Thursday, 31 July 2008
IE removes Locklizard
Wednesday, 30 July 2008
Tracking down a server
I needed to track down the server Nike. So first idea was to trace route to the server. So on to my trusty Windows laptop and enter the trace command doh this is not a Cisco box. Anyhow I remembered the Windows command as below:
C:\Program Files\Support Tools>tracert nike
Tracing route to nike.ciscoferret.local[10.109.36.85]
over a maximum of 30 hops:
1 <1 ms <1 ms <1 ms vl101-ESP-MAD-009-SW102-WEST1 [10.106.31.1]
2 <1 ms <1 ms <1 ms ge1/1-ESP-MAD-009-SW110-CORE [10.106.34.133]
3 <1 ms <1 ms <1 ms fe2/0-ESP-MAD-009-RTR01 [10.106.34.146]
4 1 ms 1 ms 1 ms vl100-ESP-MAD-010-sw01-w1-msfc [10.107.50.142]
5 1 ms 1 ms 1 ms vl952-ESP-MAD-010-sw02-core [10.109.56.17]
6 7 ms 1 ms 1 ms vl963-ESP-MAD-010-sw04-core [10.109.56.77]
7 1 ms 1 ms 1 ms nike.ciscoferret.local[10.109.36.85]
Trace complete.
So now I had my trace file and more importantly I had the IP address of the last Layer 3 device before my server. So next thing is to telnet to the last Layer 3 device before my server.
C:\Program Files\Support Tools>telnet 10.109.56.77
Then I ran a show arp to include the IP address of the server as below:
ESP-MAD-010-SW04-CORE#show arp | in 10.109.36.85
Internet 10.109.36.85 5 0011.54dd.3382 ARPA Vlan510
Now I had the MAC address it was time to find out what interface it had been learnt on.
ESP-MAD-010-SW04-CORE#show mac-address-table add 0011.254a.2833
Legend: * - primary entry
age - seconds since last seen
n/a - not available
vlan mac address type learn age ports
------+----------------+--------+-----+----------+--------------------------
Supervisor:
* 510 0011.54dd.3382 dynamic Yes 0 Gi6/1
Supervisor:
* 510 0011.54dd.3382 dynamic Yes 0 Gi6/1
So I knew the interface the next thing was to figure out who was connected to that interface. So this is where trusty CDP comes in handy (that is if you are running it, not sure what I would do if it was not enabled, anyone got any bright ideas?)
ESP-MAD-010-SW04-CORE#show cdp neighbors gigabitEthernet 6/1 detail
-------------------------
Device ID: TBP06360198(ESP-MAD-010-SW02-NSR)
Entry address(es):
IP address: 10.109.56.44
Platform: WS-C6509, Capabilities: Trans-Bridge Switch IGMP
Interface: GigabitEthernet6/1, Port ID (outgoing port): 3/6
Holdtime : 169 sec
Version :
WS-C6509 Software, Version McpSW: 7.3(1) NmpSW: 7.3(1)
Copyright (c) 1995-2002 by Cisco Systems
advertisement version: 2
VTP Management Domain: 'ACB_Module_9'
Native VLAN: 954
Duplex: full
ESP-MAD-010-SW04-CORE#
Now I had my neighbor time to telnet to my neighbor and carry on the task of ferreting out which switch the server was located on.
ESP-MAD-010-SW04-CORE#telnet 10.109.56.44
Trying 10.109.56.44 ... Open
Whoops this switch was running CatOS and this is where things got difficult for me. My CatOS is not that good so the best method I could come up with is as follows. If anyone has a better way which I am sure they do please let me know.
I did a show on the VLAN which I had learnt above from the show mac-address-table add 0011.254a.2833 command.
ESP-MAD-010-SW01-NSR (enable) show cam dynamic 510
* = Static Entry. + = Permanent Entry. # = System Entry. R = Router Entry.
