Re: Superstitious Switches? [7:72746]

2003-07-23 Thread Kent Hundley
It's a long story... http://www.naplesnews.com/today/restate/a120401k.htm -Kent On Wed, 2003-07-23 at 11:28, Raj wrote: > Anybody knows when and how did the number 13 get so unpopular? Whats the > story behind it? > > > ""MADMAN"" wrote in message > news:[EMAIL PROTECTED] > > There is a reaso

Re: Slow File Transfers After Server Upgrade [7:72402]

2003-07-16 Thread Kent Hundley
John, A few things I would look at: 1) What is the MSS value that is passed between the servers during the initial TCP setup? 2) What is the value of the MTU on the servers? 3) Are there any name resolution issues? I have seen Solaris boxes keep trying to resolve the DNS name of a client stati

Re: Sniffer Recommendation [7:72372]

2003-07-16 Thread Kent Hundley
There are various tools to do this, as far as I know they all work based on the ability to spoof arp replies. Here are a few links: http://monkey.org/~dugsong/dsniff/ (a host of tools for sniffing through various spoofing attacks) http://www.phenoelit.de/fr/tools.html (specifically just for arp

Re: hacking challenge [7:66720]

2003-04-03 Thread Kent Hundley
Rusty, I'm not clear from your question if there is an acl blocking everything inbound to the nt servers except smtp and telnet or if the acl is for inbound to the router itself. In the former case, unless your client is forcing their users to use good passwords, it's likely that a brute force te

Re: Info about cisco IDS [7:66238]

2003-03-26 Thread Kent Hundley
AFAIK, no. Cisco IDS was purchased from the Wheel Group and previously went by the name Netranger. Regards, Kent On Wed, 2003-03-26 at 07:12, ritul wrote: > Hi ! > > I want to know is Snort used with CISCO IDS ? > > Ritul Message Posted at: http://www.groupstudy.com/form/read.php?f=7&i=6625

Re: PIX Question [7:65095]

2003-03-12 Thread Kent Hundley
Manny, A couple of thoughts, not necessarily in order of applicability: 1) Change the timeout values for idle connections for conn (connection slot) from 1 hr to 5-10 min and change the xlate timeout from 3 hrs to 5-10 minutes. These are idle timeouts and will probably work for most environments

Re: can PIX IDS block spam?? [7:65017]

2003-03-11 Thread Kent Hundley
No. If you want mail content filtering (spam, virus, etc.) you need a 3rd party product like those from TrendMicro. HTH, Kent On Tue, 2003-03-11 at 02:03, Carol smith wrote: > Hi.. I wonder PIX generic IDS can block spam e-mail attack? > > Thanks > > > > - >

Re: VLAN Trunking + Access lista [7:63739]

2003-02-25 Thread Kent Hundley
No, subinterfaces on a trunked port fully support acl's in the same manner as physical interfaces. Same for other services such as NAT, CBAC, policy routing, etc. HTH, Kent On Tue, 2003-02-25 at 11:47, Skarphedinsson Arni V. wrote: > Hi > > When using vlan trunking from a router, for example i

Re: ADSL and PIX puzzle [7:63458]

2003-02-20 Thread Kent Hundley
Change this: ip nat inside source static tcp 192.168.1.30 80 200.10.15.189 80 extendable to something like: ip nat inside source static tcp 192.168.0.30 80 200.10.15.189 80 extendable -The inside from the 827's perspective needs to be something in the 192.168.0.x address space And change this:

RE: Snort versus Cisco IDS [7:62939]

2003-02-14 Thread Kent Hundley
BTW, for the record I am personally a big fan of snort. Snort is what I use on my own home network. But then I'm a tech geek with limited funds, so it fits my needs perfectly. ;-) Regards, Kent On Fri, 2003-02-14 at 10:32, Kent Hundley wrote: > The term "team" was meant

RE: Snort versus Cisco IDS [7:62939]

2003-02-14 Thread Kent Hundley
ously, they will push the product. > > Rule 1. Never trust a salesperson. > Rule 2. Never Believe a salesperson. > Rule 3. Never forget Rules 1 & 2. > > -Original Message- > From: Kent Hundley [mailto:[EMAIL PROTECTED]] > Sent: Thursday, February 13, 2003

Re: Snort versus Cisco IDS [7:62939]

2003-02-13 Thread Kent Hundley
On Thu, 2003-02-13 at 00:06, Priscilla Oppenheimer wrote: > Someone told me in an authoritative voice today that Cisco doesn't recommend > their IDS. They recommend Snort. Is this really true? Isn't Cisco's IDS a > big part of SAFE? > Whomever told you this: 1) Is extremely naiive (one Cisco eng

Re: OT: migration from CheckPoint to PIX firewall [7:58957]

2002-12-11 Thread Kent Hundley
A) No B) No It appears that someone in mgmt. has made a layer 8 (political) decision to migrate your firewall since the PIX does not support features you are currently using and yet the decision has already been made. At this point, I would recommend that you put together a brief presentation

Re: Traffic Analyses [7:58193]

2002-11-28 Thread Kent Hundley
You might also want to check out Ntop: http://www.ntop.org/ntop.html It's not for monitoring Cisco routers, but it will give you everything you want to know about the traffic on your network. HTH, Kent At 04:02 PM 11/27/2002 +, Curious wrote: >Is there a tool which gives me very good traff

Re: 2 IDS modules in a 6509 [7:58126]

2002-11-27 Thread Kent Hundley
Yes, you can use as many IDS modules as you have free slots for (minus the sups of course). Each IDS is managed independently, one does not affect the other. You would, of course, use different VACL's to point different traffic to each IDS blade, so each IDS "sees" different traffic. HTH, Ken

Re: Firewall Question [7:57893]

2002-11-25 Thread Kent Hundley
James, Just to add a bit to what others have said, if your friend is cost constrained, going open source ala OpenBSD, FreeBSD, Linux, etc will no doubt be the cheapest in terms of immediate cost. An additional option is the Cisco firewall feature set, it may require your friend to purchase ad

Re: IGRP as proprietary? [7:57603]

2002-11-18 Thread Kent Hundley
Depends on your definition of "open standard". As far as I can tell there are no RFC's for IGRP or EIGRP, which is pretty much the criteria for something to be considered an "open standard" in the Internet community. Also, I don't believe Cisco has released the source code for either IGRP or

Re: VPN Primer on Cisco site - FYI [7:56618]

2002-11-01 Thread Kent Hundley
FYI, This paper and other Cisco security docs can also be found at: http://www.cisco.com/go/safe Which has that advantage of being easier to remember. ;-) Regards, Kent At 07:58 PM 10/31/2002 +, The Long and Winding Road wrote: >found this while stumbling around: > >http://www.cisco.com/wa

RE: PIX Firewall (6.2) General Questions RANT [7:47393]

2002-06-25 Thread Kent Hundley
Richard, 1) No comments are allowed right now. Yes, its a pain. 2) Try using PDM, its a fairly nic GUI interface. For large enviro's try CSPM. 3) The PIX's default stance is a holdover from the days when not a lot of people were concerned about blocking outbound traffic. Yes, it probably shou

RE: Microsoft VPN ports [7:47376]

2002-06-25 Thread Kent Hundley
http://www.cisco.com/warp/public/110/pix_pptp.html -Kent -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of Spencer Plantier Sent: Tuesday, June 25, 2002 6:14 AM To: [EMAIL PROTECTED] Subject: Microsoft VPN ports [7:47376] Does anyone know which ports nee

RE: Pix don't route [7:46356]

2002-06-13 Thread Kent Hundley
get the job done. Sounds to me like the only barrier is getting BGP. ""Kent Hundley"" wrote in message [EMAIL PROTECTED]">news:[EMAIL PROTECTED]... > Wayne, > > I would suggest disabling NAT on the PIX and performing your NAT on the > router. This elimin

RE: Pix don't route [7:46356]

2002-06-12 Thread Kent Hundley
Wayne, I would suggest disabling NAT on the PIX and performing your NAT on the router. This eliminates the problem of not knowing what packets originate from the servers. Then, setup Policy-Based Routing (PBR) on the router. You didn't post your config, so I assume you have 2 legal addresses, o

RE: how to filter a MAC packet at 6509 or 4006 and WIN2000 [7:45361]

2002-05-29 Thread Kent Hundley
First, I think you need to determine that this is an actual attack before you start blocking anything. It could be someone who didn't know better enabled a DHCP server without even knowing what it did. I would recommend going to the person who did it and asking them why they are enabling a DHCP

RE: Anti-spoofing [7:45217]

2002-05-28 Thread Kent Hundley
You need to block more than just your own subnet. You'll want to block at least the RFC1918 address spaces and hosts that claim to be from 0.0.0.0, 255.255.255.255, 127.x.x.x and multicast addresses. You can take a look at the following for more info: http://www.cisco.com/univercd/cc/td/doc/cis

RE: Securing SNMP [7:44605]

2002-05-21 Thread Kent Hundley
Check out the SNMP section in this doc: http://www.cisco.com/univercd/cc/td/doc/cisintwk/ics/cs003.htm Additionally to the above suggestions, I would add: -Do not allow SNMP write capability, you almost never need it -Choose a _strong_ SNMP RO community. It should contain special characters s

RE: Fans too Noisey (2500 Series Router) [7:44571]

2002-05-21 Thread Kent Hundley
Maybe not if you keep the room temperature low enough, but your going to need a lot of air conditioning. ;-) Seriously, disconnecting fans will eventually cause your router, or any computer, to fry. Without heat dissapation, your components will eventually just quit working and fill your house w

RE: why "ip inspect" block my traffic? [7:43802]

2002-05-10 Thread Kent Hundley
The command you reference is for context-based access control (cbac), part of the firewall feature set (ffs). What it is and how it works are clearly explained in the cisco documentation at cisco.com. Here's a shortcut link that gives you all the basics: http://www.cisco.com/warp/public/110/32.

RE: NAT configuration for 2 service providers [7:43820]

2002-05-10 Thread Kent Hundley
You can find lots of good info on Cisco NAT by surfing to cisco.com and searching for NAT tips. Here's a shortcut: http://www.cisco.com/warp/public/556/index.shtml And here's an example to help with your specific question: http://www.cisco.com/warp/public/105/nat_routemap.html This whitepape

RE: Pix load balance? [7:42974]

2002-05-07 Thread Kent Hundley
Brian, Yes, most of them do nat. From the client WS perspective, there is only a single server IP, so it sends packets to that IP address. Once the switch gets the packet (since it is answering for that IP), it needs to forward the packet to a server. Normally, for the server to accept that pa

RE: Installing New PIX [7:43369]

2002-05-07 Thread Kent Hundley
The short answer is no. The PIX does not support a true http proxy, so you'll need to reconfigure your clients or continue to use a cache/proxy in addition to the PIX. For info on the PIX, the documentation is fairly good: http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_60/config/

RE: Security for router connected to Cable Service provider [7:43510]

2002-05-07 Thread Kent Hundley
First, take a look at the following links: http://www.cisco.com/univercd/cc/td/doc/cisintwk/ics/cs003.htm http://phrack.org/phrack/55/P55-10 Then, you might want to consider using CBAC: http://www.cisco.com/warp/public/110/32.html Finally, for performance you may want to consider using a cach

RE: Closing Ports Part 2 [7:43145]

2002-05-07 Thread Kent Hundley
In general, any Application Layer Gateway (ALG) firewall, or any firewall that has a true http proxy, will only allow sessions on port 80 that are actually http. Some examples of ALG's are Gauntlet and Raptor. An example of a firewall that is not an ALG but that does support a true http proxy is

RE: Content engine question! [7:43101]

2002-05-02 Thread Kent Hundley
Go to http://www.cisco.com/go/fn and search for WCCP version 2 HTH, Kent -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of Magdy H. Ibrahim Sent: Thursday, May 02, 2002 4:19 AM To: [EMAIL PROTECTED] Subject: Content engine question! [7:43101] Dear All,

RE: Question on VPN [7:43110]

2002-05-02 Thread Kent Hundley
This is possible in a number of different ways, but it really depends on what VPN hardware and software you will be using, which you didn't specify. If it's a cisco router to cisco router implementation, you can find an example here: http://www.cisco.com/warp/public/707/ios_804.html If your tal

RE: help is needed! [7:43035]

2002-05-01 Thread Kent Hundley
Place an access-list on the FE interface that only allows traffic with a source IP of the Squid server. Configure your clients to use the Squid proxy. If you run into issues of users trying to get around your proxy, it's a matter of policy, not technology, and should be addressed by your securit

RE: Pix load balance? [7:42974]

2002-05-01 Thread Kent Hundley
George, Yes, you can LB PIXen, but there are caveats: 1) PIXes can only do state sharing if one is in failover mode. If you have 2 active PIXen, you cannot share state so if one PIX fails, all active sessions on that PIX will drop and have to start over on the other PIX. 2) It's usually not n

RE: ways to seperate IP and IPX traffic? [7:42855]

2002-04-30 Thread Kent Hundley
That is exactly the way I would do it. In fact, it's probably the only way to accomplish your goal. One additional thing to consider is assisting your client with a migration to 100% IP. Netware has supported native IP (not IPX in IP) for some time now, and this is a logical next step. (though

