In this article I will configure, debug and shows the process of RIPv2 authentication.
This example shows how to generate 254 loop interfaces with assigned ipv4 addresses 172.16.0.1/24 up to 172.16.255.1/24. The code is:
enable
tclsh
for {set i 0} {$i < 256} {incr i} {
ios_config "int loop $i" "ip address 172.16.$i.1 255.255.255.0"
}
ios_config "end"
tclquit
and you may just simply copy and paste it into a Cisco router CLI. Therefore first run tclsh within of privileged EXEC mode
In this article I will configure dynamic complex ACL (Lock and Key). This technique is described during CCNA4 Exploration.
About Lock and Key
Description from the cisco web
Recovering from a Lost or Forgotten Password
The default configuration for the switch allows an end user with physical access to the switch to recover from a lost password by interrupting the boot process during power-on and by entering a new password. These recovery procedures require that you have physical access to the switch.
A simple comparison of the nslookup command, the Microsoft DNS tool, and dig, the linux/win based command alternative.
- Default route origination not working reliably.
- Automatic summarization turned on causes major networks to be propagated throughout the RIP domain with a metric of 1.
- Using RIPv2 on NBMA hub-and-spoke topology causes the hub router to rewrite the next hop field in the RIPv2 update to the IP address of the spoke router advertising the originalupdate, thereby creating reachability issues
Sometimes in my lab happens that students delete IOS of the switch from its flash. Unfortunately switches does not have rommon to realize quick IOS recovery over tftp. Only one way is over Xmodem.
Cat 2960 switchIOS recovery
To speed up the process of the recovery we may setup Xmodem speed to higher rate as default 9600 bits:
The flash animation explains how to configure DHCP server on a cisco router using the SDM. Where to find and how to install the SDM is described in this article.
In this article I will configure reflexive ACL. This technique is described during CCNA4 Exploration, and I'm using it during the lab exercises.
About Reflexive ACL (IP session filtering)
Description from the cisco web, regarding IOS 15.1.
Notes: Loki is a Python based framework implementing many packet generation and attack modules for Layer 3 protocols, including BGP, LDP, OSPF, VRRP and quite a few others.
Web: