With a view to tackle today’s enterprise security challenges Cisco has evolved a new architecture for enterprise security that will help enable business users to access information from any device and any location with a high degree of ease and security, The Secure Borderless Network architecture focuses on four critical anchors: enterprise end-points (mobile or […]
Category Archives: Cisco
How to Check an AAA-Server Authentication on Cisco ASA/PIX/FWSM CISCO-ASA-LAB# CISCO-ASA-LAB# test aaa-sever ? test aaa-server [authentication|authorization] [host |] username password For example: CISCO-ASA-LAB# test aaa-server authentication TACGroup username kartook password cisco12366 if authentication is successful (output mentioned below) INFO: Authentication Successful if authentication fails (output mentioned below) ERROR: Authentication Rejected: Unspecified
One of the most frustrating moments as a network administrator is when you desperately want to log on to a Cisco Kartook-R1-LAB and you try all possible passwords you have with no success. Fortunately there is a Cisco password recovery procedure for IOS Kartook-R1-LABs which you can follow and bypass password control in order to […]
Setup: Concentrators are configured to point to the same Radius server (Win2008) for authentication through Active Directory (AD) Concentrator have got “Radius with Expiry” enabled on the VPN group. Remote users use Latest Cisco VPN client version and Windows Vista 32bit 1) On Cisco VPN Conc. 3015 – It works perfectly. Remote user was prompted […]
This is a snippet for the Cisco Pix firewall that create a ‘limited user’ account on the firewall itself. That user will have access to all ‘show’ diagnostic commands, as well as the ability to clear the error/usage counters on interfaces and to ping other devices. This configuration does the following things: * Defines two […]
To change or set the enable password to P@s5wo61): config t enable secret p@s5w061 The enable pasword P@s5wo61) command will also set the enable password, but will leave the password in plain text and visible in the router configuration. This is not affected by the service password-encryption setting.
ACCESS LIST 1-99 IP starndard 100-199 IP extended 200-299 Protocol type-code 300-399 DECnet 400-499 XNS standard 500-599 XNS extended 600-699 Appletalk 700-799 48-bit MAC address 800-899 […]
Administrative distance: 0 Directly connected interface 0 Static route pointing to an interface 1 Static route pointing to a next-hop neighbor 5 Summarized […]
On June 24th, 2009, Learning@Cisco will implement program changes to the CCNA Voice certification. There will now be two options available for candidates wishing to achieve their CCNA Voice certification: A commercial option and an enterprise option. The new CCNA Voice Certification enterprise option assesses skills/knowledge related to the Cisco Unified Communications Manager […]