CSCug34485 - IOS OSPF LSA type vulnerability Injection

Hi people,

We are preparing the upgrade of all our routers to fix this bug or close this vulnerability.

We have some devices form the SXJ which run the 12.2 (33). However, the corrected version "known" indicates that the version 12.2 (33) SXJ6 should fix this bug, but I can't find anthing about it in the notes.

How can I do / remember it's really solved? Is this a mistake in the notes?

See you soon

Alex

The release notes are now updated.  Thank you for bringing This problem to our attention.

Tags: Cisco Tools

Similar Questions

  • OSPF AD

    Hello guys,.

    It is my first post here, so be gentle.

    I'm playing with OSPF and I came across something that I can't explain.

    Installation program:

    A router receiving a network from two places:

    R5(config-Router) #do sh ip route 155.1.67.0
    Routing for 155.1.67.0/24 entry
    Known via "ospf 1", distance 110, 66, type inter area metric
    155.1.0.3 was last updated on Serial0/0 ago 00:00:16
    Routing descriptor blocks:
    155.1.0.3, 150.1.3.3, there is, via Serial0/0 00:00:16
    Metric route 66, number of shares of traffic is 1
    * 155.1.0.1, 150.1.6.6, there is, via Serial0/0 00:00:16
    Metric route 66, number of shares of traffic is 1

    What I'm trying to do is change the ad for the road from 150.1.6.6, so that it doesn't settle in the routing table:

    router ospf 1
    Log-adjacency-changes

    distance 250 150.1.6.6 0.0.0.0 67

    !

    access-list 67 allow 155.1.67.0

    If I look at the routing table after I applied the config, I get:

    O AI 155.1.67.0/24 [110/66] via 155.1.0.3, 00:12:24, Serial0/0
    [110/66] via 155.1.0.1, 00:12:24, Serial0/0

    If I look at the "debug ip routing" output:

    * 04:04:16.198 Mar 1: RT: Add 155.1.67.0/24 via 155.1.0.1, ospf metric [250/66]
    * 04:04:16.198 Mar 1: RT: NET-RED 155.1.67.0/24
    * 04:04:16.198 Mar 1: RT: Add 155.1.67.0/24 via 155.1.0.3, ospf metric [110/66]
    * 04:04:16.198 Mar 1: RT: NET-RED 155.1.67.0/24

    If I change the config for ospf with the pub of 255

    router ospf 1
    Log-adjacency-changes

    distance 255 150.1.6.6 0.0.0.0 67

    !

    access-list 67 allow 155.1.67.0

    The road to 150.1.6.6 do not settle, and the "debug ip routing" is:

    * 04:20:00.510 Mar 1: RT: Add 155.1.67.0/24 via 155.1.0.3, ospf metric [110/66]
    * 04:20:00.510 Mar 1: RT: NET-RED 155.1.67.0/24

    Anyone know what is happening? Why doesn't the AD gets changed for the maximum value (255), but not for a smaller.

    Thank you

    Mihai

    When I try to manipulate the AD it changes it for the two routes.

    O AI 4.4.4.0 [200/21] via 13.13.13.3, 00:00:51, FastEthernet0/1

    [200/21] via 12.12.12.2, 00:00:51, FastEthernet0/0

    If I have the value 255 AD, then it is removed as if it were for you as well.

    4.0.0.0/24 is divided into subnets, subnets 1

    O AI 4.4.4.0 [110/21] via 13.13.13.3, 00:00:02, FastEthernet0/1

    If I add then another order of distance, then it works.

    4.0.0.0/24 is divided into subnets, subnets 1

    O AI 4.4.4.0 [200/21] via 13.13.13.3, 00:00:02, FastEthernet0/1

    So if I remove the command 255 distance it does not at all.

    O AI 4.4.4.0 [110/21] via 13.13.13.3, 00:00:02, FastEthernet0/1

    [110/21] via 12.12.12.2, 00:00:02, FastEthernet0/0

    If this function seems not work reliably. If we look at in-LSDB:

    R1 #sh ip ospf data sum 4.4.4.0

    Router OSPF with ID (1.1.1.1) (process ID 1)

    Summary Net link States (zone 0)

    Routing Bit set on this LSA

    LS age: 1392

    Options: (no TOS-capability, DC, upwards)

    LS type: Links (Network) summary

    The link state ID: 4.4.4.0 (summary network number)

    Advertising router: 2.2.2.2

    LS number of Seq: 80000002

    Checksum: 0x29F3

    Length: 28

    Network mask: 24

    TOS: metric 0: 11

    Routing Bit set on this LSA

    LS age: 1354

    Options: (no TOS-capability, DC, upwards)

    LS type: Links (Network) summary

    The link state ID: 4.4.4.0 (summary network number)

    Advertising router: 3.3.3.3

    LS number of Seq: 80000002

    Checksum: 0xB0E

    Length: 28

    Network mask: 24

    TOS: metric 0: 11

    Via 2.2.2.2 is older. We will try to make one at older 3.3.3.3 and then set distance.

    R2 #clear ip ospf proc

    Reset ALL OSPF process? [No]: Yes

    R1 #sh ip ospf data sum 4.4.4.0

    Router OSPF with ID (1.1.1.1) (process ID 1)

    Summary Net link States (zone 0)

    Routing Bit set on this LSA

    LS age: 26

    Options: (no TOS-capability, DC, upwards)

    LS type: Links (Network) summary

    The link state ID: 4.4.4.0 (summary network number)

    Advertising router: 2.2.2.2

    LS number of Seq: 80000003

    Checksum: 0x27F4

    Length: 28

    Network mask: 24

    TOS: metric 0: 11

    Routing Bit set on this LSA

    LS age: 1569

    Options: (no TOS-capability, DC, upwards)

    LS type: Links (Network) summary

    The link state ID: 4.4.4.0 (summary network number)

    Advertising router: 3.3.3.3

    LS number of Seq: 80000002

    Checksum: 0xB0E

    Length: 28

    Network mask: 24

    TOS: metric 0: 11

    R1(config-Router) #do sh run | s router ospf

    router ospf 1

    router ID 1.1.1.1

    Log-adjacency-changes

    distance 200 2.2.2.2 0.0.0.0 1

    R1(config-Router) #no distance 200 2.2.2.2 0.0.0.0 1

    R1(config-Router) #distance 200 3.3.3.3 0.0.0.0 1

    R1 (config - Router) #^ Z

    R1 #sh ip route

    Code: C - connected, S - static, mobile R - RIP, M-, B - BGP

    D - EIGRP, OSPF, IA - external EIGRP, O - EX - OSPF inter zone

    N1 - type external OSPF NSSA 1, N2 - type external OSPF NSSA 2

    E1 - OSPF external type 1, E2 - external OSPF of type 2

    i - IS - Su - summary IS, L1 - IS - IS level 1, L2 - IS level - 2

    -IS inter area, * - candidate failure, U - static route by user

    o - ODR, P - periodic downloaded route static

    Gateway of last resort is not set

    4.0.0.0/24 is divided into subnets, subnets 1

    O AI 4.4.4.0 [200/21] via 13.13.13.3, 00:00:03, FastEthernet0/1

    [200/21] via 12.12.12.2, 00:00:03, FastEthernet0/0

    So it seems that it only works for the oldest instance of the LSA, but then it changes for the two neighbours. So I can't work reliably on functionality

    R1 #sh worm | I have IOS

    Cisco IOS Software, software 3700 (C3725-ADVENTERPRISEK9-M), Version 12.4 (15) T10, VERSION of the SOFTWARE (fc3)

    Daniel Dib
    CCIE #37149

    Please evaluate the useful messages.

  • NO OSPF routes in the database, but in the Routing Table (read you correct)

    Hi all

    I have a lab of two roads R1 & R2 (connected with Ethernet link) like:<------------------>R1, R2

    I can see, OSPF learned routes are Routing Table, but not in the database (read you right).

    How can it be possible? I saw the other direction several times i.e. the routes in the database but not in the routing table (like, VPN L3 remote end when we use the ability VRF-lite, or we try to remove from the interarea road of the LSA, but that is not the concern here)

    I captured a few newspapers & running Setup two routers. Please check and let me know what I am doing wrong.

    I erased the OSPF neighborship several times but still the same. Tried to bounce e1/1 on R2, but no luck.

    R2 #ping 3.3.3.3 lo3 Yes

    Type to abort escape sequence.

    Send 5, echoes ICMP 100 bytes to 3.3.3.3, time-out is 2 seconds:

    Packet sent with the source 2.2.2.2 address

    !!!!!

    Success rate is 100 per cent (5/5), round-trip min/avg/max = 64/76/108 ms

    R2 #.

    R1

    R1 #.

    R1 #show int ip short bones

    Interface area PID IP address/mask cost of State Nbrs F/C

    Lo0 9.9.0.1/32 LOOP 1 1 0 0/0

    Lo3 3.3.3.3/32 LOOP 1 1 0 0/0

    Et1/0 1 0 9.9.12.1/24 10 DR 1/1

    R1 #.

    R1 #.

    R1 #show ip ospf da

    Router OSPF with ID (9.9.12.1) (process ID 1)

    Router link States (zone 0)

    Number of links ID ADV router age Seq # Link Checksum

    9.9.12.1 9.9.12.1 255 0 x 80000028 0x00BE86 3

    9.9.12.2 9.9.12.2 256 0 80000032 0x0067F8 x 2

    NET link States (zone 0)

    Link ID ADV router age Seq # Checksum

    9.9.12.1 9.9.12.1 255 0 x 80000003 0x00BDFC

    R1 #.

    R1 #.

    #show ip route R1 | b door

    Gateway of last resort is not set

    2.0.0.0/32 is divided into subnets, subnets 1

    O 2.2.2.2 [110/11] via 9.9.12.2, 00:04:17, Ethernet1/0

    3.0.0.0/32 is divided into subnets, subnets 1

    C 3.3.3.3 is directly connected, Loopback3

    9.0.0.0/8 is variably divided into subnets, 3 subnets, 2 masks

    C 9.9.0.1/32 is directly connected, Loopback0

    C 9.9.12.0/24 is directly connected, Ethernet1/0

    The 9.9.12.1/32 is directly connected, Ethernet1/0

    R1 #.

    R1 #.

    R1 #show ip os not

    Neighbor ID Pri State Dead Time Interface address

    9.9.12.2 1 FULL/BDR 9.9.12.2 Ethernet1/0 00:00:36

    R1 #.

    R1 #.

    R1 #show run | s r o

    router ospf 1

    Log-adjacency-changes

    R1 #.

    R1 #.

    *************  R2  ********************

    R2 #.

    R2 #show int ip short bones

    Interface area PID IP address/mask cost of State Nbrs F/C

    Lo3 2.2.2.2/32 LOOP 1 1 0 0/0

    Et1/1 1 0 10 BDR 1/1 9.9.12.2/24

    R2 #.

    R2 #.

    R2 #show run | router s o

    router ospf 1

    Log-adjacency-changes

    passive-interface Loopback3

    2.2.2.2 network 0.0.0.0 area 0

    Network 9.9.12.0 0.0.0.255 area 0

    R2 #.

    R2 #show da os ip

    Router OSPF with ID (9.9.12.2) (process ID 1)

    Router link States (zone 0)

    Number of links ID ADV router age Seq # Link Checksum

    9.9.12.1 9.9.12.1 326 0 x 80000028 0x00BE86 3

    9.9.12.2 9.9.12.2 325 80000032 0x0067F8 0 x 2

    NET link States (zone 0)

    Link ID ADV router age Seq # Checksum

    9.9.12.1 9.9.12.1 326 0 x 80000003 0x00BDFC

    R2 #.

    R2 #.

    R2 #show ip road | b door

    Gateway of last resort is not set

    2.0.0.0/32 is divided into subnets, subnets 1

    C 2.2.2.2 is directly connected, Loopback3

    3.0.0.0/32 is divided into subnets, subnets 1

    O 3.3.3.3 [110/11] via 9.9.12.1, 00:05:22, Ethernet1/1

    9.0.0.0/8 is variably divided into subnets, 3 subnets, 2 masks

    9.9.0.1/32 [110/11] via 9.9.12.1, 00:05:22, Ethernet1/1

    C 9.9.12.0/24 is directly connected, Ethernet1/1

    The 9.9.12.2/32 is directly connected, Ethernet1/1

    R2 #.

    R2 #.

    R2 #show ip os not

    Neighbor ID Pri State Dead Time Interface address

    9.9.12.1 1 FULL/DR 00:00:30 9.9.12.1 Ethernet1/1

    R2 #.

    R2 #.

    Hello

    an OSPF router generates only a router-LSA (Type-1) by Area.This router-LSA contains a list with all the links in this area.

    You can see your telesignalisations with 'show ip ospf router of database' - 'show ip ospf database' rather an overview:

    Router Link States (Area 0)Link ID         ADV Router      Age         Seq#       Checksum Link count9.9.12.1        9.9.12.1        326         0x80000028 0x00BE86 3
    Router 9.9.12.1 announces a router-LSA for area 0 and the LSA contains 3 links. Apparently, you created the Loopback IPs when adjacency was already formed, if not the router ID would be defined the highest loopback IP (maybe that's the reason for your confusion). HTHRolf
  • Architecture of iOS

    Hello guys.

    I'm looking on the web for some time to learn about the architecture used on iOS as the type of file system, the system management process and memory management system.

    Can anyone help me to get some documents.

    Thank you in advance.

    If I were you, I would like to ask here Developer Forums

  • IOS 9.3.1 replace 9.3 before updating?

    I've got 9.3 update message in my iPad2 that fortunately I have not being updated due to its problems. I always use 9.2.1

    With the new 9.3.1 now released is anyone able to tell me if the advice of 9.3 previous update are removed by Apple and replaced by the later version. of course, I don't want to Update 9.3 simply that it is "inline" next, if this can be done I have to jump 9.3.1 going on I tunes. Thank you

    Only the most recent iOS will be installed. Since iOS 9.3.1 is more recent than iOS 9.3, 9.3.1 is iOS that will be installed. You'll have no choice.

    To be sure, the most recent update is actually installed (assuming that you mean that the iOS 9.3 update is already downloaded on your device), remove this update file under

    Settings/general/storage & use iCloud / Manage Storage. Now find the application to update iOS 9.3, type on the application, and then on remove App.

    Now, go back to settings/general/Software Update and the new IOS 9.3.1 will be found and downloaded to your device. Update after the download finished.

  • ASA - IOS VPN dynamic routing

    I saw the docs that show how to configure ASA-ASA VPN share OSPF routes and for IOS to IOS OSPF sharing routes. Is it possible to get the ASA to IOS device?

    I'm supposed to put in place a DMVPN through some remote sites, and there is an ASA one of the sites. The EIGRP routes are expected to be shared across the DMVPN (I suppose could go to OSPF if necessary). My plan for the site of the SAA was to set up a VPN site-to-site regular with the DMVPN hub and redistribute OSPF and EIGRP routes in the other, so the rays can talk to the ASA branch by the hub.

    Is it possible, or I have to use static routes to and from the network of the ASA?

    Xavier,

    In the road map you must place a match statement corresponding prefixes/subnets that you would like to advertise in EIGRP.

    About the ASA, normally you have not to, but I don't see a problem with the addition of statements of IPP in crypto card (normally).

    With regard to orders. I always refer people to self-help ;-)

    http://www.Cisco.com/en/us/products/ps10591/products_product_indices_list.html

    more precisely:

    http://www.Cisco.com/en/us/docs/iOS/MCL/allreleasemcl/all_book.html

    Docs IPP:

    http://www.Cisco.com/en/us/docs/iOS/sec_secure_connectivity/configuration/guide/sec_rev_rte_inject_ps10592_TSD_Products_Configuration_Guide_Chapter.html

    Redistribution of EIGRP:

    http://www.Cisco.com/en/us/docs/iOS-XML/iOS/iproute_eigrp/configuration/15-1mt/Configuring_EIGRP.html#GUID-1D5F3B6E-B89A-497A-BBC4-98C4A4E21CE7

    In any case take step by step, start by checking what the situation will be when you insert routes into the routing on the hub by RRI table. Then, if necessary, redistribute static routes in EIGRP.

    Marcin

  • Highlight the text [iOS]

    I've updated yesterday my adobe reader software on my iPad Air yesterday. When I try to highlight the text he become total darkness of the highlighted text.

    I hope that you can help me

    Hello

    We have received your PDF document by e-mail.  Thank you!

    I opened the PDF in Acrobat Reader, the desktop version and confirmed that your highlight color is set to black and opacity is set to 100%.

    I suspect that accidentally set you the highlight color in black by Acrobat Reader for iOS on your iPad Air.  (The default color is yellow).

    To change the highlight color

    1. Open your PDF document in Acrobat Reader for iOS.
    2. Type on the black nail in the document.
    3. Select 'Color'... "in the context menu that appears.
    4. Click the color you want in the color scheme.

    It can be difficult to see due to the background color of your PDF document.  But you can see that the highlight color has changed and the highlighted text is readable now.

    Optionally, you can change its opacity by selecting 'opacity '.... "in step 3 above.

    Acrobat Reader will remember your highlight color choice next time.

    I hope this helps.

  • iOS TextInput displayAsPassword don't displayAsPassword

    I am building an application to launch simultaneously on Android, iOS and the office. The application includes a connection that is connected to a system of vBulletin and I met an important issue (the customer is adamant must be fixed). On iOS, if you type in a TextInput that has its displayAsPassword is set to true, it will show plain text as you type. Once you click on the TextInput, it displays correctly.

    Here is the code I use in Flex

    <s:TextInput id="inputField" width="100%" styleName="loginFields" text="Password" focusAlpha="0" focusEnabled="false" autoCorrect="false" />
    

    I then attach thematic demonstrations for the input field that perform these functions.

    private var defaultText:String = 'Password';
    
    private var passwordDisplay:Boolean = true;
    
    
    
    private function focusIn (e:FocusEvent = null):void {
         if (this.inputField.text == this.defaultText){
                this.inputField.text = '';
          }
         if (this.passwordDisplay){
                   this.inputField.displayAsPassword = true;
         }
    }
    
    private function focusOut (e:FocusEvent = null):void {
         if (this.inputField.text == ''){
                   this.inputField.text = this.defaultText;
                   if (this.passwordDisplay){
                          this.inputField.displayAsPassword = false;
                 }
          }
    }
    

    There are a lot more code in the file, but that's the only relevant. Fundamentally, the focus in, it checks if the text == the default text. If so, he empty the field. It then sets displayAsPassword to true. Focus on, it checks if the field is empty. If this is the case, it restores the default domain and displayAsPassword to false. I know the default text is integrated, but I need more features it offers.

    Now this problem (display password in plaintext, while emphasis is placed on field) is present in iOS only and it does not occur in the emulator. It works perfectly and as expected on Android and desktop. I tried to manually recreate the features (possible, but is not ideal because caretIndex isn't a TextInput property), I tried to hide the TextInput and layering of a "•" field that corresponds to the length of the entry (not possible because TextInput is StageText). I don't know what else I can try here. Any ideas?

    Thanks in advance for any help here.

    Data sheet:

    • Built and compiled using FlashBuilder 4.6
    • With the help of Air 3.1
    • Update on OS X Lion
    • Tested on both 1st and 3rd gen iPads
    • Using Flex SDK 4.6.0

    The answer to this question was provided by a user on StackOverflow.

    We have burned by some issues w/StageText when it first came out, I don't know if they have been addressed. A quick test (change the skin class for spark.skins.mobile.TextInputSkin ) can tell if that is the case.

  • What are the area NSSA and TNSSA?

    What is the significance of these?

    What type of LSA types may be announced in these areas OSPF?

    the difference between totally truncated and NSSA, it is totally truncated area does not allow summary routes to other regions and no external. Instead, he receives a default route from area border router. The NSSA is basically identical to a truncated area it does not summary routes, but in case you need to redistribute connected routes or any other routing protocol, you can use an NSSA, which will allow the external routes as Type 7 LSAS.

  • ASA 8.6 - l2l IPsec tunnel established - not possible to ping

    Hello world

    I have a problem of configuration of the CISCO ASA 5512-x (IOS 8.6).

    The IPsec tunnel is created between ASA and an another non-CISCO router (hereinafter "router"). I can send packets ping from router to ASA, but ASA is NOT able to meet these demands. Sending requests of ASA is also NOT possible.

    I'm trying to interconnect with the network 192.168.2.0/24 (CISCO, interface DMZ) premises and 192.168.3.0/24 (router).

    The CISCO ASA has a static public IP address. The router has a dynamic IP address, so I use the dynamic-map option...

    Here is the output of "show run":

    ---------------------------------------------------------------------------------------------------------------------------------------------

    ASA 1.0000 Version 2

    !

    ciscoasa hostname

    activate oBGOJTSctBcCGoTh encrypted password

    2KFQnbNIdI.2KYOU encrypted passwd

    names of

    !

    interface GigabitEthernet0/0

    nameif outside

    security-level 0

    address IP X.X.X.X 255.255.255.0

    !

    interface GigabitEthernet0/1

    nameif inside

    security-level 100

    the IP 192.168.0.1 255.255.255.0

    !

    interface GigabitEthernet0/2

    nameif DMZ

    security-level 50

    IP 192.168.2.1 255.255.255.0

    !

    interface GigabitEthernet0/3

    Shutdown

    No nameif

    no level of security

    no ip address

    !

    interface GigabitEthernet0/4

    Shutdown

    No nameif

    no level of security

    no ip address

    !

    interface GigabitEthernet0/5

    Shutdown

    No nameif

    no level of security

    no ip address

    !

    interface Management0/0

    nameif management

    security-level 100

    IP 192.168.1.1 255.255.255.0

    management only

    !

    passive FTP mode

    internal subnet object-

    192.168.0.0 subnet 255.255.255.0

    object Web Server external network-ip

    host Y.Y.Y.Y

    Network Web server object

    Home 192.168.2.100

    network vpn-local object - 192.168.2.0

    Subnet 192.168.2.0 255.255.255.0

    network vpn-remote object - 192.168.3.0

    subnet 192.168.3.0 255.255.255.0

    outside_acl list extended access permit tcp any object Web server

    outside_acl list extended access permit tcp any object webserver eq www

    access-list l2l-extensive list allowed ip, vpn-local - 192.168.2.0 vpn-remote object - 192.168.3.0

    dmz_acl access list extended icmp permitted an echo

    pager lines 24

    asdm of logging of information

    Outside 1500 MTU

    Within 1500 MTU

    MTU 1500 DMZ

    management of MTU 1500

    ICMP unreachable rate-limit 1 burst-size 1

    don't allow no asdm history

    ARP timeout 14400

    NAT (DMZ, outside) static static vpn-local destination - 192.168.2.0 vpn-local - 192.168.2.0, 192.168.3.0 - remote control-vpn vpn-remote control - 192.168.3.0

    !

    internal subnet object-

    NAT dynamic interface (indoor, outdoor)

    Network Web server object

    NAT (DMZ, outside) Web-external-ip static tcp www www Server service

    Access-Group global dmz_acl

    Route outside 0.0.0.0 0.0.0.0 Z.Z.Z.Z 1

    Timeout xlate 03:00

    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00

    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00

    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

    timeout tcp-proxy-reassembly 0:01:00

    Floating conn timeout 0:00:00

    dynamic-access-policy-registration DfltAccessPolicy

    identity of the user by default-domain LOCAL

    Enable http server

    http 192.168.1.0 255.255.255.0 management

    No snmp server location

    No snmp Server contact

    Server enable SNMP traps snmp authentication linkup, linkdown warmstart of cold start

    IKEv1 crypto ipsec transform-set ikev1-trans-set esp-3des esp-md5-hmac

    Crypto ipsec ikev2 proposal ipsec 3des-GNAT

    Esp 3des encryption protocol

    Esp integrity md5 Protocol

    Crypto dynamic-map dynMidgeMap 1 match l2l-address list

    Crypto dynamic-map dynMidgeMap 1 set pfs

    Crypto dynamic-map dynMidgeMap 1 set ikev1 ikev1-trans-set transform-set

    Crypto dynamic-map dynMidgeMap 1 set ikev2 ipsec-proposal 3des-GNAT

    Crypto dynamic-map dynMidgeMap 1 life span of seconds set association security 28800

    Crypto dynamic-map dynMidgeMap 1 the value reverse-road

    midgeMap 1 card crypto ipsec-isakmp dynamic dynMidgeMap

    midgeMap interface card crypto outside

    ISAKMP crypto identity hostname

    IKEv2 crypto policy 1

    3des encryption

    the md5 integrity

    Group 2

    FRP md5

    second life 86400

    Crypto ikev2 allow outside

    Crypto ikev1 allow outside

    IKEv1 crypto policy 1

    preshared authentication

    3des encryption

    md5 hash

    Group 2

    life 86400

    Telnet timeout 5

    SSH timeout 5

    Console timeout 0

    management of 192.168.1.2 - dhcpd address 192.168.1.254

    enable dhcpd management

    !

    a basic threat threat detection

    Statistics-list of access threat detection

    no statistical threat detection tcp-interception

    WebVPN

    internal midgeTrialPol group policy

    attributes of the strategy of group midgeTrialPol

    L2TP ipsec VPN-tunnel-Protocol ikev1, ikev2

    enable IPSec-udp

    tunnel-group midgeVpn type ipsec-l2l

    tunnel-group midgeVpn General-attributes

    Group Policy - by default-midgeTrialPol

    midgeVpn group of tunnel ipsec-attributes

    IKEv1 pre-shared-key *.

    remote control-IKEv2 pre-shared-key authentication *.

    pre-shared-key authentication local IKEv2 *.

    !

    class-map inspection_default

    match default-inspection-traffic

    !

    !

    type of policy-card inspect dns preset_dns_map

    parameters

    maximum message length automatic of customer

    message-length maximum 512

    Policy-map global_policy

    class inspection_default

    inspect the preset_dns_map dns

    inspect the ftp

    inspect h323 h225

    inspect the h323 ras

    inspect the rsh

    inspect the rtsp

    inspect esmtp

    inspect sqlnet

    inspect the skinny

    inspect sunrpc

    inspect xdmcp

    inspect the sip

    inspect the netbios

    inspect the tftp

    Review the ip options

    !

    global service-policy global_policy

    context of prompt hostname

    no remote anonymous reporting call

    Cryptochecksum:fa02572f9ff8add7bbfe622a4801e606

    : end

    ------------------------------------------------------------------------------------------------------------------------------

    X.X.X.X - ASA public IP

    Y.Y.Y.Y - a web server

    Z.Z.Z.Z - default gateway

    -------------------------------------------------------------------------------------------------------------------------------

    ASA PING:

    ciscoasa # ping DMZ 192.168.3.1

    Type to abort escape sequence.

    Send 5, echoes ICMP 100 bytes to 192.168.3.1, time-out is 2 seconds:

    ?????

    Success rate is 0% (0/5)

    PING from router (debug on CISCO):

    NAT ciscoasa #: untranslation - outside:192.168.2.1/0 to DMZ:192.168.2.1/0

    NAT: untranslation - outside:192.168.2.1/0 to DMZ:192.168.2.1/0

    NAT: untranslation - outside:192.168.2.1/0 to DMZ:192.168.2.1/0

    Outside ICMP echo request: 192.168.3.1 DMZ:192.168.2.1 ID = 3859 seq = 0 len = 40

    Outside ICMP echo request: 192.168.3.1 DMZ:192.168.2.1 ID = 3859 seq = 1 len = 40

    Outside ICMP echo request: 192.168.3.1 DMZ:192.168.2.1 ID = 3859 seq = 2 len = 40

    Outside ICMP echo request: 192.168.3.1 DMZ:192.168.2.1 ID = 3859 seq = len 3 = 40

    -------------------------------------------------------------------------------------------------------------------------------

    ciscoasa # show the road outside

    Code: C - connected, S - static, RIP, M - mobile - IGRP, R - I, B - BGP

    D - EIGRP, OSPF, IA - external EIGRP, O - EX - OSPF inter zone

    N1 - type external OSPF NSSA 1, N2 - type external OSPF NSSA 2

    E1 - OSPF external type 1, E2 - external OSPF of type 2, E - EGP

    i - IS - L1 - IS - IS level 1, L2 - IS - IS IS level 2, AI - IS inter zone

    * - candidate by default, U - static route by user, o - ODR

    P periodical downloaded static route

    Gateway of last resort is Z.Z.Z.Z to network 0.0.0.0

    C Z.Z.Z.0 255.255.255.0 is directly connected to the outside of the

    S 192.168.3.0 255.255.255.0 [1/0] via Z.Z.Z.Z, outdoors

    S * 0.0.0.0 0.0.0.0 [1/0] via Z.Z.Z.Z, outdoors

    -------------------------------------------------------------------------------------------------------------------------------

    Do you have an idea that I am wrong? Probably some bad NAT/ACL I suppose, but I could always find something only for 8.4 iOS and not 8.6... Perhaps and no doubt I already missed the configuration with the unwanted controls, but I've tried various things...

    Please, if you have an idea, let me know! Thank you very much!

    Hello

    I've never used "global" option in ACL, but it looks to be the origin of the problem. Cisco doc.

    "The global access rules are defined as a special ACL that is processed for each interface on the device for incoming traffic in the interface. Thus, although the ACL is configured once on the device, it acts as an ACL defined for Management In secondary interface-specific. (Global rules are always in the direction of In, never Out Management). "

    You ACL: access-list extended dmz_acl to any any icmp echo

    For example, when you launch the ASA, there is an echo response from the router on the external interface--> global can block.

    Then to initiate router, the ASA Launches echo-reply being blocked again.

    Try to add permit-response to echo as well.

    In addition, you can use both "inspect icmp" in world politics than the ACL.

    If none does not work, you can run another t-shoot with control packet - trace on SAA.

    THX

    MS

  • Cisco ipsec Vpn connects but cannot communicate with lan

    I have a version of cisco 1921 15.2 (4) M3 I install vpn ipsec and may have customers to connect but cannot ping anything inside.  A glimpse of what could be wrong with my config would be greatly appreciated.  I posted the configuration as well as running a few outings of ipsec.  I also tried with multiple operating systems using cisco vpn client and shrewsoft.  I am able to connect to the other VPN ipsec running 1921 both of these computers by using a client.

    Thanks for any assistance

    SH run

    !
    AAA new-model
    !
    !
    AAA authentication login radius_auth local radius group
    connection of AAA VPN_AUTHEN group local RADIUS authentication
    AAA authorization network_vpn_author LAN
    !
    !
    !
    !
    !
    AAA - the id of the joint session
    clock timezone PST - 8 0
    clock to summer time recurring PST
    !
    no ip source route
    decline of the IP options
    IP cef
    !
    !
    !
    !
    !
    !
    no ip bootp Server
    no ip domain search
    domain IP XXX.local
    inspect the high IP 3000 max-incomplete
    inspect the low IP 2800 max-incomplete
    IP inspect a low minute 2800
    IP inspect a high minute 3000
    inspect the IP icmp SDM_LOW name
    inspect the IP name SDM_LOW esmtp
    inspect the tcp IP SDM_LOW name
    inspect the IP udp SDM_LOW name
    IP inspect name SDM_LOW ssh
    No ipv6 cef
    !
    Authenticated MultiLink bundle-name Panel
    !
    !
    Crypto pki trustpoint TP-self-signed-2909270577
    enrollment selfsigned
    name of the object cn = IOS - Self - signed - certificate - 2909270577
    revocation checking no
    rsakeypair TP-self-signed-2909270577
    !
    !
    TP-self-signed-2909270577 crypto pki certificate chain
    certificate self-signed 01
    license udi pid CISCO1921/K9 sn FTX1715818R
    !
    !
    Archives
    The config log
    Enable logging
    size of logging 1000
    notify the contenttype in clear syslog
    the ADMIN_HOSTS object-group network
    71.X.X.X 71.X.X.X range
    !
    name of user name1 secret privilege 15 4 XXXXXXX

    !
    redundancy
    !
    !
    !
    !
    !
    property intellectual ssh time 60
    property intellectual ssh authentication-2 retries
    property intellectual ssh event logging
    property intellectual ssh version 2
    !
    !
    crypto ISAKMP policy 1
    BA 3des
    preshared authentication
    Group 2
    !
    ISAKMP crypto client configuration group roaming_vpn
    key XXXXX
    DNS 192.168.10.10 10.1.1.1
    XXX.local field
    pool VPN_POOL_1
    ACL client_vpn_traffic
    netmask 255.255.255.0
    !
    !
    Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac
    tunnel mode
    !
    !
    !
    crypto dynamic-map VPN_DYNMAP_1 1
    Set the security association idle time 1800
    game of transformation-ESP-3DES-SHA
    market arriere-route
    !
    !
    list of authentication of card crypto SDM_CMAP_1 client VPN_AUTHEN
    map SDM_CMAP_1 isakmp authorization list network_vpn_author crypto
    client configuration address map SDM_CMAP_1 crypto answer
    map SDM_CMAP_1 65535-isakmp dynamic VPN_DYNMAP_1 ipsec crypto
    !
    !
    !
    !
    !
    the Embedded-Service-Engine0/0 interface
    no ip address
    Shutdown
    !
    interface GigabitEthernet0/0
    IP 76.W.E.R 255.255.255.248
    IP access-group ATT_Outside_In in
    no ip redirection
    no ip unreachable
    no ip proxy-arp
    NAT outside IP
    inspect the SDM_LOW over IP
    IP virtual-reassembly in
    load-interval 30
    automatic duplex
    automatic speed
    No cdp enable
    No mop enabled
    map SDM_CMAP_1 crypto
    !
    interface GigabitEthernet0/1
    no ip address
    load-interval 30
    automatic duplex
    automatic speed
    !
    interface GigabitEthernet0/1.10
    encapsulation dot1Q 1 native
    IP 192.168.10.1 255.255.255.0
    no ip redirection
    no ip unreachable
    no ip proxy-arp
    property intellectual accounting-access violations
    IP nat inside
    IP virtual-reassembly in
    !
    interface GigabitEthernet0/1.100
    encapsulation dot1Q 100
    10.1.1.254 IP address 255.255.255.0
    no ip redirection
    no ip unreachable
    no ip proxy-arp
    IP nat inside
    IP virtual-reassembly in
    !
    interface GigabitEthernet0/1,200
    encapsulation dot1Q 200
    IP 10.1.2.254 255.255.255.0
    no ip redirection
    no ip unreachable
    no ip proxy-arp
    IP nat inside
    IP virtual-reassembly in
    IP tcp adjust-mss 1452
    !
    local IP VPN_POOL_1 192.168.168.193 pool 192.168.168.254
    IP forward-Protocol ND
    !
    IP http server
    IP http authentication aaa-authentication of connection ADMIN_AUTHEN
    IP http secure server
    IP http timeout policy slowed down 60 life 86400 request 10000
    !
    IP nat inside source map route ATT_NAT_LIST interface GigabitEthernet0/0 overload
    IP nat inside source static tcp 192.168.10.10 25 expandable 25 76.W.E.R
    IP nat inside source static tcp 192.168.10.10 80 76.W.E.R 80 extensible
    IP nat inside source static tcp 192.168.10.10 76.W.E.R expandable 443 443
    IP nat inside source static tcp 192.168.10.10 76.W.E.R expandable 987 987
    IP route 0.0.0.0 0.0.0.0 76.W.E.F
    !
    ATT_Outside_In extended IP access list
    permit tcp object-group ADMIN_HOSTS any eq 22
    allow any host 76.W.E.R eq www tcp
    allow any host 76.W.E.R eq 443 tcp
    allow 987 tcp any host 76.W.E.R eq
    allow any host 76.W.E.R eq tcp smtp
    permit any any icmp echo response
    allow icmp a whole
    allow udp any any eq isakmp
    allow an esp
    allow a whole ahp
    permit any any eq non500-isakmp udp
    deny ip 10.0.0.0 0.255.255.255 everything
    deny ip 172.16.0.0 0.15.255.255 all
    deny ip 192.168.0.0 0.0.255.255 everything
    deny ip 127.0.0.0 0.255.255.255 everything
    refuse the ip 255.255.255.255 host everything
    refuse the host ip 0.0.0.0 everything
    NAT_LIST extended IP access list
    IP 10.1.0.0 allow 0.0.255.255 everything
    permit ip 192.168.10.0 0.0.0.255 any
    deny ip 192.168.10.0 0.0.0.255 192.168.168.192 0.0.0.63
    refuse the 10.1.1.0 ip 0.0.0.255 192.168.168.192 0.0.0.63
    deny ip 10.1.2.0 0.0.0.255 192.168.168.192 0.0.0.63
    client_vpn_traffic extended IP access list
    permit ip 192.168.10.0 0.0.0.255 192.168.168.192 0.0.0.63
    ip licensing 10.1.1.0 0.0.0.255 192.168.168.192 0.0.0.63
    IP 10.1.2.0 allow 0.0.0.255 10.1.1.0 0.0.0.255
    !
    radius of the IP source-interface GigabitEthernet0/1.10
    Logging trap errors
    logging source hostname id
    logging source-interface GigabitEthernet0/1.10
    !
    ATT_NAT_LIST allowed 20 route map
    corresponds to the IP NAT_LIST
    is the interface GigabitEthernet0/0
    !
    !
    SNMP-server community [email protected] / * /! s RO
    Server enable SNMP traps snmp authentication linkdown, linkup warmstart cold start
    Server enable SNMP traps vrrp
    Server SNMP enable transceiver traps all the
    Server enable SNMP traps ds1
    Enable SNMP-Server intercepts the message-send-call failed remote server failure
    Enable SNMP-Server intercepts ATS
    Server enable SNMP traps eigrp
    Server enable SNMP traps ospf-change of State
    Enable SNMP-Server intercepts ospf errors
    SNMP Server enable ospf retransmit traps
    Server enable SNMP traps ospf lsa
    Server enable SNMP traps ospf nssa-trans-changes state cisco-change specific
    SNMP server activate interface specific cisco-ospf traps shamlink state change
    SNMP Server enable neighbor traps cisco-specific ospf to the State shamlink change
    Enable SNMP-Server intercepts specific to cisco ospf errors
    SNMP server activate specific cisco ospf retransmit traps
    Server enable SNMP traps ospf cisco specific lsa
    SNMP server activate license traps
    Server enable SNMP traps envmon
    traps to enable SNMP-Server ethernet cfm cc mep-top low-mep Dispatcher loop config
    Enable SNMP-Server intercepts ethernet cfm overlap missing mep mep-unknown service-up
    Server enable SNMP traps auth framework sec-violation
    Server enable SNMP traps c3g
    entity-sensor threshold traps SNMP-server enable
    Server enable SNMP traps adslline
    Server enable SNMP traps vdsl2line
    Server enable SNMP traps icsudsu
    Server enable SNMP traps ISDN call-information
    Server enable SNMP traps ISDN layer2
    Server enable SNMP traps ISDN chan-not-available
    Server enable SNMP traps ISDN ietf
    Server enable SNMP traps ds0-busyout
    Server enable SNMP traps ds1-loopback
    SNMP-Server enable traps energywise
    Server enable SNMP traps vstack
    SNMP traps enable mac-notification server
    Server enable SNMP traps bgp cbgp2
    Enable SNMP-Server intercepts isis
    Server enable SNMP traps ospfv3-change of State
    Enable SNMP-Server intercepts ospfv3 errors
    Server enable SNMP traps aaa_server
    Server enable SNMP traps atm subif
    Server enable SNMP traps cef resources-failure-change of State peer peer-fib-state-change inconsistency
    Server enable SNMP traps memory bufferpeak
    Server enable SNMP traps cnpd
    Server enable SNMP traps config-copy
    config SNMP-server enable traps
    Server enable SNMP traps config-ctid
    entity of traps activate SNMP Server
    Server enable SNMP traps fru-ctrl
    SNMP traps-policy resources enable server
    Server SNMP enable traps-Manager of event
    Server enable SNMP traps frames multi-links bundle-incompatibility
    SNMP traps-frame relay enable server
    Server enable SNMP traps subif frame relay
    Server enable SNMP traps hsrp
    Server enable SNMP traps ipmulticast
    Server enable SNMP traps msdp
    Server enable SNMP traps mvpn
    Server enable SNMP traps PNDH nhs
    Server enable SNMP traps PNDH nhc
    Server enable SNMP traps PNDH PSN
    Server enable SNMP traps PNDH exceeded quota
    Server enable SNMP traps pim neighbor-rp-mapping-change invalid-pim-message of change
    Server enable SNMP traps pppoe
    Enable SNMP-server holds the CPU threshold
    SNMP Server enable rsvp traps
    Server enable SNMP traps syslog
    Server enable SNMP traps l2tun session
    Server enable SNMP traps l2tun pseudowire status
    Server enable SNMP traps vtp
    Enable SNMP-Server intercepts waas
    Server enable SNMP traps ipsla
    Server enable SNMP traps bfd
    Server enable SNMP traps gdoi gm-early-registration
    Server enable SNMP traps gdoi full-save-gm
    Server enable SNMP traps gdoi gm-re-register
    Server enable SNMP traps gdoi gm - generate a new key-rcvd
    Server enable SNMP traps gdoi gm - generate a new key-fail
    Server enable SNMP traps gdoi ks - generate a new key-pushed
    Enable SNMP traps gdoi gm-incomplete-cfg Server
    Enable SNMP-Server intercepts gdoi ks-No.-rsa-keys
    Server enable SNMP traps gdoi ks-new-registration
    Server enable SNMP traps gdoi ks-reg-complete
    Enable SNMP-Server Firewall state of traps
    SNMP-Server enable traps ike policy add
    Enable SNMP-Server intercepts removal of ike policy
    Enable SNMP-Server intercepts start ike tunnel
    Enable SNMP-Server intercepts stop ike tunnel
    SNMP server activate ipsec cryptomap add traps
    SNMP server activate ipsec cryptomap remove traps
    SNMP server activate ipsec cryptomap attach traps
    SNMP server activate ipsec cryptomap detach traps
    Server SNMP traps enable ipsec tunnel beginning
    SNMP-Server enable traps stop ipsec tunnel
    Enable SNMP-server holds too many associations of ipsec security
    Enable SNMP-Server intercepts alarm ethernet cfm
    Enable SNMP-Server intercepts rf
    Server enable SNMP traps vrfmib vrf - up low-vrf vnet-trunk-up low-trunk-vnet
    Server RADIUS dead-criteria life 2
    RADIUS-server host 192.168.10.10
    Server RADIUS 2 timeout
    Server RADIUS XXXXXXX key
    !
    !
    !
    control plan
    !
    !

    Line con 0
    privilege level 15
    connection of authentication radius_auth
    line to 0
    line 2
    no activation-character
    No exec
    preferred no transport
    transport of entry all
    transport output pad rlogin lapb - your MOP v120 udptn ssh telnet
    StopBits 1
    line vty 0 4
    privilege level 15
    connection of authentication radius_auth
    entry ssh transport
    line vty 5 15
    privilege level 15
    connection of authentication radius_auth
    entry ssh transport
    !
    Scheduler allocate 20000 1000
    NTP-Calendar Update
    Server NTP 192.168.10.10
    NTP 64.250.229.100 Server
    !
    end

    Router ipsec crypto #sh her

    Interface: GigabitEthernet0/0
    Tag crypto map: SDM_CMAP_1, local addr 76.W.E.R

    protégé of the vrf: (none)
    local ident (addr, mask, prot, port): (0.0.0.0/0.0.0.0/0/0)
    Remote ident (addr, mask, prot, port): (192.168.168.213/255.255.255.255/0/0)
    current_peer 75.X.X.X port 2642
    LICENCE, flags is {}
    #pkts program: 1953, #pkts encrypt: 1953, #pkts digest: 1953
    #pkts decaps: 1963, #pkts decrypt: 1963, #pkts check: 1963
    compressed #pkts: 0, unzipped #pkts: 0
    #pkts uncompressed: 0, #pkts compr. has failed: 0
    #pkts not unpacked: 0, #pkts decompress failed: 0
    Errors #send 0, #recv 0 errors

    local crypto endpt. : 76.W.E.R, remote Start crypto. : 75.X.X.X
    Path mtu 1500, mtu 1500 ip, ip mtu IDB GigabitEthernet0/0
    current outbound SPI: 0x5D423270 (1564619376)
    PFS (Y/N): N, Diffie-Hellman group: no

    SAS of the esp on arrival:
    SPI: 0x2A5177DD (709982173)
    transform: esp-3des esp-sha-hmac.
    running parameters = {Tunnel UDP-program}
    Conn ID: 2115, flow_id: VPN:115 on board, sibling_flags 80000040, crypto card: SDM_CMAP_1
    calendar of his: service life remaining (k/s) key: (4301748/2809)
    Size IV: 8 bytes
    support for replay detection: Y
    Status: ACTIVE (ACTIVE)

    the arrival ah sas:

    SAS of the CFP on arrival:

    outgoing esp sas:
    SPI: 0x5D423270 (1564619376)
    transform: esp-3des esp-sha-hmac.
    running parameters = {Tunnel UDP-program}
    Conn ID: 2116, flow_id: VPN:116 on board, sibling_flags 80000040, crypto card: SDM_CMAP_1
    calendar of his: service life remaining (k/s) key: (4301637/2809)
    Size IV: 8 bytes
    support for replay detection: Y
    Status: ACTIVE (ACTIVE)

    outgoing ah sas:

    outgoing CFP sas:

    Routing crypto isakmp #sh its
    IPv4 Crypto ISAKMP Security Association
    DST CBC conn-State id
    76.W.E.R 75.X.X.X QM_IDLE 1055 ACTIVE

    IPv6 Crypto ISAKMP Security Association

    In your acl, nat, you will need to refuse your VPN traffic before you allow the subnet at all. Just put all the declarations of refusal before the declarations of licence.

    Sent by Cisco Support technique iPhone App

  • IPSEC tunnel and Routing Support protocols

    Hello world

    I read that IPSEC does not support routing with VPN's Site to the other protocols because both are Layer4.

    This means that if Site A must reach the B Site over a WAN link, we use static IP on the Site A and Site B router?

    In my lab at home I config Site to Site VPN systems and they work correctly using OSPF does that mean that IPSEC supports the routing protocol?

    IF someone can explain this please?

    OSPF config one side

    router ospf 1

    3.4.4.4 router ID

    Log-adjacency-changes

    area 10-link virtual 10.4.4.1

    passive-interface Vlan10

    passive-interface Vlan20

    3.4.4.4 to network 0.0.0.0 area 0

    network 192.168.4.0 0.0.0.255 area 10

    network 192.168.5.0 0.0.0.255 area 0

    network 192.168.10.0 0.0.0.255 area 0

    network 192.168.20.0 0.0.0.255 area 0

    network 192.168.30.0 0.0.0.255 area 0

    network 192.168.98.0 0.0.0.255 area 0

    network 192.168.99.0 0.0.0.255 area 0

    3550SMIA #sh ip route

    Code: C - connected, S - static, mobile R - RIP, M-, B - BGP

    D - EIGRP, OSPF, IA - external EIGRP, O - EX - OSPF inter zone

    N1 - type external OSPF NSSA 1, N2 - type external OSPF NSSA 2

    E1 - OSPF external type 1, E2 - external OSPF of type 2

    i - IS - Su - summary IS, L1 - IS - IS level 1, L2 - IS level - 2

    -IS inter area, * - candidate failure, U - static route by user

    o - ODR, P - periodic downloaded route static

    Gateway of last resort is 192.168.5.3 to network 0.0.0.0

    192.168.12.0/24 [13/110] through 192.168.5.3, 3d17h, FastEthernet0/11

    100.0.0.0/32 is divided into subnets, subnets 1

    O 100.100.100.100 [110/3] through 192.168.5.3, 3d17h, FastEthernet0/11

    3.0.0.0/8 is variably divided into subnets, 2 subnets, 2 masks

    O 3.3.3.3/32 [110/2] via 192.168.5.3, 3d17h, FastEthernet0/11

    C 3.4.4.0/24 is directly connected, Loopback0

    C 192.168.30.0/24 is directly connected, Vlan30

    64.0.0.0/32 is divided into subnets, subnets 1

    O E2 64.59.135.150 [110/300] through 192.168.5.3, 1d09h, FastEthernet0/11

    4.0.0.0/32 is divided into subnets, subnets 1

    O 4.4.4.4 [110/2] via 192.168.5.3, 3d17h, FastEthernet0/11

    C 192.168.10.0/24 is directly connected, Vlan10

    172.31.0.0/24 is divided into subnets, 4 subnets

    O E2 172.31.3.0 [110/300] through 192.168.5.3, 3d17h, FastEthernet0/11

    O E2 172.31.2.0 [110/300] through 192.168.5.3, 3d17h, FastEthernet0/11

    O E2 172.31.1.0 [110/300] through 192.168.5.3, 3d17h, FastEthernet0/11

    O E2 172.31.0.0 [110/300] through 192.168.5.3, 3d17h, FastEthernet0/11

    O 192.168.11.0/24 [110/3] through 192.168.5.3, 3d17h, FastEthernet0/11

    O 192.168.98.0/24 [110/2] via 192.168.99.1, 3d17h, FastEthernet0/8

    C 192.168.99.0/24 is directly connected, FastEthernet0/8

    192.168.20.0/24 C is directly connected, Vlan20

    192.168.5.0/31 is divided into subnets, subnets 1

    C 192.168.5.2 is directly connected, FastEthernet0/11

    C 10.0.0.0/8 is directly connected, Tunnel0

    192.168.6.0/31 is divided into subnets, subnets 1

    O 192.168.6.2 [110/2] via 192.168.5.3, 3d17h, FastEthernet0/11

    192.168.1.0/24 [13/110] through 192.168.5.3, 3d17h, FastEthernet0/11

    O * E2 0.0.0.0/0 [110/1] via 192.168.5.3, 1d09h, FastEthernet0/11

    B side Config

    Side A

    router ospf 1

    Log-adjacency-changes

    network 192.168.97.0 0.0.0.255 area 0

    network 192.168.98.0 0.0.0.255 area 0

    network 192.168.99.0 0.0.0.255 area 0

    1811w # sh ip route

    Code: C - connected, S - static, mobile R - RIP, M-, B - BGP

    D - EIGRP, OSPF, IA - external EIGRP, O - EX - OSPF inter zone

    N1 - type external OSPF NSSA 1, N2 - type external OSPF NSSA 2

    E1 - OSPF external type 1, E2 - external OSPF of type 2

    i - IS - Su - summary IS, L1 - IS - IS level 1, L2 - IS level - 2

    -IS inter area, * - candidate failure, U - static route by user

    o - ODR, P - periodic downloaded route static

    Gateway of last resort is 192.168.99.2 to network 0.0.0.0

    192.168.12.0/24 [110/14] through 192.168.99.2, 3d17h, FastEthernet0

    100.0.0.0/32 is divided into subnets, subnets 1

    O 100.100.100.100 [110/4] through 192.168.99.2, 3d17h, FastEthernet0

    3.0.0.0/32 is divided into subnets, 2 subnets

    O 3.3.3.3 [110/3] through 192.168.99.2, 3d17h, FastEthernet0

    O 3.4.4.4 [110/2] via 192.168.99.2, 3d17h, FastEthernet0

    O 192.168.30.0/24 [110/2] via 192.168.99.2, 3d17h, FastEthernet0

    64.0.0.0/32 is divided into subnets, subnets 1

    O E2 64.59.135.150 [110/300] through 192.168.99.2, 1d09h, FastEthernet0

    4.0.0.0/32 is divided into subnets, subnets 1

    O 4.4.4.4 [110/3] through 192.168.99.2, 3d17h, FastEthernet0

    O 192.168.10.0/24 [110/2] via 192.168.99.2, 3d17h, FastEthernet0

    172.31.0.0/24 is divided into subnets, 4 subnets

    O E2 172.31.3.0 [110/300] through 192.168.99.2, 3d17h, FastEthernet0

    O E2 172.31.2.0 [110/300] through 192.168.99.2, 3d17h, FastEthernet0

    O E2 172.31.1.0 [110/300] through 192.168.99.2, 3d17h, FastEthernet0

    O E2 172.31.0.0 [110/300] through 192.168.99.2, 3d17h, FastEthernet0

    O 192.168.11.0/24 [110/4] through 192.168.99.2, 3d17h, FastEthernet0

    C 192.168.98.0/24 is directly connected, BVI98

    C 192.168.99.0/24 is directly connected, FastEthernet0

    O 192.168.20.0/24 [110/2] via 192.168.99.2, 3d17h, FastEthernet0

    192.168.5.0/31 is divided into subnets, subnets 1

    O 192.168.5.2 [110/2] via 192.168.99.2, 3d17h, FastEthernet0

    192.168.6.0/31 is divided into subnets, subnets 1

    O 192.168.6.2 [110/3] through 192.168.99.2, 3d17h, FastEthernet0

    192.168.1.0/24 [110/14] through 192.168.99.2, 3d17h, FastEthernet0

    O * E2 0.0.0.0/0 [110/1] via 192.168.99.2, 1d09h, FastEthernet0

    Thank you

    Mahesh

    Mahesh.

    Indeed, solution based purely crypto-card are not compatible with a routing protocol.  Crypto card however is the legacy config we support on IOS. The best practice is to use the protection of tunnel. Any routing protocol would work then.

    for example

    https://learningnetwork.Cisco.com/docs/doc-2457

    It's the best solution we currenty have

  • Cisco 861 DHCP + public static IPs + NAT/DNAT. Help.

    Hello

    I used to use a server of self-made CentOS for intranet for my small office, but I have bouth a few days ago a router Cisco 861 to replace the linux machine.

    My needs:

    1. I have 2 public classes of IP from my ISP. 1 class is limitted 80mbit upload, the other to 30mbit upload. So I need some sort of DNAT to be able to know exactly what intranet computer uses internet great and including a single internet limitted.

    2. I need DHCP server with static IP addresses (a computer must always have the same IP address, etc)... I have my needs for this.

    3. also I need external access to certain servers on the inside (web, ftp, etc.)

    Parameters:

    (Dhcp) intranet: 10.11.12.x 255.255.255.0)

    1 public Internet: 89.45.204.118 255.255.255.248 (89.45.204.117 as gateway)

    Public Internet 2: some other class in the same IP (assume 89.45.204.58/24 for example)

    DNS: 89.45.200.1

    So far so good, everything seems simple and I can do this in 2 hours on a centos linux box (correct roads, active ip Routing and some rules for NAT/SNAT/DNAT iptables).

    But on this new router of Centos... Well, I am not yet able to ping the outside world, nor inside world I'm tired reading the forums, documentation... I want (at the beginning) to a simple scenario: vlan + dhcp, SEA4 with 1 public ip address and ACCESS to the real world. I was not able to reach even not that much.

    OK, first of all, here is a copy of the running configuration:

    Building configuration...

    Current configuration: 5826 bytes

    version 15.1

    no service button

    horodateurs service debug datetime msec

    Log service timestamps datetime msec

    no password encryption service

    !

    hostname cisco861

    !

    boot-start-marker

    boot-end-marker

    !

    !

    enable secret 5 [out-of-context]

    activate the password [out-of-context]

    !

    No aaa new-model

    iomem 10 memory size

    Crypto pki token removal timeout default 0

    !

    Crypto pki trustpoint TP-self-signed-2459631067

    enrollment selfsigned

    name of the object cn = IOS - Self - signed - certificate - 2459631067

    revocation checking no

    rsakeypair TP-self-signed-2459631067

    !

    !

    TP-self-signed-2459631067 crypto pki certificate chain

    certificate self-signed 01

    [deleted-of-context]

    quit smoking

    IP source-route

    !

    !

    DHCP excluded-address IP 10.11.12.1

    DHCP excluded-address IP 10.11.12.251 10.11.12.254

    !

    IP dhcp pool cisco861-iasi

    import all

    Network 10.11.12.0 255.255.255.0

    domain cisco861.iasi

    DNS-server 10.11.12.1 89.45.200.1

    router by default - 10.11.12.1

    -NetBIOS 10.11.12.2 name server 10.11.12.3

    !

    IP dhcp pool testPC

    the host 10.11.12.111 255.255.255.0

    0100.c030.1012.09 client identifier

    testpc-01 customer name

    !

    !

    IP cef

    IP domain name cisco861.iasi

    name of the IP-server 89.45.200.1

    !

    !

    license udi pid CISCO861-K9 sn [out-of-context]

    !

    !

    username admin secret of privilege 15 4 [removed-of-context]

    !

    !

    interface FastEthernet0

    no ip address

    !

    interface FastEthernet1

    no ip address

    !

    interface FastEthernet2

    no ip address

    !

    interface FastEthernet3

    no ip address

    !

    interface FastEthernet4

    external description $ ETH - LAN$

    IP 89.45.204.118 255.255.255.248

    NAT outside IP

    IP virtual-reassembly in

    full duplex

    automatic speed

    !

    interface Vlan1

    Description $ETH - SW - LAUNCH, INTF-INFO-HWIC $$ $4ESW

    10.11.12.1 IP address 255.255.255.0

    IP nat inside

    IP virtual-reassembly in

    IP tcp adjust-mss 1452

    !

    IP forward-Protocol ND

    IP http server

    23 class IP http access

    local IP http authentication

    IP http secure server

    IP http timeout policy slowed down 60 life 86400 request 10000

    !

    overload of IP nat inside source list 23 interface FastEthernet4

    IP route 0.0.0.0 0.0.0.0 89.45.204.117

    !

    access-list 23 permit 10.11.12.0 0.0.0.255

    Dialer-list 1 ip protocol allow

    SNMP-Server RO community cisco861.Iasi

    !

    Line con 0

    local connection

    line to 0

    line vty 0 4

    access-class 23 in

    privilege level 15

    password [out-of-context]

    local connection

    transport input telnet ssh

    !

    end

    (I couldn't find any CODE or a QUOTE as on other forums... so I tried to indent the config for you guys)

    In addition, here are a few troubleshooting commands I used, maybe they can help some of know you what is the problem

    cisco861 #show ip interface brief

    Interface IP-Address OK? Method status Prot

    Commissioner of official languages

    FastEthernet0 unassigned YES unset upward, upward

    FastEthernet1 unassigned YES unset down down

    FastEthernet2 unassigned YES unset down down

    FastEthernet3 unassigned YES unset down down

    FastEthernet4 89.45.204.118 YES manual up up

    NVI0 89.45.204.118 YES unset upward, upward

    Vlan1 10.11.12.1 YES manual up up

    cisco861 #show mac-address-table

    Port of destination address Destination address Type VLAN

    -------------------  ------------  ----  --------------------

    dynamic xxxx.xxxx.xxxx 1 FastEthernet0

    XXXX.xxxx.xxxx Self 1 Vlan1

    ODD: it has no mac address for the connected FastEthernet 4. How comes? I changed 3 cables. All cables are OK.

    cisco861 #show ip route

    Code: L - local, C - connected, S - static, mobile R - RIP, M-, B - BGP

    D - EIGRP, OSPF, IA - external EIGRP, O - EX - OSPF inter zone

    N1 - type external OSPF NSSA 1, N2 - type external OSPF NSSA 2

    E1 - OSPF external type 1, E2 - external OSPF of type 2

    i - IS - Su - summary IS, L1 - IS - IS level 1, L2 - IS level - 2

    -IS inter area, * - candidate failure, U - static route by user

    o - ODR, P - periodic downloaded route static, H - PNDH, l - LISP

    + - replicated road, % - next hop override

    Gateway of last resort is 89.45.204.117 to network 0.0.0.0

    S * 0.0.0.0/0 [1/0] via 89.45.204.117

    10.0.0.0/8 is variably divided into subnets, 2 subnets, 2 masks

    C 10.11.12.0/24 is directly connected, Vlan1

    L 10.11.12.1/32 is directly connected, Vlan1

    89.0.0.0/8 is variably divided into subnets, 2 subnets, 2 masks

    C 89.45.204.117/29 is directly connected, FastEthernet4

    L 89.45.204.118/32 is directly connected, FastEthernet4

    #show FastEthernet 4 router interfaces

    FastEthernet4 is up, line protocol is up

    Material is PQII_PRO_UEC, the address is xxxx.xxxx.xxxx (bia xxxx.xxxx.xxxx)

    Description: external$ ETH - LAN$

    The Internet address is 89.45.204.118/29

    MTU 1500 bytes, BW 100000 Kbit/s, DLY 100 usec,

    reliability 255/255, txload 1/255, rxload 1/255

    Encapsulation ARPA, loopback not set

    KeepAlive set (10 sec)

    Full-duplex, 100 MB/s, 100BaseTX/FX

    Type of the ARP: ARPA, ARP Timeout 04:00

    Last entry at 00:02:54, 00:00:00 exit, exit hang never

    Final cleaning of "show interface" counters never

    Input queue: 0/75/0/0 (size/max/drops/dumps); Total output drops: 0

    Strategy of queues: fifo

    Output queue: 0/40 (size/max)

    5 minute input rate 0 bps, 0 packets/s

    5 minute output rate 0 bps, 0 packets/s

    28 sachets of entrance, 3909 bytes

    Received 14 emissions (0 of IP multicasts)

    0 Runts, 0 giants, 0 shifters

    entry 0, 0 CRC errors, frame 0, saturation 0, 0 ignored

    Guard Dog 0

    entry packets 0 with condition of dribble detected

    output of 110 packages, 25366 bytes, 0 underruns

    0 output errors, 0 collisions, 3 interface resets

    unknown protocol 0 drops

    0 babbles, collision end 0, 0 deferred

    1 lost carrier, 0 no carrier

    output buffer, the output buffers 0 permuted 0 failures

    interfaces of router #show vlan 1

    Vlan1 is up, line protocol is up

    Material is EtherSVI, the address is xxxx.xxxx.xxxx (bia xxxx.xxxx.xxxx)

    Description: $ETH - SW - LAUNCH$ $INTF - INFO - HWIC-$4ESW

    The Internet address is 10.11.12.1/24

    MTU 1500 bytes, BW 100000 Kbit/s, DLY 100 usec,

    reliability 255/255, txload 1/255, rxload 1/255

    Encapsulation ARPA, loopback not set

    KeepAlive not supported

    Type of the ARP: ARPA, ARP Timeout 04:00

    Last entry of 00:00:06, output ever, blocking exit ever

    Final cleaning of "show interface" counters never

    Input queue: 0/75/0/0 (size/max/drops/dumps); Total output drops: 0

    Strategy of queues: fifo

    Output queue: 0/40 (size/max)

    5 minute input rate 0 bps, 0 packets/s

    5 minute output rate 0 bps, 0 packets/s

    packets of 512, 53381 bytes, 0 no buffer entry

    Received 185 broadcasts (0 of IP multicasts)

    0 Runts, 0 giants, 0 shifters

    entry 0, 0 CRC errors, frame 0, saturation 0, 0 ignored

    exit 180 packages, 13248 bytes, 0 underruns

    output 0 error, 1 interface resets

    unknown protocol 0 drops

    output buffer, the output buffers 0 permuted 0 failures

    Also, I tried other combinations, as follows

    1. IP route static inter-vfr
    2. IP default-gateway 89.45.204.117 (ofc combined with no ip Routing). I can ping 8.8.8.8 in this scenario, but not other IP addresses. WTF?
    3. network default IP 89.45.204.117 (the bridge) - nothing
    4. 89.45.204.118 default IP network - bothing
    5. IP route 0.0.0.0 0.0.0.0 FastEthernet 4 (with or without 89.45.204.117, with or without permanent keyword)

    Please, have mercy and help me.

