score is above what I choose.

Now let us reverse this, I own a drugstore, and a young lady comes in to buy a morning after pill, and I refuse to sell it to her because I think it is wrong to do so and I say to that person I am not going to sell this to her because of just a made-up story I thought she was creating. (I am not agreeing either way just an example the person could have been raped) No matter what it is an over-the-counter drug now. No questions asked. Then she goes and complains that she did not get it because someone at a pharmacy said no.

While being wrong “the drugstore” gets huge number of bad reviews and then the cloud company that hosted the site kills the businesses website and communication with the customers. While at the same time it was one employee that created the issue and was fired, they cannot correct or communicate what happened.

What I am saying is do not put your eggs in one simple basket. Your convenience might lead to your downfall.

Friday, December 18, 2020

Procedures for proper Digital Forensic Research.


First of use a computer system just for the recovery and not an everyday used computer. After each use of research wipe the computer with Eraser or Minitool with a low-level destruction algorithm (DoD Complaint).  

Next sandbox the computer from any network or internet connection. 

Depending on the device I use Autopsy with plug-ins from Video Triage and the LEO Version of BIN Recovery and a few others. I copy them to a usb drive and install them on the newly reloaded computer. 

Judging from the data or type of device I am having to analyze it from, I create an image of it or a backup of the data type.

Then I process all plug-ins in Autopsy the following is mostly pay more attention too; Keyword Search, Deleted Files, Video Triage, Image Processor, and the Law Enforcement plug-in. 

Depending on the case I would suggest getting a copy of Recuva to also process recovery files. 

 Autopsy will provide you with really reporting tools. Such as meta-data, (Time, Locations) Also you can generate a detailed report of information down to a single day, month, time. 

Then I run the reporting tools finalize the case move all information to external drive and encrypt it, to be handed over to the customer.


Friday, September 25, 2020

The Windows XP source code was allegedly leaked online

 The source code for Windows XP SP1 and other versions of the operating system was allegedly leaked online today.

The leaker claims to have spent the last two months compiling a collection of leaked Microsoft source code. This 43GB collection was then released today as a torrent on the 4chan forum .

For more information visit; Bleeping Computer

Microsoft confirms Group Policy Editor bug in Windows Server 2016

 Microsoft has confirmed that a bug in Windows 10 version 1607 and Windows Server 2016 is causing the Group Policy Editor to display errors.

In our September 2020 Windows health report, we reported that Windows 10 1607 and Windows Server 2016 users were experiencing errors when opening the the Security Options MMC in the group policy editor.

For More Information visit; Bleepingcomputer.com

Unpatched Domain Controllers Remain Vulnerable to Netlogon Vulnerability, CVE-2020-1472

 The Cybersecurity and Infrastructure Security Agency (CISA) is aware of active exploitation of CVE-2020-1472, an elevation of privilege vulnerability in Microsoft’s Netlogon. A remote attacker can exploit this vulnerability to breach unpatched Active Directory domain controllers and obtain domain administrator access. Applying patches from Microsoft’s August 2020 Security Advisory for CVE-2020-1472 can prevent exploitation of this vulnerability.

CISA has released a patch validation script to detect unpatched Microsoft domain controllers. CISA urges administrators to patch all domain controllers immediately—until every domain controller is updated, the entire infrastructure remains vulnerable. Review the following resources for more information:


For more information visit the site below.

https://us-cert.cisa.gov/ncas/current-activity/2020/09/24/unpatched-domain-controllers-remain-vulnerable-netlogon


Friday, September 29, 2017

Configuring Cisco Interfaces

I ran into a small issue the other day. I upgraded our network connections speed from our host, and I was not getting the speed I was suppose too. Turns out my ip-based switch port speed was throttled.
If you ever run into this change around the port speed on your router.




interface GigabitEthernet0/0
 switchport access vlan 2
 switchport mode access
 speed 100
 duplex full

Notice the highlighted speed in the config.

corerouter#config t
Enter configuration commands, one per line.  End with CNTL/Z.
corerouter(config)#
corerouter(config)#interface GigabitEthernet0/0
corerouter(config)#speed auto 
ctrl+z
corerouter#wr
corerouter#reload



Tuesday, September 19, 2017

Getting To Know Powershell

First off Windows Domain Admins need to get really familiar with the Powershell Administration. 
Let's start off with a couple examples. By the way you can install the Windows PowerShell ISE in add and remove Windows options. 

Knowing what FSMO Roles about you AD environment.
Here is the script.

Retrieving Active Directory FSMO roles with PowerShell
$dom = [System.DirectoryServices.ActiveDirectory.Domain]::getcurrentdomain()
$dom | Format-List *
Transferring Active Directory FSMO roles with PowerShell
$dom = [System.DirectoryServices.ActiveDirectory.Domain]::getcurrentdomain()
$dc = $dom.FindDomainController()
$dc.TransferRoleOwnership(’PdcRole’)
$dc.TransferRoleOwnership(’InfrastructureRole’)
Raising Active Directory Domain and Forest functionality to Windows 2003 with PowerShell
$dom = [System.DirectoryServices.ActiveDirectory.Domain]::getcurrentdomain()
$dom.RaiseDomainFunctionality(’Windows2000NativeDomain’)
$dom.RaiseDomainFunctionality(’Windows2003Domain’)
Enabling and disabling a Global Catalog server with PowerShell
$for = [System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest()
$gc = $for.FindGlobalCatalog()
$gc.DisableGlobalCatalog()
$gc.EnableGlobalCatalog()


Also if you are like me, I am always looking to clean up unneeded data on your WSUS server. 

#Region VARIABLES
 # WSUS Connection Parameters:
[String]$updateServer = "wsusserver.nrgnetworks.local"
[Boolean]$useSecureConnection = $False
[Int32]$portNumber = 80

# Cleanup Parameters:
# Decline updates that have not been approved for 30 days or more, are not currently needed by any clients, and are superseded by an aproved update.
[Boolean]$supersededUpdates = $True
# Decline updates that aren't approved and have been expired my Microsoft.
[Boolean]$expiredUpdates = $True
# Delete updates that are expired and have not been approved for 30 days or more.
[Boolean]$obsoleteUpdates = $True
# Delete older update revisions that have not been approved for 30 days or more.
[Boolean]$compressUpdates = $True
# Delete computers that have not contacted the server in 30 days or more.
[Boolean]$obsoleteComputers = $True
# Delete update files that aren't needed by updates or downstream servers.
[Boolean]$unneededContentFiles = $True

#EndRegion VARIABLES

#Region SCRIPT

# Load .NET assembly
[void][reflection.assembly]::LoadWithPartialName("Microsoft.UpdateServices.Administration")

# Connect to WSUS Server
$Wsus = [Microsoft.UpdateServices.Administration.AdminProxy]::getUpdateServer($updateServer,$useSecureConnection,$portNumber)

# Perform Cleanup
$CleanupManager = $Wsus.GetCleanupManager()
$CleanupScope = New-Object Microsoft.UpdateServices.Administration.CleanupScope($supersededUpdates,$expiredUpdates,$obsoleteUpdates,$compressUpdates,$obsoleteComputers,$unneededContentFiles)
$CleanupManager.PerformCleanup($CleanupScope)

#EndRegion SCRIPT


Cisco Show Commands

You will learn most information on your Cisco device will easy to gather from simple show commands. Everything from sessions to configs. Also Traffic Statistics for errors, or DDoS Attacks. 

Example
ciscoasa# show traffic
OUTSIDE:
        received (in 2395890.690 secs):
                317946819 packets       315525385708 bytes
                0 pkts/sec      131000 bytes/sec
        transmitted (in 2395890.690 secs):
                280139669 packets       79618073485 bytes
                0 pkts/sec      33001 bytes/sec
      1 minute input rate 218 pkts/sec,  142346 bytes/sec
      1 minute output rate 192 pkts/sec,  45133 bytes/sec
      1 minute drop rate, 7 pkts/sec
      5 minute input rate 164 pkts/sec,  109398 bytes/sec
      5 minute output rate 153 pkts/sec,  35406 bytes/sec
      5 minute drop rate, 6 pkts/sec
INSIDE:
        received (in 2395890.690 secs):
                255240733 packets       76128164260 bytes
                0 pkts/sec      31000 bytes/sec
        transmitted (in 2395890.690 secs):
                294891373 packets       247485048480 bytes
                1 pkts/sec      103001 bytes/sec
      1 minute input rate 196 pkts/sec,  44396 bytes/sec
      1 minute output rate 234 pkts/sec,  142469 bytes/sec
      1 minute drop rate, 5 pkts/sec
      5 minute input rate 158 pkts/sec,  35241 bytes/sec
      5 minute output rate 178 pkts/sec,  110074 bytes/sec
      5 minute drop rate, 4 pkts/sec
DMZ:
        received (in 2395890.690 secs):
                32384633 packets        2955292920 bytes
                0 pkts/sec      1000 bytes/sec
        transmitted (in 2395890.690 secs):
                49137094 packets        65615227653 bytes
                0 pkts/sec      27001 bytes/sec
      1 minute input rate 0 pkts/sec,  82 bytes/sec
      1 minute output rate 0 pkts/sec,  125 bytes/sec
      1 minute drop rate, 0 pkts/sec
      5 minute input rate 1 pkts/sec,  435 bytes/sec
      5 minute output rate 1 pkts/sec,  1075 bytes/sec
      5 minute drop rate, 0 pkts/sec
management:
        received (in 2395890.750 secs):
                14277133 packets        946118886 bytes
                0 pkts/sec      0 bytes/sec
        transmitted (in 2395890.750 secs):
                0 packets       0 bytes
                0 pkts/sec      0 bytes/sec
      1 minute input rate 5 pkts/sec,  424 bytes/sec
      1 minute output rate 0 pkts/sec,  0 bytes/sec
      1 minute drop rate, 0 pkts/sec
      5 minute input rate 6 pkts/sec,  407 bytes/sec
      5 minute output rate 0 pkts/sec,  0 bytes/sec
      5 minute drop rate, 0 pkts/sec
----------------------------------------
Aggregated Traffic on Physical Interface
----------------------------------------
GigabitEthernet0/0:
        received (in 2395890.790 secs):
                318032181 packets       321511281805 bytes
                0 pkts/sec      134000 bytes/sec
        transmitted (in 2395890.790 secs):
                280139730 packets       85167104894 bytes
                0 pkts/sec      35000 bytes/sec
      1 minute input rate 218 pkts/sec,  146592 bytes/sec
      1 minute output rate 192 pkts/sec,  49034 bytes/sec
      1 minute drop rate, 0 pkts/sec
      5 minute input rate 164 pkts/sec,  112593 bytes/sec
      5 minute output rate 153 pkts/sec,  38521 bytes/sec
      5 minute drop rate, 0 pkts/sec
GigabitEthernet0/1:
        received (in 2395890.810 secs):
                255241934 packets       81218647412 bytes
                0 pkts/sec      33001 bytes/sec
        transmitted (in 2395890.810 secs):
                294891391 packets       253102758608 bytes
                1 pkts/sec      105000 bytes/sec
      1 minute input rate 196 pkts/sec,  48364 bytes/sec
      1 minute output rate 234 pkts/sec,  146984 bytes/sec
      1 minute drop rate, 0 pkts/sec
      5 minute input rate 158 pkts/sec,  38456 bytes/sec
      5 minute output rate 178 pkts/sec,  113510 bytes/sec
      5 minute drop rate, 0 pkts/sec
GigabitEthernet0/2:
        received (in 2395890.850 secs):
                32384636 packets        3547413050 bytes
                0 pkts/sec      1000 bytes/sec
        transmitted (in 2395890.850 secs):
                49137094 packets        66502670016 bytes
                0 pkts/sec      27000 bytes/sec
      1 minute input rate 0 pkts/sec,  98 bytes/sec
      1 minute output rate 0 pkts/sec,  138 bytes/sec
      1 minute drop rate, 0 pkts/sec
      5 minute input rate 1 pkts/sec,  470 bytes/sec
      5 minute output rate 1 pkts/sec,  1108 bytes/sec
      5 minute drop rate, 0 pkts/sec
GigabitEthernet0/3:
        received (in 2395890.860 secs):
                14278281 packets        1203253101 bytes
                0 pkts/sec      0 bytes/sec
        transmitted (in 2395890.860 secs):
                0 packets       0 bytes
                0 pkts/sec      0 bytes/sec
      1 minute input rate 5 pkts/sec,  531 bytes/sec
      1 minute output rate 0 pkts/sec,  0 bytes/sec
      1 minute drop rate, 0 pkts/sec
      5 minute input rate 6 pkts/sec,  516 bytes/sec
      5 minute output rate 0 pkts/sec,  0 bytes/sec
      5 minute drop rate, 0 pkts/sec
GigabitEthernet0/4:
        received (in 2395890.900 secs):
                0 packets       0 bytes
                0 pkts/sec      0 bytes/sec
        transmitted (in 2395890.900 secs):
                0 packets       0 bytes
                0 pkts/sec      0 bytes/sec
      1 minute input rate 0 pkts/sec,  0 bytes/sec
      1 minute output rate 0 pkts/sec,  0 bytes/sec
      1 minute drop rate, 0 pkts/sec
      5 minute input rate 0 pkts/sec,  0 bytes/sec
      5 minute output rate 0 pkts/sec,  0 bytes/sec
      5 minute drop rate, 0 pkts/sec
GigabitEthernet0/5:
        received (in 2395890.910 secs):
                0 packets       0 bytes
                0 pkts/sec      0 bytes/sec
        transmitted (in 2395890.910 secs):
                0 packets       0 bytes
                0 pkts/sec      0 bytes/sec
      1 minute input rate 0 pkts/sec,  0 bytes/sec
      1 minute output rate 0 pkts/sec,  0 bytes/sec
      1 minute drop rate, 0 pkts/sec
      5 minute input rate 0 pkts/sec,  0 bytes/sec
      5 minute output rate 0 pkts/sec,  0 bytes/sec
      5 minute drop rate, 0 pkts/sec
Internal-Control0/0:
        received (in 2395890.950 secs):
                4813061 packets 348829320 bytes
                0 pkts/sec      0 bytes/sec
        transmitted (in 2395890.950 secs):
                5452144 packets 383499485 bytes
                0 pkts/sec      0 bytes/sec
      1 minute input rate 2 pkts/sec,  146 bytes/sec
      1 minute output rate 2 pkts/sec,  160 bytes/sec
      1 minute drop rate, 0 pkts/sec
      5 minute input rate 2 pkts/sec,  145 bytes/sec
      5 minute output rate 2 pkts/sec,  160 bytes/sec
      5 minute drop rate, 0 pkts/sec
Internal-Data0/0:
        received (in 2395890.960 secs):
                21248059 packets        1966209991 bytes
                1 pkts/sec      1 bytes/sec
        transmitted (in 2395890.960 secs):
                6170575 packets 958796353 bytes
                0 pkts/sec      0 bytes/sec
      1 minute input rate 8 pkts/sec,  850 bytes/sec
      1 minute output rate 2 pkts/sec,  402 bytes/sec
      1 minute drop rate, 0 pkts/sec
      5 minute input rate 8 pkts/sec,  836 bytes/sec
      5 minute output rate 2 pkts/sec,  403 bytes/sec
      5 minute drop rate, 0 pkts/sec
Internal-Data0/1:
        received (in 2395890.990 secs):
                603754038 packets       429853468179 bytes
                1 pkts/sec      179000 bytes/sec
        transmitted (in 2395890.990 secs):
                603754038 packets       429853468179 bytes
                1 pkts/sec      179000 bytes/sec
      1 minute input rate 397 pkts/sec,  209501 bytes/sec
      1 minute output rate 397 pkts/sec,  209501 bytes/sec
      1 minute drop rate, 0 pkts/sec
      5 minute input rate 313 pkts/sec,  164474 bytes/sec
      5 minute output rate 313 pkts/sec,  164474 bytes/sec
      5 minute drop rate, 0 pkts/sec
Internal-Data0/2:
        received (in 2395891.020 secs):
                6170575 packets 918208209 bytes
                0 pkts/sec      1 bytes/sec
        transmitted (in 2395891.020 secs):
                21248059 packets        1881217957 bytes
                1 pkts/sec      0 bytes/sec
      1 minute input rate 2 pkts/sec,  385 bytes/sec
      1 minute output rate 8 pkts/sec,  815 bytes/sec
      1 minute drop rate, 0 pkts/sec
      5 minute input rate 2 pkts/sec,  386 bytes/sec
      5 minute output rate 8 pkts/sec,  800 bytes/sec
      5 minute drop rate, 0 pkts/sec
Management0/0:
        received (in 2395891.040 secs):
                14278311 packets        1146069880 bytes
                0 pkts/sec      1 bytes/sec
        transmitted (in 2395891.040 secs):
                0 packets       0 bytes
                0 pkts/sec      0 bytes/sec
      1 minute input rate 5 pkts/sec,  507 bytes/sec
      1 minute output rate 0 pkts/sec,  0 bytes/sec
      1 minute drop rate, 0 pkts/sec
      5 minute input rate 6 pkts/sec,  492 bytes/sec
      5 minute output rate 0 pkts/sec,  0 bytes/sec
      5 minute drop rate, 0 pkts/sec
If you have a upgraded device with the security services you can even look at possible attacks against your network.  Such as;

ciscoasa# show threat-detection scanning-threat

and 

ciscoasa# show threat-detection statistics
Host:cicsoasa: tot-ses:30722 act-ses:5 fw-drop:0 insp-drop:0 null-ses:8 bad-acc:0
  1-hour Sent byte:                423             241       0           1523092
  1-hour Sent pkts:                  2               1       0              9023
  1-hour Recv byte:                  1               0       0              3632
  1-hour Recv pkts:                  0               0       0                48

Top 10 protected servers under attack (sorted by average rate)
Monitoring window size: 30 mins    Sampling interval: 30 secs

1    192.168.0.1:443 DMZ 0 0 39 172.16.42.6 (21 secs ago)

Basic HTTP Enable Commands for Cisco Routers


ciscorouter#en
ciscorouter#config t
ciscorouter#ip http server
ciscorouter#ip http authentication local
ciscorouter#ip http secure-server
Ctrl+z
wr

On Another Note if you have not removed SSL V2 and V3
You need to disable it so you can do this by the following commands

ciscorouter#en
ciscorouter#config t
ciscorouter#no ip http server
ciscorouter#no ip http authentication local
ciscorouter#no ip http secure-server
Ctrl+z
wr

How To Show ASA Active Sessions

If when using IPSec for your sessions 

ciscoasa#show vpn-sessiondb remote

ciscoasa#show vpn-sessionsdb summary

Also
ciscoasa#show logging 

Thursday, June 2, 2016

Blacklist IP's









object-group network Custom_Block_List
 network-object host 23.250.11.220
 network-object host 209.10.104.55
 network-object host 119.81.240.10
 network-object host 118.192.3.3
 network-object host 89.248.171.137
 network-object 222.186.21.0 255.255.255.0
 network-object object 89.248.168.128
 network-object host 213.136.90.120
 network-object host 80.82.70.238
 network-object 162.252.172.0 255.255.255.0
 network-object object 188.138.9.51
 network-object host 91.219.238.193
 network-object host 61.216.2.15
 network-object 185.40.4.182 255.255.255.255
 network-object host 209.126.116.147
 network-object object 125.64.94.200
 network-object 123.59.59.0 255.255.255.0
 network-object host 93.174.93.94
 network-object host 80.82.65.61
 network-object host 125.64.94.200
 network-object host 80.82.78.38
 network-object 185.45.13.0 255.255.255.0
 network-object host 208.100.26.228

Attacks and Scans

I see way to many of these lately so I am going to start posting the reoccurring ones for other engineers to reference by on attack type and if they just want to start blocking these IP's for there own firewalls/routers.

-Gary

Monday, May 16, 2016

Sample Adtran NetVanta 3430 Config

corerouter#show run
Building configuration...
!
!
! ADTRAN, Inc. OS version R11.8.0
! Boot ROM version 17.06.01.00
! Platform: NetVanta 3430, part number 1202820G1
! Serial number ******
!
!
hostname "corerouter"
enable password encrypted 323ab2216eb4ffgghhb25bcc426298ddfggba2625f57
!
!
clock timezone -5-Eastern-Time
!
ip subnet-zero
ip classless
ip default-gateway 192.168.1.1
ip routing
ipv6 unicast-routing
!
!
domain-name "gnet.local"
domain-proxy
name-server 208.67.222.222 208.67.220.220
!
!
no auto-config
auto-config authname adtran encrypted password 383e4bc8685e2bf8b1350b96da4ae62fc205
!
event-history on
no logging forwarding
logging forwarding priority-level info
logging email on
logging email receiver-ip 192.168.0.1 auth-username usrname auth-password encrypted 43lkmfdmskm454
logging email address-list glangston@ksbankinc.com
logging email ip urlfilter top-websites address-list glangston@knrgnetworksinc.com
logging email sender glangston@nrgnetworksinc.com
!
service password-encryption
!
username "admin" password encrypted "4048f6b33g249c127e28ac48fdd3452203161619f745"
!
banner motd #


#
!
!
ip firewall
no ip firewall alg msn
no ip firewall alg mszone
no ip firewall alg h323
!
!
!
!
!
!
!
!
!
!
no dot11ap access-point-control
!
!
!
ip security monitor stats-filter web-stats-filter
  threat 201
!
ip security monitor
  stats-filter web-stats-filter
!
!
!
!
!
!
!
!
ip urlfilter Web_Http_Filter http
!
!
!
!
!
!
!
!
!
no ethernet cfm
!
interface eth 0/1
  ip address  10.207.177.97  255.255.255.248
  no shutdown
!
!
interface eth 0/2
  no ip address
  shutdown
!
!
!
!
interface t1 1/1
  clock source internal
  fdl att
  tdm-group 1 timeslots 1-24 speed 64
  no shutdown
!
!
interface fr 1 point-to-point
  frame-relay lmi-type ansi
  no shutdown
!
interface ppp 1
  ip address  12.124.191.18  255.255.255.252
  ip mtu 1500
  ip urlfilter Web_Http_Filter in
  ip urlfilter Web_Http_Filter out
  no shutdown
  cross-connect 1 t1 1/1 1 ppp 1
!
interface hdlc 1
  no ip address
  no shutdown
!
!
!
!
!
!
ip access-list standard wizard-ics
  remark Internet Connection Sharing
  permit any
!
!
ip access-list extended self
  remark Traffic to NetVanta
  permit ip any  any     log
!
ip access-list extended wizard-remote-access
  remark do not hand edit this ACL
  permit tcp any  any eq telnet   log
  permit icmp any  any  echo   log
  permit ip host 192.168.10.1  any     log
!
!
!
!
ip policy-class Private
  allow list self self
!
ip policy-class Public
  allow list wizard-remote-access self
!
!
!
ip route 0.0.0.0 0.0.0.0 12.114.121.217
!
no tftp server
no tftp server overwrite
http server
http secure-server
no snmp agent
no ip ftp server
ip ftp server default-filesystem flash
no ip scp server
no ip sntp server
!
!
!
line con 0
  login
  password encrypted 2821704d6ad1dde8ac0fdfdfdbe6a02f3aa429fcbe
!
line telnet 0 4
  login
  password encrypted 3e36e4defd8afdfd26bnb3c7edb47d0117a42bb7952
  no shutdown
line ssh 0 4
  login local-userlist
  no shutdown
!
sntp server time-b.nist.gov
!
!
!
!
end
corerouter#

Saturday, May 14, 2016

Example Cisco Config with Frame Relay and Multilink /w OSPF 2900 Series

Current configuration : 4278 bytes
!
! Last configuration change at 16:10:58 PCTime Wed Jul 29 2015 by admin
!
version 15.0
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service password-encryption
service sequence-numbers
!
hostname corerouter
!
boot-start-marker
boot-end-marker
!
card type t1 0 0
logging buffered 51200
logging console critical
!
no aaa new-model
clock timezone PCTime -5
clock summer-time PCTime date Apr 6 2003 2:00 Oct 26 2003 2:00
no network-clock-participate wic 0
!
no ipv6 cef
ip source-route
ip cef
!
!
!
!
ip domain name nrgnetworksinc.com
ip name-server 208.67.222.222
ip name-server 208.67.220.220
multilink bundle-name authenticated
!
!
!
crypto pki trustpoint TP-self-signed-1461846340
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-1461846340
revocation-check none
rsakeypair TP-self-signed-1461846340
!
!
crypto pki certificate chain TP-self-signed-1461846340
certificate self-signed 01
  30820255 308201BE A0030201 02020101 300D0609 2A864886 F70D0101 04050030
  31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
  69666963 6174652D 31343631 38343633 3430301E 170D3135 30373239 31363437
  31365A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
  4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D31 34363138
  34363334 3030819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
  81009D2C 744A0648 AA54BB97 6134641C A1E81A8B 2DA3396A DCDEFD18 7C545D01
  D3665567 154FB817 31944A23 B55269D9 937ABC7D 0DECED70 D96872AD 9E756748
  B5AF0E48 8CF41793 04BB0F36 CFF148BF 4CE43D4D F8D247F3 F1F92176 19EA8554
  024F0CE6 CE2AFBCB 769F6598 E7D96E85 0E319C1A 2BF38076 CC2DB60C DCAD750D
  C4290203 010001A3 7D307B30 0F060355 1D130101 FF040530 030101FF 30280603
  551D1104 21301F82 1D636F72 65726F75 7465722E 6E72676E 6574776F 726B7369
  6E632E63 6F6D301F 0603551D 23041830 168014DA 9E0014B8 174B471C 16F84537
  1F0F3EFF D863D230 1D060355 1D0E0416 0414DA9E 0014B817 4B471C16 F845371F
  0F3EFFD8 63D2300D 06092A86 4886F70D 01010405 00038181 00163DFD 31F6A4CA
  E2999A3F 21F9DED1 91A3CD1A 429ADB5E 94EB871C C576CF75 C50879CD F675766F
  1971BE01 DBFCBAFB 308B6428 F18C2BEE 78006571 AACB80FA BE174B09 B6857915
  937FBEDA E3AE8DB6 6A4660EF E8149667 3E4DE67B 78607371 35426E9A 9712C055
  38CEEC1F 9F438D51 B08E63CD DBA02A83 C9FF1117 764AE3C2 50
        quit
license udi pid CISCO2911/K9 sn FTX****
!
!
username admin privilege 15 secret 5 (password)
!
!
controller T1 0/0/0
cablelength short 110
channel-group 1 timeslots 1-24
!
controller T1 0/0/1
cablelength short 110
channel-group 1 timeslots 1-24
!
ip tcp synwait-time 10
!
!
!
!
interface Loopback1
no ip address
!
interface Multilink1
description Wan
ip address negotiated
ip flow ingress
ppp multilink
ppp multilink group 1
!
interface GigabitEthernet0/0
description ATT
ip address 12.120.136.97 255.255.255.248
ip flow ingress
duplex auto
speed auto
!
interface GigabitEthernet0/1
description CenturyLink
ip address 184.7.17.120 255.255.255.0
ip flow ingress
duplex auto
speed auto
!
interface GigabitEthernet0/2
no ip address
ip flow ingress
shutdown
duplex auto
speed auto
!
interface Serial0/0/0:1
ip address 12.124.171.218 255.255.255.252
ip flow ingress
encapsulation ppp
ppp multilink
ppp multilink group 1
!
interface Serial0/0/1:1
ip address 187.7.23.34 255.255.255.252
ip flow ingress
encapsulation ppp
ppp multilink
ppp multilink group 1
!
router ospf 100
log-adjacency-changes
redistribute connected subnets
network 192.168.138.0 0.0.0.63 area 192
network 172.21.99.116 0.0.0.3 area 192
!
ip forward-protocol nd
!
ip http server
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
!
ip route 0.0.0.0 0.0.0.0 12.124.171.217
ip route 0.0.0.0 0.0.0.0 184.7.23.33
!
logging trap debugging
!
!
!
control-plane
!
!
line con 0
exec-timeout 120 0
login local
line aux 0
line vty 0 4
exec-timeout 60 0
privilege level 15
login local
transport input telnet ssh
line vty 5 15
exec-timeout 60 0
privilege level 15
login local
transport input telnet ssh
!
scheduler allocate 20000 1000
end