X = Port Security Entry $ = Dot1x Security Entry
VLAN Dest MAC/Route Des [CoS] Destination Ports or VCs / [Protocol Type]
---- ------------------ ----- -------------------------------------------
510 00-60-56-ae-49-3f 3/5 [ALL]
510 00-14-5e-7b-18-26 3/5 [ALL]
510 00-60-56-9e-44-82 3/5 [ALL]
510 00-11-25-9d-57-47 3/5 [ALL]
510 00-12-79-9e-38-2f 3/5 [ALL]
510 00-60-56-ae-75-46 3/5 [ALL]
510 00-60-56-ae-48-a6 3/5 [ALL]
510 00-29-6b-ca-9b-50 7/26 [ALL]
510 00-14-5e-7b-18-27 4/31 [ALL]
510 00-60-56-82-3c-25 3/5 [ALL]
510 00-0d-60-4e-6f-18 6/28 [ALL]
510 00-60-56-ae-22-a9 3/5 [ALL]
510 00-14-5e-bd-5f-d1 3/5 [ALL]
510 00-11-25-4a-17-c8 6/39-40 [ALL]
510 00-11-25-9d-50-bd 3/5 [ALL]
510 00-14-5e-36-6b-58 3/5 [ALL]
510 00-60-56-ae-6d-18 3/5 [ALL]
510 00-14-5e-bd-5f-d0 3/5 [ALL]
510 00-11-25-4a-17-c9 3/5 [ALL]
510 00-0d-60-9d-16-fd 3/5 [ALL]
510 00-14-5e-36-6b-59 3/5 [ALL]
510 00-29-6b-f5-79-c3 7/39-40 [ALL]
Do you wish to continue y/n [n]? y
510 00-60-56-ae-5b-5e 3/5 [ALL]
510 00-14-5e-ec-ed-3c 3/5 [ALL]
510 00-60-56-9e-00-1f 3/5 [ALL]
510 00-14-5e-7b-89-f6 5/19 [ALL]
510 00-60-56-ae-6c-1f 3/5 [ALL]
510 00-0d-60-9c-2d-7a 8/19 [ALL]
510 00-60-56-ae-21-07 3/5 [ALL]
510 00-11-25-9d-57-db 3/5 [ALL]
510 00-1b-54-bb-d3-b6 3/5 [ALL]
510 00-60-56-ae-7e-2d 3/5 [ALL]
510 00-11-25-9d-56-8d 3/5 [ALL]
510 00-60-56-9e-76-47 3/5 [ALL]
510 00-60-56-9e-3a-0b 3/5 [ALL]
510 00-60-56-ae-3d-9e 3/5 [ALL]
510 00-14-5e-bc-a7-67 3/5 [ALL]
510 40-00-40-10-10-12 3/5 [ALL]
510 00-11-25-9d-51-7b 3/5 [ALL]
510 00-11-25-9d-55-f7 3/5 [ALL]
510 00-0d-60-9c-2d-ba 8/19 [ALL]
510 00-60-56-ae-2f-af 3/5 [ALL]
510 00-60-56-ae-1d-37 3/5 [ALL]
510 00-0d-60-4e-66-d6 6/28 [ALL]
Do you wish to continue y/n [n]? y
510 00-0d-60-4e-6a-f8 6/28 [ALL]
510 00-60-56-82-7c-91 3/5 [ALL]
510 00-14-5e-bd-1c-de 3/5 [ALL]
510 00-11-54-dd-33-82 6/39-40 [ALL]
510 00-14-5e-36-6a-be 3/5 [ALL]
510 00-60-56-ae-73-5b 3/5 [ALL]
510 00-0d-60-9c-27-b2 8/19 [ALL]
510 00-60-56-ae-42-b7 3/5 [ALL]
510 00-14-5e-bd-1c-df 3/5 [ALL]
510 00-0d-60-4e-6f-ea 6/28 [ALL]
510 00-60-56-ae-59-54 3/5 [ALL]
510 00-11-25-9d-56-69 3/5 [ALL]
510 00-1a-64-63-8d-2c 3/5 [ALL]
510 00-0d-88-c6-87-14 6/29 [ALL]
510 00-0d-88-c6-8b-90 8/19 [ALL]
510 00-12-79-9e-64-82 3/5 [ALL]
510 00-0d-60-4e-6a-74 6/28 [ALL]
510 00-0d-60-4e-6e-f8 6/28 [ALL]
510 00-60-56-9e-52-47 3/5 [ALL]
510 00-10-18-06-05-04 3/5 [ALL]
510 00-60-56-ae-4f-62 3/5 [ALL]
510 00-29-6b-16-45-25 7/47-48 [ALL]
Do you wish to continue y/n [n]? y
510 00-12-79-9e-64-83 4/48 [ALL]
510 00-29-6b-f5-ea-5b 6/25 [ALL]
510 00-60-56-ae-09-43 3/5 [ALL]
510 00-60-56-ae-49-03 3/5 [ALL]
I took the output I received above and pasted it in to wordpad. Then I did a find on the MAC address but first I had to do a conversion from the dotted decimal MAC address notation of IOS to the dashes of CatOS. So I actually did a find on 00-11-54-dd-33-82. From this I found MAC address 00-11-54-dd-33-82 was being learnt on interface 6/39. So a show cdp neighbors 6/39 detail as below showed me what switch was connected to this interface.
ESP-MAD-010-SW01-NSR (enable) show cdp neighbors 6/39 detail
Port (Our Port): 6/39
Device-ID: BLC005MAD-BCSM1
Device Addresses:
IP Address: 10.199.130.29
Holdtime: 127 sec
Capabilities: SWITCH IGMP
Version:
Cisco Internetwork Operating System Software
IOS (tm) CIGESM Software (CIGESM-I6Q4L2-M), Version 12.1(14)AY4, RELEASE SOFTWARE (fc1)
Copyright (c) 1986-2004 by cisco Systems, Inc.
Compiled Mon 20-Dec-04 10:20 by myl
Platform: cisco OS-CIGESM-18
Port-ID (Port on Neighbors's Device): GigabitEthernet0/17
VTP Management Domain: unknown
Native VLAN: 508
Duplex: full
System Name: unknown
System Object ID: unknown
Management Addresses: unknown
Physical Location: unknown
ESP-MAD-010-SW01-NSR (enable)
The switch connected to interface 6/39 was a blade centre so I telneted to the IP address I learnt from the show cdp neighbors 6/39 detail command above. Then I did a show mac-ad address 0011.254a.2832 and it showed me the blade port the server was connected to.
BLC005MAD-BCSM1#show mac-ad address 0011.254a.2832
Mac Address Table
-------------------------------------------
Vlan Mac Address Type Ports
---- ----------- -------- -----
510 0011.254a.2832 DYNAMIC Gi0/8
Total Mac Addresses for this criterion: 1
BLC005MAD-BCSM1#
Now as I said I am sure this is not the easiest or most efficient way to track down a server. So as this skill is really important to me in my current job if anyone has a better way then please let me know. Any help would be most appreciated.
Monday, 28 July 2008
Pesky VRF's
So I think I have the hang of these pesky VRF things and then I need to telnet to a particular switch. Hmm cannot get onto it hmm what's going on here I wonder. I pluck up the courage to ask colleague another stupid question "erm mate I cannot access core switch 1, is there an ACL on there that is blocking me?". Reply comes back that all should be fine, so what is going on here. Once again it turns out to be the pesky little VRF stuff that has got me stumped. I need to telnet 11.1.1.2 /vrf abc ah that works.
Then a few days later I want to do a show ip bgp hmm output not as expected. Right this time I twig it has to be one of those pesky VRF's getting in my way. So let's try doing show ip vrf abc wooh no bgp command. Okay lets try figure this out show ip ? and look through the options hmm nothing there so how about a show ip bgp ? hmm nothing there either. Argh so I am stumped how the heck do you do a show ip bgp when you have VRF's around? Time to prepare colleague for another stupid question by offering to make him a drink. Once drink has been made then I utilize my chance for another stupid question. "Umm so you know these VRF's how do you do a show ip bgp turns out the answer is to do a show ip bgp vpnv4 vrf abc. So I have enough trouble with VRF's and then they go add the vpnv4 command before the vrf command. Guess I will get to that bit when I sort out multi-protocol BGP. Anyhow you will be pleased to know that I am getting on a lot better with VRF's now. However as with anything on this blog if any of you have any tips, hints or advice please feel free to post it. I have plenty to learn so welcome any teaching :-)
Friday, 25 July 2008
Are Dynamips Days Numbered?
