Mohammad Khalil wrote:
We have Cisco device
cisco ME-C6524GT-8S (R7000) processor (revision 1.3) with 458752K/65536K bytes
of memory.
now the issue is that we have in each site a device like the mentioned and a
WiMAX RAS , all is functoning on DC power
now the issue is that we are experiencing
David Freedman wrote:
wonder if anybody has come across this before,
in 12.4(15)T, configuring a virtual-access per-user such:
I hate to suggest the obvious but since there are so many bugs in
12.4(15)T have you considered bumping that to the latest minor rev? I
think they're up to T7 or T8
Is it dumping to rommon. If so just boot :
Most likely have a corrupt config register on the switch processor.
Sh boot ! for the RP
Remote command switch sh boot ! for the SP
Conf t
Config-register 0x2102
End
Now confirm that they are correct on both the RP and SP. I think if you
Try boot [device]:[image file name]
---
Aaron Childs
Assistant Director, Networking
Westfield State College
http://www.wsc.ma.edu/it/
From: cisco-nsp-boun...@puck.nether.net [cisco-nsp-boun...@puck.nether.net] On
Behalf Of Renelson Panosky [panoci
Everytime i power this switch i am getting this error Autoboot: failed, BOOT
string is empty and i can't remember the code to bypass it can anybody help
me with this?
___
cisco-nsp mailing list cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/li
On Fri, Sep 25, 2009 at 04:41:01PM +0100, Jeff Fitzwater wrote:
That command is not available on 12.2SXI but I see that I could just
disable QOS per PORT.
It's a per-interface command, not a global command, and it's definitely
available under SXI because we're using it.
i.e.
int Po1
no ml
I use CIDR Reports, great site with useful stuff
http://www.cidr-report.org/cgi-bin/as-report?as=AS1234
Put whatever AS you want in the end of the link
HTH
Ziv
-Original Message-
From: cisco-nsp-boun...@puck.nether.net
[mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of Alex Howells
We have Cisco device
cisco ME-C6524GT-8S (R7000) processor (revision 1.3) with 458752K/65536K bytes
of memory.
Processor board ID CAT1209C0AV
R7000 CPU at 300Mhz, Implementation 0x27, Rev 3.3, 256KB L2, 1024KB L3 Cache
Last reset from power-on
SuperLAT software (copyright 1990 by Meridian Technol
wonder if anybody has come across this before,
in 12.4(15)T, configuring a virtual-access per-user such:
Framed-IP-Address = 10.0.0.1,
Cisco-AVPAIR += "lcp:interface-config=ip policy route-map TEST\nip vrf
receive TEST\n",
Cisco-AVPAIR += "ip:route=vrf TEST 192.168.100.0
You can syslog these messages remotely as well.
there are numerous ways to create a chain of events that will allow
someone to hide their tracks, the best methods are to null route the
ip of the tacacs, radius or logging server, clearing logs, etc.
- Jared
On Sep 27, 2009, at 8:30
Well, if they didn't clear your logging buffer, you will see an entry like
this in your log on the router if they went into config mode:
Sep 23 12:25:00.603: %SYS-5-CONFIG_I: Configured from console by
log_in_username on vty0 (src IP addy)
So, it will show you the username they logged in as a
Mohammad Khalil wrote:
>
> can i know from the log or using any other method if the router was hacked ??
>
When RANCID collects (or fails to collect) the configuration file off
your router every day (or hour), it will compare it to the previous run
and
On Fri, Sep 25, 2009 at 07:50:23PM +0200, Reinhold Fischer wrote:
> What would be the benefit of transporting the Ethernet preamble?
Transparently transporting OAM done within the preamble?
Best regards,
Daniel
--
CLUE-RIPE -- Jabber: d...@cluenet.de -- d...@ircnet -- PGP: 0xA85C8AA0
_
hey all
can i know from the log or using any other method if the router was hacked ??
_
Show them the way! Add maps and directions to your party invites.
http://www.microsoft.com/windows/wi
14 matches
Mail list logo