I came across this at a University not long ago. This particular building has network issues, and I think I found the reason why. Yeah, thats right. You see that someone split the fiber. The blue is the cable coming in while the yellow is the "patch cable". Its like they never even saw the ports on the side of the box.
This is the retired Shane Killen personal blog, an IT technical blog about configs and topics related to the Network and Security Engineer working with Cisco, Brocade, Check Point, and Palo Alto and Sonicwall. I hope this blog serves you well. -- May The Lord bless you and keep you. May He shine His face upon you, and bring you peace.
Sunday, September 30, 2012
Thursday, September 27, 2012
Asterisk (Trixbox): How To Change A Phone To A Different User
These are some personal notes for me to remember how to do this.
Have you ever put in an Asterisk system and needed to change the user of a SIP Yealink phone? Someone leaves the company and another person wants that phone? Well, I had to do this the other day. Here is what I had to do.
1. Menu --> Settings --> Advance Settings (change to a static ip address, subnet mask, default gateway, vlan enable, and vlan ID) I had to change from one company to another, thats why I had to change the network settings.
2. Menu --> Settings --> Accounts (change the Name, Label, User (extension), userID (extension)
The default password is admin on the Yealink
.
Have you ever put in an Asterisk system and needed to change the user of a SIP Yealink phone? Someone leaves the company and another person wants that phone? Well, I had to do this the other day. Here is what I had to do.
1. Menu --> Settings --> Advance Settings (change to a static ip address, subnet mask, default gateway, vlan enable, and vlan ID) I had to change from one company to another, thats why I had to change the network settings.
2. Menu --> Settings --> Accounts (change the Name, Label, User (extension), userID (extension)
The default password is admin on the Yealink
.
Wednesday, September 26, 2012
Check Point: 'cphaprob status' Interface Explanations
- Active - everything is OK.
- Active Attention - problem has been detected, but the cluster member still forwarding packets, since it is the only machine in the cluster, or there are no active machines in the cluster.
- Down - one of the critical devices is having problems.
- Ready -
- When cluster members have different versions of Check Point Security Gateway, the members with a new version have the ready state and the members with the previous version have the activestate.
- Before a cluster member becomes active, it sends a message to the rest of the cluster, and then expects to receive confirmations from the other cluster members agreeing that it will becomeactive. In the period of time before it receives the confirmations, the machine is in the ready state.
- When cluster members in versions R70 and higher have different number of CPU cores and/or different number of CoreXL instances, the member with higher number of CPU cores and/or higher number of CoreXL instances will stay in Ready state, until the configuration is set identical on all members.
- Standby - the member is waiting for an active machine to fail in order to start packet forwarding. Applies only in high availability mode.
- Initializing - the cluster member is booting up, and ClusterXL product is already running, but the Security Gateway is not yet ready.
- ClusterXL inactive or machine is down - Local machine cannot hear anything coming from this cluster member.
Brocade FDP HoldTime: An Example
Have you ever watched the holdtime tick tock down so that your FDP neighbors age out? Here is a scenario where there was a loop in the network. I shut down one of the interfaces where the loop was (because I was not onsite) so that the loop would at least be logically taken out. However, with FDP, until the holdtime ages down to '0', it keeps the entry in the results of the "show fdp neighbors" command. See below.
telnet@BrocadeSwitch1(config)#sh fdp neigh
Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge
S - Switch, H - Host, I - IGMP, r - Repeater
(*) indicates a CDP device
Device ID Local Interface Holdtm Capability Platform Port ID
-------------- ---------------- ------ ---------- ----------- -------------
BrocadeSwitch2 ethernet1/1/3 22 Switch ICX6430-24P ethernet1/1/4
BrocadeSwitch2 ethernet1/1/24 142 Switch ICX6430-24P ethernet1/1/24
CoreSwitch ethernet1/2/1 167 Router FastIron SX ethernet4/21
telnet@BrocadeSwitch1(config)#sh fdp neigh
Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge
S - Switch, H - Host, I - IGMP, r - Repeater
(*) indicates a CDP device
Device ID Local Interface Holdtm Capability Platform Port ID
-------------- ---------------- ------ ---------- ----------- -------------
BrocadeSwitch2 ethernet1/1/3 15 Switch ICX6430-24P ethernet1/1/4
BrocadeSwitch2 ethernet1/1/24 135 Switch ICX6430-24P ethernet1/1/24
CoreSwitch ethernet1/2/1 160 Router FastIron SX ethernet4/21
telnet@BrocadeSwitch1(config)#sh fdp neigh
Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge
S - Switch, H - Host, I - IGMP, r - Repeater
(*) indicates a CDP device
Device ID Local Interface Holdtm Capability Platform Port ID
-------------- ---------------- ------ ---------- ----------- -------------
BrocadeSwitch2 ethernet1/1/3 5 Switch ICX6430-24P ethernet1/1/4
BrocadeSwitch2 ethernet1/1/24 125 Switch ICX6430-24P ethernet1/1/24
CoreSwitch ethernet1/2/1 150 Router FastIron SX ethernet4/21
telnet@BrocadeSwitch1(config)#sh fdp neigh
Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge
S - Switch, H - Host, I - IGMP, r - Repeater
(*) indicates a CDP device
Device ID Local Interface Holdtm Capability Platform Port ID
-------------- ---------------- ------ ---------- ----------- -------------
BrocadeSwitch2 ethernet1/1/24 120 Switch ICX6430-24P ethernet1/1/24
CoreSwitch ethernet1/2/1 145 Router FastIron SX ethernet4/21
Notice in the last 'show fdp neighbors', the first entry is gone.
telnet@BrocadeSwitch1(config)#sh fdp neigh
Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge
S - Switch, H - Host, I - IGMP, r - Repeater
(*) indicates a CDP device
Device ID Local Interface Holdtm Capability Platform Port ID
-------------- ---------------- ------ ---------- ----------- -------------
BrocadeSwitch2 ethernet1/1/3 22 Switch ICX6430-24P ethernet1/1/4
BrocadeSwitch2 ethernet1/1/24 142 Switch ICX6430-24P ethernet1/1/24
CoreSwitch ethernet1/2/1 167 Router FastIron SX ethernet4/21
telnet@BrocadeSwitch1(config)#sh fdp neigh
Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge
S - Switch, H - Host, I - IGMP, r - Repeater
(*) indicates a CDP device
Device ID Local Interface Holdtm Capability Platform Port ID
-------------- ---------------- ------ ---------- ----------- -------------
BrocadeSwitch2 ethernet1/1/3 15 Switch ICX6430-24P ethernet1/1/4
BrocadeSwitch2 ethernet1/1/24 135 Switch ICX6430-24P ethernet1/1/24
CoreSwitch ethernet1/2/1 160 Router FastIron SX ethernet4/21
telnet@BrocadeSwitch1(config)#sh fdp neigh
Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge
S - Switch, H - Host, I - IGMP, r - Repeater
(*) indicates a CDP device
Device ID Local Interface Holdtm Capability Platform Port ID
-------------- ---------------- ------ ---------- ----------- -------------
BrocadeSwitch2 ethernet1/1/3 5 Switch ICX6430-24P ethernet1/1/4
BrocadeSwitch2 ethernet1/1/24 125 Switch ICX6430-24P ethernet1/1/24
CoreSwitch ethernet1/2/1 150 Router FastIron SX ethernet4/21
telnet@BrocadeSwitch1(config)#sh fdp neigh
Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge
S - Switch, H - Host, I - IGMP, r - Repeater
(*) indicates a CDP device
Device ID Local Interface Holdtm Capability Platform Port ID
-------------- ---------------- ------ ---------- ----------- -------------
BrocadeSwitch2 ethernet1/1/24 120 Switch ICX6430-24P ethernet1/1/24
CoreSwitch ethernet1/2/1 145 Router FastIron SX ethernet4/21
Notice in the last 'show fdp neighbors', the first entry is gone.
Tuesday, September 25, 2012
Cisco Router: How To Set The Internal Clock
Have you ever needed the clock to be set correctly on an Cisco router? The answer is YES, you do need it to be set correctly, for a variety of reasons. Here is how you do it in CLI:
Cisco_2811#clock set 16:57:00 24 Sep 2012
Cisco_2811#sh clock
16:57:02.063 CST Mon Sep 24 2012
Cisco_2811#wr mem
Building configuration...
[OK]
Cisco_2811#
Cisco_2811#clock set 16:57:00 24 Sep 2012
Cisco_2811#sh clock
16:57:02.063 CST Mon Sep 24 2012
Cisco_2811#wr mem
Building configuration...
[OK]
Cisco_2811#
Monday, September 24, 2012
Cisco ASA: Upgrading The RAM To 1 Gig
About a week ago, I put in some more memory in an ASA 5510 so that we could upgrade the IOS to the 8.4 code. I thought Id show you what inside the ASA looks like and where you would put in the memory. This one had 512Meg of RAM in it already, but I took that memory out and put in the 1Gig stick you see below. Its not a hard job to do.
It does only go in one way. You can see the slots on top of the motherboard inside the ASA. Its very accessible.
It does only go in one way. You can see the slots on top of the motherboard inside the ASA. Its very accessible.
Computer Backpack: Targus VS. SwissGear
Well, its hands down for me. Targus is a much better backpack to me than the SwissGear. I have had this Targus for 7 years now, while Ive only had the SwissGear for only about 4 years now. Notice in the pictures, the shape of the two. The Targus is still in very good shape,while the SwissGear is torn where you see the RED circles.
The Targus backpack:
The SwissGear backpack:
The Targus backpack:
The SwissGear backpack:
Tuesday, September 18, 2012
"Hitless-failover Enable": Can Not Configure On The FCX648S Brocade Switch
I was configuring a stack on a couple of Brocade switches that I was setting up for a SAN environment. I couldn't figure out why I couldn't run the 'hitless-failover enable' command. As it turns out, the revision of code that came on the Brocades would not support that command. I did some research and found that revision 7.2.00 is where the command starts in the Brocade IOS. So, if you need this command like I did, you will need to upgrade your firmware to at least 7.2.00.
Friday, September 14, 2012
Cisco CME: ATA Configuration For Utilizing Both Ports
Here is how you configure an ATA in CME so that you can use both ports on the back. Im using an ATA 186. Here is the config for it:
ephone 40
device-security-mode none
mac-address 0026.CB3C.DAAD
max-calls-per-button 2
type ata
button 1:30
ephone 41
device-security-mode none
mac-address 26CB.3CDA.AD01
max-calls-per-button 2
type ata
button 1:30
Now, this implementation was for dial out only (fire alarm) that required two lines. Notice that the two front characters are taken off the front and an '01' put on the back of the mac-address. I also used the same DN (30).
ephone 40
device-security-mode none
mac-address 0026.CB3C.DAAD
max-calls-per-button 2
type ata
button 1:30
ephone 41
device-security-mode none
mac-address 26CB.3CDA.AD01
max-calls-per-button 2
type ata
button 1:30
Now, this implementation was for dial out only (fire alarm) that required two lines. Notice that the two front characters are taken off the front and an '01' put on the back of the mac-address. I also used the same DN (30).
Wednesday, September 12, 2012
Cisco ASA: Traversing From The Inside Interface To The DMZ Interface
Have you ever needed to not NAT across from the inside interface to the DMZ interface of the ASA? Seems like when you traverse from one interface to another, you are going to have to either NAT that traffic or not NAT it. Either way, you are going to have to tell it to do something. Here is what I did when I wanted to go from the inside interface to the DMZ interface.
access-list 107 extended permit ip 192.168.17.0 255.255.255.0 192.168.9.0 255.255.255.0
nat (inside) 0 access-list 107
access-list 107 extended permit ip 192.168.17.0 255.255.255.0 192.168.9.0 255.255.255.0
nat (inside) 0 access-list 107
How To Password Protect Your Blog
Here is the script that you want to cut and paste into your blog for password protecting your blog.
<SCRIPT LANGUAGE="JavaScript"> <!-- Begin var password = 'password' password=prompt('Please enter the password to enter this site:',''); if (password != 'password') { location.href='http://www.shanekillen.com'; } // End --> </SCRIPT>
Subscribe to:
Posts (Atom)