Knowledge Base:

 

Por Javier San Martín

malito: javier@sanmartin.net.ar

 

Palabras claves para búsqueda rápida:

 

[Auditoría]

[BIND]

[Comunicaciones]

[DMZ]

[Electronica]

[Estándar]

[FW-1]

[IDS]

[IKE]

[IPSO]

[Links]

[Linux]

[Lista de Discusion]

[MRTG]

[MSX]

[NMS]

[Seguridad]

[SSH]

[Standard]

[Templates]

[Tunning]

[Tutorial]

[WEP]

[Windows]

Falta completar.


Índice

 

Knowledge Base: 1

Palabras claves para búsqueda rápida: 1

Índice. 2

Links de utilidad para. 4

TRADUCCIÓN Y PROCESAMIENTO DE PALABRA.. 4

ACTUALIDAD EN REDES Y CONECTIVIDAD.. 4

Online trace route y ping. 4

ESTANDARES EN REDES. 4

BIND.. 4

NMS. 5

Remote Control 5

MRTG.. 5

SEGURIDAD.. 5

Port Scan y test de vulnerabilidad. 6

SSH.. 6

IDS. 6

Firewalls. 6

Updates (Actualizaciones), Tunning y Bastion Hosts. 7

COMUNICACIONES. 7

Cabletron-Enterasys. 7

COMPUTADORAS MSX.. 8

Notas, papers y otros. 8

Comandos de VI para UNIX.. 8

Usando el CRON de UNIX.. 9

Comandos para HP-UX (pueden funcionar en LINUX) 9

Seguridad, Tunning y Bastion Hosts. 10

Hardening NT/2000 & HP Unix. 11

DMZ - Extranet 11

Hardening Extranets. 11

Hardening DMZ. 12

OpenView Suite. 13

1-Cambio de cuenta de comunicaciones de agentes en NT. 13

2-Cambio en labels de symbols en el mapa. 13

3-Abrir mapas distintos que el default 14

4-Copiar mapas para usuarios: 14

5-SOLID administration Guide. 14

6-Limpiar la base de datos de Eventos de ITO utilizando Oracle. 14

7-Limitar el tamaño de la base SOLID.. 15

MRTG – Multi Router Traffic Grapher 17

Template para graficar FW-1. 17

Firewall-1. 18

1-State Table. 18

2-Where does checkpoint put its putkey values?. 19

3-What is sys.conf used for?. 19

4-Can't Replace Previously Installed Policy. 20

5-How to change log directory at FW4.1, How to redirect logging. 20

6-How to redirect logging to an other master 21

7-Cómo auditar cambios en el Firewall-1?. 21

8-In version 2000(4.1) what happened witn fwui.log?. 22

9-What shall I do if I want to separate the Management Module for Policy repository and a Management module for logging station. 22

10-VPN and NAT. 22

11-License limit 22

12-Carga de política por línea de comandos. 23

13-Backup y restore de firewall 23

Backup De Management station para Linux: 25

14-Backup script for NOKIA.. 26

Para hacer backup de la configuración en IPSO.. 28

Para hacer un restore de la configuración en IPSO desde archivos locales. 28

15-Enabling Windows 2000 Logon through firewall 28

16-PUTKEY Issues. 29

17-Single Rulebase for Multiple Firewalls. 32

18-MIB OIDs Para FW-1. 33

19-Configurando NAT. 34

20-Verificar Firewall-1 Build Version. 34

21-Como configurar un login banner en IPSO?. 35

22-Trap mailer 35

Cabletron Systems – Enterasys Networks. 35

Upgrade de ELS 100. 35

Password Recovery para ELS100-S24TX2M... 36

Various SSR Software Upgrade Procedures. 37

SSR Memoy erase. 39

Realizar Password Recovery del SSR.. 41

Comandos de TACACS+ para SSR.. 41

Cisco Systems. 42

Cómo cambiar BootFlash en las MSFC.. 42

Cómo hacer un FTP record en Arrowpoint 43

Cómo hacer una copia de la config en Arrowpoint 43

Cómo calcular uso de ancho de banda mediante SNMP. 43

Cómo generar tráfico entre 2 routers. 45

MIBs de Temperatura. 45

********* FIN DEL APUNTE *********. 46

 


 

Links de utilidad para

 

TRADUCCIÓN Y PROCESAMIENTO DE PALABRA

 

http://www.uni-leipzig.de/~xlatio/xtools.htm

http://www.acronymfinder.com

 

ACTUALIDAD EN REDES Y CONECTIVIDAD

 

http://www.stardust.com/

http://www.lacompu.com/noticias/vernoticia.php3?noticiasID=1514

Manual de Telecomunicaciones

www.rares.com.ar

 

Online trace route y ping

 

www.all-nettools.com

www.grc.com/shieldsup

http://nitrous.digex.net/

http://www.network-tools.com/

http://www.dido.org

 

ESTANDARES EN REDES

 

http://www.siemon.com/standards/

http://standards.ieee.org/getieee802/portfolio.html?agree=ACCEPT

http://www.nmops.org/

http://www.ietf.org

http://www.stardust.com/

http://www.inei.gob.pe/cpi/bancopub/libfree/lib620/cap0608.htm

 

BIND

 

Manual de BIND 9

http://www.csd.uwo.ca/staff/magi/doc/bind9/

 

NMS

 

http://www.snmpworld.com/

http://www.pantherdig.com/snmpfaq/

http://openview.hp.com

 

Remote Control

 

http://www.uk.research.att.com/vnc/

http://www.tightvnc.com/

http://www.symantec.com

http://www.netopia.com/software/products/tb2/2000/

http://www.serverphone.com/

http://www.remotelyanywhere.com/

http://www.dameware.com/

http://www.famatech.com

 

MRTG

 

[MRTG][Templates]

 

Para bajar templates de MRTG, se recomienda el siguiente link:

http://www.somix.com/software/mrtg/#

 

[MRTG][Lista de discusión]

Para consultar la lista de discusión de MRTG y RDD, se recomienda el siguiente link:

http://www.ee.ethz.ch/~slist/

 

SEGURIDAD

 

En estos sitios se pueden encontrar herramientas para seguridad.

 

http://www.rtek2000.com/Tech/InternetSecureLinks.html

http://www.rtek2000.com/Tech/I-SecureLinks5.html

http://support.microsoft.com/support/kb/articles/Q286/1/32.ASP

http://insecure.org

http://www.sysinternals.com/ntw2k/freeware/tdimon.shtml

http://www.xploiter.com/tambu/totostat.shtml

http://www.analogx.com/contents/download/network/pblock.htm

IKE Scanning Tool

http://www.nta-monitor.com/ike-scan/

Sin dudas, uno de los mejores sitios:

http://www.spitzner.net/

Cracker de WEP [WEP]

http://sourceforge.net/projects/wepcrack/

 

Port Scan y test de vulnerabilidad

 

http://www.insecure.org/nmap

http://www.wwdsi.com/saint (satan based)

http://www.nessus.org

 

SSH

 

[SSH]

Java Based

http://www.mindbright.se/mindterm

 

IDS

 

[IDS]

Snort 1.7 - Martin Roesch

http://www.snort.org

SnortPlot.pl - Angelos Karageorgiou, SnortPlot.pl is a Perl script that rework Snort logs to graphically plot attack signatures in 3D.

http://www.unix.gr

 

Firewalls

 

Linux Router Project

http://www.tarball.net/cish/cish.html

http://www.zelow.no/floppyfw (router+firewall)

Sentry Firewall CD-ROM 1.0.5 - Sentry Network Security. Sentry Firewall CD-ROM is a Linux-based bootable CD-ROM, suitable for use as an inexpensive and easy to maintain firewall or IDS(Intrusion Detection System) node. The system is designed to be immediately configurable for a variety of different operating environments via a configuration file located on a floppy disk or a local hard drive.

http://www.SentryFirewall.com

IP Chains – filtros de linux

http://oasis.dit.upm.es/~jantonio/documentos/revistas/ipchains/ipchains.html

Stress test?

http://www.linux-sec.net/Audit/

 

Updates (Actualizaciones), Tunning y Bastion Hosts

 

[Windows][Tunning]

 

Windows 2000 Updates

http://www.microsoft.com/windows2000/downloads/default.asp

Microsoft TechNet security site

http://www.microsoft.com/technet/security/

Microsoft TechNet security site

http://www.microsoft.com/technet/security/

Windows 2000 Internet Server Security Configuration Tool for Internet Information Server 5 (IIS5)

http://www.microsoft.com/Downloads/Release.asp?ReleaseID=19889

Windows 2000 IIS 5.0 Hotfix Checking Tool

http://www.microsoft.com/Downloads/Release.asp?ReleaseID=24168

How it works

http://www.microsoft.com/windows2000/library/howitworks/default.asp

Un buen sitio para saber qué se puede eliminar de Windows. Incluye muy buenas herramientas, tutorials, tips y discos booteables. Es un verdadero Help Desk online.

http://www.answersthatwork.com/Tasklist_pages/tasklist_w.htm

Lecturas para considerar sobre tunning de Windows

http://www.phoneboy.com/fom/fom.pl?_recurse=1&file=17#file_519

http://www.rtek2000.com/Tech/InternetSecureLinks.html#hard

http://www.systemexperts.com/tutors/HardenW2K101.pdf

Freeware Syslog para windows

http://www.kiwisyslog.com/

 

COMUNICACIONES

Cabletron-Enterasys

 

All release notes

http://www.enterasys.com/support/relnotes/index601-650.html

Enterasys White Papers

http://www.enterasys.com/products/whitepapers/

 

COMPUTADORAS MSX

 

[MSX]

Un muy buen sitio FTP sobre MSX lleno de juegos es el siguiente:

ftp://193.166.3.2/pub/msx/

 

Notas, papers y otros

 

Comandos de VI para UNIX

 

Todos los comandos del vi se utilizan con la secuencia

ESC + la letra (o sea primero ESC y luego la letra)

 

comando

significado

i

inserta antes del caracter donde esta el cursor

I

inserta al principio de la línea donde esta el cursor

a

hace un append después del cursor

A

hace un append al final de la línea

o

inserta una línea debajo de la línea donde esta el cursor

O

inserta una línea arriba de la línea donde esta el cursor

x

borra el caracter donde esta el cursor

r

hace un overstrike de un caracter

R

hace un overstrike recursivo

/cadena

busca la cadena tipeada

n

busca la siguiente cadena

dd

borra la línea donde esta el cursor

cw

cambia la palabra donde esta el cursor

dw

borra la palabra donde esta el cursor

G

va al final del archivo

yy

Copiar la linea actual al buffer

p

pega el buffer

u

deshace el ultimo cambio

 

navegación

significado

h

mover el cursor a la izquierda

j

mover el cursor abajo

k

mover el cursor arriba

l

mover el cursor a la derecha

i

modo input

esc

modo de comando

ZZ

sale del vi y graba cambios solo si se hicieron

:w

graba los cambios sin salir

:wq

graba los cambios y sale

:q!

sale sin grabar los cambios

 

Nota: el símbolo ! fuerza la escritura.

 

Usando el CRON de UNIX

 

Para verificar si el cron está funcionando, el comando es

ps –ef | grep cron

 

Para listar el cron, el comando es:

crontab –l

 

Para editar el cron, el comando es:

crontab -e

 

La entrada del cron está representada por 5 elementos y el comando, mas un comentario precedido por el caracter “#”

 

0   22    *   *        6       /etc/bkroot

 |      |       |     |      |       |->    programa o scripts a ejecutar

 |      |       |     |      |->   dia de la semana a ejecutar  (sabado)

 |      |       |     |->   mes   ( * no importa que mes  es )

 |      |       |-> Dia del mes   ( *  no importa que fecha es)

 |      |->  Hora de ejecucion

 |->   Minuto

 

Fijate en el man de cron para mas detalle de los parametros.

 

Comandos para HP-UX (pueden funcionar en LINUX)

 

Apagado de un equipo:

shutdown –h now

shutdown –h 0

shutdown -r

reboot

 

Pasar a un archivo el listado de productos instalados (ej.: de swlist):

swlist –l product > /tmp/listado.log

donde –l significa el nivel (product, subproduct, patch) Se puede consultar el man

 

Pasar a un archivo el output de algo:

echo TEST | tee -a /tmp/dump

 

Buscar la ubicación de un comando:

type comando

whereis comando

 

Exportar el tipo de terminal:

export TERM=xterm

 

Exportar el display:

export DISPLAY=direccion_ip:0.0

donde direccion_ip es la IP del equipo con X instalado, y :0.0 es desde dónde muestro la ventana X

 

Buscar y listar archivos core:

find / -name core –exec ll \;

 

Buscar y eliminar archivos core:

find / -name core –exec rm \;

 

Mostrar espacio utilizado por archivos y directorios desde el directorio de trabajo:

du –s *

 

Apagar o levantar el scheduler:

lpshut

lpsched

 

Definir una impresora local ncrprinter:

lpadmin -pncrprinter -v/dev/null/ -mrmodel -ob3 -ormncr -orplpncr2

 

Buscar un string en el syslog.log:

grep “Sep 15” syslog.log

 

Contar la cantidad de palabras:

| wc -l

 

Borrar el mailqueue:

rm * /var/spool/mqueue

 

Montar el CD-ROM:

mount /dev/dsk/c1t2d0 /cdrom

Antes revisar el path /dev/dsk/ para ver donde esta el CD con "ioscan /path"

 

Mostrar la licencia de ITO:

/opt/OV/bin/OpC/install/opclic –list

 

Comando para traps Galmonitor

echo "$A $x $X 1C $1 $2 $3 $7 $8 0A" | /usr/bin/tee -a /tmp/daniel/pruebaaee | /usr/bin/mailx -s "Interrupcion" gonzalo.pasquali@smtp02.bancogalicia.com.ar

 

Seguridad, Tunning y Bastion Hosts

 

Hardening NT/2000 & HP Unix

 

1-HP-UX

 

General UNIX hardening applies. Turning off services run from inetd, or as daemons, is always a good idea (less is better). Restricting access via firewalling, tcp_wrappers and internal controls is also recommended. Looking for setuid and setgid files, and removing the setuid/setgid where possible (or the software package entirely).

 

2-Windows NT – 2000

 

NT Passwords

Do you know where does Windows NT 4.0 stores the user's passwords?

Is there any program that help me change user's passwords on the server?

Answer:

NT stores users' passwords in the Security Accounts Manager Database, commonly referred to as the SAM. This is part of the registry, and is stored in %systemroot% -- typically c:\winnt\. To change a user's password on the server, simply use Account Manager for Domains. You must, of course, be

using an account in the administrator group or with otherwise sufficient privileges. To change the password from an NT workstation, this workstation must be part of the domain. For more information, see:

http://www.ciac.org/ciac/bulletins/h-45.shtml

Additionally, backups of the SAM are commonly stored in c:\winnt\repair\sam._

..and on the Emergency Repair Disk (ERD).

 

DMZ - Extranet

[Extranet] [DMZ]

 

Hardening Extranets

[Extranet]

 

http://www.nsa.gov/winsecurity/

 

defense_in_depth.pdf

group_policy_reference.pdf

guide_to_secure_configuration_of_isa_server.pdf

guide_to_securing_microsoft_windows_2000_act.pdf

guide_to_securing_microsoft_windows_2000_dns.pdf

guide_to_securing_microsoft_windows_2000_efs.pdf

guide_to_securing_microsoft_windows_2000_fil.pdf

guide_to_securing_microsoft_windows_2000_group_policy.pdf

guide_to_securing_microsoft_windows_2000_schema.pdf

guide_to_securing_microsoft_windows_2000_sct.pdf

guide_to_securing_windows_nt_9x_clients.pdf

microsoft_windows_2000_network_architecture_guide_1_0.pdf

microsoft_windows_2000_router_configuration_guide.pdf

office97_executable_content.pdf

secure_configuration_of_certificate_services.pdf

secure_configuration_of_certificate_services_checklist.pdf

secure_configuration_of_iis_5.pdf

secure_configuration_of_iplanet_web_server.pdf

using_dod_pki_certificates_in_outlook_2000.pdf

windows_2000_kerberos_settings.pdf

 

Hardening DMZ

 

[DMZ]

In our University we are planning a firewall configuration like this one:

 

                    |

                    | 35 Mbps

                    |

                ISP Router

                    |

                    | 20 Mbps

                    |

                 -------

vlan 1 -------- |>       | -----DMZ1 (external servers www, ldap, dns, ...)

                |  fw1  |

vlan 2 ---------|>       |------DMZ2 (other departmental external servers)

(2000)           -------

                    |

                    | Internal Servers (dns, www, ldap, nfs, ...)

                    |

                 -------

                |       |

vlan 3 ---------|fw2  | ------- BD servers

(500)           |       |

                 -------

 

Different users are grouped in vlans depending on their profile. Each vlan has his own dns server (secondary), dhcp server, and  a web proxy cache server.

Students are in vlan1, professors in vlan2 and administrative staff in vlan3. This vlans are isolated between themselves (at least for the moment, although we have to plan for exceptions).

 

Access to BD servers is performed only from people in vlan3 and from the internal web server.

 

External servers are relays to our internal servers.

 

OpenView Suite

 

1-Cambio de cuenta de comunicaciones de agentes en NT

 

Here is the procedure to install the ITO agent software without using the HP ITO account.

Since NT Agent Version A.05.37

The ITO agent can now run as non 'HP ITO account' user.  This also includes the SYSTEM' account.

Installation instruction:  Use the manual installation. Before calling the  'opc_inst.bat' script, an dditional entry can be added to  the 'opcsetup.inf' file to specify the run user for the  agent:

[Agent User]

SYSTEM

Instead of 'SYSTEM', any other name could be specified. In  this case the user account is created.

If 'SYSTEM' is given, no user account is created (no  'opc_op' either).

NOTE: User names may not contain space characters.  If a user name is specified in 'opcsetup.inf', the agent  will be installed using this account name, no matter if  there was already an agent installed using another  account. 

If a different user is specified in 'opcsetup.inf', the  account created by the existing agent is not removed but  left on the system. It has to be removed manually. If no user name is specified in 'opcsetup.inf', the   installation will check if there is already an agent  installed. If it finds one, the same user will be used.  If a user is specified or found to be used by an old  agent, and the password specified was not correct for this  account, the user is removed and re-created. It has the  same name afterwards but a different internal user ID.

 

Applications:

- All applications configured to run as 'opc_op' or    'HP ITO account' have to be changed to specify a user    that exists on the system.

- All monitoring executables will be run as the specified    account. This might restrict some of the access rights    to monitored applications.

- The 'SYSTEM' account does not have any network access    capabilities. 

 

Remote installation:

- On Domain Controllers there is the Installation Server    service that executes the installation on remote systems    in this domain. If this service is modified to run as    'SYSTEM', the remote installation is not possible at all    (the 'SYSTEM' account does not have any access rights    for remote systems).

- If remote execution is wanted, the Installation Server    service can be configured to run as a domain user that    has Domain Admin user rights.

 

2-Cambio en labels de symbols en el mapa

 

Para hacer que NNM tome los cambios realizados en el label de un dispositivo, debes setear una variable. Puedes encontrar esta opción en el capítulo 8 del manual "Managing your network", pág 237 y 238. A continuación adjunto parte del texto:

 

NOTE The ipmap service automatically assigns a symbol type and label based upon information it receives from the netmon service. This means that if you modify the symbol label or symbol type of an object that is managed by NNM, your changes will be replaced by the values assigned by NNM the next time configuration polling runs.

You can turn off this ipmap capability by setting the environment variable IPMAP_NO_SYMBOL_CHANGES=TRUE. See the ipmap reference page in NNM's online help (or the UNIX manpage) for information about the -u parameter.

 

3-Abrir mapas distintos que el default

 

Para que el usuario pueda abrir su mapa, siendo distinto al default, y en forma automatizada al hacer login en una sesión, en el profile de cada usuario se debe configurar ovw -map <nombre mapa> -ro

El comando ovw ejecuta la aplicación. la opción -map nos permite elegir el mapa y la opción -ro lo abre como sólo lectura.

 

 

4-Copiar mapas para usuarios:

 

El primer paso es crear la cuenta del usuario en el sistema operativo. Luego, se abre un mapa en NNM con ese usuario. También se debe crear el perfil de usuario en ITO. Por desgracia, el mapa se va a ver hecho un desastre.

 

Para grabar y/o copiar mapas de NNM e ITO se debe hacer de la siguiente forma

# ovwls (lista los mapas, anotar grupos owners y permisos)

map->delete->mapa a borrar

map->save as->grabar el mapa default como el mapa borrado

# ovwls

# ovwchown <owner> <mapa>

# ovwchgrp <grupo> <mapa>

# ovwchmod 776 <mapa>

 

5-SOLID administration Guide

 

You can obtain the Administrators Guide for the Solid database from

http://www.solidtech.com/developer/documentation.html

 

6-Limpiar la base de datos de Eventos de ITO utilizando Oracle.

 

Esto se hace truncando las tablas directamente desde la Base de Datos Oracle.

 

 To be able to perform these steps the Oracle DB must be up and running.

 Shutdown ITO managers (ovstop opc ovoacomm) and leave all GUIs.

 With ITO 5.0 you can decide whether you want to clear the active messages or the history messages (or both).

 

 How to clear the active message tables

 

#su - oracle

 $svrmgrl

 >connect internal;

 >truncate table opc_op.opc_act_messages;

 >truncate table opc_op.opc_msg_text;

 >truncate table opc_op.opc_orig_msg_text;

 >truncate table opc_op.opc_annotation;

 >truncate table opc_op.opc_anno_text;

 >exit;

 

 How to clear the history message tables

 

#su - oracle

 $svrmgrl

 >connect internal;

 >truncate table opc_op.opc_hist_messages;

 >truncate table opc_op.opc_hist_msg_text;

 >truncate table opc_op.opc_hist_orig_text;

 >truncate table opc_op.opc_hist_annotation;

 >truncate table opc_op.opc_hist_anno_text;

 >exit;

 

 NOTE: If you clear all messages (active + history) please truncate also  the following table:

   >truncate table opc_op.opc_forward_msgs;

 

7-Limitar el tamaño de la base SOLID

 

The Data Warehouse database ($OV_DB/analysis/default/solid.db) has filled up the disc.  I need to reduce its size and limit its future growth.CONFIGURATION NNM6.10 and 6.2 on Solaris or HP-UXRESOLUTION Here is what you need to do to reduce the size of your solid.db. Before you start it is recommended that you have a complete backup so that

should there be any problems you can return to the status quo ante.

 

The steps are the following:

(1)Delete unnecessary data from the database.

(2)Unload the data from the database into a flat file.

(3)Edit the solid.ini file in order to limit the size to which the database will grow.

(4)Delete the database.

(5)Recreate the database.

(6)Reload the data into it.

 

(1) To delete unnecessary data from the database use the command

#ovdwevent -trim.

You can test to see what data you are about to delete using

#ovdwevent -trimnodelete

before you do it for real.  For a full explanation of the options see the ovdwevent (1) man page. However deleting data will not reduce the size of the database file, it will simply free up space inside it. (Once you have got your database under control you might consider setting up a cron job to delete superfluous data on a regular basis, and thus prevent any problems caused by the database filling up.)

 

(2) Now unload the data from the database into a flat file with ovdwunloader.

Check the man page for a full explanation of the options.  You will need to export both the trend and event data, so you will need to run the command twice:

#ovdwunloader -file trend_output_file -trend -v

#ovdwunloader -file event_output_file -event -v

Stop OpenView

#ovstop -v

 

(3) The default size of the database is a single two gigabytes file. You can control the size by editing $OV_DB/analysis/default/solid.ini and setting the FileSpec parameter in the Index File section.  The FileSpec parameter describes the location and the maximum size of the database file and accepts the following three arguments:

database file name max filesize device number (optional)

You can also use the FileSpec parameter to divide the index file into multiple files and onto multiple disks. To do this, specify another FileSpec parameter identified by the number 2. The index file will be written to the second file if it grows over the maximum value of the first FileSpec parameter. For example the default value for this parameter is solid.db, 2147483647 (which equals 2 GB expressed in bytes).

FileSpec_1=SOLID.DB 2147483647

In the following example, the parameters divide the index file on the disks C:, D: and E: to be split after growing larger than 1 GB (=1073741824 bytes).

FileSpec_1=c:\soldb\solid.1 1073741824 1

FileSpec_2=D:\soldb\solid.2 1073741824 2

FileSpec_3=G:\soldb\solid.3 1073741824 3

NOTE. The index file locations entered must be valid path names in the server’s operating system. For example, if the server runs on a UNIX operating system, path separators must be slashes instead of backslashes.  Although the database files reside in different directories, the file names must be unique. In the above example, it is assumed that C:, D: and E: partitions reside on separate physical disks.  Splitting the index file on multiple disks will increase the performance of the server because  multiple disk heads will access the data in your index file. There is no limit to the number of index files you may use.

 

(4) Now delete the database:

#cd $OV_DB/analysis/default

#rm solid.db

#rm solmsg.*

#rm ./log/sol*.log

 

(5) Now recreate an empty database

#cd $OV_DB/analysis/default

 

For NNM 6.10:

#ovdbrun -x exit -u ovdb -p ovdb

 

For NNM 6.2:

#ovdbrun -x -U ovdb -P ovdb -C ovdb<

 

#cd $OV_CONF/analysis/sqlScripts

#ovdbcheck -start

#ovdwquery -file tables_common.solid

#ovdwquery -file tables_event.solid>

#ovdwquery -file tables_trend.solid>

#ovdwquery -file tables_topo.solid<

 

#ovdbcheck -stop

#ovstart -v

 

(6) Now that OpenView is running again we need to reload the data from the flat files into the database.

#ovdwloader -file trend_output_file -v

#ovdwloader -file event_output_file -v

 

MRTG – Multi Router Traffic Grapher

 

Template para graficar FW-1

 

[MRTG][FW-1][Templates]

 

Template para graficar en MRTG la cantidad de paquetes aceptados y rejectados de Checkpoint Firewall-1 (Necesita estar habilitado SNMP en el firewall y una regla que permita la transmisión)

 

<--Inicie la copia desde aquí-->

 

Target[packets-cp1]:

1.3.6.1.4.1.2620.1.1.4.0&1.3.6.1.4.1.2620.1.1.5.0:public@xxxx-cp1

Directory[packets-cp1]:xxxxcp1

WithPeak[packets-cp1]: wmy

YLegend[packets-cp1]: packets

ShortLegend[packets-cp1]: .  :

MaxBytes[packets-cp1]: 10000

Options[packets-cp1]: growright

Title[packets-cp1]: packets: xxxx-cp1

Colours[packets-cp1]: GREEN#00ee00,RED#ff0000,DARKGREEN#807711,VIOLET#ff00ff

Legend1[packets-cp1]: Accepted packets

Legend2[packets-cp1]: Rejected packets

Legend3[packets-cp1]: 5 min maximal accepted packets

Legend4[packets-cp1]: 5 min maximal rejected packets

LegendI[packets-cp1]: &nbsp;accepted packets :

LegendO[packets-cp1]: &nbsp;rejected packets :

PageTop[packets-cp1]: <H1>xxxx-cp1: Packets (5 minute samples)

 <BR></H1>

  <TABLE>

   <TR><TD>System:</TD><TD>xxxx-cp1</TD></TR>

 

   <TR><TD>Maintainer: Network Systems Team</TD></TR>

 </TABLE>

###

 

 

<--Finalice la copia aquí-->

 

Firewall-1

 

1-State Table

 

I am trying to understand how the state table works in checkpoint fw-1. What is the state table. What happens to the state table when I stop and start the fw-1 service. What happens to connections when the service stops and starts?

 

Say I was doing a ftp file transfer or http file transfer and the service was restarted. What happens to the state table or what happens to the tcp connection?

 

Answer:

I think a good place for you to find some useful answers is the fwstart and fwstop scripts. Also, please, read the portion of the Checkpoint manuals where the Firewall-1 architecture is described.

 

As far as your question is concerned, it really depends on the kernel

implementation (i.e. exit sub-routines or functions) and not user logic.

It's very much possible for the kernel not to reclaim the process' entire address space immediately, albeir it could claim non-critical portions of it.

 

That may or may not depend on the exit status of the process.

 

Anyway, I'm sure you can research the particulars of the system you happened to be using.

 

And then:

On the other hand, it depends on what you mean by stopping and starting the firewall. Certainly if you begin killing fw processes and unloading fw kernel modules, you will most definately kill your traffic and clear your state tables.

 

When I say stop and start the firewall, I mean running fwstop and fwstart.

 

And finally with a method of testing:

 

Do fwstop, then type 1. fw tab -t connections -u and 2. modinfo | grep FW. You can try the same after you do the fw unload localhost.

 

Let me know what you see.

 

Also in the thread were comments from Amin Tora (Amin@EPLUS.com)

 

The state tables are CLEARED if you stop the firewall or unload your policies.

 

You can prove this...

 

On a test firewall module:

 

run $FWDIR/bin/fw tab -t connections -u {displays contents of state table}

run $FWDIR/bin/fwstop OR $FWDIR/bin/fw unload localhost

run $FWDIR/bin/fw tab -t connections -u

 

 

2-Where does checkpoint put its putkey values?

 

http://securityportal.com/list-archive/fw1/2001/May/1005.html

 

3-What is sys.conf used for?

 

Occasionally, I see FireWall-1 refer to sys.conf in error messages. What is this file used for?

 

Answer:

sys.conf would exist for only one reason, for you to put into it the names of your firewalls [either by hostname, IP address, or name of the network object represneting the firewall]. This would then enable you, on the Management Server, to execute a command like:

 

fw load -all $FWDIR/conf/policy.W

 

and have FW-1 push the policy to each firewall listed in sys.conf. Alternatively, you could use

 

fw load -conf $FWDIR/conf/newyork.conf $FWDIR/conff/policy.W

 

which would have fw read the newyork.conf file to determine the firewalls (contained in there) so it could push the policy to them.

 

As you can see, you may have multiple system configuration files that would enable you to have a little control from the command line. Any time a command accepts the -all, you are accessing sys.conf, by defauult.

 

4-Can't Replace Previously Installed Policy

 

After (reinstalling) a - busy - firewall1 (between 8-10Mbps over the external interface), a problem which we were trying to get rid of reappeared -- customer insists on "Account" logging for traffic to its DMZ - (motivation is commercial/financial)

Problem is that, when "Account" logging is activated, the firewall panics when reloading the policy. My principal problem now is that after reboot, the firewall automatically loads the policy with the "account" logging activated. Our guess is that, since the latest policy - without account logging - did not successfully load, the firewall somehow finds and loads the previous version.  Weird thing is that the GUI and the real loaded policy do no longer match !

 

Answer:

This is because FireWall-1 stores the last installed policy in $FWDIR/state. If you haven't been able to install the policy since this problem started occurring, then you've got the old policy there. You can clear $FWDIR/state on both your management console and firewall module. This should prevent FireWall-1 from loading a policy on startup. Then you can load the proper policy from your management console.

 

5-How to change log directory at FW4.1, How to redirect logging.

 

FOR NT

 

FireWall-1 Versions 3.0b-4.0 support modifying (or adding) the following registry entry (It is of type String):

HKEY_LOCAL_MACHINE\SOFTWARE\CheckPoint\FW1\FWLOGDIR

Specify the full path name to the log directory here. In 4.1, create the following registry entry:

HKEY_LOCAL_MACHINE\SOFTWARE\CheckPoint\FW1\4.1\FWLOGDIR

Note: this directory must exist. You will need to restart the FireWall-1 service for this to take effect.

On Unix machines, you can symbolically link the $FWDIR/log directory to another drive. For example:

fwstop

mv $FWDIR/log $FWDIR/log.old

ln -s /path/to/new/logdir $FWDIR/log

fwstart,

This information can be found at http://www.phoneboy.com

 

FOR UNIX

 

To direct Log File to directory different then the standard $FWDIR/log. On UNIX system this can be achieved by adding

setenv FWLOGDIR <log-dir>

to the fwstart scripts before running the fwd and them fwm.

 

6-How to redirect logging to an other master

 

A Master is a machine to which Firewall Modules direct Logging. the file $FWDIR/conf/masters contains a list of IP addresses or network object names, one per line. When the firewall Module starts, it reads this file to determine where to direct logging.

If the file does not exist, logging is local

If the file exists logging is directed to the first IP address in the file.

If any address is preceded by the sign + , then all logging are directed to all IP with a + sign.

If the connection to master goes down, it will scan the file and use the next IP addresses. otherwise it will direct logging locally.

 

7-Cómo auditar cambios en el Firewall-1?

 

[FW-1][Auditoría]

Se deben buscar los siguientes archivos y procesarlos con alguna herramienta

Archivos de configuración:

- rulebases.fws

- objects.c

- fwmusers

- gui-clients

(si está el archivo masters, también)

Archivos de log:

- cpmgmt.aud (en FW-1 4.1) o el fwui.log (en FW-1 4.0)

- manage.lock (archivo que se genera cuando un gui client está activo)

 

8-In version 2000(4.1) what happened witn fwui.log?

fwui.log is now called cpmgmt.aud

 

9-What shall I do if I want to separate the Management Module for Policy repository and a Management module for logging station.

 

You can create the file $FWDIR/conf/loggers through a text editor to direct log to a centralized logging station. It contains a list of Ip addresses one per line. The syntax is the same as for the master file.

a + sign, logging will be directed to to all the IP addresses preceded by a + sign

IP addresses preceded by an @ sign wil receive only alerts

 

10-VPN and NAT

 

This is the best discussion I've seen on this topic:

 

http://www.isp-planet.com/technology/2001/ipsec_nat.html

 

Called "Slipping IPSec Past NAT"

As a note, in order for NAT'd encryption to work you need to use UDP

encapsulation. That only applies to SR and the original post suggested a Site to Site

VPN.

 

11-License limit

 

The host count is stored in a firewall table, you can use the fw tab command to view and delete the host count.  If you do delete the count, keep in mind that you will have to delete the fwd.hosts and fwd.h files form the $FWDIR/database directory as well.

 

To view the table

fw tab -t host_table -u

 

to delete

fw tab -t host_table -x

 

(the -u is for unlimited, that is it will display the whole table. -x is for delete)

 

The output is in HEX.  There are scripts and perl programs out there to automatically convert hex ip addresses to decimal you may want to look for one of these. :)

 

12-Carga de política por línea de comandos

 

c:\winnt\fw1\4.1\bin\fw load <politica.W> <interfaz.direccion@firewall>

 

Lo que realiza este comando es cargar una política  almacenada en el directorio \winnt\fw1\4.1\ la cual figura con extensión.W sobre las interfases indicadas para el router (en nuestro caso sería all.all@firewall), previa compilación.

 

13-Backup y restore de firewall

 

What files to backup?

 

We want to back Firewall-1 configuration. If Firewall crash, we want to be able to restore it quickly. Which files do we have to backup ?

 

The following files are considered important and should be backed up regularly. If you have on the same system the management console and the firewall module, backup all files of Management console column and also all additional files from Firewall module column.

Under Windows 2000/NT replace $FWDIR by %FWDIR%

 

Management console

Firewall module

Comment

$FWDIR/conf/fw.license

$FWDIR/conf/fw.license

 

$FWDIR/conf/objects.C

 

Object databaseFWDIRdddFWDIR

$FWDIR/conf/*.W

 

Set of policies

$FWDIR/conf/rulebases.fws

 

Combined rule bases for GUI clients

$FWDIR/conf/fwauth.NDB*

 

User database

$FWDIR/conf/fwmusers

 

Administrators database

$FWDIR/conf/gui-clients

 

Wrapper for the gui clients - Allow GUI Adminstrative hosts

$FWDIR/conf/product.conf

$FWDIR/conf/product.conf

FireWall-1 product description file

$FWDIR/conf/fwauth.keys

$FWDIR/conf/fwauth.keys

Control authentication key file

$FWDIR/conf/serverkeys.*

$FWDIR/conf/serverkeys.*

 

 

$FWDIR/conf/masters

Master address definition (of the management console)

 

$FWDIR/conf/smtp.conf

Configuration of mail relay function

 

$FWDIR/conf/fwauthd.conf

Security Server configuration file

 

$FWDIR/conf/fwopsec.conf

 

 

You should also back up /var/etc/rc.local, if you created one. This is where you could place ARP commands to support Address Translation, IPSO kernel control commands, or automated backup scripts, for example. (only for IPSO)

 

Since you might use CRON to automatically schedule this backup, consider adding /var/cron/tabs/root to the backup list.

 

You should also modify any file you may have modified in $FWDIR/lib. If you are going to be upgrading, it is not wise to copy an older version of one of these files over a newer version. If you are running Windows NT and doing static address translation, also backup $FWDIR/state/local.arp.

If the firewall goes completely south, you can re-install to the same patch level as you were running before and copy in the existing configuration files with the firewall stopped. You'll have to re-install your security policy, but it's better than having to completely reset up your firewall rules and network objects.

 

How do I proceed for restoring Restoring?

Make sure you stop the firewall before restoring any file. Make sure you restore all the files you need

fwstop

restore by copying back any file you need

fwstart

or for Windows 2000/ NT stop the service

This can also be used when you perform an update or when you have a second system run as a spare.

 

What are the meanings of the different files to backup?

 

Of largest significance are your policy file, <policyname>.W, and objects.C -- from these two you can regenerate the rulebases.fws file
(./fw m -g *.W).

The cp.license file may be useful, but if you know your certificate key, you can request a copy of it from the checkpoint license site.

The fwauth.NDB (mgmt. module only) file keeps information about your users & user-groups, so unless you're not doing any authentication or
securemote (minus LDAP stored users..), you'll want to grab this file too.

The fwauth.keys file contains all the putkeys you've set -- backing this up probably isn't necessary since you'll have to redo the putkeys
anyways. This may not be existant if in single gateway mode with no opsec add-ons tied into it.

The fwmusers (mgmt. station only) file contains all the usernames and passwords (including permissions), for GUI-Client access.

The gui-clients (mgmt. station only) file tells which remote systems are allowed to log into the management station via the GUI and manage it.

The masters file (fw module only) just has the address of the management server in it.

The product.conf file tells which options you have purchased, want turned on, and such.. restoring it will save some reconfiguring.

The seed file will allow you to utilize the parts that are stored encrypted -- user passwords and such. Without it, expect to change a lot of passwords.

The sync.conf (fw modules only) file is used when doing high-availability state-synchronization.

The serverkeys file (or serverkeys.* on unix) are hashes of the putkeys (fwauth.keys file).

 

Backup De Management station para Linux:

 

[FW-1][Linux]

Para hacer backup de una management Station corriendo en linux a otra de alta disponibilidad:

 

#!/usr/bin/ksh

lastmod="fw.timestamp"

find /opt/CPfw1-41/lib -newer $lastmod -type f -print<

|

while read file

do

   rcp -p $file backup_system:$file

done

find /var/opt/CPfw1-41/conf -newer $lastmod -type f

-print |

while read file

do

   rcp -p $file backup_system:$file

done

find /var/opt/CPfw1-41/database -newer $lastmod -type

f -print |

while read file

do

   rcp -p $file backup_system:$file

done

touch $lastmod

 

14-Backup script for NOKIA

 

[FW-1][IPSO]

Method of Backing up the files

 

It may be possible to use a floppy diskette to backup the files. If the files are too large, then FTP can be used to transfer the files across the network.

One idea is to create a file that lists the files to backup. Included in the example below is the path to the IPSO configuration files, the first entry below. Also note that this will backup your backup scripts. Don't forget them!

 

# cat /var/admin/ipsobackuplist

/config/db/*
/var/admin/ipsobackup
/var/admin/ipsobackuplist
/var/cron/tabs/root
/var/etc/rc.local
$FWDIR/conf/fw.license
$FWDIR/conf/objects.C
$FWDIR/conf/*.W
$FWDIR/conf/rulebases.fws
$FWDIR/conf/fwauth.keys
$FWDIR/conf/fwauthd.conf
$FWDIR/conf/masters
$FWDIR/conf/serverkeys.db
$FWDIR/conf/sync.conf
$FWDIR/conf/fwopsec.conf
$FWDIR/conf/omi.conf
$FWDIR/conf/slapd.conf
$FWDIR/conf/fwauth.NDB
$FWDIR/conf/fwmusers
$FWDIR/conf/gui-clients
$FWDIR/conf/smtp.conf
$FWDIR/conf/product.conf
$FWDIR/database/*
$FWDIR/state/*
$FWDIR/log/*

 

Create a file in the admin's home directory called ipsobackuplist to contain the file paths listed above.

Create an executable script in the admin's home directory called ipsobackup
that executes the following commands:

 

#! /bin/csh
# The following line will define $FWDIR
source /var/admin/.rcm_cshrc
cd /
eval tar cf /var/admin/`uname -n`.`date +%m%d%y-%H%M`.bkup.tar `cat
/var/admin/ipsobackuplist`

 

(WARNING: The tar command above should be one line)
(NOTE: If you wish to retain the leading '/' character, use `tar cPf`)
( see `tar --help` for more command line options)

(This command creates hostname.062298-0600.bkup.tar if the fwbackup script was executed at 6:00am on June 22, 1998).

 

Execute chmod 755 ipsobackup to make this script executable.

 

Backing up the files to a floppy diskette:

 

cd /
tar cvf /dev/fd0 `cat $HOME/ipsobackuplist`

 

You might want to use a DOS formatted floppy diskette. Such a diskette
is mountable across OS platforms:

 

mkdir /var/floppy
/sbin/mount_msdos /dev/fd0 /var/floppy
cd /var/admin
./ipsobackup
cp *bkup.tar /var/floppy

 

<or>

 

cp `cat ipsobackuplist` /var/floppy

umount /var/floppy

 

Using CRON to automatically archive these files onto the IPSO filesystem

Use crontab -e to modify the existing cron file. Add tthe following line to this file:

0 6 * * 0 /var/admin/ipsobackup

This will create a backup file Sunday morning at 6am

 

*****Notes for NT to IP400*****

Note that there are some issues with moving from a NT machine to an IP400.

 

Do not copy the fwauthd.conf file. This is not compatible with the IP400 (See resolution # 858 for further information

When FTP from Windows NT to an IP400 All of the *.NDB files must be transferred in binary mode and everything else must be transferred ASCII mode.

 

echo "starting FTP"

# FTP transfer part to $BACKUP <Directory>
cd $BACKUP
ftp -i $HOST <<!
cd $SAVE
bin
mput *
bye
!

 

 

Para hacer backup de la configuración en IPSO

 

1. Click CONFIG on the home page.

2. Click the Configuration Backup and Restore link in the System Configuration section.

3. In the MANUAL BACKUP field, enter a file name for your backup file in the BACKUP FILE NAME edit box.

NOTE: If you do not enter a name, the backup file is not created.

4. (Optional) Click the YES button in the BACKUP HOME DIRECTORIES field to include home directories in the backup file.

5. (Optional) Click the YES button in the BACKUP LOG FILES field to include your log files in the backup file.

6. (Optional) To include package files in your backup file, Click the Yes button next to the name of each package you want to back up in the BACKUP /OPT fields.

7. Click APPLY.

8. To make your changes permanent, click SAVE.

 

Para hacer un restore de la configuración en IPSO desde archivos locales

 

This procedure describes how to restore your files to the system from locally stored backup files. You must first create backup files. See Creating a Backup File Manually or Creating a Regularly Scheduled Backup File.

1. Click CONFIG on the home page.

2. Click the Backup and Restore Configuration link in the System Configuration section.

WARNING: Restoring from a backup file overwrites your existing files.

NOTE: The system must be running the same version of the operating system and the same packages as those of the backup file(s) from which you restore file(s).

WARNING: Make sure that you have enough disk space available on your Nokia appliance before restoring files. If you try to restore files and you do not have enough disk space, you risk damaging the operating system.

3. In the RESTORE FROM LOCAL field, click either the Manual backup file drop-down window or the Scheduled backup file window to select the name of the backup file from which to restore. Manually backed-up files are in the /var/backup directory, and scheduled backup files are in the /var/backup/sched directory. The drop-down windows contain lists of all the files in the var/backup or /bar/backup/sched directory but some of the files might not be backup files.

4. Click APPLY.

Repeat the previous two steps for each file you want to restore.

5. To make your changes permanent, click SAVE.

6. Click the Reboot link near the bottom of the page and wait for the system to reboot.

NOTE: You must reboot your system after restoring from backup files.

15-Enabling Windows 2000 Logon through firewall

 

To enable a Windows 2000 Server-based computer to log on to a Windows 2000 domain through a firewall you need to open the following ports for inbound traffic. In most cases this would be done to allow a Windows 2000 server hosting Exchange 2000 to be placed on a DMZ.

53 (User Datagram Protocol [UDP]) - Domain Name System (DNS).

88 (Transmission Control Protocol [TCP], UDP) - Kerberos authentication.

123 (TCP) - Windows Time Synchronization Protocol (NTP). Note that this is not necessary for Windows 2000 logon capability, but may be configured or required by the network administrator.

135 (TCP) - EndPointMapper.

389 (TCP, UDP) - Lightweight Directory Access Protocol (LDAP).

445 (TCP)- Server message block (SMB) for Netlogon, LDAP conversion and distributed file system (Dfs) discovery.

3268 (TCP)- LDAP to global catalog servers.

One port for the Active Directory logon and directory replication interface (universally unique identifiers [UUIDs] 12345678-1234-abcd-ef00-01234567cffb and e3514235-4b06-11d1-ab04-00c04fc2dcd2), which is typically assigned port 1025 or 1026 during startup. This value is not set in the DSProxy or System attendant (MAD) source code, so you need to map the port in the registry and then open the port on the firewall. To assign a static port mapping enter the following registry key

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Parameters
Value Name: TCP/IP Port
Data Type: REG_DWORD
Radix: Decimal
Value: greater than 1024

For the servers inside the firewall to communicate back through the firewall to the external server on the DMZ, you also need to have ports 1024 through 65535 configured for outbound communications. Computers that initiate the communication through the firewall use a client-side port that is dynamically assigned and cannot be configured.

 

16-PUTKEY Issues

 

Do You Really Need to Stop (fwstop) Firewalls for Putkeys to Work?

The firewalls have to be stopped and started, but there is a possible workaround. Contrary to all Check Point documentation, Bill Husler found that it isn't always necessary - the reason for the stop/start is simply so that you can exchange keys, prior to the next authentication request. Since this is the case, there exists a small window of time which would allow for successful key exchange, while both firewall processes continue to run. To take advantage of this, Bill found that if he opened two separate administrative windows into the two separate systems, issued the putkey commands, then hit Enter on the management window and Enter on the firewall module window, the exchange happened quick enough to prevent the need for a fwstop.

 

Is the session between the GUI client and the Management console encrypted?

I may be wrong, but I was under the impression that the session between the GUI client and the Management server is encrypted if you are using a version of FW-1 with encryption and clear text if you are using a non-encryption version. The method by which your firewall and management station communicate is defined in the control.map. Within it are certain variables that mitigate how your firewall will talk to your management, fwz, ssl, or none (no encryption). By default the communication that exists between the two is encrypted so long as you have an encryption module loaded.

How can I secure the session between the Management client and a firewall or a Management console?

If you are running fw-1 on solaris it's no problem install ssh and download the secure crt client on your management client. Configure scrt so it's tunnels all packets that comes from port 258 to your solaris. (it's possible in scrt version 2.3x and above i think) Then in the gui client just enter 127.0.0.1 (localhost) as management sever.
Then all fw-1 management communication is encrypted.

 

When I have a separated Management from a remote firewall module what are secret shared passwords?

When you separate the Firewall Management Console functions from the Inspect module, firewall-1 needs to exchange secret keys. To do this, you need to use the "fw putkey" utility on both boxes. On the Firewall Management Console, login as root or administrator and enter the following -

fw putkey -p <Shared Secret> <Resolvable Name or IP Address of Firewall>

On the firewall that's running the Inspect module, login as root, or administrator and enter the following -

fw putkey -p <Shared Secret> <Resolvable Name or IP Address of Firewall Management Console>

Also, if you haven't purchased/installed any License Encryption Keys for both the Firewall Management console and the Firewall, you will need to edit the $FWDIR/lib/control.map file. By default, Checkpoint attempts to use FWZ to communicate between boxes. If there is no encyption license installed, you will never get them to successfully communicate. To enable the boxes to communicate, you will need to change your control.map file to resemble
something like the following -

The keys are generated using the random number generator, I guess, or some other similar process. The password you enter is only a way to securely exchange those keys over the network, and for initial authentication to the management. No two keys are the same.

 

I can't get my putkeys to work. What am I doing wrong?

Make sure all IPs on both the management and firewall are resolvable to a hostname within the system's local host file and that the systems are configured to look at the local hosts file before looking to DNS.

fw putkey -n local-ip remote-ip

The "local ip" here depends on which interface you will need to talk out to see the remote system.
The "remote ip" will be the IP address that is closest to you.

 

To prove / disprove / workaround the problem, do the following on both hosts.

Take a backup of control.map (in Solaris, this is at $FWDIR/lib/control.map)

edit control.map and replace occurances of 'skey' with 'none'

re-start the firewall daemons


If this works then it is definitely an encryption / fw putkey problem.

 

Procedure provided by Lance Spitzner

I have developed and implemented a solution for Management Module to Firewall Module Authentication
problems. This is one of last resort :)

PROBLEM:
I had 10 FW Modules (4.0 SP2 on AIX) that could neither fetch the FW rule base NOR log to the Management Module. I received an authentication error for both. However, the Management Module (4.0 SP2 on Solaris 2.6) CAN push the rule base onto the Firewall Modules. Authentication was working one way, but not the other.

