<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-4698096966682789219</id><updated>2025-11-26T14:02:45.000-06:00</updated><category term="Cisco IOS"/><category term="GNS3"/><category term="Security"/><category term="Linux"/><category term="Networking"/><category term="Cisco Router"/><category term="BackTrack"/><category term="Wireless"/><category term="CCNA"/><category term="Cisco"/><category term="Cisco Switch"/><category term="Pentesting"/><category term="Layer 2"/><category term="Videotutoriales"/><category term="Virtualización"/><category term="Dynamips"/><category term="Hacking Wireless"/><category term="Switching"/><category term="VMware"/><category term="Network Security"/><category term="Windows"/><category term="Alfa 2W"/><category term="Aircrack-ng"/><category term="Forensics"/><category term="Java"/><category term="Cracking WEP"/><category term="Programming"/><category term="Routing"/><category term="Ubuntu"/><category term="Certificaciones"/><category term="DHCP"/><category term="Firewall"/><category term="Malware"/><category term="Qemu"/><category term="WAN"/><category term="Layer 3"/><category term="ASA"/><category term="Core Linux"/><category term="Frame Relay"/><category term="VLANS"/><category term="Wifiway"/><category term="Packet Injection"/><category term="Password Cracking"/><category term="EIGRP"/><category term="SSH"/><category term="Sniffing"/><category term="Syslog"/><category term="Troubleshooting"/><category term="Eve-ng"/><category term="InterVLAN"/><category term="Juniper"/><category term="Metasploit"/><category term="NTP"/><category term="OSPF"/><category term="PPP"/><category term="Password Recovery"/><category term="SNMP"/><category term="STP"/><category term="VTP"/><category term="WifiSlax"/><category term="AAA"/><category term="Apache"/><category term="Botnets"/><category term="Cisco NX-OS"/><category term="Criptografía"/><category term="Exploits"/><category term="Footprinting"/><category term="FortiGate"/><category term="FortiOS"/><category term="Fortinet"/><category term="JunOS"/><category term="NAT"/><category term="Nagios"/><category term="NetFlow"/><category term="PortFast"/><category term="RIP"/><category term="Seguridad Web"/><category term="WPA"/><category term="WarDriving"/><title type='text'>Seguridad y Redes</title><subtitle type='html'>Tips, Video Tutoriales, Wifislax, VMware, Linux, GNS3, Eve-NG, CCNA, Cisco Routers, Switches</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://delfirosales.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://delfirosales.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>delfirosales</name><uri>http://www.blogger.com/profile/08332248815774447288</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>157</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-4698096966682789219.post-8070856043549538208</id><published>2020-08-30T19:23:00.016-05:00</published><updated>2020-08-30T19:31:51.582-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco IOS"/><category scheme="http://www.blogger.com/atom/ns#" term="Core Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Eve-ng"/><category scheme="http://www.blogger.com/atom/ns#" term="Firewall"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Networking"/><title type='text'>Configuración de NAT en Core Linux con iptables</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHa86CKh3Y4lRTBCkNfL4TQ9jLi_cYU9Wn49xKfX_eNMCz8p8kutfsGifaAovFPyMe3_hJ8httPus3qaZWu1ZfNruUMmkuplfi5c-RjQ2fr9upbnv-zTpq_4a82HWZbtAnGeccllRxPD7o/s1000/linux_iptables_eve-ng.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;598&quot; data-original-width=&quot;1000&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHa86CKh3Y4lRTBCkNfL4TQ9jLi_cYU9Wn49xKfX_eNMCz8p8kutfsGifaAovFPyMe3_hJ8httPus3qaZWu1ZfNruUMmkuplfi5c-RjQ2fr9upbnv-zTpq_4a82HWZbtAnGeccllRxPD7o/s640/linux_iptables_eve-ng.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;i&gt;Config de NAT con iptables&lt;/i&gt;&lt;/div&gt;&lt;div&gt;stop client dhcp&lt;pre&gt;&lt;code&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;/etc/init.d/services/dhcp stop&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

Configure Eth0 (WAN)
&lt;pre&gt;&lt;code&gt;$ &lt;span style=&quot;color: #04ff00;&quot;&gt;sudo ifconfig eth0 10.1.100.33 netmask 255.255.255.0 up&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

Configure Eth1 (LAN)
&lt;pre&gt;&lt;code&gt;$ &lt;span style=&quot;color: #04ff00;&quot;&gt;sudo ifconfig eth1 192.168.11.1 netmask 255.255.255.0 up&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

Ruta de default
&lt;pre&gt;&lt;code&gt;$ &lt;span style=&quot;color: #04ff00;&quot;&gt;sudo route add default gw 10.1.100.253&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

Archivo resolv.conf
&lt;pre&gt;&lt;code&gt;$ &lt;span style=&quot;color: #04ff00;&quot;&gt;echo &quot;nameserver 8.8.8.8&quot; &amp;gt;&amp;gt; /etc/resolv.conf&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

Internet verification
&lt;pre&gt;&lt;code&gt;$ &lt;span style=&quot;color: #04ff00;&quot;&gt;nslookup cisco.com&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

Route verification
&lt;pre&gt;&lt;code&gt;$ &lt;span style=&quot;color: #04ff00;&quot;&gt;ip route get 8.8.8.8&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;

Check if IP-Forwarding is enabled in the OS&amp;nbsp;&lt;/div&gt;&lt;div&gt;$ sudo sysctl net.ipv4.ip_forward&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;0 = disabled&amp;nbsp;&lt;/div&gt;&lt;div&gt;1 = enabled&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Enable IP-Forwarding
&lt;pre&gt;&lt;code&gt;$ &lt;span style=&quot;color: #04ff00;&quot;&gt;sudo sysctl -w net.ipv4.ip_forward=1&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

Config NAT (PAT)
&lt;pre&gt;&lt;code&gt;$ &lt;span style=&quot;color: #04ff00;&quot;&gt;sudo iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

Cisco SW
&lt;pre&gt;&lt;code&gt;Switch(config-if)#&lt;span style=&quot;color: #04ff00;&quot;&gt;ip add 192.168.11.2 255.255.255.0&lt;/span&gt;
Switch(config-if)#&lt;span style=&quot;color: #04ff00;&quot;&gt;no sh&lt;/span&gt;
Switch(config-if)#&lt;span style=&quot;color: #04ff00;&quot;&gt;exit&lt;/span&gt;
Switch(config)#&lt;span style=&quot;color: #04ff00;&quot;&gt;ip dhcp excluded-address 192.168.11.1&lt;/span&gt;
Switch(config)#&lt;span style=&quot;color: #04ff00;&quot;&gt;ip dhcp pool test&lt;/span&gt;
Switch(dhcp-config)#&lt;span style=&quot;color: #04ff00;&quot;&gt;network 192.168.11.0 255.255.255.0&lt;/span&gt;
Switch(dhcp-config)#&lt;span style=&quot;color: #04ff00;&quot;&gt;default-router 192.168.11.1&lt;/span&gt;
Switch(dhcp-config)#&lt;span style=&quot;color: #04ff00;&quot;&gt;dns-server 8.8.8.8&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://delfirosales.blogspot.com/feeds/8070856043549538208/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://delfirosales.blogspot.com/2020/08/configuracion-de-nat-en-core-linux-con.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/8070856043549538208'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/8070856043549538208'/><link rel='alternate' type='text/html' href='http://delfirosales.blogspot.com/2020/08/configuracion-de-nat-en-core-linux-con.html' title='Configuración de NAT en Core Linux con iptables'/><author><name>delfirosales</name><uri>http://www.blogger.com/profile/08332248815774447288</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHa86CKh3Y4lRTBCkNfL4TQ9jLi_cYU9Wn49xKfX_eNMCz8p8kutfsGifaAovFPyMe3_hJ8httPus3qaZWu1ZfNruUMmkuplfi5c-RjQ2fr9upbnv-zTpq_4a82HWZbtAnGeccllRxPD7o/s72-c/linux_iptables_eve-ng.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4698096966682789219.post-4731017266256012930</id><published>2020-08-20T17:39:00.002-05:00</published><updated>2020-08-20T17:40:03.668-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Eve-ng"/><title type='text'>Cambiar el cliente telnet predeterminado en Windows</title><content type='html'>&lt;div&gt;&lt;div&gt;Con esta función, ahora puede configurar PuTTY o SecureCRT como el controlador predeterminado para las URL de Telnet.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Si ejecuta el editor del registro (Inicio-&amp;gt; Ejecutar-&amp;gt; regedit.exe) y establece el valor en: &lt;b&gt;HKEY_CLASSES_ROOT\telnet\shell\open\command&lt;/b&gt;&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Para putty establecer la ruta:&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;&quot;C:\ruta\de\putty.exe&quot; %1&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;O para SecureCRT:&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;&quot;C:\Program Files\VanDyke Software\SecureCRT\SecureCRT.exe&quot; %1&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Con esto debería encontrar que al hacer clic en los enlaces telnet en su navegador web ahora se ejecute el cliente telnet establecido.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Se confirma que esto funciona para Chrome en Windows 7.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiK6DNA31d_EuuI7KDJEV1pETPf6JTfTIzFsD6RPZmqHfapRQa0RcOL6Ly4FZRmbAMxxzru-9dr0nEH9GhpJvAC85QidgUzGrqiAeVubYnJQbvFn6DrBoVVVO1JGERrxnKdiugxrAB65OnP/s875/securecrt_telnet_default.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;374&quot; data-original-width=&quot;875&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiK6DNA31d_EuuI7KDJEV1pETPf6JTfTIzFsD6RPZmqHfapRQa0RcOL6Ly4FZRmbAMxxzru-9dr0nEH9GhpJvAC85QidgUzGrqiAeVubYnJQbvFn6DrBoVVVO1JGERrxnKdiugxrAB65OnP/s640/securecrt_telnet_default.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8CKwr_mVI7ZzLqbZjueuE-w5qjh3IRTlvb-7BTwzAmzEr_8ZYt8Kd4cBjblcExoNz62VLdUAgGZgKBRLrzRpDRi_i4NKu1WF38NIfbGV2HMQjV5tNRa7JaglvxGMI5sTvznuCpv0bokI-/s837/securecrt_telnet_chrome_default.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;566&quot; data-original-width=&quot;837&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8CKwr_mVI7ZzLqbZjueuE-w5qjh3IRTlvb-7BTwzAmzEr_8ZYt8Kd4cBjblcExoNz62VLdUAgGZgKBRLrzRpDRi_i4NKu1WF38NIfbGV2HMQjV5tNRa7JaglvxGMI5sTvznuCpv0bokI-/s640/securecrt_telnet_chrome_default.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://delfirosales.blogspot.com/feeds/4731017266256012930/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://delfirosales.blogspot.com/2020/08/cambiar-el-cliente-telnet.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/4731017266256012930'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/4731017266256012930'/><link rel='alternate' type='text/html' href='http://delfirosales.blogspot.com/2020/08/cambiar-el-cliente-telnet.html' title='Cambiar el cliente telnet predeterminado en Windows'/><author><name>delfirosales</name><uri>http://www.blogger.com/profile/08332248815774447288</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiK6DNA31d_EuuI7KDJEV1pETPf6JTfTIzFsD6RPZmqHfapRQa0RcOL6Ly4FZRmbAMxxzru-9dr0nEH9GhpJvAC85QidgUzGrqiAeVubYnJQbvFn6DrBoVVVO1JGERrxnKdiugxrAB65OnP/s72-c/securecrt_telnet_default.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4698096966682789219.post-3604610058688951815</id><published>2020-03-10T11:09:00.003-06:00</published><updated>2020-03-10T11:22:15.446-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Apache"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Nagios"/><category scheme="http://www.blogger.com/atom/ns#" term="SNMP"/><category scheme="http://www.blogger.com/atom/ns#" term="Ubuntu"/><title type='text'>Nagios Core en Ubuntu 18.04</title><content type='html'>Nagios es un sistema de monitoreo de equipos y servicios de red ampliamente utilizado, creado para facilitar y ayudar a los administradores a tener siempre el control de la red, alertando sobre cualquier problema que ocurra en la infraestructura antes de que los usuarios de la misma los perciban.

Instalación de Nagios.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgV4mhigbSMzzAbN3XyYDbUg1xCvX20QHRJruRaO90HErE-qXFSl_RKp9kNsEpnYoi_MeK0DG8rfFES48OY9WJIcUCmeQLUD_gwxSeoIFOAytfvG2tAu0UoBJa4-YTvbnmIRmuUv5s4y5pw/s1600/nagios_core.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;176&quot; data-original-width=&quot;555&quot; height=&quot;101&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgV4mhigbSMzzAbN3XyYDbUg1xCvX20QHRJruRaO90HErE-qXFSl_RKp9kNsEpnYoi_MeK0DG8rfFES48OY9WJIcUCmeQLUD_gwxSeoIFOAytfvG2tAu0UoBJa4-YTvbnmIRmuUv5s4y5pw/s320/nagios_core.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Pre requisitos&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;$ &lt;span style=&quot;color: lime;&quot;&gt;sudo apt-get update&lt;/span&gt;
$ &lt;span style=&quot;color: lime;&quot;&gt;sudo apt-get dist-upgrade&lt;/span&gt;

$ &lt;span style=&quot;color: lime;&quot;&gt;sudo apt-get install wget build-essential unzip openssl libssl-dev&lt;/span&gt;
$ &lt;span style=&quot;color: lime;&quot;&gt;sudo apt-get install apache2 php libapache2-mod-php php-gd libgd-dev&lt;/span&gt; &lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
Creación de usuario Nagios

&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;$ &lt;span style=&quot;color: lime;&quot;&gt;sudo adduser nagios&lt;/span&gt;
$ &lt;span style=&quot;color: lime;&quot;&gt;sudo groupadd nagcmd&lt;/span&gt;
$ &lt;span style=&quot;color: lime;&quot;&gt;sudo usermod -a -G nagcmd nagios&lt;/span&gt;
$ &lt;span style=&quot;color: lime;&quot;&gt;sudo usermod -a -G nagcmd www-data&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
Instalación del Servicio Nagios Core

&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;$ &lt;span style=&quot;color: lime;&quot;&gt;cd /opt/&lt;/span&gt;
$ &lt;span style=&quot;color: lime;&quot;&gt;sudo wget https://github.com/NagiosEnterprises/nagioscore/archive/nagios-4.4.5.tar.gz&lt;/span&gt;
$ &lt;span style=&quot;color: lime;&quot;&gt;sudo tar xzf nagios-4.4.5.tar.gz&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
Después extraer al directorio fuente de nagios e instalar usando el comando make.

&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;$ &lt;span style=&quot;color: lime;&quot;&gt;cd nagios-4.4.5&lt;/span&gt;
$ &lt;span style=&quot;color: lime;&quot;&gt;sudo ./configure --with-command-group=nagcmd&lt;/span&gt;
$ &lt;span style=&quot;color: lime;&quot;&gt;sudo make all&lt;/span&gt;
$ &lt;span style=&quot;color: lime;&quot;&gt;sudo make install&lt;/span&gt;
$ &lt;span style=&quot;color: lime;&quot;&gt;sudo make install-init&lt;/span&gt;
$ &lt;span style=&quot;color: lime;&quot;&gt;sudo make install-daemoninit&lt;/span&gt;
$ &lt;span style=&quot;color: lime;&quot;&gt;sudo make install-config&lt;/span&gt;
$ &lt;span style=&quot;color: lime;&quot;&gt;sudo make install-commandmode&lt;/span&gt;
$ &lt;span style=&quot;color: lime;&quot;&gt;sudo make install-exfoliation&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
Controladores de eventos en el directorio libexec, estos archivos binarios proporcionan múltiples eventos para la interfaz web de Nagios.

&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;$ &lt;span style=&quot;color: lime;&quot;&gt;sudo cp -R contrib/eventhandlers/ /usr/local/nagios/libexec/&lt;/span&gt;
$ &lt;span style=&quot;color: lime;&quot;&gt;sudo chown -R nagios:nagios /usr/local/nagios/libexec/eventhandlers&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
Configuración de Apache con Autenticación&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #3d85c6;&quot;&gt;sudo vi /etc/apache2/conf-available/nagios.conf&lt;/span&gt;&lt;br /&gt;
&lt;pre&gt;&lt;code&gt; 
&lt;span style=&quot;color: #cccccc;&quot;&gt;ScriptAlias /nagios/cgi-bin &quot;/usr/local/nagios/sbin&quot;

&lt;directory local=&quot;&quot; nagios=&quot;&quot; sbin=&quot;&quot; usr=&quot;&quot;&gt;
   Options ExecCGI
   AllowOverride None
   Order allow,deny
   Allow from all
   AuthName &quot;Restricted Area&quot;
   AuthType Basic
   AuthUserFile /usr/local/nagios/etc/htpasswd.users
   Require valid-user
&lt;/directory&gt;

Alias /nagios &quot;/usr/local/nagios/share&quot;

&lt;/span&gt;&lt;directory local=&quot;&quot; nagios=&quot;&quot; share=&quot;&quot; usr=&quot;&quot;&gt;&lt;span style=&quot;color: #cccccc;&quot;&gt;
   Options None
   AllowOverride None
   Order allow,deny
   Allow from all
   AuthName &quot;Restricted Area&quot;
   AuthType Basic
   AuthUserFile /usr/local/nagios/etc/htpasswd.users
   Require valid-user&lt;/span&gt;
&lt;/directory&gt;
&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #3d85c6;&quot;&gt;$ sudo htpasswd -c /usr/local/nagios/etc/htpasswd.users nagiosadmin&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Ahora habilite la configuración de Apache y reinicie el servicio de Apache para que la nueva configuración surta efecto.

&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;$ &lt;span style=&quot;color: lime;&quot;&gt;sudo a2enconf nagios&lt;/span&gt;
$ &lt;span style=&quot;color: lime;&quot;&gt;sudo a2enmod cgi rewrite&lt;/span&gt;
$ &lt;span style=&quot;color: lime;&quot;&gt;sudo service apache2 restart&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
Instalacion de Plugins de Nagios

&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;$ &lt;span style=&quot;color: lime;&quot;&gt;cd /opt&lt;/span&gt;
$ &lt;span style=&quot;color: lime;&quot;&gt;sudo wget http://www.nagios-plugins.org/download/nagios-plugins-2.2.1.tar.gz&lt;/span&gt;
$ &lt;span style=&quot;color: lime;&quot;&gt;sudo tar xzf nagios-plugins-2.2.1.tar.gz&lt;/span&gt;
$ &lt;span style=&quot;color: lime;&quot;&gt;cd nagios-plugins-2.2.1&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
Compilacion e instalacion de los complementos

&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;$ &lt;span style=&quot;color: lime;&quot;&gt;sudo ./configure --with-nagios-user=nagios --with-nagios-group=nagios --with-openssl&lt;/span&gt;
$ &lt;span style=&quot;color: lime;&quot;&gt;sudo make&lt;/span&gt;
$ &lt;span style=&quot;color: lime;&quot;&gt;sudo make install&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
Verificación de la configuración

&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;$ &lt;span style=&quot;color: lime;&quot;&gt;/usr/local/nagios/bin/nagios -v /usr/local/nagios/etc/nagios.cfg&lt;/span&gt;
$ &lt;span style=&quot;color: lime;&quot;&gt;sudo service nagios start&lt;/span&gt;
$ &lt;span style=&quot;color: lime;&quot;&gt;sudo systemctl enable nagios&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
Acceso a la interfaz web de Nagios

Acceda a la configuracion de nagios utilizando el nombre de host o la direccion IP seguido de /nagios.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;https://direccionIP_o_dominio/nagios






&lt;/b&gt;</content><link rel='replies' type='application/atom+xml' href='http://delfirosales.blogspot.com/feeds/3604610058688951815/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://delfirosales.blogspot.com/2020/03/nagios-core-en-ubuntu-1804.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/3604610058688951815'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/3604610058688951815'/><link rel='alternate' type='text/html' href='http://delfirosales.blogspot.com/2020/03/nagios-core-en-ubuntu-1804.html' title='Nagios Core en Ubuntu 18.04'/><author><name>delfirosales</name><uri>http://www.blogger.com/profile/08332248815774447288</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgV4mhigbSMzzAbN3XyYDbUg1xCvX20QHRJruRaO90HErE-qXFSl_RKp9kNsEpnYoi_MeK0DG8rfFES48OY9WJIcUCmeQLUD_gwxSeoIFOAytfvG2tAu0UoBJa4-YTvbnmIRmuUv5s4y5pw/s72-c/nagios_core.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4698096966682789219.post-4658335934141735551</id><published>2015-12-17T03:06:00.000-06:00</published><updated>2020-03-09T13:50:29.191-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco IOS"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco NX-OS"/><category scheme="http://www.blogger.com/atom/ns#" term="GNS3"/><category scheme="http://www.blogger.com/atom/ns#" term="Networking"/><category scheme="http://www.blogger.com/atom/ns#" term="OSPF"/><category scheme="http://www.blogger.com/atom/ns#" term="Routing"/><title type='text'>Configuración de OSPF en un Cisco 3725 (IOS) y Nexus 7000 (NX-OS)</title><content type='html'>A continuación, se muestra un ejemplo de configuración básica de OSPF entre un Switch Nexus y un Router 3725. Para habilitar OSPF en el Cisco Nexus se realiza desde la configuración de la interfaz.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjA3Am09u-qY2oDidWq8RtDLNMkBfuB64d6nK4neQdZjeCrClnWGh5yUizbcStYboDBdhz7Xba5qbJV5M_7iVRCACl-SulIjC8AaZxQSMuslPzaWu1HOG9osKL42h8KtMx_5qXx1TeQju7/s1600/Cisco_Nexus.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;184&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjA3Am09u-qY2oDidWq8RtDLNMkBfuB64d6nK4neQdZjeCrClnWGh5yUizbcStYboDBdhz7Xba5qbJV5M_7iVRCACl-SulIjC8AaZxQSMuslPzaWu1HOG9osKL42h8KtMx_5qXx1TeQju7/s320/Cisco_Nexus.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;Topologia en GNS3.&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
Habilitamos OSPF
&lt;br /&gt;
&lt;pre class=&quot;prettyprint&quot;&gt;N7K-2(config)# feature ospf&lt;/pre&gt;
Habilitamos el proceso de OSPF
&lt;br /&gt;
&lt;pre class=&quot;prettyprint&quot;&gt;N7K-2(config)# router ospf 10
N7K-2(config-router)# router-id 10.10.10.1&lt;/pre&gt;
Habilitamos OSPF en la interface en particular
&lt;br /&gt;
&lt;pre class=&quot;prettyprint&quot;&gt;N7K-2(config)# int ethernet 2/2
N7K-2(config-if)# ip address 10.10.10.1 255.255.255.0
N7K-2(config-if)# no shutdown
N7K-2(config-if)# ip router ospf 10 area 0
N7K-2(config-if)# end
N7K-2#&lt;/pre&gt;
Configuración de OSPF en el Cisco 3725.

&lt;br /&gt;
&lt;pre class=&quot;prettyprint&quot;&gt;ESW1(config)#interface fastEthernet0/1
ESW1(config-if)#ip add 10.10.10.2 255.255.255.0
ESW1(config-if)#no shutdown

ESW1(config)#interface fastEthernet0/0
ESW1(config-if)#ip add 10.4.4.4 255.255.255.0
ESW1(config-if)#no shutdown
ESW1(config-if)#exit

ESW1(config)#interface loopback2
ESW1(config-if)#ip address 10.3.3.3 255.255.255.0
ESW1(config-if)#end

ESW1#show ip int brief
Interface                  IP-Address      OK? Method Status                Protocol
FastEthernet0/0            10.4.4.4        YES manual up                    up      
FastEthernet0/1            10.10.10.2      YES manual up                    up      
FastEthernet1/0            unassigned      YES unset  up                    down    
FastEthernet1/14           unassigned      YES unset  up                    down    
FastEthernet1/15           unassigned      YES unset  up                    down    
Vlan1                      unassigned      YES unset  up                    down    
Loopback1                  10.2.2.2        YES manual up                    up      
Loopback2                  10.3.3.3        YES manual up                    up      

ESW1(config)#router ospf 10
ESW1(config-router)#network 10.10.10.0 0.0.0.255 area 0
*Mar  1 00:06:10.307: %OSPF-5-ADJCHG: Process 10, Nbr 10.10.10.1 on FastEthernet0/1 from LOADING to FULL, Loading Done
ESW1(config-router)#networ 10.4.4.0 0.0.0.255 area 0
ESW1(config-router)#&lt;/pre&gt;
&lt;br /&gt;
&lt;b&gt;Verificación&lt;/b&gt;&lt;br /&gt;
&lt;pre class=&quot;prettyprint&quot;&gt;ESW1#show ip ospf neighbor 

Neighbor ID     Pri   State           Dead Time   Address         Interface
10.10.10.1        1   FULL/BDR        00:00:33    10.10.10.1      FastEthernet0/1
ESW1


ESW1#show cdp neighbors detail 
-------------------------
Device ID: N7K-2(Nexus-Switch)
Entry address(es): 
  IP address: 10.10.10.1
Platform: Nexus-Switch,  Capabilities: Router Switch IGMP 
Interface: FastEthernet0/1,  Port ID (outgoing port): Ethernet2/2
Holdtime : 165 sec

Version :
Cisco Nexus Operating System (NX-OS) Software, Version 5.1(2)

advertisement version: 2
Duplex: full

ESW1#&lt;/pre&gt;
&lt;b&gt;Verificación&amp;nbsp;en el Cisco Nexus


&lt;/b&gt;&lt;br /&gt;
&lt;pre class=&quot;prettyprint&quot;&gt;N7K-2# show ip route
IP Route Table for VRF &quot;default&quot;
&#39;*&#39; denotes best ucast next-hop
&#39;**&#39; denotes best mcast next-hop
&#39;[x/y]&#39; denotes [preference/metric]

10.4.4.0/24, ubest/mbest: 1/0
    *via 10.10.10.2, Eth2/2, [110/50], 00:00:11, ospf-10, intra
10.10.10.0/24, ubest/mbest: 1/0, attached
    *via 10.10.10.1, Eth2/2, [0/0], 00:01:52, direct
10.10.10.1/32, ubest/mbest: 1/0, attached
    *via 10.10.10.1, Eth2/2, [0/0], 00:01:52, local
N7K-2#

N7K-2# show ip ospf neighbors
 OSPF Process ID 10 VRF default
 Total number of neighbors: 1
 Neighbor ID     Pri State            Up Time  Address         Interface
 10.3.3.3          1 FULL/DR          00:00:09 10.10.10.2      Eth2/2


N7K-2# ping 10.10.10.2
PING 10.10.10.2 (10.10.10.2): 56 data bytes
64 bytes from 10.10.10.2: icmp_seq=0 ttl=254 time=10 ms
64 bytes from 10.10.10.2: icmp_seq=1 ttl=254 time=10 ms
64 bytes from 10.10.10.2: icmp_seq=2 ttl=254 time=10 ms
64 bytes from 10.10.10.2: icmp_seq=3 ttl=254 time=10 ms
64 bytes from 10.10.10.2: icmp_seq=4 ttl=254 time=10 ms

--- 10.10.10.2 ping statistics ---
5 packets transmitted, 5 packets received, 0.00% packet loss
round-trip min/avg/max = 10/10/10 ms
N7K-2#

N7K-2# ping 10.4.4.4
PING 10.4.4.4 (10.4.4.4): 56 data bytes
64 bytes from 10.4.4.4: icmp_seq=0 ttl=254 time=10 ms
64 bytes from 10.4.4.4: icmp_seq=1 ttl=254 time=10 ms
64 bytes from 10.4.4.4: icmp_seq=2 ttl=254 time=0 ms
64 bytes from 10.4.4.4: icmp_seq=3 ttl=254 time=0 ms
64 bytes from 10.4.4.4: icmp_seq=4 ttl=254 time=10 ms

--- 10.4.4.4 ping statistics ---
5 packets transmitted, 5 packets received, 0.00% packet loss
round-trip min/avg/max = 0/6/10 ms
N7K-2#&lt;/pre&gt;
&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://delfirosales.blogspot.com/feeds/4658335934141735551/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://delfirosales.blogspot.com/2015/12/configuracion-de-ospf-entre-un-cisco.html#comment-form' title='1 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/4658335934141735551'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/4658335934141735551'/><link rel='alternate' type='text/html' href='http://delfirosales.blogspot.com/2015/12/configuracion-de-ospf-entre-un-cisco.html' title='Configuración de OSPF en un Cisco 3725 (IOS) y Nexus 7000 (NX-OS)'/><author><name>delfirosales</name><uri>http://www.blogger.com/profile/08332248815774447288</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjA3Am09u-qY2oDidWq8RtDLNMkBfuB64d6nK4neQdZjeCrClnWGh5yUizbcStYboDBdhz7Xba5qbJV5M_7iVRCACl-SulIjC8AaZxQSMuslPzaWu1HOG9osKL42h8KtMx_5qXx1TeQju7/s72-c/Cisco_Nexus.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4698096966682789219.post-8445558242231066413</id><published>2015-12-04T01:04:00.000-06:00</published><updated>2020-03-09T14:15:43.789-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="DHCP"/><category scheme="http://www.blogger.com/atom/ns#" term="Firewall"/><category scheme="http://www.blogger.com/atom/ns#" term="FortiGate"/><category scheme="http://www.blogger.com/atom/ns#" term="Fortinet"/><category scheme="http://www.blogger.com/atom/ns#" term="FortiOS"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Configuración de DHCP Server en FortiGate</title><content type='html'>El FortiGate puede actuar como un servidor DHCP para distribuir dirección IP a los hosts finales que ejecutan servicios de un cliente DHCP. Esta característica es importante si se tiene una pequeña sucursal que no posee un servidor DHCP dedicado.&lt;br /&gt;
&lt;br /&gt;
Para habilitar el servicio de DHCP en el FortiGate se puede realizar desde la interfaz web en las opciones de &lt;b&gt;System &amp;gt; Network &amp;gt; Interface&lt;/b&gt;. Para configurar este servicio desde el CLI.&lt;br /&gt;
&lt;br /&gt;
Datos del servidor DHCP.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Interface:&lt;/b&gt; port3 (INSIDE)&lt;br /&gt;
&lt;b&gt;Rango de direcciones IP:&lt;/b&gt; 192.168.23.50 - 192.168.23.100&lt;br /&gt;
&lt;b&gt;Subnet:&lt;/b&gt; 255.255.255.0&lt;br /&gt;
&lt;b&gt;Default Gateway:&lt;/b&gt; 192.168.23.1&lt;br /&gt;
&lt;b&gt;DNS:&lt;/b&gt; Servicio de DNS por default&lt;br /&gt;
&lt;b&gt;Nombre de Dominio:&lt;/b&gt; delfirosales.com&lt;br /&gt;
&lt;br /&gt;
Configuracion de la interface Inside.

&lt;br /&gt;
&lt;pre class=&quot;prettyprint&quot;&gt;edit &quot;port3&quot;
    set vdom &quot;root&quot;
    set ip 192.168.23.1 255.255.255.0
    set allowaccess ping
    set type physical
    set alias &quot;INSIDE&quot;
    set snmp-index 3
next&lt;/pre&gt;
Configuracion del DNS.

&lt;br /&gt;
&lt;pre class=&quot;prettyprint&quot;&gt;FortiGate-VM # show system dns 
config system dns
    set primary 8.8.8.8
    set secondary 8.8.4.4
    set domain &quot;delfirosales.com&quot;
    set source-ip 192.168.1.102
end&lt;/pre&gt;
Configuración de DHCP Server desde CLI

&lt;br /&gt;
&lt;pre class=&quot;prettyprint&quot;&gt;FortiGate-VM # config system dhcp server 
FortiGate-VM (server) # edit 1
new entry &#39;1&#39; added
FortiGate-VM (1) # set auto-configuration disable 
FortiGate-VM (1) # set default-gateway 192.168.23.1
FortiGate-VM (1) # set dns-service default 
FortiGate-VM (1) # set interface port3
FortiGate-VM (1) # config ip-range 
FortiGate-VM (ip-range) # edit 1
new entry &#39;1&#39; added
FortiGate-VM (1) # set start-ip 192.168.23.50
FortiGate-VM (1) # set end-ip 192.168.23.100
FortiGate-VM (1) # next 
FortiGate-VM (ip-range) # end
FortiGate-VM (1) # set netmask 255.255.255.0
FortiGate-VM (1) # next 
FortiGate-VM (server) # end

FortiGate-VM # 
FortiGate-VM # show sys dhcp server 
config system dhcp server
    edit 1
        set auto-configuration disable
        set default-gateway 192.168.23.1
        set dns-service default
        set interface &quot;port3&quot;
            config ip-range
                edit 1
                    set end-ip 192.168.23.100
                    set start-ip 192.168.23.50
                next
            end
        set netmask 255.255.255.0
    next
end
FortiGate-VM # &lt;/pre&gt;


&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2EsOykjDnfZMvzjTI5nLq4wrXJ1gHj3NAKFynS-bA4Oad0gi50rbz4_WeKL32BiCPIRnXBsah54IbTeUU4NwUMyRzz0uV5m8TdXI02M2nePTOnA5ptAit36y63Z4N_VISRPWcYq6dmoZA/s1600/Fortinet_DHCP.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;424&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2EsOykjDnfZMvzjTI5nLq4wrXJ1gHj3NAKFynS-bA4Oad0gi50rbz4_WeKL32BiCPIRnXBsah54IbTeUU4NwUMyRzz0uV5m8TdXI02M2nePTOnA5ptAit36y63Z4N_VISRPWcYq6dmoZA/s640/Fortinet_DHCP.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;


&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqq0UES6Sl7v3cUOAEaou6rbKIQ3cigavZ9g1v3A59l_bScPu-lBVo7wetsKGkT9rnLyVMz8xaN6MeciWyykda-q1S-s1xqQSup8rLHz2aU4vGNKjeiLFeJyycEc1GyF-vLuDU_lv75gNN/s1600/Fortigate_DHCP_Server.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;408&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqq0UES6Sl7v3cUOAEaou6rbKIQ3cigavZ9g1v3A59l_bScPu-lBVo7wetsKGkT9rnLyVMz8xaN6MeciWyykda-q1S-s1xqQSup8rLHz2aU4vGNKjeiLFeJyycEc1GyF-vLuDU_lv75gNN/s640/Fortigate_DHCP_Server.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;

Verificacion del Servicio

&lt;br /&gt;
&lt;pre class=&quot;prettyprint&quot;&gt;root@labs:/home/delfi# ifconfig eth0
eth0      Link encap:Ethernet  HWaddr 00:00:AB:5C:A9:00  
          inet addr:192.168.23.50  Bcast:192.168.23.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:179 errors:0 dropped:0 overruns:0 frame:0
          TX packets:158 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000 
          RX bytes:26721 (26.0 KiB)  TX bytes:50476 (49.2 KiB)

root@labs:/home/delfi# 

root@labs:/home/delfi# route -e
Kernel IP routing table
Destination     Gateway         Genmask         Flags   MSS Window  irtt Iface
default         192.168.23.1    0.0.0.0         UG        0 0          0 eth0
127.0.0.1       *               255.255.255.255 UH        0 0          0 lo
192.168.23.0    *               255.255.255.0   U         0 0          0 eth0

root@labs:/home/delfi# ping www.google.com
PING www.google.com (173.194.115.176): 56 data bytes
64 bytes from 173.194.115.176: seq=0 ttl=57 time=134.307 ms
64 bytes from 173.194.115.176: seq=1 ttl=57 time=248.415 ms
64 bytes from 173.194.115.176: seq=2 ttl=57 time=166.495 ms
64 bytes from 173.194.115.176: seq=3 ttl=57 time=50.341 ms
64 bytes from 173.194.115.176: seq=4 ttl=57 time=283.354 ms
64 bytes from 173.194.115.176: seq=5 ttl=57 time=187.280 ms
64 bytes from 173.194.115.176: seq=6 ttl=57 time=69.864 ms
64 bytes from 173.194.115.176: seq=7 ttl=57 time=102.955 ms
64 bytes from 173.194.115.176: seq=8 ttl=57 time=107.317 ms
64 bytes from 173.194.115.176: seq=9 ttl=57 time=84.637 ms
64 bytes from 173.194.115.176: seq=10 ttl=57 time=142.454 ms&lt;/pre&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3P0ZBQUp7o41c-lu0N30lZPmIrTgFNAUNyopsY_xWPaGZxIGCzvqh9ecqI90HYDl_MgIX_0y7PbCrfph9HZ5RQ8-9Bl9LYXC8a0Fl1c9wFwlFB418ulySLOr_6VTLk1oGzDbclkw4aVmR/s1600/Core_Linux_DHCP.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;424&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3P0ZBQUp7o41c-lu0N30lZPmIrTgFNAUNyopsY_xWPaGZxIGCzvqh9ecqI90HYDl_MgIX_0y7PbCrfph9HZ5RQ8-9Bl9LYXC8a0Fl1c9wFwlFB418ulySLOr_6VTLk1oGzDbclkw4aVmR/s640/Core_Linux_DHCP.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKtBtC992Bn_-RjHIG6uAd3shTSWeDYaeIzK3jnWP0ZajMNcBU1MLkMri3-5VJ47vjEv1bMqBcG0B4VvaA2NrjGFcj5szXvSmKl-0M37BOM341urgTbaverbRTmdramDZaTxCgCZU2QSJt/s1600/DHCP_FortIOS.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;356&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKtBtC992Bn_-RjHIG6uAd3shTSWeDYaeIzK3jnWP0ZajMNcBU1MLkMri3-5VJ47vjEv1bMqBcG0B4VvaA2NrjGFcj5szXvSmKl-0M37BOM341urgTbaverbRTmdramDZaTxCgCZU2QSJt/s640/DHCP_FortIOS.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://delfirosales.blogspot.com/feeds/8445558242231066413/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://delfirosales.blogspot.com/2015/12/configuracon-de-dhcp-server-en-fortigate.html#comment-form' title='1 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/8445558242231066413'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/8445558242231066413'/><link rel='alternate' type='text/html' href='http://delfirosales.blogspot.com/2015/12/configuracon-de-dhcp-server-en-fortigate.html' title='Configuración de DHCP Server en FortiGate'/><author><name>delfirosales</name><uri>http://www.blogger.com/profile/08332248815774447288</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2EsOykjDnfZMvzjTI5nLq4wrXJ1gHj3NAKFynS-bA4Oad0gi50rbz4_WeKL32BiCPIRnXBsah54IbTeUU4NwUMyRzz0uV5m8TdXI02M2nePTOnA5ptAit36y63Z4N_VISRPWcYq6dmoZA/s72-c/Fortinet_DHCP.png" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4698096966682789219.post-3744264608800320434</id><published>2015-11-15T21:47:00.000-06:00</published><updated>2020-03-09T12:24:00.651-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco Switch"/><category scheme="http://www.blogger.com/atom/ns#" term="Core Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="GNS3"/><category scheme="http://www.blogger.com/atom/ns#" term="InterVLAN"/><category scheme="http://www.blogger.com/atom/ns#" term="Layer 2"/><category scheme="http://www.blogger.com/atom/ns#" term="Qemu"/><category scheme="http://www.blogger.com/atom/ns#" term="Virtualización"/><category scheme="http://www.blogger.com/atom/ns#" term="VLANS"/><title type='text'>Configuración de SVIs en un Switch de Capa 3</title><content type='html'>Las VLAN dividen dominios de transmisión en un entorno LAN. Siempre que los host de una VLAN necesitan comunicarse con algun otro host en otra VLAN, debe enrutarse el tráfico entre ellos. Esto se denomina ruteo interVLAN. En los switches Catalyst, se logra al crear interfaces de Capa 3 (Switch Virtual Interface - SVI).&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Host1&lt;/b&gt;&lt;br /&gt;
IP: 10.1.1.5&lt;br /&gt;
Default Gateway: 10.1.1.1&lt;br /&gt;
Subnet: 255.255.255.0&amp;nbsp;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Host2&lt;/b&gt;&lt;br /&gt;
IP: 10.1.2.2&lt;br /&gt;
Default Gateway: 10.1.2.1&lt;br /&gt;
Subnet: 255.255.255.0&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7vttKbCKRjZsb9dTvezYK2wwtMSZY2yRF5g5eMLAeaqtlN9QV_w1qqLHKZjDUhGl9zBOddW4IAxn9tOC9FBSnFnnA5zFpmBinKgAcQHRGaJWuuNYM24z1yZAzSWeUqFzQxnqBmJXf6Hac/s1600/GNS3_VLANs_SVIs.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;377&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7vttKbCKRjZsb9dTvezYK2wwtMSZY2yRF5g5eMLAeaqtlN9QV_w1qqLHKZjDUhGl9zBOddW4IAxn9tOC9FBSnFnnA5zFpmBinKgAcQHRGaJWuuNYM24z1yZAzSWeUqFzQxnqBmJXf6Hac/s640/GNS3_VLANs_SVIs.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;Topologia en GNS3 utilizando la imagen&amp;nbsp;vIOS-L2 y Core Linux.&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
Configuracion en Core Linux 1.&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;labs login: delfi
Password:
                                   /\_/\
                                  ( o.o )
                                   &amp;gt; ^ &amp;lt;
                              delfirosales.com
delfi@labs:~$ 
delfi@labs:~$ &lt;span style=&quot;color: lime;&quot;&gt;sudo su&lt;/span&gt;
root@labs:/home/delfi# &lt;span style=&quot;color: lime;&quot;&gt;ifconfig eth0 10.1.1.5 netmask 255.255.255.0 up&lt;/span&gt;
root@labs:/home/delfi# &lt;span style=&quot;color: lime;&quot;&gt;route add default gw 10.1.1.1&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
Core Linux 2.

&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;delfi@labs:~$ 
delfi@labs:~$ &lt;span style=&quot;color: lime;&quot;&gt;sudo su&lt;/span&gt;
root@labs:/home/delfi# &lt;span style=&quot;color: lime;&quot;&gt;ifconfig eth0 10.1.2.2 netmask 255.255.255.0 up&lt;/span&gt;
root@labs:/home/delfi# &lt;span style=&quot;color: lime;&quot;&gt;route add default gw 10.1.2.1&lt;/span&gt;
root@labs:/home/delfi# &lt;/code&gt;&lt;/pre&gt;
Habilitar ruteo en el Switch

&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;vIOS-L2#&lt;span style=&quot;color: lime;&quot;&gt;configure terminal&lt;/span&gt;
vIOS-L2(config)#&lt;span style=&quot;color: lime;&quot;&gt;ip routing &lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
Configuracion y creacion de VLANs

&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;vIOS-L2(config)#&lt;span style=&quot;color: lime;&quot;&gt;interface gigabitEthernet0/1&lt;/span&gt;
vIOS-L2(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;switchport access vlan 2&lt;/span&gt;
&lt;span style=&quot;color: #6fa8dc;&quot;&gt;% Access VLAN does not exist. Creating vlan 2&lt;/span&gt;
vIOS-L2(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;switchport mode access &lt;/span&gt;
vIOS-L2(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;exit&lt;/span&gt;

vIOS-L2(config)#&lt;span style=&quot;color: lime;&quot;&gt;interface gigabitEthernet0/2&lt;/span&gt;
vIOS-L2(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;switchport access vlan 3&lt;/span&gt;
&lt;span style=&quot;color: #3d85c6;&quot;&gt;% Access VLAN does not exist. Creating vlan 3&lt;/span&gt;
vIOS-L2(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;switchport mode access &lt;/span&gt;
vIOS-L2(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;exit&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
Verificacion de las VLANs creadas anterior.

&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;vIOS-L2#&lt;span style=&quot;color: lime;&quot;&gt;show vlan&lt;/span&gt;   

VLAN Name                             Status    Ports
---- -------------------------------- --------- -------------------------------
1    default                          active    Gi0/0, Gi0/3
&lt;span style=&quot;color: #3d85c6;&quot;&gt;2    VLAN0002                         active    Gi0/1
3    VLAN0003                         active    Gi0/2&lt;/span&gt;
100  VLAN100                          active    
200  VLAN0200                         active    
300  VLAN0300                         active    
1002 fddi-default                     act/unsup 
1003 trcrf-default                    act/unsup 
1004 fddinet-default                  act/unsup 
1005 trbrf-default                    act/unsup 

VLAN Type  SAID       MTU   Parent RingNo BridgeNo Stp  BrdgMode Trans1 Trans2
---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------
1    enet  100001     1500  -      -      -        -    -        0      0   
2    enet  100002     1500  -      -      -        -    -        0      0   
3    enet  100003     1500  -      -      -        -    -        0      0   
100  enet  100100     1500  -      -      -        -    -        0      0   
200  enet  100200     1500  -      -      -        -    -        0      0   
300  enet  100300     1500  -      -      -        -    -        0      0   
1002 fddi  101002     1500  -      -      -        -    -        0      0   
          
VLAN Type  SAID       MTU   Parent RingNo BridgeNo Stp  BrdgMode Trans1 Trans2
---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------
1003 trcrf 101003     4472  1005   3276   -        -    srb      0      0   
1004 fdnet 101004     1500  -      -      -        ieee -        0      0   
1005 trbrf 101005     4472  -      -      15       ibm  -        0      0   


VLAN AREHops STEHops Backup CRF
---- ------- ------- ----------
1003 7       7       off

Primary Secondary Type              Ports
------- --------- ----------------- ------------------------------------------&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJ2IUNlsG2Wa3MDFXqoE5MeZx_tumBrlhUk9UJSva3bftgHSn_zW2E-BsslRz5zuO-U-FC0xd1zNu58KDarvfEbVUAU34r3u9cQWeutC1IhNNML7OAEga6AUcJuokRCvQegwrxf1h5t-1h/s1600/vlans-gns3.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;425&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJ2IUNlsG2Wa3MDFXqoE5MeZx_tumBrlhUk9UJSva3bftgHSn_zW2E-BsslRz5zuO-U-FC0xd1zNu58KDarvfEbVUAU34r3u9cQWeutC1IhNNML7OAEga6AUcJuokRCvQegwrxf1h5t-1h/s640/vlans-gns3.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Creacion de la SVI 2.&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;vIOS-L2(config)#&lt;span style=&quot;color: lime;&quot;&gt;interface vlan 2&lt;/span&gt;
vIOS-L2(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;ip address 10.1.1.1 255.255.255.0&lt;/span&gt;
vIOS-L2(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;no shutdown&lt;/span&gt; 
vIOS-L2(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;exit&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
Creacion de la SVI 3.

&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;vIOS-L2(config)#&lt;span style=&quot;color: lime;&quot;&gt;interface vlan 3&lt;/span&gt;
vIOS-L2(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;ip address 10.1.2.1 255.255.255.0&lt;/span&gt;
vIOS-L2(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;no shutdown &lt;/span&gt;
vIOS-L2(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;end&lt;/span&gt;
vIOS-L2#&lt;/code&gt;&lt;/pre&gt;
Si ingresamos el siguiente comando podremos observar que las interfaces se encuentran arriba.

&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;vIOS-L2#&lt;span style=&quot;color: lime;&quot;&gt;show ip interface brief&lt;/span&gt;
Interface              IP-Address      OK? Method Status                Protocol
GigabitEthernet0/0     unassigned      YES unset  up                    up      
GigabitEthernet0/1     unassigned      YES unset  up                    up      
GigabitEthernet0/2     unassigned      YES unset  up                    up      
GigabitEthernet0/3     unassigned      YES unset  up                    up      
&lt;span style=&quot;color: #3d85c6;&quot;&gt;Vlan2                  10.1.1.1        YES manual up                    up      
Vlan3                  10.1.2.1        YES manual up                    up &lt;/span&gt;     
vIOS-L2#&lt;/code&gt;&lt;/pre&gt;
Tambien podremos observar la tabla de ruteo con el comando show ip route.

&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;vIOS-L2#&lt;span style=&quot;color: lime;&quot;&gt;show ip route&lt;/span&gt;
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area 
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
       E1 - OSPF external type 1, E2 - OSPF external type 2
       i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
       ia - IS-IS inter area, * - candidate default, U - per-user static route
       o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP
       a - application route
       + - replicated route, % - next hop override

Gateway of last resort is not set

      10.0.0.0/8 is variably subnetted, 4 subnets, 2 masks
C        10.1.1.0/24 is directly connected, Vlan2
L        10.1.1.1/32 is directly connected, Vlan2
C        10.1.2.0/24 is directly connected, Vlan3
L        10.1.2.1/32 is directly connected, Vlan3
vIOS-L2#

vIOS-L2#&lt;span style=&quot;color: lime;&quot;&gt;show interfaces vlan 2&lt;/span&gt;
Vlan2 is up, line protocol is up 
  Hardware is Ethernet SVI, address is 0000.ab5a.8002 (bia 0000.ab5a.8002)
  Internet address is 10.1.1.1/24
  MTU 1500 bytes, BW 1000000 Kbit/sec, DLY 10 usec, 
     reliability 255/255, txload 1/255, rxload 1/255
  Encapsulation ARPA, loopback not set
  Keepalive not supported 
  ARP type: ARPA, ARP Timeout 04:00:00
  Last input 00:00:10, output never, output hang never
  Last clearing of &quot;show interface&quot; counters never
  Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
  Queueing strategy: fifo
  Output queue: 0/40 (size/max)
  5 minute input rate 0 bits/sec, 0 packets/sec
  5 minute output rate 0 bits/sec, 0 packets/sec
     652 packets input, 98538 bytes, 0 no buffer
     Received 0 broadcasts (0 IP multicasts)
     0 runts, 0 giants, 0 throttles 
     0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored
     17 packets output, 1054 bytes, 0 underruns
     0 output errors, 0 interface resets
     0 unknown protocol drops
     0 output buffer failures, 0 output buffers swapped out
vIOS-L2#&lt;/code&gt;&lt;/pre&gt;
Verificacion de Core Linux 1 a Core Linux 2.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzuYP8gkz8ynrGcBFzOotnmp1EG6NyjZqQjySKy9fHrB_uB-57gw7c7ac57y8Da0cV_7JD7D0t9lNvN6s_1DoIpcJHXf4aMhlyN76PUt9uCb-SpgxuhX6kiE6MmwxxAHbcItZXs54cjDvH/s1600/SVIs_vlans_cisco.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;425&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzuYP8gkz8ynrGcBFzOotnmp1EG6NyjZqQjySKy9fHrB_uB-57gw7c7ac57y8Da0cV_7JD7D0t9lNvN6s_1DoIpcJHXf4aMhlyN76PUt9uCb-SpgxuhX6kiE6MmwxxAHbcItZXs54cjDvH/s640/SVIs_vlans_cisco.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Otros comandos de verificacion.&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;vIOS-L2#&lt;span style=&quot;color: lime;&quot;&gt;show interfaces vlan 3&lt;/span&gt;
vIOS-L2#&lt;span style=&quot;color: lime;&quot;&gt;show interface gigabitEthernet0/0&lt;/span&gt;
vIOS-L2#&lt;span style=&quot;color: lime;&quot;&gt;show interfaces gigabitEthernet0/0 switchport&lt;/span&gt;
vIOS-L2#&lt;span style=&quot;color: lime;&quot;&gt;show vlan brief&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;a href=&quot;https://www.dropbox.com/s/lbgg751bukrcjr7/LinuxCore_6.4.1.img&quot; target=&quot;_blank&quot;&gt;Descargar Core Linux&lt;/a&gt;:&amp;nbsp;LinuxCore-6.4.1.img</content><link rel='replies' type='application/atom+xml' href='http://delfirosales.blogspot.com/feeds/3744264608800320434/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://delfirosales.blogspot.com/2015/11/configuracion-de-svis-en-un-switch-de.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/3744264608800320434'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/3744264608800320434'/><link rel='alternate' type='text/html' href='http://delfirosales.blogspot.com/2015/11/configuracion-de-svis-en-un-switch-de.html' title='Configuración de SVIs en un Switch de Capa 3'/><author><name>delfirosales</name><uri>http://www.blogger.com/profile/08332248815774447288</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7vttKbCKRjZsb9dTvezYK2wwtMSZY2yRF5g5eMLAeaqtlN9QV_w1qqLHKZjDUhGl9zBOddW4IAxn9tOC9FBSnFnnA5zFpmBinKgAcQHRGaJWuuNYM24z1yZAzSWeUqFzQxnqBmJXf6Hac/s72-c/GNS3_VLANs_SVIs.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4698096966682789219.post-1855544291982417860</id><published>2015-11-10T20:38:00.000-06:00</published><updated>2020-03-08T00:41:29.925-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="GNS3"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Qemu"/><category scheme="http://www.blogger.com/atom/ns#" term="Virtualización"/><title type='text'>Linux Core en Qemu</title><content type='html'>Imágenes ISO de Linux Core Live x86 o x86-64 se pueden &lt;a href=&quot;https://tinycorelinux.net/6.x/&quot; target=&quot;_blank&quot;&gt;descargar de su pagina&lt;/a&gt; la versión mas reciente es el Core 6.4.1.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Creación de la imagen Qemu
&lt;/b&gt;&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;$ &lt;span style=&quot;color: lime;&quot;&gt;qemu-img.exe create -f qcow2 LinuxCore.img 300M&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;b&gt;Iniciar Qemu con la imagen ISO Live de Core Linux
&lt;/b&gt;&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;$ &lt;span style=&quot;color: lime;&quot;&gt;qemu-system-i386w.exe -boot d -cdrom Core-6.4.1.iso -hda LinuxCore.img&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;b&gt;Instalacion de Syslinux Extensions
&lt;/b&gt;&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;$ &lt;span style=&quot;color: lime;&quot;&gt;tce-load -wi syslinux&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;b&gt;Creación de una nueva Particion Ext4
&lt;/b&gt;&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;$ &lt;span style=&quot;color: lime;&quot;&gt;sudo fdisk /dev/sda&lt;/span&gt;

&lt;span style=&quot;color: #ffd966;&quot;&gt;n - Agregar particion
p - Particion primaria
Partition number (1-4): 1
First cylinder (1-25, default 1): ENTER
Last cylinder (1-25, default 25): ENTER
a - bootable flag
Partition number (1-4): 1
w - guardar la tabla de particion y salir&lt;/span&gt;

$ &lt;span style=&quot;color: lime;&quot;&gt;mkfs.ext4 /dev/sda1&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;b&gt;Instalar el Boot Sector&lt;/b&gt;&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;$ &lt;span style=&quot;color: lime;&quot;&gt;dd if=/usr/local/share/syslinux/mbr.bin of=/dev/sda&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;b&gt;Reconstruir /etc/fstab y Montar la Particion /dev/sda1
&lt;/b&gt;&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;$ &lt;span style=&quot;color: lime;&quot;&gt;sudo rebuildfstab&lt;/span&gt;
$ &lt;span style=&quot;color: lime;&quot;&gt;mount /mnt/sda1&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;b&gt;Montar el CDROM y copiar los archivos core.gz y vmlinuz a /mnt/sda1/boot
&lt;/b&gt;&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;$ &lt;span style=&quot;color: lime;&quot;&gt;sudo mkdir -p /mnt/sda1/boot/extlinux&lt;/span&gt;
$ &lt;span style=&quot;color: lime;&quot;&gt;mount /mnt/sr0&lt;/span&gt;
$ &lt;span style=&quot;color: lime;&quot;&gt;sudo cp -p /mnt/sr0/boot/* /mnt/sda1/boot&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;b&gt;Instalar el Boot Loader
&lt;/b&gt;&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;$ &lt;span style=&quot;color: lime;&quot;&gt;sudo extlinux --install /mnt/sda1/boot/extlinux&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;b&gt;Creación&amp;nbsp;del Archivo extlinux.conf
&lt;/b&gt;&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;$ &lt;span style=&quot;color: lime;&quot;&gt;sudo vi /mnt/sda1/boot/extlinux/extlinux.conf&lt;/span&gt;

&lt;span style=&quot;color: #ffd966;&quot;&gt;DEFAULT core
LABEL core
KERNEL /boot/vmlinuz
APPEND initrd=/boot/core.gz quiet&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;b&gt;Creación de directorios
&lt;/b&gt;&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;$ &lt;span style=&quot;color: lime;&quot;&gt;sudo mkdir /mnt/sda1/tce&lt;/span&gt;
$ &lt;span style=&quot;color: lime;&quot;&gt;sudo chown tc:staff /mnt/sda1/tce&lt;/span&gt;
$ &lt;span style=&quot;color: lime;&quot;&gt;touch /mnt/sda1/tce/mydata.tgz&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
Apagar Linux Core&lt;br /&gt;
&lt;br /&gt;
Despues de apagar Linux Core ingresar desde consola
&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;$ &lt;span style=&quot;color: lime;&quot;&gt;qemu-system-i386w.exe -boot c -hda LinuxCore.img&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;b&gt;Habilitar en Linux Core la redirección al Puerto Serial
&lt;/b&gt;&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;&lt;span style=&quot;color: #ffd966;&quot;&gt;default core
label core
kernel /boot/vmlinuz console=ttyS0,38400n8
        append initrd=/boot/core.gz quiet&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
Extaer el archivo core.gz
&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;$ &lt;span style=&quot;color: lime;&quot;&gt;mkdir -p /home/tc/temp/extract&lt;/span&gt;
$ &lt;span style=&quot;color: lime;&quot;&gt;sudo cp /mnt/sda1/boot/core.gz /home/tc/temp/&lt;/span&gt;
$ &lt;span style=&quot;color: lime;&quot;&gt;cd /home/tc/temp/extract/&lt;/span&gt;

$ &lt;span style=&quot;color: lime;&quot;&gt;zcat ../core.gz | sudo cpio -i -H newc -d&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;b&gt;Desabilitar Autologin para tty1 y agregar ttyS0
&lt;/b&gt;&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;$ &lt;span style=&quot;color: lime;&quot;&gt;sudo vi /etc/inittab&lt;/span&gt;

#tty1::respawn:/sbin/getty -nl /sbin/autologin 38400 tty1
&lt;span style=&quot;color: #ffd966;&quot;&gt;tty1::respawn:/sbin/getty 38400 tty1
ttyS0::respawn:/sbin/getty 38400 ttyS0&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCqigot7sLRtN6olRssBuuYRY2iNfK5XekqhY_PHqMPHjKHI-oliEhRqYX3_1xq_dmweNPM76VrqC1xU5yCeVTCCV9ilPFlenGylqMaVmwqTu9VrLqDQTxBqH7hsFLHXuQ2xGp5z-gKPcs/s1600/linux_qemu.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;379&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCqigot7sLRtN6olRssBuuYRY2iNfK5XekqhY_PHqMPHjKHI-oliEhRqYX3_1xq_dmweNPM76VrqC1xU5yCeVTCCV9ilPFlenGylqMaVmwqTu9VrLqDQTxBqH7hsFLHXuQ2xGp5z-gKPcs/s640/linux_qemu.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;Personalizar entrada al sistema&lt;/b&gt;&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;$ &lt;span style=&quot;color: lime;&quot;&gt;sudo vi /etc/issue&lt;/span&gt;

&lt;span style=&quot;color: #ffd966;&quot;&gt;Bienvenido a Core Linux

Username &quot;tc&quot;, password no establecido&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
Editar /etc/securetty y permitir acceso al Puerto Serial ttyS0
&lt;br /&gt;
Descomentar la linea #ttyS0

&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;$ &lt;span style=&quot;color: lime;&quot;&gt;sudo vi ./etc/securetty&lt;/span&gt;

&lt;span style=&quot;color: #ffd966;&quot;&gt;ttyS0&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;b&gt;Pack File core.gz
&lt;/b&gt;&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;$ &lt;span style=&quot;color: lime;&quot;&gt;sudo su&lt;/span&gt;
$ &lt;span style=&quot;color: lime;&quot;&gt;cd /home/tc/temp/extract/&lt;/span&gt;

$ &lt;span style=&quot;color: lime;&quot;&gt;find | cpio -o -H newc | gzip -2 &amp;gt; /mnt/sda1/boot/core.gz&lt;/span&gt;

$ &lt;span style=&quot;color: lime;&quot;&gt;cd /home/tc&lt;/span&gt;
$ &lt;span style=&quot;color: lime;&quot;&gt;rm -rf /home/tc/temp&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;Guardar cambios de configuración de Linux Core&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Por default al reiniciar Linux Core no se guardan los cambios realizados, para guardar los cambios que se realicen se debe editar el scrpt /opt/bootlocal.sh el cual se ejecuta en cada inicio de la maquina virtual.

El único editor que viene instalado en Linux Core es el editor vi, para editar el script bootlocal.sh ingresar el siguiente comando.
&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;$ &lt;span style=&quot;color: lime;&quot;&gt;sudo vi /opt/bootlocal.sh&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
Por ejemplo si desea mantener la dirección IP para la interface eth0 con la direccion 10.1.1.1/24 y el nombre de host sea labs, añadir las siguientes líneas a este archivo.
&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;&lt;span style=&quot;color: lime;&quot;&gt;sudo hostname labs&lt;/span&gt;
&lt;span style=&quot;color: lime;&quot;&gt;sudo ifconfig eth0 10.1.1.1 netmask 255.255.255.0 up&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
Ejemplo de guardar cambios en los directorios.&lt;br /&gt;
sudo vi /opt/.filetool.lst

&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;&lt;span style=&quot;color: lime;&quot;&gt;/etc/inittab
/etc/issue
/etc/securetty&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
Una vez guardado los cambios en vi, se tendrá que guardar esta configuración mediante otro script llamado filetool.sh, para guardar cambios ejecutar el siguiente comando:&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;$ &lt;span style=&quot;color: lime;&quot;&gt;filetool.sh -b&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
Otros comandos utiles para utilizar.&lt;br /&gt;
&lt;br /&gt;
sudo reboot&lt;br /&gt;
sudo poweroff&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Apagar Core Linux Qemu y verificar&lt;/b&gt;.&lt;br /&gt;
&lt;br /&gt;
$ sudo poweroff&lt;br /&gt;
&lt;br /&gt;
Una vez apagado Core Linux Ingresar el siguiente comando para verificar
&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;$ &lt;span style=&quot;color: lime;&quot;&gt;qemu-system-i386w.exe -boot c -hda LinuxCore.img -serial telnet:0.0.0.0:3000,server,nowait&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
Una vez iniciado Core Linux ejecutar el siguiente comando desde consola.
&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;$ &lt;span style=&quot;color: lime;&quot;&gt;telnet localhost 3000&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiymua3j9Gmf69HWqEGGyGL1xi37SCLXLjxr9a7st0MGP3k9JfmNVNIo1IrroNXlq59eTDvWhsdNgmVmutuTNVCDRD6H5no9XPEckMeAgt0dAHdluGr3HNDtHWdfEkA8QNwNCT2COteZ15Z/s1600/qemu.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;403&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiymua3j9Gmf69HWqEGGyGL1xi37SCLXLjxr9a7st0MGP3k9JfmNVNIo1IrroNXlq59eTDvWhsdNgmVmutuTNVCDRD6H5no9XPEckMeAgt0dAHdluGr3HNDtHWdfEkA8QNwNCT2COteZ15Z/s640/qemu.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwuSmMMFIbhOZLLYOa8Pbcx5_sX50Wa2-xLGzzb3CqT8QORsaL4IEqA7FDS2UwQ3fJb61GGRFKwWWnmSoIL9qgSOHXjSYWj4zN8z-HDkGmSxUzQSHePOwBIVQHWdCcT1TfAFgOF-9Vq36x/s1600/qemu-gns3.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;424&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwuSmMMFIbhOZLLYOa8Pbcx5_sX50Wa2-xLGzzb3CqT8QORsaL4IEqA7FDS2UwQ3fJb61GGRFKwWWnmSoIL9qgSOHXjSYWj4zN8z-HDkGmSxUzQSHePOwBIVQHWdCcT1TfAFgOF-9Vq36x/s640/qemu-gns3.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://delfirosales.blogspot.com/feeds/1855544291982417860/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://delfirosales.blogspot.com/2015/11/linux-core-en-qemu.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/1855544291982417860'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/1855544291982417860'/><link rel='alternate' type='text/html' href='http://delfirosales.blogspot.com/2015/11/linux-core-en-qemu.html' title='Linux Core en Qemu'/><author><name>delfirosales</name><uri>http://www.blogger.com/profile/08332248815774447288</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCqigot7sLRtN6olRssBuuYRY2iNfK5XekqhY_PHqMPHjKHI-oliEhRqYX3_1xq_dmweNPM76VrqC1xU5yCeVTCCV9ilPFlenGylqMaVmwqTu9VrLqDQTxBqH7hsFLHXuQ2xGp5z-gKPcs/s72-c/linux_qemu.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4698096966682789219.post-8328818399124586637</id><published>2015-10-30T22:51:00.001-06:00</published><updated>2020-03-08T00:41:53.356-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco IOS"/><category scheme="http://www.blogger.com/atom/ns#" term="GNS3"/><category scheme="http://www.blogger.com/atom/ns#" term="NetFlow"/><category scheme="http://www.blogger.com/atom/ns#" term="Network Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Networking"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="SNMP"/><title type='text'>NetFlow - Monitorea los equipos de tu red</title><content type='html'>NetFlow es un protocolo de red desarrollado por Cisco Systems para recolectar información sobre tráfico IP. Netflow se ha convertido en un estándar de la industria para monitorización de tráfico de red, y actualmente está soportado para varias plataformas además de Cisco IOS y NXOS, como por ejemplo en dispositivos de fabricantes como Juniper, Enterasys Switches, y en sistemas operativos como Linux, FreeBSD, NetBSD y OpenBSD.&lt;br /&gt;
&lt;br /&gt;
Existen varias diferencias entre la versión de implementación del Netflow original, por lo que algunas versiones incorporan algunos datos más, pero en líneas generales el Netflow básico envía al menos la siguiente información.&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Dirección IP de origen.&lt;/li&gt;
&lt;li&gt;Dirección IP de destino.&lt;/li&gt;
&lt;li&gt;Puerto UDP o TCP de origen.&lt;/li&gt;
&lt;li&gt;Puerto UDP o TCP de destino.&lt;/li&gt;
&lt;li&gt;Protocolo IP.&lt;/li&gt;
&lt;li&gt;Interfaz (SNMP ifIndex).&lt;/li&gt;
&lt;li&gt;Tipo de servicio IP.&lt;/li&gt;
&lt;/ul&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQVDFspAFFx3GUs7SxyZJw8ky0u7fgZ-V2V6ZtHJ5Xx7__ryTBVQVm639mlmYPTtAKJl5NlIapUZoM1_8eAacPEvuixUkJyq1RF1gzW1howr_s7mOXNbD1wb6u30ssVRyL2-BOl6f3mjgE/s1600/NetFlow_GNS3.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;206&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQVDFspAFFx3GUs7SxyZJw8ky0u7fgZ-V2V6ZtHJ5Xx7__ryTBVQVm639mlmYPTtAKJl5NlIapUZoM1_8eAacPEvuixUkJyq1RF1gzW1howr_s7mOXNbD1wb6u30ssVRyL2-BOl6f3mjgE/s400/NetFlow_GNS3.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;R1#&lt;span style=&quot;color: lime;&quot;&gt;configure terminal&lt;/span&gt;
R1(config)#&lt;span style=&quot;color: lime;&quot;&gt;interface fastethernet0/0&lt;/span&gt;
R1(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;ip address 10.10.10.1 255.255.255.0&lt;/span&gt;
R1(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;no shutdown&lt;/span&gt;
R1(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;end&lt;/span&gt;
R1#&lt;/code&gt;&lt;/pre&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Configuración de SNMP y NetFlow

&lt;/span&gt;&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;R1(config)#&lt;span style=&quot;color: lime;&quot;&gt;ip access-list standard ACL&lt;/span&gt;
R1(config-std-nacl)#&lt;span style=&quot;color: lime;&quot;&gt;permit host 10.10.10.10&lt;/span&gt;
R1(config-std-nacl)#&lt;span style=&quot;color: lime;&quot;&gt;exit&lt;/span&gt;

R1(config)#&lt;span style=&quot;color: lime;&quot;&gt;hostname RouterLocal&lt;/span&gt;

RouterLocal(config)#&lt;span style=&quot;color: lime;&quot;&gt;snmp-server community secreto rw ACL&lt;/span&gt;
RouterLocal(config)#&lt;span style=&quot;color: lime;&quot;&gt;snmp-server location Mexico&lt;/span&gt;
RouterLocal(config)#&lt;span style=&quot;color: lime;&quot;&gt;snmp-server contact delfirosales&lt;/span&gt;

RouterLocal(config)#&lt;span style=&quot;color: lime;&quot;&gt;interface fastEthernet0/0&lt;/span&gt;
RouterLocal(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;ip flow egress &lt;/span&gt;
RouterLocal(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;ip flow ingress &lt;/span&gt;
RouterLocal(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;exit&lt;/span&gt;

RouterLocal(config)#&lt;span style=&quot;color: lime;&quot;&gt;ip flow-export version 9&lt;/span&gt;
RouterLocal(config)#&lt;span style=&quot;color: lime;&quot;&gt;ip flow-export destination 10.10.10.10 99&lt;/span&gt;
RouterLocal(config)#&lt;span style=&quot;color: lime;&quot;&gt;ip flow-export source fastEthernet0/0&lt;/span&gt;

RouterLocal(config)#&lt;span style=&quot;color: lime;&quot;&gt;service timestamps &lt;/span&gt;
RouterLocal(config)#&lt;span style=&quot;color: lime;&quot;&gt;logging 10.10.10.10&lt;/span&gt;
RouterLocal(config)#&lt;span style=&quot;color: lime;&quot;&gt;ip domain name delfirosales.com&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;b&gt;Comandos shows

&lt;/b&gt;&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;RouterLocal#&lt;span style=&quot;color: lime;&quot;&gt;show ip cache flow&lt;/span&gt;
RouterLocal#&lt;span style=&quot;color: lime;&quot;&gt;show ip flow export&lt;/span&gt;
RouterLocal#&lt;span style=&quot;color: lime;&quot;&gt;show ip flow interface&lt;/span&gt;
RouterLocal#&lt;span style=&quot;color: lime;&quot;&gt;debug ip flow export&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Configuración del NetFlow Collector&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Hay varios colectores disponibles, algunos licenciados y otros libres, dependiendo de lo que necesites, con cualquier collector te será muy fácil generar el reporte de los top 10 terminales que consumen ancho de banda. Para esta practica se utilizo &lt;i&gt;Real-Time NetFlow Analyzer&lt;/i&gt;&amp;nbsp;de SolarisWinds para concentrar la información, analizarla y generar resportes.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRgFOWXaRm5drvhJqVXurC0iBlYECowICK4gVOC7ME389AYHJknlfuhASA4xjWdKw-CaeWK4J3rtIYFBtgAPrshznQI20_nReQCfScEfNLibcU_GJg0BGQ_TAiY1Ywk4NLmJUoBJnCe_v8/s1600/NetFlow_Solaris.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;316&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRgFOWXaRm5drvhJqVXurC0iBlYECowICK4gVOC7ME389AYHJknlfuhASA4xjWdKw-CaeWK4J3rtIYFBtgAPrshznQI20_nReQCfScEfNLibcU_GJg0BGQ_TAiY1Ywk4NLmJUoBJnCe_v8/s400/NetFlow_Solaris.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPeXWOPV94cnCUl2mwjtFMkaCOaqtV1fThoaAjnEQDPshpBbvtCfnJNbuQlJU8Glnp1l5ozgoeWXEXPGqqW64DdWAFCKUmPs4xlRHTdzKPJvqTSD6Q94ktYSOIOUAd7iIgyLubk0PjCwNt/s1600/solaris_netflow.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;316&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPeXWOPV94cnCUl2mwjtFMkaCOaqtV1fThoaAjnEQDPshpBbvtCfnJNbuQlJU8Glnp1l5ozgoeWXEXPGqqW64DdWAFCKUmPs4xlRHTdzKPJvqTSD6Q94ktYSOIOUAd7iIgyLubk0PjCwNt/s400/solaris_netflow.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFYCJ0FMGdOO0LsUxnSXbQiU50o52eiRGlMZDkbszqnoDNMoLSpOk09kyRKJdQ8iJ7ZJ7JkRKjc0QzGPjh2MUYNPoz5FDuGSE9WnJ__Lz7uNbZxVY2Kzvn_UeZW9cE1ijOyiDYoj3SZHbJ/s1600/netflow_collector.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;252&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFYCJ0FMGdOO0LsUxnSXbQiU50o52eiRGlMZDkbszqnoDNMoLSpOk09kyRKJdQ8iJ7ZJ7JkRKjc0QzGPjh2MUYNPoz5FDuGSE9WnJ__Lz7uNbZxVY2Kzvn_UeZW9cE1ijOyiDYoj3SZHbJ/s400/netflow_collector.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://delfirosales.blogspot.com/feeds/8328818399124586637/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://delfirosales.blogspot.com/2015/10/netflow-monitorea-los-equipos-de-tu-red.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/8328818399124586637'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/8328818399124586637'/><link rel='alternate' type='text/html' href='http://delfirosales.blogspot.com/2015/10/netflow-monitorea-los-equipos-de-tu-red.html' title='NetFlow - Monitorea los equipos de tu red'/><author><name>delfirosales</name><uri>http://www.blogger.com/profile/08332248815774447288</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQVDFspAFFx3GUs7SxyZJw8ky0u7fgZ-V2V6ZtHJ5Xx7__ryTBVQVm639mlmYPTtAKJl5NlIapUZoM1_8eAacPEvuixUkJyq1RF1gzW1howr_s7mOXNbD1wb6u30ssVRyL2-BOl6f3mjgE/s72-c/NetFlow_GNS3.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4698096966682789219.post-1503198995825953699</id><published>2015-10-29T21:37:00.000-06:00</published><updated>2020-03-08T00:42:09.017-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="GNS3"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><title type='text'>Agregar un Adaptador Loopback en GNS3 con Windows 10</title><content type='html'>Se recomienda no utilizar el asistente de windows (hdwwiz.exe) para crear el adapatador de bluce invertido (loopback) ya que al querer utilizarlo en el GNS3 envia el siguiente error.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj08-vbIfLETR2JOimC4fVfXiRqmh8o_kD2INCTwFUoQ9XfEb-PyRYAs-4pRYKnfyxN488MG95ScMB5zD710nIIyIB4H6_skg02VNAgcWaQYxVQouwg1VA3hIbN883rFHlEjF60kfI4tE6J/s1600/gns3_loopback_windows10.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;184&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj08-vbIfLETR2JOimC4fVfXiRqmh8o_kD2INCTwFUoQ9XfEb-PyRYAs-4pRYKnfyxN488MG95ScMB5zD710nIIyIB4H6_skg02VNAgcWaQYxVQouwg1VA3hIbN883rFHlEjF60kfI4tE6J/s640/gns3_loopback_windows10.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;Error en GNS3.&lt;/i&gt;&lt;/div&gt;
&lt;pre&gt;&lt;code&gt;GNS3 management console.
Running GNS3 version 1.3.11 on Windows (64-bit) with Python 3.4.2 Qt 4.8.6.
Copyright (c) 2006-2015 GNS3 Technologies.

== &amp;gt; &lt;span style=&quot;color: red;&quot;&gt;Server error from 127.0.0.1:8000: R1: unable to create generic ethernet NIO&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
Para solucionar esto debemos utilizar la herramienta llamada Loopback Manager de GNS3, desde el cual podemos eliminar o agregar algun adaptador loopback. En el siguiente video se muestra la solución a este error.&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;center&quot;&gt;
&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; src=&quot;https://www.youtube.com/embed/yZe_RPdalIQ&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://delfirosales.blogspot.com/feeds/1503198995825953699/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://delfirosales.blogspot.com/2015/10/agregar-un-adaptador-loopback-en-gns3.html#comment-form' title='1 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/1503198995825953699'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/1503198995825953699'/><link rel='alternate' type='text/html' href='http://delfirosales.blogspot.com/2015/10/agregar-un-adaptador-loopback-en-gns3.html' title='Agregar un Adaptador Loopback en GNS3 con Windows 10'/><author><name>delfirosales</name><uri>http://www.blogger.com/profile/08332248815774447288</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj08-vbIfLETR2JOimC4fVfXiRqmh8o_kD2INCTwFUoQ9XfEb-PyRYAs-4pRYKnfyxN488MG95ScMB5zD710nIIyIB4H6_skg02VNAgcWaQYxVQouwg1VA3hIbN883rFHlEjF60kfI4tE6J/s72-c/gns3_loopback_windows10.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4698096966682789219.post-6133507022664697533</id><published>2015-10-26T16:53:00.000-06:00</published><updated>2020-03-08T00:42:53.355-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ASA"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><category scheme="http://www.blogger.com/atom/ns#" term="Firewall"/><category scheme="http://www.blogger.com/atom/ns#" term="GNS3"/><category scheme="http://www.blogger.com/atom/ns#" term="NAT"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Virtualización"/><title type='text'>Dynamic PAT en el Cisco ASA</title><content type='html'>El Cisco ASA soporta los siguientes tipos mas comunes de NAT.&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Dynamic NAT:&lt;/b&gt; Traducción de muchos a muchos. Traduce las direcciones de origen en las interfaces de seguridad más altos en un rango de direcciones o pool a una interface menos segura para las conexiones salientes.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Dynamic PAT:&lt;/b&gt; Traducción de muchos a uno. Usualmente un pool de direcciones internas a una interface externa.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Static NAT:&lt;/b&gt; Traducción de uno a uno, entre una dirección IP en una interface más segura y otra interface menos segura (ejemplo internet) para así poder acceder a los host de una interface de mayor seguridad (ejemplo servidores web en la DMZ) sin exponer la dirección IP real del host en la interface de mayor seguridad.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Twice NAT:&lt;/b&gt; Permite definir origen y destino desde una sola regla. Son procesadas de acuerdo a la secuencia que fueron insertadas (sin diferenciar estáticos de dinámicos). Puede Referenciar objetos de tipo “network” y “service”.&lt;/li&gt;
&lt;/ul&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Configuración Básica de NAT - ASA versión 8.4&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Practica en GNS3&lt;/b&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkdwVkgD5BXmnLxhxdb1srM0H5C2g00CBHfowW8zgpzXYpyCt4NfIXXRLdQ3PZaEVwa3naSyVOPcNWz_QTA5ktIVBXN9C9wHLUCAmkRkImwRHf0H-OGALF8J3ywoyJFRIjRY5qIFQTUZVy/s1600/Dynamic_PAT.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;300&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkdwVkgD5BXmnLxhxdb1srM0H5C2g00CBHfowW8zgpzXYpyCt4NfIXXRLdQ3PZaEVwa3naSyVOPcNWz_QTA5ktIVBXN9C9wHLUCAmkRkImwRHf0H-OGALF8J3ywoyJFRIjRY5qIFQTUZVy/s640/Dynamic_PAT.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;Topologia de red Dynamic PAT.&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Lo primero es configurar las tres interfaces en el ASA. El segmento de la red ISP está conectada a la interface gigabitEthernet3 con la etiqueta de outside y nivel de seguridad 0. La red interna está conectada a la interface gigabitEthernet1 con etiqueta de nombre inside y con nivel de seguridad 100. El segmento DMZ, donde reside el WebServer está conectado a la interface gigabitEthernet2 del ASA y etiquetado con el nombre de dmz con nivel de seguridad 50.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;Datos adicionales:&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;Interface inside:&lt;/b&gt; 192.168.0.1 y es default gateway para los host internos.&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;Interface dmz:&lt;/b&gt; 192.168.1.1 y es el default gateway para los host internos.&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;Interface outside:&lt;/b&gt; 198.51.100.100&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;Ruta de default:&lt;/b&gt; Next-Hop 198.50.100.101&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;Configuración de la Topología de Red&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
Configuración PC&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjz-Dr0COagavom83SPu9cQpkhk5zlCjYM-4a9mTSBiLJPYzLzGPC2vHUcvdm-ApEKOr2-KmfuFPk_JkUjFk7KxeZH7RHS4W6X3e-iVgeYh4eyFZG8-btjX3Ejwuf5H1SkA4fYf4oS4K54f/s1600/GNS3_PC_NAT.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjz-Dr0COagavom83SPu9cQpkhk5zlCjYM-4a9mTSBiLJPYzLzGPC2vHUcvdm-ApEKOr2-KmfuFPk_JkUjFk7KxeZH7RHS4W6X3e-iVgeYh4eyFZG8-btjX3Ejwuf5H1SkA4fYf4oS4K54f/s320/GNS3_PC_NAT.png&quot; width=&quot;287&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;Configuración WebServer&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;pre&gt;&lt;code&gt;&lt;span style=&quot;color: lime;&quot;&gt;!
interface FastEthernet0/0
 ip address 192.168.1.100 255.255.255.0
!         
ip route 0.0.0.0 0.0.0.0 192.168.1.1
!&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3AzVMudPXEEZ5gr_lINzRORM-RmkDwMV9pMJGXZdDqVzRO1otB-JmBcpOTX2McT4dm2uA_ttSazwdl9rPZZh-u2eXJdfQIY67Y8JATZOstqgKaPXYsnoRy7udicFkE6P89gEpVhFHq3Ez/s1600/ASA_NAT_GNS3.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;203&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3AzVMudPXEEZ5gr_lINzRORM-RmkDwMV9pMJGXZdDqVzRO1otB-JmBcpOTX2McT4dm2uA_ttSazwdl9rPZZh-u2eXJdfQIY67Y8JATZOstqgKaPXYsnoRy7udicFkE6P89gEpVhFHq3Ez/s640/ASA_NAT_GNS3.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;Configuración ISP
&lt;/b&gt;&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;&lt;span style=&quot;color: lime;&quot;&gt;!
interface FastEthernet0/0
 ip address 198.51.100.101 255.255.255.0
 duplex auto
 speed auto
!
interface Serial1/1
 ip address 100.1.1.2 255.255.255.252
 serial restart-delay 0
!
ip route 50.50.50.0 255.255.255.0 100.1.1.1
ip route 89.89.89.0 255.255.255.248 198.51.100.100
ip route 192.168.0.0 255.255.255.0 198.51.100.100
!&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;b&gt;Configuración R4
&lt;/b&gt;&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;&lt;span style=&quot;color: lime;&quot;&gt;!
interface FastEthernet0/0
 ip address 50.50.50.1 255.255.255.0
 duplex auto
 speed auto
!
interface Serial1/1
 ip address 100.1.1.1 255.255.255.252
 serial restart-delay 0
!
ip route 89.89.89.0 255.255.255.248 Serial1/1
ip route 198.51.100.0 255.255.255.0 Serial1/1
!&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;b&gt;Configuración R5
&lt;/b&gt;&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;&lt;span style=&quot;color: lime;&quot;&gt;!
interface FastEthernet0/0
 ip address 50.50.50.17 255.255.255.0
 duplex auto
 speed auto
!         
ip route 0.0.0.0 0.0.0.0 50.50.50.1
!
line vty 0 5
 password cisco
 login
!&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;b&gt;Configuración del ASA

&lt;/b&gt;&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;&lt;span style=&quot;color: lime;&quot;&gt;!
interface GigabitEthernet1
 nameif inside
 security-level 100
 ip address 192.168.0.1 255.255.255.0 
!
interface GigabitEthernet2
 nameif dmz
 security-level 50
 ip address 192.168.1.1 255.255.255.0 
!
interface GigabitEthernet3
 nameif outside
 security-level 0
 ip address 198.51.100.100 255.255.255.0 
!
route outside 0.0.0.0 0.0.0.0 198.51.100.101 1
!&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSTgnCuewncr2sKiNfJG1Xw8zFxRb34ta5BVx88OCZhiod0K0ZkZtF5TomJxMg8q7p1tywRhyzKqMKhnVE-ISZ4Jd0nBqHdKP3aM09Ys6vk1zfZX6mb4K1Dbls-fFfvnUA2hX1C0Kqcye9/s1600/NAT_CiscoASA.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSTgnCuewncr2sKiNfJG1Xw8zFxRb34ta5BVx88OCZhiod0K0ZkZtF5TomJxMg8q7p1tywRhyzKqMKhnVE-ISZ4Jd0nBqHdKP3aM09Ys6vk1zfZX6mb4K1Dbls-fFfvnUA2hX1C0Kqcye9/s640/NAT_CiscoASA.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Configuración de Dynamic PAT en el ASA

&lt;/span&gt;&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;CiscoASA# &lt;span style=&quot;color: lime;&quot;&gt;configure terminal&lt;/span&gt;
CiscoASA(config)# &lt;span style=&quot;color: lime;&quot;&gt;object network red-interna&lt;/span&gt;
CiscoASA(config-network-object)# &lt;span style=&quot;color: lime;&quot;&gt;subnet 192.168.0.0 255.255.255.0&lt;/span&gt;
CiscoASA(config-network-object)# &lt;span style=&quot;color: lime;&quot;&gt;nat (inside,outside) dynamic interface&lt;/span&gt;
CiscoASA(config-network-object)# &lt;span style=&quot;color: lime;&quot;&gt;exit&lt;/span&gt;

CiscoASA(config)# &lt;span style=&quot;color: lime;&quot;&gt;object network red-dmz&lt;/span&gt;
CiscoASA(config-network-object)# &lt;span style=&quot;color: lime;&quot;&gt;subnet 192.168.1.0 255.255.255.0&lt;/span&gt;
CiscoASA(config-network-object)# &lt;span style=&quot;color: lime;&quot;&gt;nat (dmz,outside) dynamic interface&lt;/span&gt;
CiscoASA(config-network-object)# &lt;span style=&quot;color: lime;&quot;&gt;end&lt;/span&gt;
CiscoASA#&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
&lt;b&gt;Verificación.&lt;/b&gt;&lt;br /&gt;
Para verificar que está funcionando, volvemos a intentar realizando un telnet a la ip 50.50.50.17.


&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidWBgVWO4iK7onSDHKEenHGYeuD8LPwKJFZm_22lTODg6TqZR0kJYgRra66DS0ulHcEP05Zn5mxHalEcb01btJbcc_crazOSFk0aX_cm5zl5uyOUXzzvEl_cxGBObMgjUDe_goiH2cn8nI/s1600/GNS3_ASA.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;289&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidWBgVWO4iK7onSDHKEenHGYeuD8LPwKJFZm_22lTODg6TqZR0kJYgRra66DS0ulHcEP05Zn5mxHalEcb01btJbcc_crazOSFk0aX_cm5zl5uyOUXzzvEl_cxGBObMgjUDe_goiH2cn8nI/s640/GNS3_ASA.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnO-ZIhLwE-aKmgVQBTCZa3xXhoex43nUj2q401_CXsL4Q36nP3nC3rR0pnTrbychr-XkMnVvEb2mYWVrZ3DhocN6z-U6RurAwDaiZrEoa-k0Sx3kdL46YncLSbh-xYMmJRxF6lbyNZfig/s1600/GNS3_ASA_Cisco.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;323&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnO-ZIhLwE-aKmgVQBTCZa3xXhoex43nUj2q401_CXsL4Q36nP3nC3rR0pnTrbychr-XkMnVvEb2mYWVrZ3DhocN6z-U6RurAwDaiZrEoa-k0Sx3kdL46YncLSbh-xYMmJRxF6lbyNZfig/s640/GNS3_ASA_Cisco.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Habilitando el debug ip icmp para verificar el comportamiento y algunos comandos shows.&lt;/div&gt;
&lt;pre&gt;&lt;code&gt;R5#&lt;span style=&quot;color: lime;&quot;&gt;debug ip icmp&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXyLUsdUvqGQipVSwxnExFJF4l3jg2OwKxPkKDnz4gKDOsUrVfgwx_00GPiV8WdsLdEXXOYscOWALVdwQKlMOFKsdyaiZgVALg4CKLlOXiOAhPyHdHkm6LtZ72OidPUsFPVGj5fkbGf-zz/s1600/CiscoASA_Debug.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;267&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXyLUsdUvqGQipVSwxnExFJF4l3jg2OwKxPkKDnz4gKDOsUrVfgwx_00GPiV8WdsLdEXXOYscOWALVdwQKlMOFKsdyaiZgVALg4CKLlOXiOAhPyHdHkm6LtZ72OidPUsFPVGj5fkbGf-zz/s640/CiscoASA_Debug.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;CiscoASA# &lt;span style=&quot;color: lime;&quot;&gt;show xlate&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjyWdTiViLr5mfSa0MokTQsRU4UhkZbaIhwcRT6cxdJa5t0DTj_Wu4tu-bATWM0zHt4viELSJx0vjbDfy14JD-NOtpaM3dvTMn5mqGHR9No_b2-Z70BUmBucr6SzgISZMNHMyF-rGbyinh/s1600/show_xlate.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;72&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjyWdTiViLr5mfSa0MokTQsRU4UhkZbaIhwcRT6cxdJa5t0DTj_Wu4tu-bATWM0zHt4viELSJx0vjbDfy14JD-NOtpaM3dvTMn5mqGHR9No_b2-Z70BUmBucr6SzgISZMNHMyF-rGbyinh/s640/show_xlate.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;CiscoASA# &lt;span style=&quot;color: lime;&quot;&gt;show nat detail&lt;/span&gt;
CiscoASA# &lt;span style=&quot;color: lime;&quot;&gt;show nat translated interface outside&lt;/span&gt;
CiscoASA# &lt;span style=&quot;color: lime;&quot;&gt;sh  local-host&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://delfirosales.blogspot.com/feeds/6133507022664697533/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://delfirosales.blogspot.com/2015/10/dynamic-pat-en-el-cisco-asa.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/6133507022664697533'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/6133507022664697533'/><link rel='alternate' type='text/html' href='http://delfirosales.blogspot.com/2015/10/dynamic-pat-en-el-cisco-asa.html' title='Dynamic PAT en el Cisco ASA'/><author><name>delfirosales</name><uri>http://www.blogger.com/profile/08332248815774447288</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkdwVkgD5BXmnLxhxdb1srM0H5C2g00CBHfowW8zgpzXYpyCt4NfIXXRLdQ3PZaEVwa3naSyVOPcNWz_QTA5ktIVBXN9C9wHLUCAmkRkImwRHf0H-OGALF8J3ywoyJFRIjRY5qIFQTUZVy/s72-c/Dynamic_PAT.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4698096966682789219.post-4758278141253101103</id><published>2015-10-19T22:57:00.000-05:00</published><updated>2020-03-24T13:43:09.747-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Wireless"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="WifiSlax"/><category scheme="http://www.blogger.com/atom/ns#" term="Wifiway"/><category scheme="http://www.blogger.com/atom/ns#" term="Wireless"/><title type='text'>Como crear un LiveUSB de Wifislax 4.11.1</title><content type='html'>&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
WifiSlax es una distro GNU/Linux que se ejecuta en modo Live, es decir;
no se instala físicamente en el disco duro, sino que se bootea desde un CD/DVD.
Está pensada y diseñada para la auditoria de seguridad y relacionada con la
seguridad informática en general e incluye una gran variedad de herramientas
listas para ser utilizar. Hoy vamos a ver cómo crear un LiveUSB a partir de la imagen
ISO.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;b&gt;Herramientas a Utilizar.&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;Imagen ISO de Wifislax.&lt;/li&gt;
&lt;li&gt;Memoria USB de al menos 2 Gigas.&lt;/li&gt;
&lt;/ul&gt;
El primero paso que tenemos que hacer es descargar la ISO de WifiSlax
desde su página oficial.&lt;o:p&gt;&lt;/o:p&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;b&gt;Nombre archivo: &lt;/b&gt;wifislax-4-11-1-final.iso 1.09 GB&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;b&gt;Hash MD5:&lt;/b&gt; dd00c7cca12ab7bb7de76aeb73fd2565&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;b&gt;Opciones de descarga:&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;ul&gt;
&lt;li&gt;&lt;i&gt;&lt;a href=&quot;https://tinyurl.com/ww8sezq&quot; target=&quot;_blank&quot;&gt;Wifislax &lt;/a&gt;&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;&lt;a href=&quot;https://tinyurl.com/ww8sezq&quot; target=&quot;_blank&quot;&gt;ISO FTP Principal&lt;/a&gt;&lt;/i&gt;&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;&lt;a href=&quot;https://tinyurl.com/ww8sezq&quot; target=&quot;_blank&quot;&gt;ISO FTP Hadrianweb&lt;/a&gt;&lt;/i&gt;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;
El paso siguiente es preparar la memoria USB que vamos a utilizar, debemos de formatear con formato
FAT32. Una vez descargado el Wifislax descomprimir el archivo de imagen ISO con
algún descompresor (ejemplo Winrar) o el que utilicen habitualmente. Al
terminar de descomprimir creara dos carpetas, una llamada &lt;b&gt;Boot &lt;/b&gt;y la otra &lt;b&gt;Wifislax&lt;/b&gt;. El siguiente paso será copiar estas dos carpetas a la memoria USB.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
Una vez copiados las dos carpetas en la memoria usb, iremos a la
carpeta Boot de la memoria usb y ejecutaremos el archivo llamado &lt;i&gt;Wifislax Boot
Installer&lt;/i&gt;.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiO0jnL64_qYIpEd0hJYuai7QBK2KT7-HllqhBzGXhEoKgJ4i5xuRymXEfWtVQ-KDGrOOxDNElJGd9KclpeF2TLCD-qKQY_UVKoO9Jjpl-SN4hhd8Ts7GD7V9-U-wMqyLZxIwZb-876WMPl/s1600/Wifislax.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;374&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiO0jnL64_qYIpEd0hJYuai7QBK2KT7-HllqhBzGXhEoKgJ4i5xuRymXEfWtVQ-KDGrOOxDNElJGd9KclpeF2TLCD-qKQY_UVKoO9Jjpl-SN4hhd8Ts7GD7V9-U-wMqyLZxIwZb-876WMPl/s640/Wifislax.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;i&gt;Wifislax Boot Installer.&lt;/i&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
Ejecutado el archivo nos aparecerá un mensaje de consola que nos pedirá
la confirmación, ingresamos la tecla &quot;s&quot; para confirmar.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXVc6d1mLzHD2azYEwUq2rffVjuV0Suv0dcraMBylSs-2Ukwe878Wu7uDG9XyjUl9qpBS1TzIgS_yz_DDcOAb9F3zPkzRzRFeQXImfixwS81lYt_Eq-FAHgz8p0Nkpv004pJAufy_HHQlu/s1600/Wifislax_USB.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;211&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXVc6d1mLzHD2azYEwUq2rffVjuV0Suv0dcraMBylSs-2Ukwe878Wu7uDG9XyjUl9qpBS1TzIgS_yz_DDcOAb9F3zPkzRzRFeQXImfixwS81lYt_Eq-FAHgz8p0Nkpv004pJAufy_HHQlu/s640/Wifislax_USB.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
Con esto ya podremos arrancar Wifislax desde el USB. Por si tienen
activado la UEFI es necesario desactivarlo desde la Bios para poder iniciar
desde la USB y también deben asegurarse iniciar desde la USB como primera opción
de arranque.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;o:p&gt;&lt;br /&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_0vuR2zNW7nwEoEArA0xb0GkFVsIJIsIHNR8NoIF-aH0_4cUDw7s96ebxac9Y9fYa1n6ZISxYLrtj9kc7oTfJs9HOoTxoh0d8XNl6q-O9Nw8HU__eGE3t0twJKVATzMopjY6jLkG1xwBh/s1600/Wifislax_4_11.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;473&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_0vuR2zNW7nwEoEArA0xb0GkFVsIJIsIHNR8NoIF-aH0_4cUDw7s96ebxac9Y9fYa1n6ZISxYLrtj9kc7oTfJs9HOoTxoh0d8XNl6q-O9Nw8HU__eGE3t0twJKVATzMopjY6jLkG1xwBh/s640/Wifislax_4_11.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;Al iniciar con el LiveUSB nos aparecerá un menú donde podremos elegir
varios modos de arranque, si tenemos menos de 4 GB de RAM seleccionamos
“Arrancar con kernel NORMAL” y si cuenta con más memoria de la mencionada sería
la opción de “Arrancar con kernel PAE”.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
A continuación, podemos elegir entre KDE y Xfce como entorno gráfico.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;o:p&gt;&lt;br /&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdvEfTbedwZYKOEKKhYXCaMZU6aTO5i_7i-oHUIDCZwC1BW-qEpIBRdqJha6crfsdZD0BeYLzx26xMdRBzax1EQ3O0SsuwupkyMXqXOcjZP7EgFe99wolBxyBwDKfLYR4OdBEdYW3GGd8N/s1600/Wifislax_wifi.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;480&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdvEfTbedwZYKOEKKhYXCaMZU6aTO5i_7i-oHUIDCZwC1BW-qEpIBRdqJha6crfsdZD0BeYLzx26xMdRBzax1EQ3O0SsuwupkyMXqXOcjZP7EgFe99wolBxyBwDKfLYR4OdBEdYW3GGd8N/s640/Wifislax_wifi.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
Esperamos un poco y listo ya podremos utilizar el Wifislax desde la
memoria USB.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJvxdbo9YCzeAsRpbGDK9f5cYcZdXq1OkmQDHgURpKUe8EJ8avyDtsUzYLpxI6ti3Ey0_bB6XGqgwrj1w9Bg9Jb0ojwGVsR3dHFYD7eP0r-vKdIT7uOJzT_NEVfiX5WqJNIZ6SQoyONxP8/s1600/Wifislax_2015.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;473&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJvxdbo9YCzeAsRpbGDK9f5cYcZdXq1OkmQDHgURpKUe8EJ8avyDtsUzYLpxI6ti3Ey0_bB6XGqgwrj1w9Bg9Jb0ojwGVsR3dHFYD7eP0r-vKdIT7uOJzT_NEVfiX5WqJNIZ6SQoyONxP8/s640/Wifislax_2015.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;br /&gt;
Usuario: root&lt;br /&gt;
Pass: toor&lt;/div&gt;
&lt;center&gt;
&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; src=&quot;https://www.youtube.com/embed/r1oIut3mlbQ&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;&lt;/center&gt;
</content><link rel='replies' type='application/atom+xml' href='http://delfirosales.blogspot.com/feeds/4758278141253101103/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://delfirosales.blogspot.com/2015/10/como-crear-un-liveusb-de-wifislax-4111.html#comment-form' title='14 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/4758278141253101103'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/4758278141253101103'/><link rel='alternate' type='text/html' href='http://delfirosales.blogspot.com/2015/10/como-crear-un-liveusb-de-wifislax-4111.html' title='Como crear un LiveUSB de Wifislax 4.11.1'/><author><name>delfirosales</name><uri>http://www.blogger.com/profile/08332248815774447288</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiO0jnL64_qYIpEd0hJYuai7QBK2KT7-HllqhBzGXhEoKgJ4i5xuRymXEfWtVQ-KDGrOOxDNElJGd9KclpeF2TLCD-qKQY_UVKoO9Jjpl-SN4hhd8Ts7GD7V9-U-wMqyLZxIwZb-876WMPl/s72-c/Wifislax.jpg" height="72" width="72"/><thr:total>14</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4698096966682789219.post-1200394738483913914</id><published>2015-10-19T03:17:00.000-05:00</published><updated>2020-03-08T00:44:01.978-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco IOS"/><category scheme="http://www.blogger.com/atom/ns#" term="GNS3"/><category scheme="http://www.blogger.com/atom/ns#" term="Network Security"/><category scheme="http://www.blogger.com/atom/ns#" term="NTP"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Syslog"/><title type='text'>Configuración de NTP con Autenticacion en un Router Cisco</title><content type='html'>&lt;div&gt;
NTP son las siglas de &lt;a href=&quot;https://en.wikipedia.org/wiki/Network_Time_Protocol&quot; target=&quot;_blank&quot;&gt;Network Time Protocol&lt;/a&gt; el cual nos permite sincronizar los dispositivos que funcionan en una red. Esto es muy importante ya que hay una gran variedad de servicios de red que se basan en la correcta sincronización de horarios de los servidores.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Para esto, el equipo realiza una referencia a un servidor de horario, que puede comparar y ajustar su fecha y la hora con otro servidor NTP publico en internet. El protocolo NTP utiliza el puerto UDP 123 para establecer la conexión con los servidores de horario. Es recomendable e importante configurar primero el protocolo NTP en los equipos de la nuestra red antes de implementar el protocolo estándar &lt;a href=&quot;https://delfirosales.blogspot.com/2015/10/syslog-server-kiwi-syslog-configuracion_17.html&quot; target=&quot;_blank&quot;&gt;Syslog &lt;/a&gt;centralizado.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPLdICvQknoTTKzsK0qVTCiUvJ5nSrLOAU5CWE8QUXUBcqnD60JHCfYPVenOLbiUiUhAyW_PARtVV_xsHq-ID33XO1JZUAuUNTqbvUVuy5ygeqNAg3VNlG7f9g2seyHcb2s5S_VuTLtxQE/s1600/NTP_Server_GNS3.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;193&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPLdICvQknoTTKzsK0qVTCiUvJ5nSrLOAU5CWE8QUXUBcqnD60JHCfYPVenOLbiUiUhAyW_PARtVV_xsHq-ID33XO1JZUAuUNTqbvUVuy5ygeqNAg3VNlG7f9g2seyHcb2s5S_VuTLtxQE/s640/NTP_Server_GNS3.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;NTP en GNS3.&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Configuración de un router Cisco para que sincronice la fecha y hora con un servidor de NTP público en internet.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Primero verificamos conectividad con el servidor NTP público en internet.&lt;/div&gt;
&lt;div&gt;
&lt;pre&gt;&lt;code&gt;R1#&lt;span style=&quot;color: lime;&quot;&gt;ping pool.ntp.org&lt;/span&gt;
Translating &quot;pool.ntp.org&quot;...domain server (192.168.137.1) [OK]
 
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 132.248.30.3, timeout is 2 seconds:
!!!.!
Success rate is 80 percent (4/5), round-trip min/avg/max = 76/98/120 ms
R1#&lt;/code&gt;&lt;/pre&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnyzix1z6I5CKjjHoIbGjvD9AXuUOIXjR1skKT5MV2qfTomSNUK5kyPaEDDkKnlJSWK0xELU1V28hulmdp4z78P0fpHhccUfh16HHtkx_AWL0loibxWerc9M4eb1IrT-DCqMID7UZe7iHU/s1600/NTP_Cisco.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;130&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnyzix1z6I5CKjjHoIbGjvD9AXuUOIXjR1skKT5MV2qfTomSNUK5kyPaEDDkKnlJSWK0xELU1V28hulmdp4z78P0fpHhccUfh16HHtkx_AWL0loibxWerc9M4eb1IrT-DCqMID7UZe7iHU/s640/NTP_Cisco.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;Verificando conexión.&lt;/i&gt;&lt;/div&gt;
&lt;b&gt;Configuración del Cliente NTP en R1.&lt;/b&gt;&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;R1#&lt;span style=&quot;color: lime;&quot;&gt;configure terminal&lt;/span&gt;
R1(config)#&lt;span style=&quot;color: lime;&quot;&gt;ntp server pool.ntp.org&lt;/span&gt;
Translating &quot;pool.ntp.org&quot;...domain server (192.168.137.1) [OK]
R1(config)#&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
&lt;b&gt;Verificación.&lt;/b&gt;&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;R1#&lt;span style=&quot;color: lime;&quot;&gt;show clock detail&lt;/span&gt;
&lt;span style=&quot;color: #ffd966;&quot;&gt;07:17:15.480 UTC Sun Mar 29 2015
Time source is NTP&lt;/span&gt;
 
R1#&lt;span style=&quot;color: lime;&quot;&gt;show ntp status&lt;/span&gt;
R1#&lt;span style=&quot;color: lime;&quot;&gt;show ntp associations&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqQiLqJxh1Jf-AYO72UgCrBNWhD29vBLGRcvZdiYQlXmk0of7nlVb4F0Dv5oN2dPzb5e0LXawgIur0p-cjnpqh9P_eQb0A7uA-0prPo_gvf2m9glc5m1ERtli2G_kQ979LHR5ypvUuPbOy/s1600/NTP_Server.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;228&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqQiLqJxh1Jf-AYO72UgCrBNWhD29vBLGRcvZdiYQlXmk0of7nlVb4F0Dv5oN2dPzb5e0LXawgIur0p-cjnpqh9P_eQb0A7uA-0prPo_gvf2m9glc5m1ERtli2G_kQ979LHR5ypvUuPbOy/s640/NTP_Server.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYARxFpDNwYreV0yrkrTrAisn4MPjeNcHHv3K98JZo-jv-VeHYlzc485A72jQ1IpZF5Z26uHM7SoEDGyFNSR1e3Ca7XVx5eWhq_m3KQZNE12oczuk3mrF2A-KxAG32qfePvBElvDY2REgA/s1600/show_NTP_cisco.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;180&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYARxFpDNwYreV0yrkrTrAisn4MPjeNcHHv3K98JZo-jv-VeHYlzc485A72jQ1IpZF5Z26uHM7SoEDGyFNSR1e3Ca7XVx5eWhq_m3KQZNE12oczuk3mrF2A-KxAG32qfePvBElvDY2REgA/s640/show_NTP_cisco.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;Verificación de NTP y comandos adicionales del estado de NTP&lt;/i&gt;.&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;Configuración en R2.&lt;/b&gt;&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;R2#&lt;span style=&quot;color: lime;&quot;&gt;configure terminal&lt;/span&gt;
R2(config)#&lt;span style=&quot;color: lime;&quot;&gt;ntp server 10.10.10.1&lt;/span&gt;
R2(config)#&lt;span style=&quot;color: lime;&quot;&gt;end&lt;/span&gt;
R2#
*Mar  1 00:14:15.523: %SYS-5-CONFIG_I: Configured from console by console
 
R2#&lt;span style=&quot;color: lime;&quot;&gt;show clock detail&lt;/span&gt;
&lt;span style=&quot;color: #ffd966;&quot;&gt;.07:22:29.536 UTC Sun Mar 29 2015
Time source is NTP&lt;/span&gt;
R2#&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;NTP con Autenticación&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;R1#&lt;span style=&quot;color: lime;&quot;&gt;configure terminal&lt;/span&gt;
R1(config)#&lt;span style=&quot;color: lime;&quot;&gt;ntp authentication-key 1 md5 cisco&lt;/span&gt;
R1(config)#&lt;span style=&quot;color: lime;&quot;&gt;ntp authenticate&lt;/span&gt;
R1(config)#&lt;span style=&quot;color: lime;&quot;&gt;ntp trusted-key 1&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;Configuración de R2 como cliente NTP con autenticación.&lt;/b&gt;&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;R2#&lt;span style=&quot;color: lime;&quot;&gt;configure terminal&lt;/span&gt;
R2(config)#&lt;span style=&quot;color: lime;&quot;&gt;ntp authenticate&lt;/span&gt;
R2(config)#&lt;span style=&quot;color: lime;&quot;&gt;ntp authentication-key 1 md5 cisco&lt;/span&gt;
R2(config)#&lt;span style=&quot;color: lime;&quot;&gt;ntp trusted-key 1&lt;/span&gt;
R2(config)#&lt;span style=&quot;color: lime;&quot;&gt;ntp server 10.10.10.1 key 1&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://delfirosales.blogspot.com/feeds/1200394738483913914/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://delfirosales.blogspot.com/2015/10/configuracion-de-ntp-con-autenticacion_58.html#comment-form' title='3 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/1200394738483913914'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/1200394738483913914'/><link rel='alternate' type='text/html' href='http://delfirosales.blogspot.com/2015/10/configuracion-de-ntp-con-autenticacion_58.html' title='Configuración de NTP con Autenticacion en un Router Cisco'/><author><name>delfirosales</name><uri>http://www.blogger.com/profile/08332248815774447288</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPLdICvQknoTTKzsK0qVTCiUvJ5nSrLOAU5CWE8QUXUBcqnD60JHCfYPVenOLbiUiUhAyW_PARtVV_xsHq-ID33XO1JZUAuUNTqbvUVuy5ygeqNAg3VNlG7f9g2seyHcb2s5S_VuTLtxQE/s72-c/NTP_Server_GNS3.png" height="72" width="72"/><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4698096966682789219.post-678963290192630463</id><published>2015-10-17T21:32:00.002-05:00</published><updated>2020-03-08T00:44:24.448-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco IOS"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco Router"/><category scheme="http://www.blogger.com/atom/ns#" term="GNS3"/><category scheme="http://www.blogger.com/atom/ns#" term="NTP"/><category scheme="http://www.blogger.com/atom/ns#" term="Syslog"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><title type='text'>Syslog Server: Kiwi Syslog - Configuracion de un router Cisco</title><content type='html'>Si queremos enviar los mensajes de log a un servidor de &lt;a href=&quot;https://delfirosales.blogspot.com/2015/10/syslog.html&quot; target=&quot;_blank&quot;&gt;Syslog&lt;/a&gt; (Syslog server) para poder administrar los logs del dispositivo de la red de una forma mas centralizada, podemos enviar los logs que se generan y para que los mensajes se envíen a un servidor.&lt;br /&gt;
&lt;br /&gt;
Es importante que antes de implementar el almacenamiento del log en un Syslog Server, todos los dispositivos de la red estén sincronizados con la misma hora, día y fecha. Para esto debemos de configurar el protocolo &lt;a href=&quot;https://es.wikipedia.org/wiki/Network_Time_Protocol&quot; target=&quot;_blank&quot;&gt;Network Time Protocol (NTP)&lt;/a&gt; en los switches y routers. Si no sabes realizar esta configuración podras consultar la siguiente publicación sobre NTP Server.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVLUlDpa3NJU8t9o47gSgulpz0l3rVabvrTuFxdbn4oAZ3VR2KQ098UhHD53drL88tQukuu314e2cu_3XM_f2qTYHh-ilIPdfNzkKEQ2OnWKRFLMN3iMOMG9Sz209llUCheeep4M4KnvPD/s1600/Syslog_Server.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;224&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVLUlDpa3NJU8t9o47gSgulpz0l3rVabvrTuFxdbn4oAZ3VR2KQ098UhHD53drL88tQukuu314e2cu_3XM_f2qTYHh-ilIPdfNzkKEQ2OnWKRFLMN3iMOMG9Sz209llUCheeep4M4KnvPD/s640/Syslog_Server.png&quot; title=&quot;Syslog Server&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;Syslog Server en GNS3.&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
Para configurar a que el router envíe los logs al Syslog Server debemos ingresar el siguiente comando, loggin host ip_servidor o el comando loggin ip_servidor, indicando la dirección IP del Servidor de Syslog.&lt;br /&gt;
&lt;br /&gt;
Router(config)#&lt;span style=&quot;color: #3d85c6;&quot;&gt;logging host 10.10.20.10&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
10.10.20.10 es el servidor de log.&lt;br /&gt;
&lt;br /&gt;
Podemos limitar la cantidad de mensajes enviados al servidor syslog, según la gravedad con el comando logging trap para establecer el nivel de detalle de la información que será registrada en el log. En este caso es de nivel 7 (debugging) que es el nivel más alto. &lt;a href=&quot;https://delfirosales.blogspot.com/2015/10/syslog.html&quot; target=&quot;_blank&quot;&gt;Niveles de mensajes de Syslog&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
R1(config)#&lt;span style=&quot;color: #3d85c6;&quot;&gt; &lt;span style=&quot;color: #6fa8dc;&quot;&gt;logging trap 7&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Otro comando importante es el &lt;i&gt;service timestamps&lt;/i&gt;, esta configuración es muy importante cuando estemos configurando el loggin porque con esto vamos habilitar que aparezcan los logs con la fecha y la hora en que se genera el log, por default no está habilitado y básicamente lo que hace es que si te pone el log pero no te dice a qué hora fue generado el log, entonces este comando es importante configurarlo en el router.&lt;br /&gt;
&lt;br /&gt;
Router(config)#&lt;span style=&quot;color: #3d85c6;&quot;&gt;service timestamps&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
La segunda parte del procedimiento es efectivamente instalar un software servidor de Syslog en una PC Windows o Linux. Kiwi Syslog Server para Windows es una excelente opción, fácil de instalar y configurar.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Verificacion&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;R1#&lt;span style=&quot;color: lime;&quot;&gt;debug ip icmp &lt;/span&gt;
ICMP packet debugging is on
R1#

R1#&lt;span style=&quot;color: lime;&quot;&gt;ping 10.10.20.10&lt;/span&gt;
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.10.20.10, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 4/50/148 ms
R1#

&lt;span style=&quot;color: #ffd966;&quot;&gt;00:09:28: ICMP: echo reply rcvd, src 10.10.20.10, dst 10.10.20.1
00:09:28: ICMP: echo reply rcvd, src 10.10.20.10, dst 10.10.20.1
00:09:28: ICMP: echo reply rcvd, src 10.10.20.10, dst 10.10.20.1
00:09:28: ICMP: echo reply rcvd, src 10.10.20.10, dst 10.10.20.1
00:09:28: ICMP: echo reply rcvd, src 10.10.20.10, dst 10.10.20.1&lt;/span&gt;

R1#conf t
R1(config)#exit
R1#
&lt;span style=&quot;color: #ffd966;&quot;&gt;*Mar  1 00:09:35.999: %SYS-5-CONFIG_I: Configured from console by console&lt;/span&gt;
R1#&lt;/code&gt;&lt;/pre&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhn8oHtvwUBGrN9e9kVaWd-oO9YkbemOPwUkdcxp59XH0g0-gtgMdfsNrsJtzh5yBZ8y9KmrilxYifHsbffiYvtOfchGMYx3eDic6eJGxmG8EZ7huMlxSxx0QildPzSaoX_KMmDLrIoI63f/s1600/Syslog_Server_GNS3.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;355&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhn8oHtvwUBGrN9e9kVaWd-oO9YkbemOPwUkdcxp59XH0g0-gtgMdfsNrsJtzh5yBZ8y9KmrilxYifHsbffiYvtOfchGMYx3eDic6eJGxmG8EZ7huMlxSxx0QildPzSaoX_KMmDLrIoI63f/s640/Syslog_Server_GNS3.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEissw6Dd2ZoNjC3CZUdLFYLYpO1ilxFQLia9y5lj1bX864C-6X0irLqi8VYxfONGU0Wy0ScETVBRS4vaiUvV9RBk9P91IIPahi53tdf_RBbrpS_6v_gFZR2eER3N3EFXhKetA_3P4DQU994/s1600/Kiwi_Syslog.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;272&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEissw6Dd2ZoNjC3CZUdLFYLYpO1ilxFQLia9y5lj1bX864C-6X0irLqi8VYxfONGU0Wy0ScETVBRS4vaiUvV9RBk9P91IIPahi53tdf_RBbrpS_6v_gFZR2eER3N3EFXhKetA_3P4DQU994/s640/Kiwi_Syslog.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;Kiwi Syslog en Windows.&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
Así de simple podemos centralizar la administración del log en nuestra red y mejorar significativamente la respuesta a un posible incidente o ataque de seguridad que tengamos que enfrentar.</content><link rel='replies' type='application/atom+xml' href='http://delfirosales.blogspot.com/feeds/678963290192630463/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://delfirosales.blogspot.com/2015/10/syslog-server-kiwi-syslog-configuracion_17.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/678963290192630463'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/678963290192630463'/><link rel='alternate' type='text/html' href='http://delfirosales.blogspot.com/2015/10/syslog-server-kiwi-syslog-configuracion_17.html' title='Syslog Server: Kiwi Syslog - Configuracion de un router Cisco'/><author><name>delfirosales</name><uri>http://www.blogger.com/profile/08332248815774447288</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVLUlDpa3NJU8t9o47gSgulpz0l3rVabvrTuFxdbn4oAZ3VR2KQ098UhHD53drL88tQukuu314e2cu_3XM_f2qTYHh-ilIPdfNzkKEQ2OnWKRFLMN3iMOMG9Sz209llUCheeep4M4KnvPD/s72-c/Syslog_Server.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4698096966682789219.post-2007111779614756400</id><published>2015-10-17T02:30:00.001-05:00</published><updated>2020-03-08T00:44:46.388-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco IOS"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco Router"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco Switch"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Syslog"/><title type='text'>Syslog</title><content type='html'>El Syslog es enviar mensajes de información que puede ser a un router o a un servidor externo.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;¿Para que nos va servir el Syslog?&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
El Syslog nos puede servir para sabes cual es la naturaleza de alguna ataque o amenaza de seguridad. También nos sirve de bastante para Troubleshooting y podemos correlacionar cualquier tipo de eventos, como por ejemplo.&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Un intento de acceso con contraseña equivocada&lt;/li&gt;
&lt;li&gt;Un acceso correcto al sistema&lt;/li&gt;
&lt;li&gt;Anomalías: variaciones en el funcionamiento normal del sistema&lt;/li&gt;
&lt;li&gt;Alertas cuando ocurre alguna condición especial&lt;/li&gt;
&lt;li&gt;Información sobre las actividades del sistema operativo&lt;/li&gt;
&lt;li&gt;Errores del hardware o el software&lt;/li&gt;
&lt;/ul&gt;
Por lo tanto, es vital la administración adecuada de esta información para mantener corriendo de manera estable una red y principalmente para poder mitigar las amenazas de seguridad a las que nos podamos ver expuestos.&lt;br /&gt;
&lt;div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Los logs también se pueden enviar a la consola (por default)&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;Al Logging Buffer del Router (por default)&lt;/li&gt;
&lt;li&gt;A las Líneas VTY (Ingresando el comando terminal monitor)&lt;/li&gt;
&lt;li&gt;A un Servidor de SNMP como puede ser un Cisco Works&lt;/li&gt;
&lt;li&gt;A un servidor de Syslog.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;
Existe un Cliente y Servidor de Syslog.&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;El Syslog Client es el que envía los logs, es decir un router puede ser un cliente de Syslog.&lt;/li&gt;
&lt;li&gt;Servidor Syslog es un aquel servidor que guarda todos los logs.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLfa346F27u50c9Q3DfASlQfKUoWuPSU9BEdCBbv3UEZ7PQ9xenjy05Z5G806C7NzDQ9sf_WaqnzAKaR8ExDcntAMzfDVVJ3BGdaWupS2Jb997XsFX1FkvWnndGLGcAeCY9OcjRbGv_jbS/s1600/Syslog_level.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;206&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLfa346F27u50c9Q3DfASlQfKUoWuPSU9BEdCBbv3UEZ7PQ9xenjy05Z5G806C7NzDQ9sf_WaqnzAKaR8ExDcntAMzfDVVJ3BGdaWupS2Jb997XsFX1FkvWnndGLGcAeCY9OcjRbGv_jbS/s400/Syslog_level.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;Syslog Levels.&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
La figura anterior muestra los niveles de Syslog que se tienen.&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Nivel 0 son las Emergencias:&lt;/b&gt; Es cuando hay un error severo que hace que el sistema no sea usable&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Nivel 1 son Alertas:&lt;/b&gt; Significa que requieren atención inmediata.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Nivel 2 Critica:&lt;/b&gt; Requiere atención para prevenir que haya interrupción en el servicio.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Nivel 3 Errores:&lt;/b&gt; Condiciones de errores en el Sistema.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Nivel 4 Warnings:&lt;/b&gt; Es cuando algo en específico falla.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Nivel 5 Notificaciones:&lt;/b&gt; Alerta sobre los cambios de estados.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Nivel 6 Información:&lt;/b&gt; Información detallada acerca de la operación normal.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Nivel 7 Debugging:&lt;/b&gt; Información detallada, comandos de debug, usualmente puede servir simplemente para troubleshooting.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;
Es importante saber que existen estos 8 niveles, que significa cada uno y como se llaman.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
Iniciando un router se presentan varios log, ejemplo.&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;&lt;span style=&quot;color: lime;&quot;&gt;Press RETURN to get started!
*Mar  1 00:00:07.059: %LINEPROTO-&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;color: #ffd966;&quot;&gt;5&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;color: lime;&quot;&gt;-UPDOWN: Line protocol on Interface VoIP-Null0, changed state to up&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
5 = Nivel 5

&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;&lt;span style=&quot;color: lime;&quot;&gt;*Mar  1 00:00:07.059: %LINK-&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;color: #ffd966;&quot;&gt;3&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;color: lime;&quot;&gt;-UPDOWN: Interface FastEthernet0/0, changed state to up
*Mar  1 00:00:07.063: %LINK-&lt;/span&gt;&lt;b style=&quot;color: lime;&quot;&gt;3&lt;/b&gt;&lt;span style=&quot;color: lime;&quot;&gt;-UPDOWN: Interface FastEthernet0/1, changed state to up&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
3 = Nivel 3

&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;&lt;span style=&quot;color: lime;&quot;&gt;*Mar  1 00:00:07.287: %SYS-&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;color: #ffd966;&quot;&gt;5&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;color: lime;&quot;&gt;-CONFIG_I: Configured from memory by console
*Mar  1 00:00:07.875: %SYS-&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;color: #ffd966;&quot;&gt;5&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;color: lime;&quot;&gt;-RESTART: System restarted --
Cisco IOS Software, 3600 Software (C3660-IK9O3S-M), Version 12.4(13b), RELEASE SOFTWARE (fc3)
Technical Support: https://www.cisco.com/techsupport
Copyright (c) 1986-2007 by Cisco Systems, Inc.
Compiled Tue 24-Apr-07 21:18 by prod_rel_team
*Mar  1 00:00:07.887: %SNMP-5-COLDSTART: SNMP agent on host Router is undergoing a cold start
*Mar  1 00:00:08.059: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to down
*Mar  1 00:00:09.299: %LINK-5-CHANGED: Interface FastEthernet0/1, changed state to administratively down&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
En el IOS de Cisco por default está configurado el log en la consola.

&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://delfirosales.blogspot.com/feeds/2007111779614756400/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://delfirosales.blogspot.com/2015/10/syslog.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/2007111779614756400'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/2007111779614756400'/><link rel='alternate' type='text/html' href='http://delfirosales.blogspot.com/2015/10/syslog.html' title='Syslog'/><author><name>delfirosales</name><uri>http://www.blogger.com/profile/08332248815774447288</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLfa346F27u50c9Q3DfASlQfKUoWuPSU9BEdCBbv3UEZ7PQ9xenjy05Z5G806C7NzDQ9sf_WaqnzAKaR8ExDcntAMzfDVVJ3BGdaWupS2Jb997XsFX1FkvWnndGLGcAeCY9OcjRbGv_jbS/s72-c/Syslog_level.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4698096966682789219.post-5707063795004312873</id><published>2015-03-03T13:34:00.000-06:00</published><updated>2020-03-08T00:45:00.581-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ASA"/><category scheme="http://www.blogger.com/atom/ns#" term="DHCP"/><category scheme="http://www.blogger.com/atom/ns#" term="GNS3"/><category scheme="http://www.blogger.com/atom/ns#" term="Network Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>DHCP Relay en el Cisco ASA</title><content type='html'>Las comunicaciones DHCP se realizan por broadcast y los mensajes broadcast no pasan a través de los routers. Por consiguiente, tanto las peticiones DHCP como las respuestas de los servidores no producen ninguna acción fuera de la red local. La solución mas fácil consiste evidentemente en poner un servidor DHCP en cada segmento de la red donde sean necesarios. Sin embargo, si se desea utilizar solo un servidor para varias redes, existe una solución , los agentes DHCP relay.&lt;br /&gt;
&lt;br /&gt;
Un DHCP relay recibe las solicitudes de los clientes en formato de broadcast y las reenvía como unicast a la dirección del servidor DHCP.&lt;br /&gt;
&lt;br /&gt;
Los mensajes unicast pueden pasar por los routers, llegando la información a buen puerto. En seguida, el servidor DHCP responderá con un mensaje en modo unicast con el agente relay como destino y este, a su vez enviara un mensaje broadcast que recibirá el equipo cliente. El cliente DHCP no sabrá que esta tratando con un agente relay, si no que piensa que hay un servidor DHCP real en su segmento.&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Habilitar la función DHCP relay en el Cisco ASA.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;b&gt;Identificar el servidor DHCP&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
ciscoasa(config)# &lt;i&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&lt;b&gt;dhcprelay server ip-address interface&lt;/b&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Si se tiene más de un servidor DHCP, puede repetir este comando para definir hasta cuatro servidores diferentes. En este caso, las solicitudes DHCP se transmiten a cada uno de los servidores de forma simultánea.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;Identificar los clientes DHCP&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
ciscoasa(config)# &lt;span style=&quot;color: #444444;&quot;&gt;&lt;b&gt;&lt;i&gt;dhcprelay enable interface&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
La palabra clave setroute instala automáticamente una ruta por defecto en el dispositivo.&lt;/div&gt;
&lt;div&gt;
ciscoasa(config)# &lt;span style=&quot;color: #444444;&quot;&gt;&lt;i&gt;&lt;b&gt;dhcprelay setroute interface&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZnHocvQvYyj06pxwptTVy6pCrtOBGxpftq-Sp2MRkpSrRw4Qcz1ZgJBxz4thwqarK_IoqdO4_ic7OgddCAaAnjChIR9_hZrpbMpTmCFgV6r2WpItyFUQ0q9_Y0EwOoDix4QdeTmd1CbKz/s1600/DHCP_Relay_Cisco_ASA.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;264&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZnHocvQvYyj06pxwptTVy6pCrtOBGxpftq-Sp2MRkpSrRw4Qcz1ZgJBxz4thwqarK_IoqdO4_ic7OgddCAaAnjChIR9_hZrpbMpTmCFgV6r2WpItyFUQ0q9_Y0EwOoDix4QdeTmd1CbKz/s1600/DHCP_Relay_Cisco_ASA.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;pre&gt;&lt;code&gt;CiscoASA(config)# &lt;span style=&quot;color: lime;&quot;&gt;dhcprelay server 20.1.1.2 DMZ&lt;/span&gt;
CiscoASA(config)# &lt;span style=&quot;color: lime;&quot;&gt;dhcprelay enable inside&lt;/span&gt;
CiscoASA(config)# &lt;span style=&quot;color: lime;&quot;&gt;dhcprelay setroute inside&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Configurar la interface inside de los host para obtener la dirección IP por DHCP.&lt;/div&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;pre&gt;&lt;code&gt;R1(config)#&lt;span style=&quot;color: lime;&quot;&gt;interface fastEthernet0/0&lt;/span&gt;
R1(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;ip address dhcp&lt;/span&gt; 
R1(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;no shutdown &lt;/span&gt;
R1(config-if)#end
&lt;span style=&quot;color: #f1c232;&quot;&gt;Interface FastEthernet0/0 assigned DHCP address 192.168.1.2, mask 255.255.255.0
&lt;/span&gt;R1#
R1#show ip int brief
Interface                  IP-Address      OK? Method Status                Protocol
&lt;span style=&quot;color: #f1c232;&quot;&gt;FastEthernet0/0            192.168.1.2     YES DHCP   up                    up      
&lt;/span&gt;FastEthernet0/1            unassigned      YES unset  administratively down down   &lt;/code&gt;&lt;/pre&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://delfirosales.blogspot.com/feeds/5707063795004312873/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://delfirosales.blogspot.com/2015/03/dhcp-relay-en-el-cisco-asa.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/5707063795004312873'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/5707063795004312873'/><link rel='alternate' type='text/html' href='http://delfirosales.blogspot.com/2015/03/dhcp-relay-en-el-cisco-asa.html' title='DHCP Relay en el Cisco ASA'/><author><name>delfirosales</name><uri>http://www.blogger.com/profile/08332248815774447288</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZnHocvQvYyj06pxwptTVy6pCrtOBGxpftq-Sp2MRkpSrRw4Qcz1ZgJBxz4thwqarK_IoqdO4_ic7OgddCAaAnjChIR9_hZrpbMpTmCFgV6r2WpItyFUQ0q9_Y0EwOoDix4QdeTmd1CbKz/s72-c/DHCP_Relay_Cisco_ASA.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4698096966682789219.post-1766428606486884485</id><published>2015-02-21T16:24:00.000-06:00</published><updated>2020-03-08T00:45:28.013-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="GNS3"/><category scheme="http://www.blogger.com/atom/ns#" term="Juniper"/><category scheme="http://www.blogger.com/atom/ns#" term="JunOS"/><title type='text'>JunOS - Comandos Basicos</title><content type='html'>Ingresar al modo de &lt;i&gt;“Operational Mode”&lt;/i&gt;.&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;root@% &lt;span style=&quot;color: lime;&quot;&gt;cli&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
Es este modo (Operational Mode) no vas a poder realizar ningún tipo de configuración en particular, se usa solo para ver configuraciones y monitorear el estado del equipo.

Para ingresar a &lt;i&gt;“Configuration Mode”&lt;/i&gt;.&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;root&amp;gt; &lt;span style=&quot;color: lime;&quot;&gt;configure&lt;/span&gt;
Entering configuration mode
root#&lt;/code&gt;&lt;/pre&gt;
Ahora el prompt se muestra con un # al final, arriba podes ver entre corchetes tu ubicación (sumamente útil). Para ejecutar el equivalente a “show run” de CISCO existen dos opciones, desde &lt;i&gt;“Operational mode”&lt;/i&gt;.&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;root&amp;gt; &lt;span style=&quot;color: lime;&quot;&gt;show configuration&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
Y desde “Configuration Mode”.&lt;br /&gt;
root# &lt;span style=&quot;color: #444444;&quot;&gt;&lt;b&gt;run show configuration&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Establecer una password para el usuario root:&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;root# &lt;span style=&quot;color: lime;&quot;&gt;set system root-authentication plain-text-password&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
Configurar Hostname&lt;br /&gt;
root# &lt;span style=&quot;color: #444444;&quot;&gt;&lt;b&gt;set system host-name Juniper&amp;nbsp;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Mostrar interfaces o similar a show ip interfaces brief de Cisco.&lt;br /&gt;
root@Juniper# &lt;span style=&quot;color: #444444;&quot;&gt;&lt;b&gt;run show interfaces terse


&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_urtWy1Nn6Q2VFgI6e2UdNOM8WlW64U5C5t0aychHJTxwut9CVHodrSVoaJa3uDsoVg8u6pJ2srPSLBKTcc-1XoW6-5VLowewHBbUd_rOuyHt3PK6Gnov_bXalmQgG_4Ql4KAtTShCk7n/s1600/Comandos_Junos.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;378&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_urtWy1Nn6Q2VFgI6e2UdNOM8WlW64U5C5t0aychHJTxwut9CVHodrSVoaJa3uDsoVg8u6pJ2srPSLBKTcc-1XoW6-5VLowewHBbUd_rOuyHt3PK6Gnov_bXalmQgG_4Ql4KAtTShCk7n/s1600/Comandos_Junos.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
Asignar una dirección IP a la interface em0&lt;br /&gt;
root@Juniper# &lt;span style=&quot;color: #444444;&quot;&gt;&lt;b&gt;set interfaces em0 unit 0 family inet address 192.168.10.1/30&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Mostrar configuracion&lt;br /&gt;
root@Juniper# &lt;span style=&quot;color: #444444;&quot;&gt;&lt;b&gt;show&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Borrar alguna linea de configuracion&lt;br /&gt;
root@Juniper# &lt;span style=&quot;color: #444444;&quot;&gt;&lt;b&gt;delete interfaces em0 unit 0 family inet address 192.168.10/30&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Guardar configuración&lt;br /&gt;
root@Juniper# &lt;span style=&quot;color: #444444;&quot;&gt;&lt;b&gt;commit&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjTVi2ZYeEdrytH5Bd9d88Q5jqf3sq96fPXQrh4uAp43d18GAJzgEpiOW2eJRgkqacmB5j_q0BoY_9hihH7rte8vMg0soou0lQvUwPcgzMRIRP5VbRLVDvH5q-YwiPwuDUmELKCvcjrrd9/s1600/junos.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;378&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjTVi2ZYeEdrytH5Bd9d88Q5jqf3sq96fPXQrh4uAp43d18GAJzgEpiOW2eJRgkqacmB5j_q0BoY_9hihH7rte8vMg0soou0lQvUwPcgzMRIRP5VbRLVDvH5q-YwiPwuDUmELKCvcjrrd9/s1600/junos.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Prueba de conectividad con un Ping&lt;br /&gt;
root@Juniper# &lt;span style=&quot;color: #444444;&quot;&gt;&lt;b&gt;run ping 192.168.10.2&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Habilitar Telnet&lt;br /&gt;
root@Juniper# &lt;span style=&quot;color: #444444;&quot;&gt;&lt;b&gt;set system services telnet&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Crear un Usuario y contraseña con class “super-user”:&lt;br /&gt;
root@Juniper# &lt;span style=&quot;color: #444444;&quot;&gt;&lt;b&gt;set system login user delfirosales class super-user authentication plain-text-password&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Guardar cambios con commit&lt;br /&gt;
&lt;br /&gt;
Dejar todo a los valores de fábrica&lt;br /&gt;
root@Juniper# &lt;span style=&quot;color: #444444;&quot;&gt;&lt;b&gt;load factory-default&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
root@Juniper# &lt;span style=&quot;color: #444444;&quot;&gt;&lt;b&gt;set system root-authentication plain-text-password&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
root@Juniper# &lt;span style=&quot;color: #444444;&quot;&gt;&lt;b&gt;commit&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitnZbl-quKDOvLVLS6C2ZuWot7Xm4IZtzz39CLoM_FqzaRjqMOfUBtHq5OEtgnPX5oYhf9u5-Hlu1JhuSv13Rzarx5I4Zvwz8FSr5R-pXXZybE5OKOxhdUt2nqQ6VyWQIjAtSDHX28X8p_/s1600/Junos_GNS3.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;339&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitnZbl-quKDOvLVLS6C2ZuWot7Xm4IZtzz39CLoM_FqzaRjqMOfUBtHq5OEtgnPX5oYhf9u5-Hlu1JhuSv13Rzarx5I4Zvwz8FSr5R-pXXZybE5OKOxhdUt2nqQ6VyWQIjAtSDHX28X8p_/s1600/Junos_GNS3.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://delfirosales.blogspot.com/feeds/1766428606486884485/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://delfirosales.blogspot.com/2015/02/junos-comandos-basicos.html#comment-form' title='5 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/1766428606486884485'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/1766428606486884485'/><link rel='alternate' type='text/html' href='http://delfirosales.blogspot.com/2015/02/junos-comandos-basicos.html' title='JunOS - Comandos Basicos'/><author><name>delfirosales</name><uri>http://www.blogger.com/profile/08332248815774447288</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_urtWy1Nn6Q2VFgI6e2UdNOM8WlW64U5C5t0aychHJTxwut9CVHodrSVoaJa3uDsoVg8u6pJ2srPSLBKTcc-1XoW6-5VLowewHBbUd_rOuyHt3PK6Gnov_bXalmQgG_4Ql4KAtTShCk7n/s72-c/Comandos_Junos.png" height="72" width="72"/><thr:total>5</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4698096966682789219.post-4529590580770761829</id><published>2015-02-21T15:58:00.000-06:00</published><updated>2020-03-08T00:46:02.225-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ASA"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><category scheme="http://www.blogger.com/atom/ns#" term="DHCP"/><category scheme="http://www.blogger.com/atom/ns#" term="Firewall"/><category scheme="http://www.blogger.com/atom/ns#" term="GNS3"/><category scheme="http://www.blogger.com/atom/ns#" term="Network Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Servidor DHCP en el Cisco ASA</title><content type='html'>&lt;div class=&quot;MsoNormalCxSpFirst&quot; style=&quot;text-align: justify;&quot;&gt;
El
Cisco ASA puede actuar como un servidor DHCP para distribuir dirección IP a los
hosts finales que ejecutan servicios de un cliente DHCP. Esta característica es
importante si usted tiene una pequeña sucursal que no posee un servidor DHCP
dedicado.&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpFirst&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7M_X9_NFI8ozSPxhaaK9QB67n9V3shPfC4PONLlyPEH5MFmkbTfQZzNoqafhErf4T6MLLMeRBZdnRXTA5ZV0f6njqGBRBTEAs0ivZuPWOebiWIDHTfA99tHPEW1RX5c8yCMtDr8Wq8z6i/s1600/ASA_DHCP.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7M_X9_NFI8ozSPxhaaK9QB67n9V3shPfC4PONLlyPEH5MFmkbTfQZzNoqafhErf4T6MLLMeRBZdnRXTA5ZV0f6njqGBRBTEAs0ivZuPWOebiWIDHTfA99tHPEW1RX5c8yCMtDr8Wq8z6i/s1600/ASA_DHCP.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpFirst&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpFirst&quot; style=&quot;text-align: justify;&quot;&gt;
Para configurar el servidor DHCP a través de ASDM, ir a &lt;b&gt;&lt;i&gt;Configuración
&amp;gt; Device Management &amp;gt; DHCP &amp;gt; DHCP server&lt;/i&gt;&lt;/b&gt; y seleccione la
interface en la que desea habilitar los servicios DHCP.&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpFirst&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjs55c0cL-Nkk3ypQNDV4o_Nx6flIHpdu8kjz_nC_hUSgQvGvHEwgphRXdRJ0uSkn-Jg_H7GBsmPb_ODgX0zvk_mkjKVgkHsUIjhO4lC0cay1Kr8GAdA1d8WfVj56-9IUOXxJr_LrEF01OX/s1600/Cisco_ASA_DHCP.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;440&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjs55c0cL-Nkk3ypQNDV4o_Nx6flIHpdu8kjz_nC_hUSgQvGvHEwgphRXdRJ0uSkn-Jg_H7GBsmPb_ODgX0zvk_mkjKVgkHsUIjhO4lC0cay1Kr8GAdA1d8WfVj56-9IUOXxJr_LrEF01OX/s1600/Cisco_ASA_DHCP.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidV5fVcKxaITAImQ8Dc3QFfuC_tSVjRg1bRYlDCROOqTpMKRCVe6EaYix1HWRPiSPVqbCzWqfN-ERs8LZEaf135iPycbb17I42qbhj1QTDSrJwb0WYJ_sqlgtKT3-yU0JS2M9XWJCYNaO9/s1600/ASA_Cisco.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;404&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidV5fVcKxaITAImQ8Dc3QFfuC_tSVjRg1bRYlDCROOqTpMKRCVe6EaYix1HWRPiSPVqbCzWqfN-ERs8LZEaf135iPycbb17I42qbhj1QTDSrJwb0WYJ_sqlgtKT3-yU0JS2M9XWJCYNaO9/s1600/ASA_Cisco.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Para configurar un ASA como un servidor DHCP, desde la línea de comandos.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Configuramos la interface inside.&lt;/b&gt;&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;CiscoASA# &lt;span style=&quot;color: lime;&quot;&gt;configure terminal&lt;/span&gt;
CiscoASA(config)# &lt;span style=&quot;color: lime;&quot;&gt;interface gigabitEthernet0&lt;/span&gt; 
CiscoASA(config-if)# &lt;span style=&quot;color: lime;&quot;&gt;nameif inside&lt;/span&gt;
&lt;i&gt;&lt;span style=&quot;color: #ffd966;&quot;&gt;INFO: Security level for &quot;inside&quot; set to 100 by default.&lt;/span&gt;&lt;/i&gt;
CiscoASA(config-if)# &lt;span style=&quot;color: lime;&quot;&gt;ip address 192.168.1.1 255.255.255.0&lt;/span&gt;
CiscoASA(config-if)# &lt;span style=&quot;color: lime;&quot;&gt;no shutdown &lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
Definir el conjunto de direcciones IP y asignar el pool a los usuarios internos.&lt;br /&gt;
CiscoASA(config)# &lt;span style=&quot;color: lime;&quot;&gt;dhcpd address 192.168.1.10-192.168.1.30 inside&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Habilitar el servicio de servidor DHCP en la interface&lt;br /&gt;
CiscoASA(config)# &lt;span style=&quot;color: lime;&quot;&gt;dhcpd enable inside&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Definir el nombre de dominio para los clientes DHCP.&lt;br /&gt;
CiscoASA(config)#&lt;span style=&quot;color: lime;&quot;&gt; dhcpd domain delfirosales&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Definir un servidor de nombres de dominio (DNS.&lt;br /&gt;
CiscoASA(config)# &lt;span style=&quot;color: lime;&quot;&gt;dhcpd dns 192.168.1.50&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Tiempo de concesión en segundos. El valor predeterminado es de 3600 segundos (1 hora).&lt;br /&gt;
CiscoASA(config)# &lt;span style=&quot;color: lime;&quot;&gt;dhcpd lease 7200&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvG3yNrpVplamTyDUxWzA0h-YbfHot0_VFRChM_LyEgkZdoD_TCiA42iYpu9yZstXH_h5YgpnXeBJXGDOLzNMIXd-eRzHgRXQkEp8vnJ5wmRV1BU_qpqXnn4aSvLMw_deCPcTTSjlrFo_O/s1600/dhcpd_lease.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;128&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvG3yNrpVplamTyDUxWzA0h-YbfHot0_VFRChM_LyEgkZdoD_TCiA42iYpu9yZstXH_h5YgpnXeBJXGDOLzNMIXd-eRzHgRXQkEp8vnJ5wmRV1BU_qpqXnn4aSvLMw_deCPcTTSjlrFo_O/s1600/dhcpd_lease.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizOcQ3H8YXa6ZrL25V5xD1q9epcc5nQnNYaGeIMLFo8orsT5pHD_2gNKDNQCvbnAxzhYgts_gM6bnJzZrjqAIsv7IEt56bqvEl-wVBnjTi5TYk177OyjPdMKhcdCkY4eRJjlT9PkbS1nt-/s1600/Cliente_DHCP.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizOcQ3H8YXa6ZrL25V5xD1q9epcc5nQnNYaGeIMLFo8orsT5pHD_2gNKDNQCvbnAxzhYgts_gM6bnJzZrjqAIsv7IEt56bqvEl-wVBnjTi5TYk177OyjPdMKhcdCkY4eRJjlT9PkbS1nt-/s1600/Cliente_DHCP.png&quot; width=&quot;337&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Para comprobar la configuración de DHCP, podemos utilizar el comando show dhcpd state para mostrar el estado actual de DHCP en &amp;nbsp;las interfaces internas y externas. El comando show dhcpd binding para visualizar los enlaces actuales de los usuarios internos y el comando show dhcpd statistics para mostrar las estadísticas de DHCP.&lt;br /&gt;
&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;CiscoASA# &lt;span style=&quot;color: lime;&quot;&gt;show dhcpd state    &lt;/span&gt;
Context  Configured as DHCP Server
Interface inside, Configured for DHCP SERVER

