nagios ntp/clock check for Cisco devices ... ?
Hi all, Can anyone recommend any good nagios checks for time drifting on Cisco routers and switches ? -Alex
Re: Simple Low Cost WAN Link Simulator Recommendations [SEC=UNCLASSIFIED]
0n Fri, Mar 18, 2011 at 10:27:18AM -0700, Jim Logajan wrote: >Loopback wrote: >> Need the ability to test Network Management and Provisioning >> applications over a variety of WAN link speeds from T1 equivalent up to >> 1GB speeds. Seems to be quite a few offerings but I am looking for >> recommendations from actual users. Thanks in advance. FreeBSD + DummyNet [http://www.freebsd.org/cgi/man.cgi?query=dummynet&sektion=4] -Alex IMPORTANT: This email remains the property of the Department of Defence and is subject to the jurisdiction of section 70 of the Crimes Act 1914. If you have received this email in error, you are requested to contact the sender and delete the email.
Re: Software DNS hghi availability and load balancer solution [SEC=UNCLASSIFIED]
0n Tue, Jan 18, 2011 at 02:42:57PM -0500, david raistrick wrote: >On Tue, 18 Jan 2011, Rhys Rhaven wrote: > >> Having hit these issues myself, I heavily recommend a real frontend >> proxy like nginx or varnish. > >A frontend proxy (nginx, varnish, haproxy, or anything else) doesnt give >you HA any more than any other loadbalancer solution does. You need a way >to send traffic to another frontend server when the primary frontend >server fails, or is overloaded, transparently. freebsd + varnish + carp (http://www.openbsd.org/faq/pf/carp.html) -Alex IMPORTANT: This email remains the property of the Department of Defence and is subject to the jurisdiction of section 70 of the Crimes Act 1914. If you have received this email in error, you are requested to contact the sender and delete the email.
Re: in-addr.arpa server problems for europe? [SEC=UNCLASSIFIED]
0n Mon, Feb 15, 2010 at 01:40:31PM +0100, Michelle Sullivan wrote: >Michelle Sullivan wrote: >miche...@enigma:~$ dig +trace +bufsize=512 -x 81.255.164.225 >miche...@enigma:~$ dig +bufsize=4096 -x 81.255.164.225 @NS3.NIC.FR Curious, why did you modify 'bufsize' ? -Alex IMPORTANT: This email remains the property of the Australian Defence Organisation and is subject to the jurisdiction of section 70 of the CRIMES ACT 1914. If you have received this email in error, you are requested to contact the sender and delete the email.
Re: dns interceptors [SEC=UNCLASSIFIED]
0n Sat, Feb 13, 2010 at 06:15:02AM +0800, Randy Bush wrote: >i just lost ten minutes debugging what i thought was a server problem >which turned out to be a dns trapper on the wireless in the changi sats >lounge. this is not the first time i have been caught by this. Whats a "dns trapper" ? -Alex IMPORTANT: This email remains the property of the Australian Defence Organisation and is subject to the jurisdiction of section 70 of the CRIMES ACT 1914. If you have received this email in error, you are requested to contact the sender and delete the email.
Re: The Confiker Virus.
0n Tue, Mar 31, 2009 at 09:22:32AM -0400, Steven M. Bellovin wrote: Honeynet Project has released Know Your Enemy: Containing Conficker: Our "Know Your Enemy: Containing Conficker" whitepaper was released on March 30th as a PDF only. You can download the full paper from the link below. Paper Abstract The Conficker worm has infected several million computers since it first started spreading in late 2008 but attempts to mitigate Conficker have not yet proved very successful. In this paper we present several potential methods to contain Conficker. The approaches presented take advantage of the way Conficker patches infected systems, which can be used to remotely detect a compromised system. Furthermore, we demonstrate various methods to detect and remove Conficker locally and a potential vaccination tool is presented. Finally, the domainname generation mechanism for all three Conficker variants is discussed in detail and an overview of the potential for upcoming domain collisions in version .C is provided. Tools for all the ideas presented here are freely available for download including source code. In addition, as a result of this paper and the hard work of Dan Kaminsky, most vulnerability scanning tools (including Nmap) should now have a plugin or signatures that allow you to remotely detect infected Conficker systems on your networks. Finally, we would like to recognize and thank the tremendous help and input of the Conficker Working Group. Paper last updated March 30th 2009, 23:00 GMT (rev1) http://www.honeynet.org/files/KYE-Conficker.pdf -aW IMPORTANT: This email remains the property of the Australian Defence Organisation and is subject to the jurisdiction of section 70 of the CRIMES ACT 1914. If you have received this email in error, you are requested to contact the sender and delete the email.