SOLUTION
The standard "putkey with -n" trick did not help here. We needed a more radical approach as the entire authentication database was corrupted. Basically, I blew away the entire authentication database on the Management Module and all Remote Modules, and then rebuilt everything from scratch. Bill Burns pointed me in the right direction, I just had to be a little more "draconian" in the files I nulled out :)

PROCEDURE
When all else fails, this is the procedure to follow on 4.0 when you are having authentication problems. I recommend you follow the steps exactly as listed.

On the Management Module
- fwstop
- Backup the following files by copying thhem to <filename>.old
- $FWDIR/database/authkeys.C
- $FWDIR/database/opsec_authkeys.C
- $FWDIR/conf/fwauth.keys
- $FWDIR/serverkeys.pag
- Null out these files with the following command
- cp /dev/null <filename>
- Confirm that $FWDIR/lib/control.map is uusing the same authentication as the remote modules (fwa1 or skey).
- Make sure /etc/hosts has an entry for thhe remote module(s).

On the Remote Module
- fwstop
- Backup the following files by copying thhem to <filename>.old
- $FWDIR/database/autkeys.C
- $FWDIR/database/opsec_authkeys.C
- $FWDIR/conf/fwauth.keys
- $FWDIR/conf/serverkeys.pag
- Null out these files with the following command
- cp /dev/null <filename>
- Confirm that $FWDIR/lib/control.map is uusing the same authentication as the management module (fwa1 or skey).
- Make sure /etc/hosts has an entry for thhe management module.

On the Management Module
- fw putkey -p <password> -n <loccal IP> <remote IP>

On the Remote Module
- fw putkey -p <password> -n <loccal IP> <remote IP>

On the Mangement Module
- fwstart

On the Remote Module
- fwstart

That's it! If that did not do the trick, follow these two steps.

STEP 1
Ensure all Network Objects in Rule Base match /etc/hosts file and fw putkey IP addresses. Repeat steps above.

If this fails,
STEP 2
Post resume on Internet :)

 

17-Single Rulebase for Multiple Firewalls

 

If I want to manage multiple Remote Firewall modules with a single management station, is it possible with a single rulebase, instead of having 10 different rule bases, one for each individual remote module, we want a single rule base that is installed on all 10 remote modules. We specify in the rule base what rules apply to what remote modules under the "Install On" column. Usually, we create separate rule base for every remote module.

Is this a good practice or is it bad because it creates a huge single rulebase that is installed on every Firewall. Also, wouldn't this also create allot of CPU overhead, as now every Firewall has to process a rulebase where 80%

of the rules do not apply to it.

Is there an advantage to having a single rulebase for many remote modules?

Either way is correct. Both ways have their plusses and minuses.

If each firewall has a different rulebase file, it is fairly easy to see what security policy is on an individual firewall. Also, it is far easier to specify whether or not a rule is enforced inbound, outbound, or eitherbound. On the other hand, it is possible to install the wrong rulebase on the wrong firewall, thus causing an outage on an individual firewall. Also, if you have to make global changes, you have to change each individual security policy file. If you do not feel to comfortable with firewall policies, go that way, it is much clearer and easier to understand.

A single rulebase is slightly more difficult to maintain.

On the other hand, you can see your entire site's security policy at a glance and it does prevent snafus that occur from installing the wrong rulebase on the wrong firewall. Only the rules that apply to a specific gateway will be installed there. On the downside, when you list specific gateways in the Install-On field, rules are enforced in the eitherbound direction (i.e. they must pass through the rulebase twice). This is only usually noticable with large rulebases on heavily-loaded systems.

If you are going to go with a single security policy file for multiple firewalls, here are my hints:

Rules that apply to "all" firewalls should have the install-on be listed as gateways (e.g. any any any drop)

Potentially busy rules on all firewalls should be installed on gateways to increase performance (even if a particular firewall can't enforce the rule).

 

18-MIB OIDs Para FW-1

 

Name: fwModuleState Oid: 1.3.6.1.4.1.2620.1.1.1 Description: The state of the fw module.

Name: fwFilterName Oid: 1.3.6.1.4.1.2620.1.1.2 Description: The name of the loaded filter.

Name: fwFilterDate Oid: 1.3.6.1.4.1.2620.1.1.3 Description: When was the filter installed (STRING!)

Name: fwAccepted Oid: 1.3.6.1.4.1.2620.1.1.4 Description: The number of accepted packets.

Name: fwRejected Oid: 1.3.6.1.4.1.2620.1.1.5 Description: The number of rejected packets.

Name: fwDropped Oid: 1.3.6.1.4.1.2620.1.1.6 Description: The number of dropped packets.

Name: fwLogged Oid: 1.3.6.1.4.1.2620.1.1.7 Description: The number of logged packets.

Name: fwMajor Oid: 1.3.6.1.4.1.2620.1.1.8 Description: FireWall-1 Major Version.

Name: fwMinor Oid: 1.3.6.1.4.1.2620.1.1.9 Description: FireWall-1 Minor Version.

Name: fwProduct Oid: 1.3.6.1.4.1.2620.1.1.10 Description: FireWall-1 Product.

Name: fwEvent Oid: 1.3.6.1.4.1.2620.1.1.11 Description: A string containing the last snmp trap sent via fw

 

19-Configurando NAT

 

Automatic NAT

 

1. create a workstation object.

2. use the actual ip under the first tab.

3. click on NAT tab

4. put checkmark in "create automatic translation"

5. select STATIC

6. put external IP address (the one not actually on the box).

7. add a PROXY ARP MAC address using the external MAC for the external ip

address.

 

Manual NAT

 

1. create a workstation object with the external ip address.

2. create a workstation object with the internal ip address

3. click on "network address translation tab"

4. add two rules (if there are other rules already there, make sure there is

not logic conflict).

5. for rule one, put external ip workstation object in original destination.

6. for rule one, put internal ip workstation object in translated

destination.

7. for rule two, put internal ip workstation object in original source.

8. for rule two, put external ip workstation object in translated source.

9. add a PROXY ARP MAC address using the external MAC for the external ip

address.

 

route add -p <external-IP-address> mask 255.2555.255.255 <internal-ip-address>

 

        where <external-ip-address> is the published external IP address

        where <internal-ip-address> is either the Internal IP address of the server

                or the IP address of the router sitting between the Firewall and the

                Internal server

 

20-Verificar Firewall-1 Build Version

 

Para verificar la versión de Firewall-1 y nivel de parches, el comando a ejecutar es "fw ver" que se debe chequear contra:

http://fixmyfirewall.com/fw1/fw-1.0003.html

 

21-Como configurar un login banner en IPSO?

 

[FW-1][Auditoría][IPSO]

The telnet banner is set in /etc/gettytab by using the "im" (initial message) capability. All IPSO terminals use the default entry, which looks like this:

default:\

:cb:ce:ck:lc:fd#1000:im=\r\n IPSO (%h) (%t)\r\n\r\n:sp#1200:

This produces the following initial banner.

 

IPSO (hostname) (ttyp0)

 

login:

 

You may change this by editing /etc/gettytab. To do so, first remount the hard disk read-write (# mount -uw /) and edit gettytab. If you wished for the initial banner to say something else, you could edit the im capability, such as in the following example:

default:\

:cb:ce:ck:lc:fd#1000:im=\r\n Unauthorized access

prohibited\r\n\r\n:sp#1200:

 

22-Trap mailer

 

Cómo hago para que el daemon del firewall me envíe un mail ante un problema? (no me refiero al alert que se pone en el campo "track" de la política)

 

You need to go into the global properties, LOG AND ALERT, Alert Commands and activate "Run mail Alert Script" and plug the following information:

Internal_sendmail (IP of your mail server) -s alert (Replace alert with a personal Warning; ex. "From Firewall

> abc123" -t mailer (Replace root with name of Sender)

Then you need to change the rule, you want the alert for from LOG to MAIL If you want to activate mail for popup alerts from the System status then activate "Run popup Alert Script" and use what I have mentionned above;

1.1.1.1 -s "From Firewall abc123" -t mailer "THE STATUS-VIEWER"

 

"-t mailer" should be replaced by "-t mail.server.com"

 

Cabletron Systems – Enterasys Networks

 

Upgrade de ELS 100

 

Descargar las imágenes de firmware de la web y seguir estos pasos:

1. Download the TFTP/Bootp Services from the Cabletron Download Library, http://www.cabletron.com/download/. Make sure you save this as a Zip file to your hard drive.

2. Unzip the file and run the setup program. This will install the TFTP/Bootp Services on your computer. After the install, start the services.

3. If you have another TFTP program running, close that down as only one service should be running.

4. Place the .dnl file close to root. Copy down the path. (Ex. C:\images\10002.dnl)

5. Telnet or locally go to the ELS100-24 and go into the Download Software Menu, selection F.

6. Select A and enter the IP address of the PC that you have the TFTP/Bootp Services running on and then hit return.

7. Select B and enter the path to the image file. Ex. C:\images\10002.dnl

8. Select C to start the download.

NOTE: This will take the ELS100 off line, similar to doing a .HEX download to other Cabletron devices.

If you have the same image on the ELS as you are trying to download, the ELS will not download and will reset.

The menu screen asks for a .bin file. The .dnl file is the same thing and will work fine.

Spectrum Element Manager, ver. 2.0 and 2.1 Remote Administration Tools will not recognize the .dnl file and you will not be able to do a download to the ELS100-24 family. The Standalone TFTP/Bootp server is from the ver. 1.x family of Spectrum Element Manager and will also not recognize the .dnl file

Do not reset the ELS100-24 while a download is in progress. If the download fails and the ELS is reset then it may need to be replaced.

Runtime firmware downloads will not work if the TFTP server is using one of the following RFC1819 reserved addresses:

10.0.0.0    172.16.0.0   192.168.0.0

Non-Runtime downloads operate properly with all IP addresses.

The download may also not work if there is a 0 (zero) in the second or third octet of the IP address of the server. Examples of this are 134.141.0.3 or 126.0.141.3.