    P.S. I've also attached the configuration and troubleshooting files if it will be easier for you to follow this path.

    A big thank you and God bless you!

    Hello

    IP nat inside source static 10.11.12.33 89.45.204.120 (host - to - host)

    IP nat inside source static tcp 10.11.12.33 80 89.45.204.120 80 (port translation host-to - host)

    RES

    Paul

    Please don't forget to rate this post if it has been helpful.

  • DMVPN Phases

    I'm a little confused now, because I realized that I can't understand DMVPN phases.

    Can someone explain to me - what is the difference between Full-Terminal and Hub-and-Spoke network.

    (1) network hub-and-Spoke - all traffic DMVPN through HUB. is it not? and the difference between dynamic and static VPN is that IPSec tunnels are only created when necessary?

    (2) network terminal full - rays ask for the PNDH table hub and establish direct tunnels (traffic passes of talk of talks about his)?

    When this information is correct, so where can I find a guide to configuring DMVPN in mesh network full?

    I found this guide http://www.cisco.com/en/US/tech/tk583/tk372/technologies_configuration_example09186a00801982ae.shtml , but it seems to me, this is example of Hub-and-Spoke!

    I thank very you much in advance!

    Hi Dimitri.

    Question 1:

    All traffic passes through HUB - OK

    The tunnels are only created when needed between rays - correct

    Question 2:

    Fix

    http://Cisco.com/en/us/Tech/tk583/TK372/technologies_white_paper09186a008018983e.shtml

    Please take a look at the link given above.

    Excerpt from the link above

    "PNDH offers the opportunity for the spoke routers learn dynamically outside physical interface other routers address talk network VPN." This means that a router speaks will be enough information to dynamically build an IPsec + tunnel love directly to the other spoke routers.

    The dynamic IP routing protocol running on the hub router can be configured to reflect the routes registered by one spoke back on the same interface for all other rays, but the leap following IP on these roads will usually be the hub router, not the router speaks where the hub has learned this route.

    The dynamic routing protocols (RIP, OSPF and EIGRP) need to be configured on the hub router to announce routes back to the love tunnel interface and define the next IP for the router hop speaks originating for the routes registered by one spoke when the road is called back to the other rays.

    Here are the requirements for Protocol routing configurations.

    RIP

    You should disable split horizon on the interface of tunnel love on the hub, otherwise, RIP will be registered through the love interface routes not regularize this same interface.

    No cutting of the ip horizon

    No other changes are needed. RIP will automatically use the original next IP Hop on the roads it advertises back on the same interface where she learned these routes.

    EIGRP

    You should disable split horizon on the interface of tunnel love on the hub, otherwise, EIGRP will broadcast routes recorded via the interface love not regularize this same interface.

    no ip split horizon eigrp

    By default, EIGRP will set the next hop IP for the router to hub for roads is advertising, even when advertising that these routes of return the same interface where he learns the. Therefore, you must in this case, the following configuration command to indicate to EIGRP to use the jump according to original when IP advertising of these roads.

    no ip next-hop-self eigrp

    Note: The no ip next-hop-self eigrp command will be available from Cisco IOS release 12.3 (2). For Cisco IOS versions 12.2 (13) T and 12.3 (2), you must do the following:

    * If the talk-to-spoke dynamic tunnels are not wanted, then the above command is not necessary.

    * If the talk-to-spoke dynamic tunnels are wanted, then you must use process switching on the interface of tunnel on the spoke routers.

    * Otherwise, you will need to use another protocol for routing on the DMVPN.

    OSPF

    Because OSPF is a routing protocol - the status of the connection, there is not any split horizon issues. Normally, for multipoint interfaces, you configure the OSPF network type to be point-to-multipoint, but this would entail OSPF add host routes to the routing on the spoke routers table. These host routes would cause packets to networks behind the other spoke routers to transmit via the hub, rather than directly transmitted to another talk. To work around this problem, configure the OSPF network type to be broadcast using the command.

    dissemination of IP ospf network

    You must also make sure that the hub, router will be the designated router (DR) for IPsec + love network. This is done by setting the priority OSPF is greater than 1 on the hub and 0 on the shelves.

    * Hub: ip ospf priorite2

    * Speaks: ip ospf priority 0

    * END OF THE SNIPPET *.

    Hope that explains.

    The rate of this post, if that helps.

    Gilbert

  • DLR control VM issue

    Hello Experts,

    I'm listening to VMworld 2014 - Networking: NSX for logical routing vSphere Deep Dive and came across this slide.

    NSX-DLR.PNG

    In above slide speaker says this DLR control THAT VM is never in the path of data between NSX Edge and logical network behind DLR. In case when DLR does OSPF adjacency with edge NSX, it must send LSA type 5 for 172.16.10/20/30.0/24 subnets because NSX edge must use 192.168.10.2 as the next hop to bypass the control DLR VM from the data path. That also means DLR VM control cannot send Type 5 LSAS when OSPF.

    Correct me if I'm wrong.

    NSX supports 2 types of OSPF, Normal areas and NSSA.

    If your DLR and the GSS are in an NSSA and you redistribute your DLR connected routes, they will be 7 Type LSA and appear on the GSS as 'N2 - type external OSPF NSSA 2' roads.

    If your DLR and the GSS are defined for an OSPF from Normal area, then you are right, they will be 5 Type LSA.

    Here is an excerpt from an ip road show and see the database ip ospf to a peering with a DLR ESG into an NSSA.

    ESG-nsx-01-0 > sh ip road

    Code: O - derived OSPF, i - EAST drift, B - BGP derived,

    C connected, S - static, L1 - IS - IS level 1, L2 - IS level - 2,

    IA - OSPF inter zone, E1 - type 1, E2 external OSPF - type external OSPF 2.

    N1 - type external OSPF NSSA 1, N2 - type external OSPF NSSA 2

    10.29.15.0/24 O N2 [110/1] via 10.29.2.254

    10.29.20.0/24 O N2 [110/1] via 10.29.2.254

    10.29.21.0/24 O N2 [110/1] via 10.29.2.254

    10.29.22.0/24 O N2 [110/1] via 10.29.2.254

    10.29.24.0/24 O N2 [110/1] via 10.29.2.254

    ESG-nsx-01-0 > sh ip ospf database

    Type - 7 AS external link States (area 0.0.0.29)

    Link ID ADV router age Seq Num Checksum

    10.29.15.0 10.29.2.254 0x8000029a 1395 0 x 00009272

    10.29.20.0 10.29.2.254 1395 0x8000038f 0x00006e9b

    10.29.21.0 10.29.2.254 1395 0x800003e8 0x0000b0fe

    10.29.22.0 10.29.2.254 1395 0x800003e8 0x0000a509

    10.29.24.0 10.29.2.254 1395 0x8000038f 0x000042c3

    And the corresponding routes on the DLR

    DLR-nsx-01 > sh ip road

    Code: O - derived OSPF, i - EAST drift, B - BGP derived,

    C connected, S - static, L1 - IS - IS level 1, L2 - IS level - 2,

    IA - OSPF inter zone, E1 - type 1, E2 external OSPF - type external OSPF 2.

    N1 - type external OSPF NSSA 1, N2 - type external OSPF NSSA 2

    10.29.15.0/24 C [0/0] via 10.29.15.254

    10.29.20.0/24 C [0/0] via 10.29.20.254

    10.29.21.0/24 C [0/0] via 10.29.21.254

    10.29.22.0/24 C [0/0] via 10.29.22.254

    10.29.24.0/24 C [0/0] via 10.29.24.254

    See you soon

    Dale

Maybe you are looking for

  • Satellite L500-1UU and Ubuntu

    Hello worldI bought Toshiba Satellite L500-1UU and installed Ubuntu 9.10 on this, but I found very high sound products of the fan itI have been using Toshiba, but they say that this laptop does not support of Linux, is this true?and if it is true, hi

  • Writing and reading the same excel file

    Hello. I wanted to write a few values in the excel sheet and after doing some math here I want to read the same file. Can I do this? Or there is a better way to accomplish the same task. Kindly help. Thank you

  • Implementation of the shift from table register

    Hi all I am a novice in Labview and I'm trying to implement entrelaceur Convolutional. I have a problem with the implementation of the shift register using tables. Here I use interleaver in channel 4. First bit should go directly to the output. 2nd b

  • I got a code of error 0x8007000D

    Can someone tell me what this code and what I need to do please

  • How can I upgrade to Windows 7 without product key?

    I received a laptop from a friend. Initially, she had vista but upgraded to windows 7. She gave me the original vista disc and disc upgrade. Vist disc supplied with key-code. The disc of windows 7 did not come with or she can't find it. She wants me