nagios ntp/clock check for Cisco devices ... ?

2016-01-08 Thread Wilkinson, Alex
Hi all,

Can anyone recommend any good nagios checks for time drifting on Cisco routers 
and switches ?

  -Alex


Re: Simple Low Cost WAN Link Simulator Recommendations [SEC=UNCLASSIFIED]

2011-03-20 Thread Wilkinson, Alex

0n Fri, Mar 18, 2011 at 10:27:18AM -0700, Jim Logajan wrote: 

>Loopback  wrote:
>> Need the ability to test Network Management and Provisioning 
>> applications over a variety of WAN link speeds from T1 equivalent up to 
>> 1GB speeds.  Seems to be quite a few offerings but I am looking for 
>> recommendations from actual users.   Thanks in advance.

FreeBSD + DummyNet [http://www.freebsd.org/cgi/man.cgi?query=dummynet&sektion=4]

   -Alex

IMPORTANT: This email remains the property of the Department of Defence and is 
subject to the jurisdiction of section 70 of the Crimes Act 1914. If you have 
received this email in error, you are requested to contact the sender and 
delete the email.



Re: Software DNS hghi availability and load balancer solution [SEC=UNCLASSIFIED]

2011-01-18 Thread Wilkinson, Alex

0n Tue, Jan 18, 2011 at 02:42:57PM -0500, david raistrick wrote: 

>On Tue, 18 Jan 2011, Rhys Rhaven wrote:
>
>> Having hit these issues myself, I heavily recommend a real frontend
>> proxy like nginx or varnish.
>
>A frontend proxy (nginx, varnish, haproxy, or anything else) doesnt give 
>you HA any more than any other loadbalancer solution does.  You need a way 
>to send traffic to another frontend server when the primary frontend 
>server fails, or is overloaded, transparently.

freebsd + varnish + carp (http://www.openbsd.org/faq/pf/carp.html)

  -Alex

IMPORTANT: This email remains the property of the Department of Defence and is 
subject to the jurisdiction of section 70 of the Crimes Act 1914. If you have 
received this email in error, you are requested to contact the sender and 
delete the email.



Re: in-addr.arpa server problems for europe? [SEC=UNCLASSIFIED]

2010-02-15 Thread Wilkinson, Alex

0n Mon, Feb 15, 2010 at 01:40:31PM +0100, Michelle Sullivan wrote: 

>Michelle Sullivan wrote:

>miche...@enigma:~$ dig +trace +bufsize=512 -x 81.255.164.225
>miche...@enigma:~$ dig +bufsize=4096 -x 81.255.164.225 @NS3.NIC.FR

Curious, why did you modify 'bufsize' ?

   -Alex

IMPORTANT: This email remains the property of the Australian Defence 
Organisation and is subject to the jurisdiction of section 70 of the CRIMES ACT 
1914.  If you have received this email in error, you are requested to contact 
the sender and delete the email.




Re: dns interceptors [SEC=UNCLASSIFIED]

2010-02-12 Thread Wilkinson, Alex

0n Sat, Feb 13, 2010 at 06:15:02AM +0800, Randy Bush wrote: 

>i just lost ten minutes debugging what i thought was a server problem
>which turned out to be a dns trapper on the wireless in the changi sats
>lounge.  this is not the first time i have been caught by this.

Whats a "dns trapper" ?

   -Alex

IMPORTANT: This email remains the property of the Australian Defence 
Organisation and is subject to the jurisdiction of section 70 of the CRIMES ACT 
1914.  If you have received this email in error, you are requested to contact 
the sender and delete the email.




Re: The Confiker Virus.

2009-03-31 Thread Wilkinson, Alex

0n Tue, Mar 31, 2009 at 09:22:32AM -0400, Steven M. Bellovin wrote: 

Honeynet Project has released Know Your Enemy:  Containing Conficker:

   Our "Know Your Enemy: Containing Conficker" whitepaper was released on March
   30th as a PDF only. You can download the full paper from the link below.

   Paper Abstract

   The Conficker worm has infected several million computers since it first 
started
   spreading in late 2008 but attempts to mitigate Conficker have not yet proved
   very successful. In this paper we present several potential methods to 
contain
   Conficker. The approaches presented take advantage of the way Conficker 
patches
   infected systems, which can be used to remotely detect a compromised system.
   Furthermore, we demonstrate various methods to detect and remove Conficker
   locally and a potential vaccination tool is presented. Finally, the 
domainname
   generation mechanism for all three Conficker variants is discussed in detail 
and
   an overview of the potential for upcoming domain collisions in version .C is
   provided. Tools for all the ideas presented here are freely available for
   download including source code.

   In addition, as a result of this paper and the hard work of Dan Kaminsky, 
most
   vulnerability scanning tools (including Nmap) should now have a plugin or
   signatures that allow you to remotely detect infected Conficker systems on 
your
   networks.  Finally, we would like to recognize and thank the tremendous help 
and
   input of the Conficker Working Group.

   Paper last updated March 30th 2009, 23:00 GMT (rev1)

   http://www.honeynet.org/files/KYE-Conficker.pdf


  -aW

IMPORTANT: This email remains the property of the Australian Defence 
Organisation and is subject to the jurisdiction of section 70 of the CRIMES ACT 
1914.  If you have received this email in error, you are requested to contact 
the sender and delete the email.