 

Password Recovery para ELS100-S24TX2M

 

Firmware version 2.01.04 and later allows you to clear the password. Reset the box and hit enter any time to set the Baud rate of the Local Management connection. When you see Topology discovery completed, hit the CTL and P keys 3 times. The unit will continue to boot up and when you see >>>>>> System Port Loopback Test.......--> Pass and then you will see, "Are you sure (y/n)" show up on the screen. The default is No. Hit y for yes and the unit will continue to boot up and clear the password. Admin and enter will allow you to log into the unit and reconfigure a new password.

Version 2.00.07 and below do not have this option. Contact Tier 3 to get a Webview session setup with the customer. This requires the customer to have a LM/telnet session with the device and an internet connection.

If not possible, the unit will have to be RMA'd.

 

Various SSR Software Upgrade Procedures

 

Solution ID: tk0722-9

Creation Date: 04/18/2001

Revised Date: 05/13/2002

Technology: Routing

Environment: X-Pedition, SSR-2, SSR-8, SSR-16, ER16, Upgrade

Goals:

SSR Software Upgrade Procedures

upgrading from boot 1.1.0.7 to 1.1.0.8; and from vfs1 to vfs2

upgrading to a new boot prom and software image, while on vfs2

upgrading to a new software image

recovering a corrupted external pcmcia flash

Solution:

This document contains procedures for the following upgrade-related tasks:

Upgrading from boot 1.1.0.7- to 1.1.0.8+, software image, and from VFS1 to VFS2

Use steps 1-18

Upgrading to a new boot prom and software image, while already on VFS2

Use steps 1-9, 15-18

Upgrading to a new software image

Use steps 1-7, 17-18

Recovering a corrupted External (PCMCIA) Flash

Use steps 1-3, 9-16, 6-7, 17-18 (omit pcmakeversion2 in step 11)

While upgrading an SSR8000/8600 with two control modules, differing software/boot images on the two CMs are incompatible. So, depending upon what you are doing and how carefully you do it, you either should or must remove the CMs one at a time and upgrade them separately. It is best to err on the side of safety, and seek downtime to do the parallel upgrades. Even with only a single CM, one or more system reboots will likely be necessary, so expect at least some level of disruption.

Before you begin:

Review the SSR memory organization, in TK0550-9, but do not use any of the commands described there.

Back up your startup config to a TFTP server, as explained in TK0660-9. This would also be a good time to ask yourself whether the active config is the same as the startup config. If not, you may choose to do a config-mode save startup command before performing the backup operation.

Each time you save startup (with f/w 3.x+), a copy of the merged scratchpad/active config will not only be saved to the Internal Flash startup file, but will also be saved to the External (PCMCIA) Flash startup file. The TFTP-offload suggestion is precautionary, in the unlikely event of Internal Flash corruption. Recovery from this problem is described in TK0553-9 and TK0660-9.

Items needed:

PC/Laptop with software (aka firmware) and bootprom images.

TFTP/BootP server application, for the PC. Don't have one? Try our FTP Site.

Pair of identical DB9<=>RJ45 adapters, usually Enterasys' "PC" Adapters, for attachment to the SSR's DB9 console port and the PC's DB9 COM port; and straight-through RJ45 cable to connect the adapters.

Crossover cable to connect PC/Laptop to the RJ45 10 or 10/100 Mgmt port en0, on the SSR.

Steps:

1. Assemble the adapters and cable, and open up a terminal session via the console port on the SSR.

2. Connect the PC's Network Interface to the SSR's en0 port, using the RJ45 crossover cable. Though enable-mode upgrade commands can use either management interface en0 or any user port, a portion of this document uses boot prom-mode, which can use only en0. For consistency, all instructions assume en0.

3. Start the TFTP/BootP Server application on the PC, and then minimize it.

4. Need to confirm the SSR's currently running boot/software image revs? Simplest way is to monitor the bootup process. Alternately, use enable-mode's system show version command.

5. When the SSR boots to user mode, enter enable mode.

enable (toggle from user mode to enable mode)

6. The PC and SSR must share a common IP subnet. To add an enable-mode IP address to en0:

config (toggle from enable mode to config mode)

interface add ip en0 address-netmask [IP address/maskbits]

save active (save from scratchpad to active config)

save startup (save from scratchpad to startup config)

[CTRL Z] (exit to enable mode)

7. Ping from the SSR to the TFTP Server (PC), to confirm IP connectivity.

ping [TFTP server's IP address]

8. Download the boot image from the TFTP Server to the SSR's nonvolatile boot area, located on Internal Flash memory. File name must be no greater than 8 DOS-valid characters, and must have no extension:

system promimage upgrade [TFTP Server's IP address] [bootprom file name]

9. Once the upgrade is done, reboot onto the new prom image:

reboot

10. While rebooting, press the "Esc" key until you see a "ssr-boot>" prompt, representing boot prom mode.

11. Totally initialize the PCMCIA; a repository of one or more software images, plus possibly a backup copy of the startup configuration set. Consider the first command to be a bit of paranoia, since the subsequent set of commands should do the same thing:

pcmakeversion2 (reformat the PCMCIA from VFS1 to VFS2 - retaining data)

pcumount (unmount the PCMCIA)

erasepcvfs (reformat the PCMCIA - using 1.1.0.8's VFS2 - and wipe all data)

pcmount -i (remount the PCMCIA)

Note: Though boot images above 1.1.0.8 (such as 1.1.0.9, 2.0.0.0, E3.0.0.0, and any future releases) also contain the pcmakeversion1 and pcmakeversion2 commands, making them in theory compatible with both VFS1 and VFS2 and capable of converting between them, actual practice has more often than not shown them to be intolerant of VFS1. Since there is no reason not to go to the more efficient and much faster VFS2, the recommendation is to do that as of the 1.1.0.8 boot prom level, and don't look back. TB1083-9, TK0706-9, and ENT949 contain some additional background about boot and software revs, and VFS.

12. Confirm the resulting PCMCIA Virtual File System rev: 

pcshowversion (response should be "PC Flash File System is version 2")

13. Download the new image from the TFTP server to the SSR's volatile DRAM:

set netaddr [SSR's boot prom-mode en0 IP address]

set netmask [SSR's boot prom-mode en0 subnet mask]

set bootaddr [TFTP Server's IP address] (must be local subnet)

ping [TFTP Server's IP address] (ensures connectivity)

boot [TFTP Server's path/filename] (example: boot c:/images/ssr3011)

14. At this point the SSR should reset, and boot off of the TFTP Server.

15. Use the enable command, to toggle from user mode to enable mode.

16. Confirm that the downloaded boot and software images are properly identified:

system show version

17. Download/confirm/select the image, this time storing to the non-volatile PCMCIA, for use during the next system reboot. These commands represent a typical software upgrade, explained in somewhat more detail in TK0547-9:

system image add [TFTP server's IP address] [path/filename]

(Need to add an enable-mode IP address for en0? See step 6.)

(Insufficient room on the PCMCIA for another image? See TK0698-9.)

system image list (find the image you want, for use in the next command)

system image choose [software file name] (example: ssr3011)

18. Cold-boot (power cycle) the SSR. Per TB0806-9, this is strongly recommended as the final step in any upgrade operation, including E8 software and beyond.

 

SSR Memoy erase

 

Environment: SmartSwitch Router 2000, SmartSwitch Router 8000, SmartSwitch Router 8600, memory
Goals: SSR Control Module (CM) memory and deletion processes
Solution: Where appropriate, commands will be given to allow the user to erase sensitive data that they may have entered into the system to make the SSR operational for their environment. All of these special commands to erase data should be issued from the boot prom mode command line.
The different memories are:
NVRAM: holds the boot variables (ipaddr, bootsource, etc). This is stored as a compacted sequence of strings. When a variable is deleted, the list is compacted by copying the strings downwards. The leftover data is not erased in any way. To make sure any variables that were set are unreadable, do the following commands:
1.delete the sensitive variables
ssr-boot> unset netaddr
2.create a few new large variables
ssr-boot> set foo aaaaaaaaaaaaaaa
(Creating 4 variables, each with 80 "a"s in them, will overwrite about 320 bytes of NVRAM memory destroying any previous entries in that space.)
3.delete the newly created large variables
ssr-boot> unset foo
IDPROM: a small (32-byte) memory that holds the OEM ID and the base MAC address. This memory is sequential information assigned by Cabletron during the manufacturing process and is not accessible to the customer.
BOOT PROM: 512kb of flash, holds the boot prom. This memory is only updated when you issue a system promimage upgrade command from the CLI. The system only allows write access to this area with an approved version of prom code.
DRAM: This is volatile memory used when the system is in operation. Nothing written to DRAM is stored permanently. A few seconds of power loss is enough to completely lose DRAM contents.
INTFLASH: 512kb of flash, holds the config file (and any copies of the config file saved via the CLI from enable mode) in a special file system. Files are deleted in the standard file system manner: a pointer is zeroed out and the blocks freed for other use, but unless a file actually needs them, these free blocks are not erased. The INTFLASH can be completely erased with the erasevfs command. The process will erase all memory by writing all "1"s to every bit
in every byte on all blocks. This is a proper hard erase: every bit is wiped. Use the following commands to ensure complete destruction of all data on the
INTFLASH:
ssr-boot> umount
ssr-boot> erasevfs
ssr-boot> mount -i
PCFLASH: 8MB of flash in a PCMCIA card (CM and CM2) holds the boot image and a copy of the config file in certain software revisions. This PCFLASH uses the same file system structure as INTFLASH. It is subject to the same deletion issues and the same secure deletion procedure. Use the following commands to ensure complete destruction of data on the PCFLASH:
ssr-boot> pcumount
ssr-boot> erasepcvfs
ssr-boot> pcmount -i
The same process (outlined above for PCFLASH) is necessary to wipe the PCFLASH on an SSR2000 or SSR2100 product. The 8MB Flash is not a removable PCMCIA card on these platforms, but it is identified by the system and handled in an identical manner using the same commands.
Based on the above information, there are three areas that need to be considered for security reasons:
-NVRAM may have IP addresses of actual serrvices on the network that were used during tfpt uploads while in boot prom mode.
-INTFLASH contains configuration files thaat were saved to startup or copied to other backup file names.
-PCFLASH may contain a copy of the startupp file depending on the version of code that was in operation at any time while changes to the config were being made and saved.
Those who are security conscious will want to ensure that they have issued the appropriate commands to the INTFLASH, the PCFLASH, and the NVRAM to ensure that those memory locations contain no information related to their locations.

