Re: [swinog] Hardware for testlab
Hi, you could also use the free sw for real emulation Cisco IOS Routers and switches: [1] dynamips [2] the graphical front end The only thing you need are the Cisco IOS. greetz - marcel [2] www.gns3.net/ [1] http://www.gns3.net/ Pascal Mainini schrieb: Hi all i'm looking for some hardware for my private testlab. So in case you got some of the stuff below lurking around somewhere and fear the effort to throw it away, tell me :-) I'm particularly looking for: - 2-3 Cisco switches, basically interface count and type doesn't matter, as long as it can run more or less current IOS-versions - DB60M DTE/DCE-crossover-cables - BRI and/or Fastserial Enhanced PAs for 7200 - Powersupply for Cisco 1600 - Rackmounting-brackets for 2500/2600 series Additionally, i'm always interested in - all kinds of Routers (needn't to be Cisco) - ATM and tokenring equipment Tell me offline if you've got anything, i'd also be able to pay small amounts depending on kind and state of the equipment. Thanks a lot and kindest regards, Pascal ___ swinog mailing list swinog@lists.swinog.ch http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog ___ swinog mailing list swinog@lists.swinog.ch http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog
AW: [swinog] CIXP power outage this morning ?
Hello Jerome, We had no problems this morning @CIXP - no power outage, no peerings were down- except the BGP-Sessions to sunrise were down this morning. Greetz, marcel -Ursprüngliche Nachricht- Von: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Im Auftrag von Frédéric Jutzet Gesendet: Mittwoch, 8. Februar 2006 10:44 An: swinog@swinog.ch Betreff: Re: [swinog] CIXP power outage this morning ? io, nous aucun souci sur des équipements présent labas mlrGEV001 uptime is 4 weeks, 6 days, 4 hours, 21 minutes mesGEV001 uptime is 4 weeks, 6 days, 3 hours, 28 minutes ni sur le border bgp: Feb 8 05:24:22.768 CET: %BGP-5-ADJCHANGE: neighbor 195.66.224.214 Down BGP Notification sent Feb 8 05:24:22.768 CET: %BGP-3-NOTIFICATION: sent to neighbor 195.66.224.214 4/0 (hold time expired) 0 bytes Feb 8 05:37:00.409 CET: %BGP-5-ADJCHANGE: neighbor 195.66.224.214 Up Feb 8 08:26:00.575 CET: %BGP-3-NOTIFICATION: received from neighbor 206.223.115.57 4/0 (hold time expired) 0 bytes Feb 8 08:26:00.575 CET: %BGP-5-ADJCHANGE: neighbor 206.223.115.57 Down BGP Notification received Feb 8 08:27:10.985 CET: %BGP-3-NOTIFICATION: received from neighbor 206.223.115.57 6/5 (cease) 0 bytes A+ Frédo PS : j'ai une entrée en CVS, putain pas trop tot, mais les boules [EMAIL PROTECTED] Hello, First, happy new year and best wishes for 2006 to all swinoggers ! All our routers in Geneva CIXP went down between 6h and 6h20 this morning, due to a power outage. I'm waiting for some news from CERN but did somebody have more infos ? Thanks, Jerome ___ swinog mailing list swinog@lists.swinog.ch http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog ___ swinog mailing list swinog@lists.swinog.ch http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog ___ swinog mailing list swinog@lists.swinog.ch http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog
RE: [swinog] [Fwd: Cisco IOS Exploit Cover Up]
For more info about into the fun land of exploiting a routing device made by Cisco Systems google with the keywords Burning the bridge: Cisco IOS exploits Greetz, marcel -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of [EMAIL PROTECTED] Sent: Friday, July 29, 2005 11:40 AM To: swinog@swinog.ch Subject: RE: [swinog] [Fwd: Cisco IOS Exploit Cover Up] Hi Now Cisco has announced the possibility to execute arbitrary code on the IOS. (Maybe) the discussions in the net forced Cisco must admit their security flaw. http://www.cisco.com/warp/public/707/cisco-sa-20050729-ipv6.shtml Nice weekend, marcel -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Fredy Kuenzler Sent: Wednesday, July 27, 2005 8:41 PM To: swinog@swinog.ch Subject: [swinog] [Fwd: Cisco IOS Exploit Cover Up] Another YAGR to come ... ?!? F. Original Message Subject: Cisco IOS Exploit Cover Up Date: Wed, 27 Jul 2005 13:26:21 -0400 From: James Baldwin [EMAIL PROTECTED] To: nanog@merit.edu For those who like to keep abreast of security issues, there are interesting developments happening at BlackHat with regards to Cisco IOS and its vulnerability to arbitrary code executions. I apologize for the article itself being brief and lean on technical details, but allow me to say that it does represent a real problem (as in practical and confirmed): http://blogs.washingtonpost.com/securityfix/2005/07/mending_a_hole_.html ___ swinog mailing list swinog@lists.swinog.ch http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog ___ swinog mailing list swinog@lists.swinog.ch http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog ___ swinog mailing list swinog@lists.swinog.ch http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog