Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
cisco:pastebin [2009/05/25 00:35] 127.0.0.1 external edit |
cisco:pastebin [2014/05/17 13:18] 79.24.101.124 [Slow ADSL with 12.4 IOS version?!] |
||
---|---|---|---|
Line 1: | Line 1: | ||
====== Cisco random pastebin :) ====== | ====== Cisco random pastebin :) ====== | ||
- | ==== See open ports ==== | + | ===== See open ports ===== |
R1# show control-plane host open-ports | R1# show control-plane host open-ports | ||
Line 18: | Line 18: | ||
* This show command does not display non-TCP/UDP servers (OSPF, EIGRP, RSVP) or even some UDP-based services (RIP). | * This show command does not display non-TCP/UDP servers (OSPF, EIGRP, RSVP) or even some UDP-based services (RIP). | ||
- | ==== Policy QoS ==== | + | ===== Policy QoS ===== |
---- | ---- | ||
Line 51: | Line 51: | ||
- | ==== Alias ==== | + | ===== Alias ===== |
To display IP addresses assigned to router' | To display IP addresses assigned to router' | ||
Line 75: | Line 75: | ||
</ | </ | ||
+ | and some more | ||
- | ==== A basic script for handling ACLs of your Cisco Catalyst ==== | + | < |
+ | alias exec siib sh ip int brief | ||
+ | alias exec srint sh run int | ||
+ | alias exec srb sh run | begin | ||
+ | alias exec srs sh run | sec | ||
+ | alias exec sri sh run | incl | ||
+ | alias exec sia sh ip access-list | ||
+ | </ | ||
+ | |||
+ | < | ||
+ | alias configure ping do ping | ||
+ | alias configure sh do sh | ||
+ | alias configure siib do siib | ||
+ | alias configure srint do srint | ||
+ | alias configure srb do srb | ||
+ | alias configure sri do sri | ||
+ | alias configure sia do sia | ||
+ | |||
+ | alias interface ping do ping | ||
+ | alias interface sh do sh | ||
+ | alias interface siib do siib | ||
+ | alias interface srint do srint | ||
+ | alias interface srb do srb | ||
+ | alias interface sri do sri | ||
+ | alias interface sia do sia | ||
+ | |||
+ | alias subinterface ping do ping | ||
+ | alias subinterface sh do sh | ||
+ | alias subinterface siib do siib | ||
+ | alias subinterface srint do srint | ||
+ | alias subinterface srb do srb | ||
+ | alias subinterface sri do sri | ||
+ | |||
+ | alias subinterface sia do sia | ||
+ | </ | ||
+ | |||
+ | < | ||
+ | alias exec s show run | ||
+ | alias exec c config t | ||
+ | alias exec srs show run | section | ||
+ | alias exec srb show run | begin | ||
+ | alias exec si show run interface | ||
+ | alias exec sri show run | include | ||
+ | alias exec siib show ip interface brief | exclude admin | ||
+ | alias exec sib show ip bgp | ||
+ | alias exec sir show ip route | ||
+ | alias exec sirp show ip route vrf PURPLE | ||
+ | alias exec sibp show ip bgp vpnv4 vrf PURPLE | ||
+ | alias exec pp ping vrf PURPLE | ||
+ | alias exec zp show policy-map type inspect zone-pair | ||
+ | alias exec sci show crypto ipsec | ||
+ | alias exec sck show crypto isakmp | ||
+ | alias exec cci clear crypto sa | ||
+ | alias exec cck clear crypto isakmp | ||
+ | alias exec sio show ip ospf | ||
+ | alias exec sie show ip eigrp | ||
+ | </ | ||
+ | |||
+ | ===== A basic script for handling ACLs of your Cisco Catalyst | ||
A handy script //( [[http:// | A handy script //( [[http:// | ||
Line 139: | Line 198: | ||
- | ==== Cisco IPIP Tunnels ==== | + | ===== Cisco IPIP Tunnels |
**Linux (192.168.2.1): | **Linux (192.168.2.1): | ||
Line 155: | Line 214: | ||
| | ||
+ | ===== GRE tunel (Cisco & Juniper) ===== | ||
- | ==== Is there a way to block VTP from coming in a port ==== | + | |
+ | |||
+ | **Juniper Configuration** | ||
+ | < | ||
+ | > show configuration interfaces gr-0/1/0 | ||
+ | unit 0 { | ||
+ | tunnel { | ||
+ | source 219.93.2.1; | ||
+ | destination 219.93.2.2; | ||
+ | key 123456; ## problem | ||
+ | } | ||
+ | family inet { | ||
+ | mtu 1514; | ||
+ | address 192.168.1.1/ | ||
+ | } | ||
+ | } | ||
+ | </ | ||
+ | |||
+ | **Cisco Configuration** | ||
+ | < | ||
+ | interface | ||
+ | Tunnel0 | ||
+ | ip address 192.168.1.2 255.255.255.252 | ||
+ | no ip unreachables | ||
+ | no ip proxy-arp | ||
+ | ip mtu 1514 | ||
+ | | ||
+ | | ||
+ | | ||
+ | </ | ||
+ | |||
+ | ===== Is there a way to block VTP from coming in a port ===== | ||
* make the port an access port | * make the port an access port | ||
Line 166: | Line 257: | ||
(different vtp domains on each side). | (different vtp domains on each side). | ||
- | ==== DHCP Configuration for Cisco VOIP Phones ==== | + | ===== DHCP Configuration for Cisco VOIP Phones |
< | < | ||
.... | .... | ||
Line 177: | Line 268: | ||
This should likely work for you as well, just make sure you replace the IP for “voip-tftp-server” with the address to your core phone server. | This should likely work for you as well, just make sure you replace the IP for “voip-tftp-server” with the address to your core phone server. | ||
- | ==== 1:1 NAT (not Cisco NAT) example ==== | + | ===== Slow ADSL with 12.4 IOS version?! ===== |
+ | |||
+ | < | ||
+ | Ciscozine(config-if)# | ||
+ | 1000000 | ||
+ | 1300000 | ||
+ | 1600000 | ||
+ | 2000000 | ||
+ | 2600000 (default) | ||
+ | 3200000 | ||
+ | 4000000 | ||
+ | 5300000 | ||
+ | 7000000 | ||
+ | |||
+ | < | ||
+ | | ||
+ | |||
+ | Ciscozine(config-if)# | ||
+ | 1000000 | ||
+ | 1300000 | ||
+ | 1600000 | ||
+ | 2000000 | ||
+ | 2600000 (default) | ||
+ | 3200000 | ||
+ | 4000000 | ||
+ | 5300000 | ||
+ | 7000000 | ||
+ | |||
+ | < | ||
+ | | ||
+ | |||
+ | Ciscozine(config-if)# | ||
+ | </ | ||
+ | |||
+ | In fact, if you don’t define the clock rate command into the atm interface, the IOS set to 2600000 this parameter. To force it, use the command ‘clock rate aal5′; in my case I use the command ‘clock rate aal5 7000000′. | ||
+ | |||
+ | Below the download speed test guarantee the bandwith improvement. More info on http:// | ||
+ | |||
+ | ===== 1:1 NAT (not Cisco NAT) example | ||
< | < | ||
Line 185: | Line 314: | ||
ip address 10.66.175.21 255.255.240.0 | ip address 10.66.175.21 255.255.240.0 | ||
ip nat outside | ip nat outside | ||
+ | ! PPPoE ip tcp adjust-mss 1412 | ||
! | ! | ||
! LAN interface | ! LAN interface | ||
Line 196: | Line 326: | ||
<note tip>With this rule '' | <note tip>With this rule '' | ||
+ | |||
+ | |||
+ | ==== Cisco NAT ==== | ||
+ | |||
+ | < | ||
+ | ip nat pool NAT 10.252.162.2 10.252.162.2 netmask 255.255.255.252 | ||
+ | ip nat inside source list 10 pool NAT overload | ||
+ | |||
+ | |||
+ | access-list 10 permit 10.52.4.0 0.0.0.255 | ||
+ | </ | ||
+ | ===== NAT Based Upon Source Address ===== | ||
+ | |||
+ | {{http:// | ||
+ | |||
+ | See original source: http:// | ||
- | ====== | + | ====== |
< | < |