 

Realizar Password Recovery del SSR

 

ssr-boot> cp /int-flash/cfg/startup int-flash/cfg/startup.sav (copies startup to startup.sav)

ssr-boot> ls /int-flash/cfg/ (makes sure the new file is there)

ssr-boot> rm /int-flash/cfg/startup (deletes the original startup file)

ssr-boot> reboot

After rebooting:

ssr# copy startup.sav to scratchpad

ssr# config

ssr# show (Note line # of password set command(s))

ssr(config)# negate <line number(s)> scratchpad

ssr(config)# ^z

ssr# copy scratchpad to startup (Configuration -- without passwords -- made Active)

 

Comandos de TACACS+ para SSR

 

SSR-8600 VER3.0.0.2 TACACS PLUS COMMANDS

 

tacacs-plus enable

tacacs-plus set server <IPaddr>

tacacs-plus set [timeout <number>] [key <string>] [last-resort password|succeed]

tacacs-plus authentication login|enable

            login: permite autenticar en el login

            enable: permite autenticar en el enable

 

tacacs-plus show stats|all

            muestra las stats de tacacs

 

tacacs-plus accounting command level <level>

            5 Log Configure commands.

            10 Log all Configure and Enable commands.

            15 Log all Configure, Enable, and User commands.

 

tacacs-plus accounting shell start|stop|all

            en nuestro caso seria all

 

tacacs-plus accounting snmp active|startup

            loguea cambios hechos a la config a traves de snmp

 

tacacs-plus accounting system fatal|error|warning|info

            nosotros lo tenemos por syslog, pero se puede hacer por tacacs.

            nivel a utilizar: error

 

Entonces, el script seria una cosa asi:

 

tacacs-plus enable

tacacs-plus set server 10.0.3.2

tacacs-plus set server 10.0.3.4

# tacacs-plus set timeout 5

tacacs-plus set key jk23

tacacs-plus set last-resort password

 tacacs-plus authentication login

 tacacs-plus authentication enable

tacacs-plus accounting command level 15

tacacs-plus accounting shell all

 tacacs-plus accounting snmp active

 tacacs-plus accounting snmp startup

tacacs-plus accounting system error

 

fin del script

 

Cisco Systems

 

Cómo cambiar BootFlash en las MSFC

 

ena

sess 15

ena

conf

int vlan1

ip add 1.1.1.1 255.255.255.0

no shut

sh bootf

copy tftp bootflash:

            1.1.1.2

            <name>

            <destinaton>

delete bootflash

            <el archivo viejo>

squeeze bootf

cop tftp: bootflash:

boot bootldr bootflash:c6msfc2-boot-mz.121-4.E1

boot system bootflash:c6msfc2-jsv-mz.121-4.E1

 

Cómo hacer un FTP record en Arrowpoint

 

ftp-record <nombre> <ip> anonymous "adrian@" ctrl-z

copy ftp adrian

copy running-conf tftp <ip> <nombre>

 

Cómo hacer una copia de la config en Arrowpoint

 

copy config flash

# te pide el nombre, y despues

copy config tftp

copy flash tftp

levantar la config en word

courrier new plain text 10

 

 

Cómo calcular uso de ancho de banda mediante SNMP

 

Introduction

This document describes how to calculate bandwidth utilization using Simple Network Management Protocol (SNMP).

Solution

Calculating utilization depends on how data is presented for the particular thing you want to measure. Interface utilization is the primary measure used for network utilization. The following formulas should be used, based on whether the connection you measure is half-duplex or full-duplex. Shared LAN connections tend to be half-duplex, mainly because contention detection requires that a device listen before transmitting. WAN connections typically are full-duplex because the connection is point-to-point; both devices can transmit and receive at the same time because they know there is only one other device sharing the connection. Because MIB-II variables are stored as counters, you must take two poll cycles and figure the difference between the two (hence, the delta used in the equation).

 

The following explains the variables used in the formulas:

 

Formula: DeltaIfInOctets: The difference between two poll cycles of the collecting the SNMP ifInOctets object, which represents the count of inbound octets of traffic.

Formula: DeltaIfOutOctets: The difference between two poll cycles of the collecting the SNMP ifOutOctets object, which represents the count of outbound octets of traffic.

IfSpeed: the speed of the interface, as reported in the snmpifSpeed object

Note: ifSpeed may not accurately reflect the speed of a WAN interface.

For half-duplex media, use the following formula for interface utilization:

 

( (DeltaIfInOctets + DeltaIfOutOctets) * 8 * 100 ) / ( seconds in Delta * ifSpeed )

For full-duplex media, calculating the utilization is trickier. For example, with a full T-1 serial connection, the line speed is 1.544 Mbps. What this means is that a T-1 interface can both receive and transmit 1.544 Mbps for a combined possible bandwidth of 3.088 Mbps!

When calculating interface bandwidth for full-duplex connections, you could use the following formula, in which you take the larger of the in and out values and generate a utilization percentage:

 

( (max(DeltaIfInOctets + DeltaIfOutOctets)) * 8 * 100 ) / ( seconds in Delta * ifSpeed )

 

However, this method hides the utilization of the direction that has the lesser value and provides less accurate results. A more accurate method is to measure the input utilization and output utilization separately, using the following formulae:

 

Input Utilization= ( DeltaIfInOctets * 8 * 100 ) / (seconds in Delta * ifSpeed )

Output Utilization= ( DeltaIfOutOctets * 8 * 100 ) / (seconds in Delta * ifSpeed )

 

These formulas are somewhat simplified because they do not take into consideration any overhead associated with the particular protocol. As an example, refer to RFC 1757 Ethernet-utilization formulas that take into consideration packet overhead.

All of the MIB attributes listed above are found in RFC1213 MIB.

Details of the MIB variables used in these formulas are as follows:

.1.3.6.1.2.1.2.2.1.10
ifInOctets OBJECT-TYPE
-- FROM RFC1213-MIB, IF-MIB
SYNTAX Counter
MAX-ACCESS read-only
STATUS Mandatory
DESCRIPTION "The total number of octets received on the interface, including framing characters."
::= { iso(1) org(3) dod(6) internet(1) mgmt(2) mib-2(1) interfaces(2) ifTable(2) ifEntry(1) 10 }
.1.3.6.1.2.1.2.2.1.16
ifOutOctets OBJECT-TYPE
-- FROM RFC1213-MIB, IF-MIB
SYNTAX Counter
MAX-ACCESS read-only
STATUS Mandatory
DESCRIPTION "The total number of octets transmitted out of the interface, including framing characters."
::= { ISO(1) org(3) DOD(6) Internet(1) mgmt(2) mib-2(1) interfaces(2) ifTable(2) ifEntry(1) 16 }
.1.3.6.1.2.1.2.2.1.5
ifSpeed OBJECT-TYPE
-- FROM RFC1213-MIB, IF-MIB
SYNTAX Gauge
MAX-ACCESS read-only
STATUS Mandatory
DESCRIPTION "An estimate of the interface's current bandwidth in bits per second. For interfaces which do not vary in bandwidth or for those where no accurate estimation can be made, this object should contain the nominal bandwidth."
::= { ISO(1) org(3) DOD(6) Internet(1) mgmt(2) mib-2(1) interfaces(2) ifTable(2) ifEntry(1) 5 }

 

Cómo generar tráfico entre 2 routers

 

Para generar trafico (entre dos routers por ejemplo):

 

A) =>

1) telnet xxx.xxx.xxx.xxA

2) autenticarse.

3) ya en la linea de comando: si el otro router es xxx.xxx.xxx.xxB hacer "telnet xxx.xxx.xxx.xxB chargen"

4) dejar el telnet andando.

 

B) <=

1) telnet xxx.xxx.xxx.xxB

2) autenticarse.

3) ya en la linea de comando: si el otro router es xxx.xxx.xxx.xxA hacer "telnet xxx.xxx.xxx.xxA chargen"

4) dejar el telnet andando.

 

MIBs de Temperatura

Se debe partir del siguiente OID para obtener las MIBs de Temperatura para Cisco

 

.1.3.6.1.4.1.9.9.13.1.3.1

.iso.org.dod.internet.private.enterprises.cisco.ciscoMgmt.ciscoEnvMonMIB.ciscoEnvMonTemperatureStatusTable.ciscoEnvMonTemperatureStatusEntry.1

 

Entries:

 

CiscoEnvMonTemperatureStatusIndex:

.1.3.6.1.4.1.9.9.13.1.3.1.1

Se usa para el snmpwalk

 

CiscoEnvMonTemperatureStatusDescr:

.1.3.6.1.4.1.9.9.13.1.3.1.2.instancia

Los puntos donde se mide la temperatura:

Instancias:

Inlet (entrada)=1

Hotpoint (puntos criticos)=2

Eshaust (salida)=3

 

CiscoEnvMonTemperatureStatusValue:

.1.3.6.1.4.1.9.9.13.1.3.1.3.instancia

Mide los 3 valores (en grados C) de los puntos anteriores

 

CiscoEnvMonTemperatureTreshold:

.1.3.6.1.4.1.9.9.13.1.3.1.4.instancia

Tiene como parametro el umbral al cual puede llegar antes de un shutdown de emergencia

Inlet (entrada)=50

Hotpoint (puntos criticos)=60

Eshaust (salida)=101

 

CiscoEnvMonTemperatureLastShutdown:

.1.3.6.1.4.1.9.9.13.1.3.1.5.instancia

Guarda (contrariamente a lo que dice el manual) las temperaturas registradas en los puntos medidos durante un shutdown (sea o no de emergencia)

 

CiscoEnvMonTemperatureState:

.1.3.6.1.4.1.9.9.13.1.3.1.6.instancia

Para este ultimo, tenemos los estados:

Normal=1

Warning=2

Critical=3

Shutdown=4

Not present=5

 

********* FIN DEL APUNTE *********