RE: CSPM for IDS4210 [7:42788]

2002-04-30 Thread Kent Hundley
Mea culpa. I thought the current version I had was 3.0i, I now see that it is 2.3.3i. -Kent -Original Message- From: Tim O'Brien [mailto:[EMAIL PROTECTED]] Sent: Tuesday, April 30, 2002 10:28 AM To: Kent Hundley; [EMAIL PROTECTED] Subject: RE: CSPM for IDS4210 [7:42788] Kent,

RE: CSPM for IDS4210 [7:42788]

2002-04-30 Thread Kent Hundley
There are different versions of CSPM 3.0. CSPM 3.0f supports PIX and routers, CSPM 3.0i supports IDS. You can read about it here: http://www.cisco.com/univercd/cc/td/doc/product/ismg/policy/ver30/reln30.htm #xtocid2 Regards, Kent -Original Message- From: [EMAIL PROTECTED] [mailto:[EMA

RE: Alternatives to Cisco VPN client [7:42604]

2002-04-28 Thread Kent Hundley
The issue isn't with IPSec per se, its with allowing split tunneling. If a user PC becomes compromised via a trojan that allows remote control such as BackOrifice, Netbus, etc., if you allow split tunneling then not only can the attacker control the users machine, they can use it as a jumping off

RE: Alternatives to Cisco VPN client [7:42604]

2002-04-26 Thread Kent Hundley
Craig, I have done quite a bit of research in this area, and I'm pretty confident that no product exists that does what your looking for. There are plenty of client side products that can simply peer with an IPSec gateway using a shared secret or even a certificate, but as far as I have seen the

RE: PIX Inside Interface - Secondary IP? [7:42567]

2002-04-25 Thread Kent Hundley
No, you'll need to use a router if you need this capability -Kent -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of Audy Bautista Sent: Thursday, April 25, 2002 10:24 AM To: [EMAIL PROTECTED] Subject: PIX Inside Interface - Secondary IP? [7:42567] Is it

RE: Cheap terminal server? [7:42536]

2002-04-25 Thread Kent Hundley
Craig, I use the STS10 at home and it works great. I got it off ebay for $70 about 2 years ago and the only problem I had was getting the pinouts right. (it's not the traditional rollover) Unfortunately, those boxes are EOL and seem hard to come by. You might want to look at xyplex, they have

RE: External Tech support connecting on server - VPN is OK ? [7:42490]

2002-04-24 Thread Kent Hundley
Ah yes, security through obscurity. ;-) If I would have had to guess, I would have guessed you were using one of the following VPN products: 1) Cisco 2) Checkpoint 3) Nortel I would have started with Cisco and assumed either a VPN concentrator or a PIX. (in your case, I would have hit the first

RE: Netmeeting [7:42012]

2002-04-19 Thread Kent Hundley
There are some pretty strict requirements for IOS based on the version of netmeeting being used, you can check out the req's here: http://www.cisco.com/warp/public/cc/pd/iosw/ioft/ionetn/prodlit/1195_pp.htm If you meet the req's, netmeeting should work. However, I have had a lot of problems in

RE: Linksys vs. Cisco [7:41829]

2002-04-18 Thread Kent Hundley
Rico, I would have to agree with the other posts, the Linksys is intended for Small Office, Home Office, not for a small branch. It would typically fit where you have somewhere between 1 and 10 users, not 100. The Linksys and other similar routers are clearly intended for the low-end, home user

RE: Signature for blocking telnet to SMTP server [7:41565]

2002-04-16 Thread Kent Hundley
Short answer: It's probably going to be impossible to write a signature that won't give you tons of false positives. The problem is that there is virutally no difference between someone manually typing mail commands via telnet to port 25 and a standard SMTP program sending the same commands. Lon

RE: silly encryption question [7:41583]

2002-04-16 Thread Kent Hundley
Tom, It's all about performance. Public key encryption/decryption such as DH is about 100-1000 times slower than the same process using shared key cryptography (it has to do with the type of algorithms required). Given this, the standard modus operandi is for two hosts to use public key cryptog

RE: traffic analyzer [7:41267]

2002-04-13 Thread Kent Hundley
If all that's needed is general traffic trend patterns, things like how much traffic, what stations are talking to what other stations, protocols in use, etc, then you can do no better than NTOP: http://www.ntop.org It has a small footprint, fairly low overhead, gives you RMON type stats through

RE: OT Question [7:41326]

