IPSec and packet loss
For those of you which configuring IPSec and have packet loss in transit… Perhaps this configuration could help :
crypto ipsec client ezvpn REGISBTP
connect auto
group VPN-CLIENT2 key jsdfxkqwpoe
local-address FastEthernet0
mode network-extension
peer 22.22.22.22
username ipsec1@client2.vpn password jsdfxkqwpoe
xauth userid mode local
interface FastEthernet0
ip address 192.168.1.36 255.255.255.0
ip mtu 1460
no ip route-cache cef
ip tcp adjust-mss 1420
duplex auto
speed auto
crypto ipsec client ezvpn CLIENT2
!
interface Vlan1
ip address 10.20.0.1 255.255.255.0
ip mtu 1460
ip virtual-reassembly
ip tcp adjust-mss 1420
crypto ipsec client ezvpn CLIENT2 inside
!
ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 192.168.1.254
The really interesting command (which resolves packet loss) is :
FreeRadius and same multiple attribute
Password recovery on PIX515
For those of you, which need to reset password on PIX515, you will not find somthing like other cisco devices (button to push, BREAK+conf-reg). You must hit ESC when it is asked to you, then :
monitor>interface 0
0: i8255X @ PCI(bus:0 dev:13 irq:10)
1: i8255X @ PCI(bus:0 dev:14 irq:7 )
Using 0: i82559 @ PCI(bus:0 dev:13 irq:10), MAC: 0050.54ff.82b9
monitor>address 10.21.1.99
address 10.21.1.99
monitor>server 172.18.125.3
server 172.18.125.3
monitor>file np52.bin
file np52.bin
monitor>gateway 10.21.1.1
gateway 10.21.1.1
monitor>ping 172.18.125.3
Sending 5, 100-byte 0xf8d3 ICMP Echoes to 172.18.125.3, timeout is 4 seconds:
!!!!!
Success rate is 100 percent (5/5)
monitor>tftp
tftp np52.bin@172.18.125.3 via 10.21.1.1...................................
Received 73728 bytes
Cisco Secure PIX Firewall password tool (3.0) #0: Tue Aug 22 23:22:19 PDT 2000
Flash=i28F640J5 @ 0x300
BIOS Flash=AT29C257 @ 0xd8000
Do you wish to erase the passwords? [yn] y
Passwords have been erased.
Rebooting....
You will find np70.bin on the page : http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_password_recovery09186a008009478b.shtml
How to upgrade Brocade Ironware
Hi guys,
If like me, you begin in Brocade world and must quickly upgrade a Brocade device such as a CER2000, you can find here some (stupid) tips.
You must upgrade this device in two parts :
- Upgrade your ironware
- Upgrade your PBIF (FGPA)
Yo upgrade your ironware :
In my example, I have make the choice to put the ironware on secondary flash. For thus of you which come from Cisco world, it is not seen such a disk, where you can copy what you want.
ASN 4 bytes : How to calculate and configure it ...
To begin : How to calculate the ASN 4 bytes we need to configure it ?
So : ASN-decimal = 197632.
197632 % 65536 = 3
And
197632 - (65536 * 3) = 1024
Ok. Now we can configure it on a Cisco router :
router bgp XXXX
nei 197.66.55.33 remote-as 3.1024
I let you go on the configuration as always it works.
A little cisco stuff page for french guys
http://pteu.hd.free.fr/doku.php?id=informatique:cisco:mpls
Hope this can help. There are others categories and lot of stuff to read.
How to build a mirror port on Brocade devices ?!
I have had to use this feature on Brocade hardware stuff. I know how to do this on Cisco devices, but it is the first time I must do on Brocade switches to sniff trafic.
To do this :
FCX(config)# mirror-port ethernet 1/2/4
FCX(config)#interface ethernet 1/2/11
FCX(config-if-e1000-11)# monitor ethernet 1/2/4 both
Hope this tip can help :)
Little little challenge
How to configure a password such as (below) on the Cisco device ?
"mon?password"
Yes it is possible …
'netcat' : my best friend :)
For those of you who read this unpretentious blog, you must have noticed this week-end a maintenance window.
The DD of my hosting has crashed. To be more precise, it is crashing. His time to live is near to expire…
So to save my files on this server, a simple tar and scp is not enough. In fact, if you do this, you will create inodes and store on your FS. You will have lot of chance to have corrupted tarballs.

