Differences
This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision Next revision | Previous revision | ||
|
cisco:pastebin [2009/05/08 13:45] a cisco 1:1 NAT |
cisco:pastebin [2014/05/17 13:18] (current) 79.24.101.124 [Slow ADSL with 12.4 IOS version?!] |
||
|---|---|---|---|
| Line 1: | Line 1: | ||
| ====== Cisco random pastebin :) ====== | ====== Cisco random pastebin :) ====== | ||
| - | ==== See open ports ==== | + | ===== See open ports ===== |
| R1# show control-plane host open-ports | R1# show control-plane host open-ports | ||
| Line 18: | Line 18: | ||
| * This show command does not display non-TCP/UDP servers (OSPF, EIGRP, RSVP) or even some UDP-based services (RIP). | * This show command does not display non-TCP/UDP servers (OSPF, EIGRP, RSVP) or even some UDP-based services (RIP). | ||
| - | ==== Policy QoS ==== | + | ===== Policy QoS ===== |
| ---- | ---- | ||
| Line 51: | Line 51: | ||
| - | ==== Alias ==== | + | ===== Alias ===== |
| To display IP addresses assigned to router' | To display IP addresses assigned to router' | ||
| Line 75: | Line 75: | ||
| </ | </ | ||
| + | and some more | ||
| - | ==== A basic script for handling ACLs of your Cisco Catalyst ==== | + | < |
| + | alias exec siib sh ip int brief | ||
| + | alias exec srint sh run int | ||
| + | alias exec srb sh run | begin | ||
| + | alias exec srs sh run | sec | ||
| + | alias exec sri sh run | incl | ||
| + | alias exec sia sh ip access-list | ||
| + | </ | ||
| + | |||
| + | < | ||
| + | alias configure ping do ping | ||
| + | alias configure sh do sh | ||
| + | alias configure siib do siib | ||
| + | alias configure srint do srint | ||
| + | alias configure srb do srb | ||
| + | alias configure sri do sri | ||
| + | alias configure sia do sia | ||
| + | |||
| + | alias interface ping do ping | ||
| + | alias interface sh do sh | ||
| + | alias interface siib do siib | ||
| + | alias interface srint do srint | ||
| + | alias interface srb do srb | ||
| + | alias interface sri do sri | ||
| + | alias interface sia do sia | ||
| + | |||
| + | alias subinterface ping do ping | ||
| + | alias subinterface sh do sh | ||
| + | alias subinterface siib do siib | ||
| + | alias subinterface srint do srint | ||
| + | alias subinterface srb do srb | ||
| + | alias subinterface sri do sri | ||
| + | |||
| + | alias subinterface sia do sia | ||
| + | </ | ||
| + | |||
| + | < | ||
| + | alias exec s show run | ||
| + | alias exec c config t | ||
| + | alias exec srs show run | section | ||
| + | alias exec srb show run | begin | ||
| + | alias exec si show run interface | ||
| + | alias exec sri show run | include | ||
| + | alias exec siib show ip interface brief | exclude admin | ||
| + | alias exec sib show ip bgp | ||
| + | alias exec sir show ip route | ||
| + | alias exec sirp show ip route vrf PURPLE | ||
| + | alias exec sibp show ip bgp vpnv4 vrf PURPLE | ||
| + | alias exec pp ping vrf PURPLE | ||
| + | alias exec zp show policy-map type inspect zone-pair | ||
| + | alias exec sci show crypto ipsec | ||
| + | alias exec sck show crypto isakmp | ||
| + | alias exec cci clear crypto sa | ||
| + | alias exec cck clear crypto isakmp | ||
| + | alias exec sio show ip ospf | ||
| + | alias exec sie show ip eigrp | ||
| + | </ | ||
| + | |||
| + | ===== A basic script for handling ACLs of your Cisco Catalyst | ||
| A handy script //( [[http:// | A handy script //( [[http:// | ||
| Line 139: | Line 198: | ||
| - | ==== Cisco IPIP Tunnels ==== | + | ===== Cisco IPIP Tunnels |
| **Linux (192.168.2.1): | **Linux (192.168.2.1): | ||
| Line 155: | Line 214: | ||
| | | ||
| + | ===== GRE tunel (Cisco & Juniper) ===== | ||
| - | ==== Is there a way to block VTP from coming in a port ==== | + | |
| + | |||
| + | **Juniper Configuration** | ||
| + | < | ||
| + | > show configuration interfaces gr-0/1/0 | ||
| + | unit 0 { | ||
| + | tunnel { | ||
| + | source 219.93.2.1; | ||
| + | destination 219.93.2.2; | ||
| + | key 123456; ## problem | ||
| + | } | ||
| + | family inet { | ||
| + | mtu 1514; | ||
| + | address 192.168.1.1/ | ||
| + | } | ||
| + | } | ||
| + | </ | ||
| + | |||
| + | **Cisco Configuration** | ||
| + | < | ||
| + | interface | ||
| + | Tunnel0 | ||
| + | ip address 192.168.1.2 255.255.255.252 | ||
| + | no ip unreachables | ||
| + | no ip proxy-arp | ||
| + | ip mtu 1514 | ||
| + | | ||
| + | | ||
| + | | ||
| + | </ | ||
| + | |||
| + | ===== Is there a way to block VTP from coming in a port ===== | ||
| * make the port an access port | * make the port an access port | ||
| Line 166: | Line 257: | ||
| (different vtp domains on each side). | (different vtp domains on each side). | ||
| - | ==== DHCP Configuration for Cisco VOIP Phones ==== | + | ===== DHCP Configuration for Cisco VOIP Phones |
| < | < | ||
| .... | .... | ||
| Line 177: | Line 268: | ||
| This should likely work for you as well, just make sure you replace the IP for “voip-tftp-server” with the address to your core phone server. | This should likely work for you as well, just make sure you replace the IP for “voip-tftp-server” with the address to your core phone server. | ||
| - | ==== 1:1 NAT (not Cisco NAT) example ==== | + | ===== Slow ADSL with 12.4 IOS version?! ===== |
| + | |||
| + | < | ||
| + | Ciscozine(config-if)# | ||
| + | 1000000 | ||
| + | 1300000 | ||
| + | 1600000 | ||
| + | 2000000 | ||
| + | 2600000 (default) | ||
| + | 3200000 | ||
| + | 4000000 | ||
| + | 5300000 | ||
| + | 7000000 | ||
| + | |||
| + | < | ||
| + | | ||
| + | |||
| + | Ciscozine(config-if)# | ||
| + | 1000000 | ||
| + | 1300000 | ||
| + | 1600000 | ||
| + | 2000000 | ||
| + | 2600000 (default) | ||
| + | 3200000 | ||
| + | 4000000 | ||
| + | 5300000 | ||
| + | 7000000 | ||
| + | |||
| + | < | ||
| + | | ||
| + | |||
| + | Ciscozine(config-if)# | ||
| + | </ | ||
| + | |||
| + | In fact, if you don’t define the clock rate command into the atm interface, the IOS set to 2600000 this parameter. To force it, use the command ‘clock rate aal5′; in my case I use the command ‘clock rate aal5 7000000′. | ||
| + | |||
| + | Below the download speed test guarantee the bandwith improvement. More info on http:// | ||
| + | |||
| + | ===== 1:1 NAT (not Cisco NAT) example | ||
| < | < | ||
| Line 185: | Line 314: | ||
| ip address 10.66.175.21 255.255.240.0 | ip address 10.66.175.21 255.255.240.0 | ||
| ip nat outside | ip nat outside | ||
| + | ! PPPoE ip tcp adjust-mss 1412 | ||
| ! | ! | ||
| ! LAN interface | ! LAN interface | ||
| Line 196: | Line 326: | ||
| <note tip>With this rule '' | <note tip>With this rule '' | ||
| + | |||
| + | |||
| + | ==== Cisco NAT ==== | ||
| + | |||
| + | < | ||
| + | ip nat pool NAT 10.252.162.2 10.252.162.2 netmask 255.255.255.252 | ||
| + | ip nat inside source list 10 pool NAT overload | ||
| + | |||
| + | |||
| + | access-list 10 permit 10.52.4.0 0.0.0.255 | ||
| + | </ | ||
| + | ===== NAT Based Upon Source Address ===== | ||
| + | |||
| + | {{http:// | ||
| + | |||
| + | See original source: http:// | ||
| - | ====== | + | ====== |
| < | < | ||