2002-04-13 Thread Kent Hundley
In the proxy/cache space, the products from Network Appliance are considered by many, including myself, to be the best of breed. It meets all of your listed requirements and is consistently rated high in 3rd party reviews. You can check out their product line at http://www.netapp.com As far as i

RE: Cisco Memory [7:41266]

2002-04-13 Thread Kent Hundley
This is in the list archives: http://www.memoryx.com -Kent -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of The Edward Groove Sent: Thursday, April 11, 2002 9:38 PM To: [EMAIL PROTECTED] Subject: Cisco Memory [7:41266] Has anyone done any research on ch

RE: How can you block spam email with NBAR? [7:41029]

2002-04-11 Thread Kent Hundley
AFAIK, you can only block HTTP content using NBAR, although Cisco is working on adding additional protocols for classifying content. You can use the IDS features in the IOS to catch some SPAM related mail, such as the number of recipients in an email message. Based on this you could setup your m

RE: What is the best HyperTerminal program for Linux? [7:41228]

2002-04-11 Thread Kent Hundley
minicom or, the x version, xminicom. It should be included in most linux distros. -Kent -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of hall Sent: Thursday, April 11, 2002 1:16 PM To: [EMAIL PROTECTED] Subject: What is the best HyperTerminal program for

RE: How fast do bits travel ? [7:41192]

2002-04-11 Thread Kent Hundley
There are several factors: 1) Clock rate of the line 2) Buffering delay by any intermediary devices such as ATM/FR switches 3) Speed of light If we take a simple case and say that there are no layer 2 devices in the path and only digital cross-connects. I have read (somewhere) that the speed of

RE: configure VPN on PIX which behind PAT router [7:41090]

2002-04-11 Thread Kent Hundley
You could, if the PIX supported NAT transparency for IPSec like the VPN 3000 does. Unfortunately, this feature is not yet available. My SE tells me its on the road map for inclusion sometime this year, but there are no firm dates yet. Your other option would be to get rid of the cayman router,

RE: Cisco VPN Client & PIX [7:40670]

2002-04-10 Thread Kent Hundley
I haven't tested it, but according to the Linksys release notes, they support IPSec passthrough for multiple IPSec tunnels beginning in version 1.42.3 released Jan 25, 02. Regards, Kent -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of Fly Ers Sent: Tuesda

RE: Cisco PIX question, static, conduit, and alias [7:40722]

2002-04-09 Thread Kent Hundley
provide Secondary DNS for them. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of Kent Hundley Sent: Tuesday, April 09, 2002 9:53 AM To: [EMAIL PROTECTED] Subject: RE: Cisco PIX question, static, conduit, and alias [7:40722] Robert, Ok, I'm more confused than

RE: Cisco PIX question, static, conduit, and alias [7:40722]

2002-04-09 Thread Kent Hundley
web server, your going to have to modify your conduit statement(s). Regards, Kent -Original Message- From: Robert T. Repko (R Squared Consultants) [mailto:[EMAIL PROTECTED]] Sent: Sunday, April 07, 2002 8:35 PM To: Kent Hundley; [EMAIL PROTECTED] Subject: RE: Cisco PIX question, static, cond

RE: port mirroring and vlans [7:40816]

2002-04-08 Thread Kent Hundley
Priscilla is correct, normally a span only shows unicast for the VLAN on the switch where the span is enabled plus any bcast or mcast from other switches that have active ports in the VLAN in question. However, there is a "remote span" capability that has been added to the 6000 series in 5.3 code

RE: Hardening Ports? [7:40852]

2002-04-08 Thread Kent Hundley
Charlie, As others noted, it depends on your OS. I would recommend doing a search on google for "your OS"+hardening. You'll probably find what your looking for. Also consult your vendors web site and http://www.sans.org for more info. HTH, Kent -Original Message- From: [EMAIL PROTECTE

RE: Core layer question [7:40535]

2002-04-08 Thread Kent Hundley
t. If it's not done right now, when they expand later this year, the network will suck. -- RFC 1149 Compliant. Get in my head: http://sar.dynu.com ""Kent Hundley"" wrote in message [EMAIL PROTECTED]">news:[EMAIL PROTECTED]... > It's not a bad idea to ha

RE: Core layer question [7:40535]

2002-04-07 Thread Kent Hundley
It's not a bad idea to have an IDS blade in the core, but if you have to pick either the DMZ and server blocks or the core, I would choose the former. Having an IDS blade in the core should not affect any other processing of the switch since its a completely self contained module with its own pro

RE: Cisco PIX question, static, conduit, and alias [7:40722]