Thursday, 24 July 2008
Cisco Exam Security
Cisco and Pearson VUE Launch Global Test Delivery Exam Security Enhancements
Cisco and its global testing provider, Pearson VUE, a business of Pearson Inc. are pleased to announce a series of security enhancements that will reinforce the integrity and value of its Career certification program.
The advanced security enhancements include the use of digital photographs for candidate-identity verification and forensic analysis of testing data. The new measures, to be implemented beginning on Aug. 1, will include:
- Photo on Score Report and Web – On completion of a certification exam at the test center, candidates will receive preliminary score reports imprinted with their photos and unique authentication codes. The authentication code can be used to access a candidate’s official score online at Pearson VUE’s website usually within 72 hours of the examination. The online score report will also display the candidate’s photo. Candidates may share access to their online records with employers or other third parties.
- Forensic Analysis – Exam results and other testing data will be continuously analyzed by forensic software to detect aberrant testing behavior and to flag suspect exams for further investigation.
- Preliminary Score Report – All paper score reports will be preliminary, pending the results of forensic analysis, until official exam scores are posted to the Web usually within 72 hours of exam completion. Once the exam scores are official, candidates may use the authentication codes on their score reports to access the Pearson VUE website for score and photo verification.
These new exam security measures are part of Cisco’s overall strategy to protect the value and integrity of its certifications. Other measures include simulation-based testing, dynamically generated questions and emulations to help ensure that Cisco certified networking professionals continue to have the knowledge, skills, and credentials to perform well on the job.
To find out more about Cisco Career Certifications access the Cisco Learning Network at www.cisco.com/go/learnnetspace
To sign up for a Cisco exam at a VUE testing center go to http://www.pearsonvue.com/
San Fran Network Admin Saga Over
Wednesday, 23 July 2008
Study Update 23/07/08
cciepursuit's cool OSPF/EiGRP Trick
Rack1R3(config)#router eigrp 2
Rack1R3(config-router)#network 155.145.167.13 255.255.255.224
Rack1R3(config-router)#do show run | sec eigrp
router eigrp 2
network 155.1.13.3 0.0.0.0
network 155.1.23.3 0.0.0.0
network 155.145.167.0 0.0.0.31
auto-summary
Awesome
Tuesday, 22 July 2008
CCDE Practical Exam Beta
Now Available! Cisco Certified Design Expert (CCDE) Practical Exam Beta
Cisco is now registering beta candidates for the Cisco Certified Design Expert (CCDE) Practical Exam. Cisco has finished development of the second exam needed to attain the CCDE certification, the practical exam, and is now soliciting candidates for the beta delivery.
The CCDE practical exam is a computer-based, performance assessment that evaluates a candidate’s ability to gather network requirements, perform design analyses, and implement complex networks.
Cisco will be offering this beta delivery of the exam on October 1, 2008, in Chicago, Illinois, at a Pearson professional testing center. Only candidates that have a passing score on the CCDE qualification exam can register and participate in this exam. Exam beta pricing is $980US and registration inquiries should be sent to ITPC@pearson.com, notifying us of your interest. You will be notified of your eligibility, instructions for registration, payment and logistics in a follow-up email.
Location: Chicago, Illinois USA
Date: October 1, 2008
Cost: $ 980 US
Prerequisite: Passing score of exam 352-001 on the CCDE qualification exam (ADVDESIGN)
For more information on the CCDE program and the CCDE practical exam visit: www.cisco.com/go/ccde or the Cisco Learning Network at www.cisco.com/go/learnnetspace