You are here: Foswiki>ATLAS Web>CiscoIPX (19 Aug 2007, HenningPerl)Edit Attach

Cisco IPX

Category: Network The first step is to gain the Cisco device an ssh connect, we must connect with the blue(!?) Console-Cable with the one side to the PC-Com slot and with the other side to the Cisco-Com slot

 ///// SSH connection/////////
 enable
 configure terminal
 domain-name aei.uni-hannover.de
 ca generate rsa key 512
 ca save all
 ssh 130.75.117.0  255.255.0.0 outside

Thist example shows how we can allow ciso ipx accept ssh connections from our subnet.

to connect via a web-interface use some of the addresses from the 10.117.0.0 network Then type in in your browser
  https://10.117.0.47

Important Commands

 nat
    Associate a network with a pool of global IP addresses.
       [no] nat [(local_interface)] id local_ip [mask [dns] [outside |
            [norandomseq] [max_conns [emb_limit]]]]
       [no] nat [(local_interface)] id access-list acl_name [dns] [outside |
            [norandomseq] [max_conns [emb_limit]]]
       [no] nat [(local_interface)] 0 access-list acl_name [outside]
       clear nat
       show nat

 access-list
            Create an access list, or use a downloadable access list. (Downloadable access lists are supported for
            RADIUS servers only).
                access-list  object-group-search
                [no] access-list deny-flow-max n
                [no] access-list alert-interval secs
                [no] access-list [id] compiled
                [no] access-list id [line line-num] remark text
                [no] access-list id [line line-num] {deny | permit}{protocol | object-group protocol_obj_grp_id
                    {source_addr source_mask} | object-group network_obj_grp_id [operator port [port] |
                    interface if_name | object-group service_obj_grp_id] {destination_addr | remote_addr}
                    {destination_mask | remote_mask} | object-group network_obj_grp_id [operator port [port] |
                    object-group service_obj_grp_id]} [log [[Cluster.DisableDefault][[level]]] [interval secs]]
                [no] access-list id [line line-num] {deny | permit} icmp {source_addr source_mask} |
                    interface if_name | object-group network_obj_grp_id {destination_addr | remote_addr}
                    {destination_mask | remote_mask} | interface if_name | object-group network_obj_grp_id
                    [icmp_type | object-group icmp_type_obj_grp_id] [log [[Cluster.DisableDefault][[level]]] [interval
                    secs]]
                [no] debug access-list all | standard | turbo
                clear access-list {[id] | [id counters]}
                show access-list [[id] source_addr]
                Restricted for use with the prefix-list command:
                [no] access-list id deny | permit {any | prefix mask | host address}

 vpngroup
         Supports Cisco VPN Client Version 3.x (Cisco Unified VPN Client Framework) and Easy VPN Remote
         devices.
             vpngroup group_name address-pool pool_name
             vpngroup group_name authentication-server server_tag
             vpngroup group_name backup-server {{ip1 [ip2 ... ip10]} | clear-client-cfg}
             vpngroup group_name default-domain domain_name
             vpngroup group_name device-pass-through
             vpngroup group_name dns-server dns_ip_prim [dns_ip_sec]
             vpngroup group_name idle-time idle_seconds
             vpngroup group_name max-time max_seconds
             vpngroup group_name password preshared_key
Topic revision: r1 - 19 Aug 2007, HenningPerl
This site is powered by FoswikiCopyright © by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding Foswiki? Send feedback