2002-04-07 Thread Kent Hundley
Robert, Your conduit command doesn't look right. Typically you want to allow any outside host to access the inside host specified in the conduit. You can specify 'any' by using 0.0.0.0 or 0: conduit (inside,outside) xxx.yyy.115.172 25 tcp 0 0 Also, I'm not sure what your trying to accomplish

RE: PIX Question !!! [7:40465]

2002-04-05 Thread Kent Hundley
Avi, You have a few things in your config that look strange: 1) static (inside,outside) 192.168.2.13 216.6.24.129 netmask 255.255.255.255 This creates a static with the outside address of 192.168.2.13, which you indicate is your router's IP address, and an inside address of 216.6.24.129, which

RE: Replacing a router with PIX [7:40454]

2002-04-04 Thread Kent Hundley
Jeffrey, A few things you'll need to be aware of: 1) If you want to get an additional Internet connection for redundancy, it will have to be Ethernet since the PIX does not support WAN connections. 2) The PIX cannot act as an HTTP proxy, so you may have to change the config on the clients so th

RE: BGP Load-Balancing with 2 providers...Possible?? [7:40242]

2002-04-03 Thread Kent Hundley
Very possible, not much different from using 1 provider as long as you have your own address space. If you don't have your own address space, you'll have to either get it from ARIN or convince one provider to advertise addresses from another providers space. They will probably do this, for a pri

RE: PIX VS CheckPoint [7:40136]

2002-04-02 Thread Kent Hundley
Actually, depending on what Nokia boxes you compare with what PIXen and whose numbers you believe, the Nokia boxes may be faster. According to Nokia/Checkpoint, the high-end Nokia boxes are faster than the PIX 535's. Course, a lot depends on what your rule-set looks like. On the flexibility, I a

RE: please help **location migration** [7:40162]

2002-04-02 Thread Kent Hundley
Kevin, Check out "local area mobility", it looks like it may fit your needs: http://www.cisco.com/warp/public/cc/pd/iosw/ioft/lam/tech/lamso_wp.htm HTH, Kent -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of Kevin Campbell Sent: Tuesday, April 02, 2002

RE: Contest [7:40072]

2002-04-01 Thread Kent Hundley
If memory serves, William S. Bonnie is "Billy the Kid" -K -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of Brian Zeitz Sent: Monday, April 01, 2002 10:54 AM To: [EMAIL PROTECTED] Subject: Contest [7:40072] Ill give you a free website that you can find t

RE: SSH client for windows 95 [7:39869]

2002-03-29 Thread Kent Hundley
John, 3 ways to verify the host key: 1) Connect over a network which you have a reasonable degree of confidence is secure. This would normally mean connecting over a LAN to the host in question to get its key. For the truly paranoid, this would mean connecting over a x-over cable to the host i

RE: Unrelated question [7:39788]

2002-03-28 Thread Kent Hundley
Probably has something to do with the asymmetric nature of email and the inherent delays in various mail servers and the Internet. Right now I see no responses to your question in my inbox, but there could be 5 on their way by the time I type this and hit send. -Kent -Original Message-

RE: Router question.. [7:39788]

2002-03-28 Thread Kent Hundley
I have tried it, it works provided you have appropriate IOS and use 802.1q. -Kent -Original Message- From: Walker, Jim [mailto:[EMAIL PROTECTED]] Sent: Thursday, March 28, 2002 11:33 AM To: 'Kent Hundley'; [EMAIL PROTECTED] Subject: RE: Router question.. [7:39788] I neve

RE: If it's a 2611, you're out of luck [7:39788]

2002-03-28 Thread Kent Hundley
Incorrect. Only ISL requires FastE, 802.1q works perfectly well on a standard Ethernet port. This was covered in another thread a few days ago. -Kent -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] Sent: Thursday, March 28, 2002 10:15 AM To: [EMAIL PROTECTED] Subje

RE: TACACS+ [7:39297]

2002-03-28 Thread Kent Hundley
the pix is also a NAS, network access server ? would that be correct to say, atleast in this scenario where users connect to pix to say access a web server behind or protected by the pix. > ""Kent Hundley"" wrote in message > [EMAIL PROTECTED]">news:[EMAIL PROT

RE: NAT [7:39601]

2002-03-27 Thread Kent Hundley
Yes, you are (lots of good info on NAT can be found by doing a search on CCO for "NAT tips") Regards, Kent -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of Wilson, Gavin (KBPB) Sent: Wednesday, March 27, 2002 6:00 AM To: [EMAIL PROTECTED] Subject: NAT [7:

RE: pix question [7:39560]

2002-03-27 Thread Kent Hundley
George, In current versions, it's "show access-list". :-) pix# sh ver Cisco Secure PIX Firewall Version 6.0(1) PIX Device Manager Version 1.0(1) pix# sh access-list access-list 1 permit icmp any any (hitcnt=27) access-list 1 permit ip any host 172.16.1.55 (hitcnt=0) access-list 1 permit ip any

RE: How to get running-config of cisco routers through SNMP [7:39619]

2002-03-27 Thread Kent Hundley
You can find this info and lots of other good SNMP info by searching on CCO for "snmp tips". Here's the relevant direct url: http://www.cisco.com/warp/public/477/SNMP/copy_configs_snmp.shtml HTH, Kent -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of V\J

RE: picture attached-NAT question in BCRAN book-can work?? [7:39444]

2002-03-25 Thread Kent Hundley
Tong, There's no magic, you must either advertise a route for 192.168.2.0/24 or the upstream router(s) must have a static route for the the 192.168.2.0/24 pointing to your router. One way around this issue is to configure NAT to overload the routers interface IP or use addresses in the same rang

RE: TACACS+ [7:39297]

2002-03-23 Thread Kent Hundley
ct: Re: TACACS+ [7:39297] I think cisco stopped the DL of the free tacacs server a while ago. -- RFC 1149 Compliant. Get in my head: http://sar.dynu.com ""Kent Hundley"" wrote in message [EMAIL PROTECTED]">news:[EMAIL PROTECTED]... > IMO, the best way to study T

RE: TACACS+ [7:39297]

2002-03-23 Thread Kent Hundley
IMO, the best way to study TACACS+ is to download the free TACACS+ server from Cisco, install it on Linux and play around with it. You'll learn much more about how TACACS+ works by implementing it and trying different things than any WP (it helps a lot if you have a router to work with as well).

RE: ISL Trunking from a h/w's perspective [7:39246]

2002-03-22 Thread Kent Hundley
Danny, Sometimes even people who work for Cisco, even SE's who may by CCIE's, make mistakes. The router never lies: 3620(config)#int ethernet 0/0.1 3620(config-subif)#encap ? dot1Q IEEE 802.1Q Virtual LAN sdeIEEE 802.10 Virtual LAN - Secure Data Exchange Notice this is an Ethernet, no

RE: Catalyst 6509 [7:39192]

2002-03-22 Thread Kent Hundley
Correct, it's essentially a 802.1q native VLAN issue, not a VLAN 1 issue per se. I would note though that although the change to make a non-active VLAN the native VLAN is an obvious fix, it strikes me as a bug that Cisco does not perform a sanity check on native VLAN frames to ensure that they in

RE: VPN over Internet [7:39255]

2002-03-22 Thread Kent Hundley
SS, Point a route for the other ends LAN subnet to your IPSec peers address. For example, if the far LAN is 10.1.1.0/24 and your IPSec peer's address is 1.1.1.1: ip route 10.1.1.0 255.255.255.0 1.1.1.1 Create a similar route on the CES for the LAN subnet attached to the Cisco 2610. HTH, Kent

RE: what is TCP feature ? [7:38987]

2002-03-21 Thread Kent Hundley
John, I believe the matrix is a list of TCP features that are implemented on the router as an end-system and affect only TCP traffic with the router as the src or dst. 1) Socket API - sockets are a network programming application interface. To me this would only be of interest to Cisco code joc

RE: Stupid Rip/Default Route question [7:38999]

2002-03-21 Thread Kent Hundley
Aaron, Do a "debug rip" on each router and see what advertisements its receiving from the FW's. It sounds like one FW is not advertising any routes. You should see something like this: RIP: received v1 update from a.b.c.d on 0.0.0.0 in 1 hops If both FW's are advertising the routes, the

RE: Cisco's pps claims [7:38956]

2002-03-20 Thread Kent Hundley
Sam, IIRC, Cisco uses 64 byte packets as the baseline. FYI, I have been conducting some throughput tests on 2 2621's in the lab and here are some results for you. I used TTCP between 2 Sparc ultras for the traffic. The sparc ultras can generate about 90Mbps with no routers between them, so the

RE: PIX performance problem again ! [7:38955]

2002-03-20 Thread Kent Hundley
Mohannad, 1) Have you taken sniffer traces? If so, what information did they tell you? If you have not taken a sniffer trace, you absolutely need to do this. You need to look at the TCP windows and MSS values and compare the trace through the PIX and without the PIX. If you have the traces you

RE: How to monitor the bridging traffic at routers [7:38758]

2002-03-19 Thread Kent Hundley
Some protocols don't have a layer 3 address, examples of this would be LAT and SNA. Since they have no layer 3 address, you must bridge them. The docs on CCO show how to enable bridging on a router: http://www.cisco.com/univercd/cc/td/doc/product/software/ios120/12cgcr/ibm_c /index.htm HTH, Ke

RE: Is cable network really a shared medium? [7:38705]

2002-03-18 Thread Kent Hundley
Sam, You can check out the DOCSIS standards here: http://www.cablemodem.com/ (check out the "specifications" section) You should, at a minimum, see broadcasts from the other devices on your cable network. Mostly you will see arp broadcasts, but some Windows users on "raw" cable may still be ou

RE: PIX 515 throughput problem ?! [7:38698]

2002-03-18 Thread Kent Hundley
Mohannad, Look at this link, it may be the cause of your problem: http://www.cisco.com/warp/public/110/21.html If this is not the reason, try sniffing the connection. HTH, Kent -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of Mohannad Khuffash Sent: Mo

RE: Loopback Interfaces..long reply, read carefully please to [7:38335]

2002-03-14 Thread Kent Hundley
Mark, You can _advertise_ the whole subnet, but the problem is that once you assign a subnet to the loopback, you cannot assign another interface an IP address in the same address space. I'm still not sure I understand what your trying to accomplish here. If you have hosts that will have IP add

RE: Question on PIX 501 [7:38246]

2002-03-14 Thread Kent Hundley
Justin, I think you got your answer, but I just wanted to clarify for you that contrary to some of the information you were given, you do _not_ need to configure an access-list on the PIX for outbound traffic. You _do_ have to setup, at a minimum, a "nat" statement. If you are not using nat, yo

RE: you American need to think [7:38323]

2002-03-14 Thread Kent Hundley
Jim, I normally ignore these sorts of wy OT posts, however I am so glad that individuals such as yourself feel that you can better the lives of all of us morally degenerate Americans by instructing us on the proper rules of life and giving us s much to think about. I am so glad

RE: Aironet to Cable Modem [7:38212]

2002-03-14 Thread Kent Hundley
The problem is that most likely you are using a subnet for your wireless net that is not routable. For example, if your using 192.168.1.0/24 for your wireless IP's, you cannot use those addresses on the Internet, you'll need a NATing device like a linksys router or some other low end NAT capable

RE: Is this possible? [7:38098]

2002-03-13 Thread Kent Hundley
Yes, you'll need to configure the PIX to use AAA and have it speak Radius or TACACS+ to the ACE server: How to do AAA with the PIX: http://www.cisco.com/warp/public/110/atp52.html Info on Cisco talking to ACE server: http://www.rsasecurity.com/support/guides/imp_pdfs/Cisco_Remote_Access_Serve rs

RE: EIGRP Metric and Route inconcistence [7:38043]

2002-03-13 Thread Kent Hundley
What your describing is fairly common and you can "fix" this by adjusting the delay metric of router interfaces in your path. In your example, you could adjust the delay between the routers so that the path metrics are equal. This is, as you note, the preferred approach with IGRP/EIGRP to manipul

RE: DHCP across PIX [7:37286]

2002-03-05 Thread Kent Hundley
You cannot. The PIX does not support forwarding of DHCP requests (or any broadcast for that matter). Your only options are to hard-code your IP address or use the DHCP server built into the PIX. HTH, Kent -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of

RE: Another Security Advisory [7:36823]

2002-02-28 Thread Kent Hundley
I assume that this would have to be a "crafted" packet since, as you say, it would be awfully strange to see normal traffic matching this description. For example, assume I created the following packet: [ethernet header] + 46 data bytes + 4 byte crc = 64 byte packet Normal IP total length = 46 b

RE: question about stateful inspection [7:36817]

2002-02-28 Thread Kent Hundley
As far as I can tell, it means essentially nothing. All SPI is by definition, "multi layer" since it tracks at least both layer 3 and layer 4. It looks like a term added to SPI to make it sound like its looking at more "layers". It's probably a term cooked up by the marketing departments of SPI

RE: firewall feature set not in 4000 series [7:36768]

2002-02-28 Thread Kent Hundley
John, Your correct, there is no support for the FFS on the 4x00 platform and there probably will never be. Cisco has EOLed the 4x00 series and is not going to continue development on that platform, although they will continue supporting it for some time. The midrange router of choice is the 360

  1   2   3   >