[OSL | CCIE_Security] Preventing double tagging by trunking native vlan traffic

2012-03-17 Thread Kingsley Charles
Hi all How does vlan dot1q tag native help us prevent double tagging attack? I know it can help, but I want to discuss how and where it actually does the job. Can we have a discussion :-) With regards Kings ___ For more information regarding

[OSL | CCIE_Security] Routing towards pim pr

2012-03-17 Thread Kingsley Charles
Hi all I have the following the topology. The ASA in multicontext mode is sitting in between the KS and GM. I am using a GRE point to point tunnel interface between R1 and R2. I am using pim sparse mode and the loopback of R1 is the PIM RP R1 (KS) L0 -- ASA (multicontext) --- R2 (GM)

Re: [OSL | CCIE_Security] SSL VPN authentication failed

2012-03-17 Thread Aous SAlloum
Yes Dear , thanks so so so much now its ok , I was entering ccie@admin , now i did ccie only and its authenticating : User ccie has logged in from 192.168.1.100 to gateway ssl context admin 2012/3/16 Kingsley Charles kingsley.char...@gmail.com In the prompt, how did you enter the

[OSL | CCIE_Security] ASA Multiple context

2012-03-17 Thread Aous SAlloum
Hello Dears , I am trying to configure ASA with Multicontext 1 , is it mandatory to have admin-context admin keywork ? or i can creat any two contexts like con1 and con2 and make one of the admin ?? like admin-context con1 without having context named admin 2, If i have tow contexts: context

Re: [OSL | CCIE_Security] ASA Multiple context

2012-03-17 Thread Dave Craddock
The admin context is basiclly there to assign the physical resorce to the virtual asa so you have to have it The file system is not case sencetive so both admin and Admin are the same Sent from Moxier Mail (http://www.moxier.com) - Original Message - From: Aous SAlloum

Re: [OSL | CCIE_Security] ASA Multiple context

2012-03-17 Thread Mike Rojas
NO, wait wait Admin context is from where you can manage your device... some sort of like the management interface on a single context based ASA... where you actually assign the resources in on the System context... dont mix them up.. . Regarding to your question, yes indeed is needed to

[OSL | CCIE_Security] IPS Question Regarding event action filters.

2012-03-17 Thread Mike Rojas
Hi All, This is something I just thought off, when you get an exercise that says excempt loopback blah to trigger any action on the virtual sensor blah. I do actually need to configure 2 action filters right? One from it being the attacker and other one to be as the victim? Is this correct?

[OSL | CCIE_Security] IPS Rate Limiting

2012-03-17 Thread Mike Rojas
Hello, Another question (I know getting a little bit annoying, but I guess some others may have the same doubts) In regards of the configuration on the Blocking device when using ssh, you either have to do a bunch of stuffs configuring Authorization (in case you dont have an enable password)

Re: [OSL | CCIE_Security] ASA Multiple context

2012-03-17 Thread Aous SAlloum
Thanks all . 2012/3/17 Mike Rojas mike_c...@hotmail.com NO, wait wait Admin context is from where you can manage your device... some sort of like the management interface on a single context based ASA... where you actually assign the resources in on the System context... dont mix

Re: [OSL | CCIE_Security] IOS firewall and OOO packets

2012-03-17 Thread Imre Oszkar
Hi Piotr, Below are my findings: 1. Only Protocols that requires application layer inspection (DPI) are reassembled for inspection. 2. The reassembly process happens on the copy of the packets, the original OOO packets are sent unmodified to the destination. 3. OOO packets sourced from the

Re: [OSL | CCIE_Security] Recovering error disable port

2012-03-17 Thread Joe Astorino
Not that I know of...oh wait, reload : ) On 3/17/12, Kingsley Charles kingsley.char...@gmail.com wrote: Hi all To enable error disable ports other than manually performing shut/no shut or using the errdisable recovery command, are there any other methods? With regards Kings* * --

[OSL | CCIE_Security] Shell Exec Authorization with Radius

2012-03-17 Thread Mike Rojas
So here is something else that I find really concerning. There was an exercise that said... authorize user Blah and make you sure that the user falls into privilege level 12. Do not change anything on the group. So I figured that it has to do with the Cisco AV pair boxes under the ACS

Re: [OSL | CCIE_Security] Preventing double tagging by trunking native vlan traffic

2012-03-17 Thread Joe Astorino
Here is how I understand the attack. Let's imagine the following setup ATTACKER SW1 --- SW2 --- VICTIM HOST - The switch port the attacker is connected to is an access port in VLAN 1 - The native VLAN from SW1 -- SW2 is the default VLAN 1 - VICTIM host is in VLAN 10 Now, let's look at how

Re: [OSL | CCIE_Security] IPS Question Regarding event action filters.

2012-03-17 Thread Kingsley Charles
Yes On Sun, Mar 18, 2012 at 12:00 AM, Mike Rojas mike_c...@hotmail.com wrote: Hi All, This is something I just thought off, when you get an exercise that says excempt loopback blah to trigger any action on the virtual sensor blah. I do actually need to configure 2 action filters right? One

Re: [OSL | CCIE_Security] Preventing double tagging by trunking native vlan traffic

2012-03-17 Thread Kingsley Charles
Now SW2 gets a double tagged frames and it will be also configured for vlan dot1q tag native to accept double tagged. It strips the outer tag and then what will happen to that frames? It will be sent on ports that have vlan 1 or trunk ports that have native vlan 1. So the frame will keeps