CiscoASA# show dhcpd binding
IP address       Client Identifier        Lease expiration        Type
   192.168.1.10  0063.6973.636f.2d63.           7020 seconds    Automatic
                 3830.302e.3037.3734.
                 2e30.3030.302d.4661.
                 302f.30&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEih54Lsab8pGf0Wh9kCtqkeW5Wni-evZBrd2tSb6UPN4gc0-ZOckOVNMh_YG8gVXGsFB1AWwvKA0LukbR4_ehVfl4CrW8Sq0oa5N4PtUGBwTxoZf6iPHt_a6TMbchkUn5W1TZXijp3bg7RG/s1600/DHCP_binding.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;296&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEih54Lsab8pGf0Wh9kCtqkeW5Wni-evZBrd2tSb6UPN4gc0-ZOckOVNMh_YG8gVXGsFB1AWwvKA0LukbR4_ehVfl4CrW8Sq0oa5N4PtUGBwTxoZf6iPHt_a6TMbchkUn5W1TZXijp3bg7RG/s1600/DHCP_binding.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style=&quot;text-align: justify;&quot;&gt;Para
borrar los enlaces de DHCP o estadísticas, utilice el comando &lt;/span&gt;&lt;b style=&quot;text-align: justify;&quot;&gt;&lt;i&gt;clear
dhcpd binding&lt;/i&gt;&lt;/b&gt;&lt;span style=&quot;text-align: justify;&quot;&gt; o &lt;/span&gt;&lt;b style=&quot;text-align: justify;&quot;&gt;&lt;i&gt;clear dhcpd statistics&lt;/i&gt;&lt;/b&gt;&lt;span style=&quot;text-align: justify;&quot;&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormalCxSpFirst&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;span lang=&quot;EN-US&quot;&gt;CiscoASA# &lt;b&gt;&lt;span style=&quot;color: lime;&quot;&gt;clear dhcpd binding&lt;/span&gt;&lt;/b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;text-align: justify;&quot;&gt;CiscoASA# &lt;/span&gt;&lt;b style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;color: lime;&quot;&gt;clear dhcpd statistics&lt;/span&gt;&lt;/b&gt;</content><link rel='replies' type='application/atom+xml' href='http://delfirosales.blogspot.com/feeds/4529590580770761829/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://delfirosales.blogspot.com/2015/02/servidor-dhcp-en-el-cisco-asa.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/4529590580770761829'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/4529590580770761829'/><link rel='alternate' type='text/html' href='http://delfirosales.blogspot.com/2015/02/servidor-dhcp-en-el-cisco-asa.html' title='Servidor DHCP en el Cisco ASA'/><author><name>delfirosales</name><uri>http://www.blogger.com/profile/08332248815774447288</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7M_X9_NFI8ozSPxhaaK9QB67n9V3shPfC4PONLlyPEH5MFmkbTfQZzNoqafhErf4T6MLLMeRBZdnRXTA5ZV0f6njqGBRBTEAs0ivZuPWOebiWIDHTfA99tHPEW1RX5c8yCMtDr8Wq8z6i/s72-c/ASA_DHCP.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4698096966682789219.post-5594349124665627831</id><published>2015-02-08T15:59:00.002-06:00</published><updated>2020-03-08T00:37:11.185-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco IOS"/><category scheme="http://www.blogger.com/atom/ns#" term="EIGRP"/><category scheme="http://www.blogger.com/atom/ns#" term="Layer 3"/><category scheme="http://www.blogger.com/atom/ns#" term="Routing"/><title type='text'>Passive Interface</title><content type='html'>Otro caracteristica que le podemos configurar a EIGRP es lo que se llama interface pasiva (passive interface).&lt;br /&gt;
&lt;br /&gt;
Una interface pasiva lo que hace es que no envía ningún tipo de paquete, ni hellos ni cualquier otro tipos de paquetes. Es decir que por esa interfaces no podremos tener neighbors o vecinos pero si anunciara las redes de dichas interfaces.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;i&gt;¿Cuándo se utiliza este tipo de interfaces?&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Para suprimir tráfico de actualización innecesario, por ejemplo, cuando una interfaz es una interfaz LAN, sin otros routers conectados.&lt;/li&gt;
&lt;li&gt;Para aumentar los controles de seguridad, por ejemplo, para evitar que dispositivos desconocidos de routing no autorizados reciban actualizaciones de EIGRP.&lt;/li&gt;
&lt;/ul&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFu74uMibrvOVa1KJiHhE5haaKFtKX50Dr6WVZoAFPMCY1OhiToIXQopC94-rU0cW9Sq7FheqentvO0sLXZIhtRi-3RXgXzzuImaiAkxys4oFaemxSeySS5YW9EXhhFv6EmhO1JF4z0b0L/s1600/Passive_interface.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;361&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFu74uMibrvOVa1KJiHhE5haaKFtKX50Dr6WVZoAFPMCY1OhiToIXQopC94-rU0cW9Sq7FheqentvO0sLXZIhtRi-3RXgXzzuImaiAkxys4oFaemxSeySS5YW9EXhhFv6EmhO1JF4z0b0L/s1600/Passive_interface.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Observando la topología sería buena idea configurar como interfaces pasivas las áreas en color rojo, porque en esas interfaces no tendremos ningún neighbor pero si vamos anunciar las redes de dichas interfaces.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormalCxSpFirst&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-size: 14.0pt; mso-ansi-language: EN-US; mso-bidi-font-size: 11.0pt;&quot;&gt;Configuración de Passive
Interface.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;pre&gt;&lt;code&gt;R5#&lt;span style=&quot;color: lime;&quot;&gt;configure terminal&lt;/span&gt;
R5(config)#&lt;span style=&quot;color: lime;&quot;&gt;router eigrp 10&lt;/span&gt;
R5(config-router)#&lt;span style=&quot;color: lime;&quot;&gt;passive-interface ethernet 0/1&lt;/span&gt;

R2#&lt;span style=&quot;color: lime;&quot;&gt;configure terminal &lt;/span&gt;
R2(config)#&lt;span style=&quot;color: lime;&quot;&gt;router eigrp 10&lt;/span&gt;
R2(config-router)#&lt;span style=&quot;color: lime;&quot;&gt;passive-interface fastEthernet 1/0&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
Hemos configurado las interfaces pasivas, desde R3 podremos seguir viendo las redes y seguiremos teniendo conectividad.
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkhX9h9ex-THt5xglN96KFJeERztuiMu7q2_BIxA0IDKm_4yRv3jmXJqgtbAyipBpgW_lYKJVV7MmtJ-eK_LiNAkUTJYFOnrDXCNBcJEYiJ-u_89sACIoZfIcpObP9Q9b3IHjCkcd7BtMj/s1600/interface_pasiva.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;260&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkhX9h9ex-THt5xglN96KFJeERztuiMu7q2_BIxA0IDKm_4yRv3jmXJqgtbAyipBpgW_lYKJVV7MmtJ-eK_LiNAkUTJYFOnrDXCNBcJEYiJ-u_89sACIoZfIcpObP9Q9b3IHjCkcd7BtMj/s1600/interface_pasiva.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://delfirosales.blogspot.com/feeds/5594349124665627831/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://delfirosales.blogspot.com/2015/02/passive-interface.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/5594349124665627831'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/5594349124665627831'/><link rel='alternate' type='text/html' href='http://delfirosales.blogspot.com/2015/02/passive-interface.html' title='Passive Interface'/><author><name>delfirosales</name><uri>http://www.blogger.com/profile/08332248815774447288</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFu74uMibrvOVa1KJiHhE5haaKFtKX50Dr6WVZoAFPMCY1OhiToIXQopC94-rU0cW9Sq7FheqentvO0sLXZIhtRi-3RXgXzzuImaiAkxys4oFaemxSeySS5YW9EXhhFv6EmhO1JF4z0b0L/s72-c/Passive_interface.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4698096966682789219.post-4396922507154195692</id><published>2015-02-08T15:15:00.000-06:00</published><updated>2020-03-08T00:47:24.609-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco IOS"/><category scheme="http://www.blogger.com/atom/ns#" term="EIGRP"/><category scheme="http://www.blogger.com/atom/ns#" term="GNS3"/><category scheme="http://www.blogger.com/atom/ns#" term="Networking"/><category scheme="http://www.blogger.com/atom/ns#" term="Routing"/><title type='text'>Configuración de EIGRP</title><content type='html'>Las mínimas opciones que podemos configurar para habilitar EIGRP son las siguientes.&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;Proceso de EIGRP&lt;/li&gt;
&lt;li&gt;Sistema Autonomo&lt;/li&gt;
&lt;li&gt;Habilitar EIGRP en las interfaces&lt;/li&gt;
&lt;/ol&gt;
Topologia a configurar.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKPH2gj8z010YbsumZQ_wwet6Bphm9szSU-DaNJx5h_CZ60yBJCfwsw89XgqDt6CjyQvlpbD8f0hNYXaOwJcmXEF_OBZw-nA4oO1_Ckknk1n1WkpPRNXrLnzc21xm9XeyxhlVTuvRSwiU0/s1600/EIGRP.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;363&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKPH2gj8z010YbsumZQ_wwet6Bphm9szSU-DaNJx5h_CZ60yBJCfwsw89XgqDt6CjyQvlpbD8f0hNYXaOwJcmXEF_OBZw-nA4oO1_Ckknk1n1WkpPRNXrLnzc21xm9XeyxhlVTuvRSwiU0/s1600/EIGRP.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;Configurar la parte del direccionamiento.&lt;/b&gt;&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;b&gt;Configuración de R2&lt;/b&gt;
&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;R2#&lt;span style=&quot;color: lime;&quot;&gt;configure terminal&lt;/span&gt;
R2(config)#&lt;span style=&quot;color: lime;&quot;&gt;interface fastEthernet1/0&lt;/span&gt;
R2(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;ip address 192.168.2.2 255.255.255.0&lt;/span&gt;
R2(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;no shutdown&lt;/span&gt;
R2(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;exit&lt;/span&gt;

R2(config)#&lt;span style=&quot;color: lime;&quot;&gt;interface serial2/1&lt;/span&gt;
R2(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;ip address 192.168.0.2 255.255.255.252&lt;/span&gt;
R2(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;no shutdown&lt;/span&gt;
R2(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;end&lt;/span&gt;
R2#
&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
&lt;b&gt;Cofiguración de R3&lt;/b&gt;
&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;R3#&lt;span style=&quot;color: lime;&quot;&gt;configure terminal &lt;/span&gt;
R3(config)#&lt;span style=&quot;color: lime;&quot;&gt;interface serial1/3&lt;/span&gt;
R3(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;ip address 192.168.0.1 255.255.255.252&lt;/span&gt;
R3(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;no shutdown&lt;/span&gt;
R3(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;exit&lt;/span&gt;

R3(config)#&lt;span style=&quot;color: lime;&quot;&gt;interface ethernet0/0&lt;/span&gt;
R3(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;ip address 192.168.35.3 255.255.255.0&lt;/span&gt;
R3(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;no shutdown&lt;/span&gt;
R3(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;end&lt;/span&gt;
R3# &lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
&lt;b&gt;Configuracón de R5&lt;/b&gt;
&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;R5#&lt;span style=&quot;color: lime;&quot;&gt;configure terminal &lt;/span&gt;
R5(config)#&lt;span style=&quot;color: lime;&quot;&gt;interface ethernet0/0&lt;/span&gt;
R5(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;ip address 192.168.35.5 255.255.255.0&lt;/span&gt;
R5(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;no shutdown&lt;/span&gt;
R5(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;exit&lt;/span&gt;

R5(config)#&lt;span style=&quot;color: lime;&quot;&gt;interface ethernet0/1&lt;/span&gt;
R5(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;ip address 192.168.5.5 255.255.255.0&lt;/span&gt;
R5(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;no shutdown&lt;/span&gt;
R5(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;end&lt;/span&gt;
R5#
&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
&lt;div&gt;
Si ingresamos el comando
&lt;i&gt;show ip route&lt;/i&gt; en R2, podremos ver lo siguiente.&lt;/div&gt;
&lt;div&gt;
&lt;div class=&quot;MsoNormalCxSpFirst&quot;&gt;
&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpFirst&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEji4W73cflPCMptYtNu82I2mcEUgJn6sYuYHsvVpDLOXCbWMUHmqNkI4L9amDYct90ZlteJX00qMyfH1Wz8HWRHW80CalahUPbcIq6P_rM720J8sbdBVZQafphn7cxw2s9jYUZNQcAFFUB1/s1600/eigrp_route.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;208&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEji4W73cflPCMptYtNu82I2mcEUgJn6sYuYHsvVpDLOXCbWMUHmqNkI4L9amDYct90ZlteJX00qMyfH1Wz8HWRHW80CalahUPbcIq6P_rM720J8sbdBVZQafphn7cxw2s9jYUZNQcAFFUB1/s1600/eigrp_route.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormalCxSpFirst&quot; style=&quot;text-align: justify;&quot;&gt;
Si
realizamos un ping a 192.168.35.3 no va responder ya que no tenemos una ruta
hacia él. Podemos configurar rutas estáticas, pero en este caso vamos a
configurar EIGRP.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormalCxSpFirst&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;span lang=&quot;EN-US&quot;&gt;R2#&lt;b&gt;ping 192.168.35.3&lt;/b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;span lang=&quot;EN-US&quot; style=&quot;color: red; mso-ansi-language: EN-US;&quot;&gt;Type escape sequence to
abort.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;span lang=&quot;EN-US&quot; style=&quot;color: red; mso-ansi-language: EN-US;&quot;&gt;Sending 5, 100-byte ICMP
Echos to 192.168.35.3, timeout is 2 seconds:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;span lang=&quot;EN-US&quot; style=&quot;color: red; mso-ansi-language: EN-US;&quot;&gt;.....&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;span lang=&quot;EN-US&quot; style=&quot;color: red; mso-ansi-language: EN-US;&quot;&gt;Success rate is 0 percent
(0/5)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormalCxSpFirst&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: 14.0pt; mso-bidi-font-size: 11.0pt;&quot;&gt;Pasos para configurar EIGRP&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
Entrar
a configuración global.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
R2#&lt;b&gt;configure terminal&lt;/b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
Ingresar
el comando &lt;i&gt;router eigrp sistema_autonomo&lt;/i&gt;.
Podemos asignarle un número de AS que va del 1 al 65535.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;span lang=&quot;EN-US&quot;&gt;R2(config)#&lt;b&gt;router eigrp ?&lt;/b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span lang=&quot;EN-US&quot;&gt;&amp;nbsp; &lt;1-65535&gt;&amp;nbsp; Autonomous system number&lt;o:p&gt;&lt;/o:p&gt;&lt;!--1-65535--&gt;&lt;!--1-65535--&gt;&lt;!--1-65535--&gt;&lt;!--1-65535--&gt;&lt;!--1-65535--&gt;&lt;!--1-65535--&gt;&lt;!--1-65535--&gt;&lt;!--1-65535--&gt;&lt;!--1-65535--&gt;&lt;!--1-65535--&gt;&lt;!--1-65535--&gt;&lt;!--1-65535--&gt;&lt;!--1-65535--&gt;&lt;!--1-65535--&gt;&lt;/1-65535&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;span lang=&quot;EN-US&quot;&gt;R2(config)#&amp;nbsp;&lt;b&gt;&lt;span style=&quot;color: blue;&quot;&gt;router eigrp 10&lt;/span&gt;&lt;/b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;text-align: justify;&quot;&gt;R2(config-router)#&amp;nbsp;&lt;/span&gt;&lt;b&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: &amp;quot;calibri&amp;quot; , &amp;quot;sans-serif&amp;quot;; font-size: 11.0pt; line-height: 115%;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;no auto-summary&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
El siguiente paso es indicar en que interfaces va estar corriendo EIGRP. Esto se realiza con el comando network.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormalCxSpFirst&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;span lang=&quot;EN-US&quot;&gt;R2(config-router)#&amp;nbsp;&lt;b&gt;&lt;span style=&quot;color: blue;&quot;&gt;network 192.168.2.0 0.0.0.255&lt;/span&gt;&lt;/b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;span lang=&quot;EN-US&quot;&gt;R2(config-router)#&amp;nbsp;&lt;b&gt;&lt;span style=&quot;color: blue;&quot;&gt;network 192.168.0.0 0.0.0.3&lt;/span&gt;&lt;/b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
Con
este estamos indicando que estamos corriendo EIGRP en ambas interfaces.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;Configuración de EIGRP en las interfaces de R3.

&lt;/b&gt;&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;R3#&lt;span style=&quot;color: lime;&quot;&gt;configure terminal&lt;/span&gt;
R3(config)#&lt;span style=&quot;color: lime;&quot;&gt;router eigrp 10&lt;/span&gt;
R3(config-router)#&lt;span style=&quot;color: lime;&quot;&gt;no auto-summary&lt;/span&gt;
R3(config-router)#&lt;span style=&quot;color: lime;&quot;&gt;network 192.168.0.0 0.0.0.3&lt;/span&gt;
R3(config-router)#&lt;span style=&quot;color: lime;&quot;&gt;network 192.168.35.0 0.0.0.255&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;i style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;color: #3d85c6;&quot;&gt;*Mar&amp;nbsp; 1 00:01:59.599:
%DUAL-5-NBRCHANGE: IP-EIGRP(0) 10: Neighbor 192.168.0.2 (Serial1/3) is up: new
adjacency&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
Podemos observar que se ha creado una adyacencia.&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
Como
ya tenemos corriendo EIGRP en R3 con R2 podemos ingresar el siguiente comando,
el cual nos va listar los vecinos o neighbors que tenemos.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
R3#&amp;nbsp;&lt;span style=&quot;color: blue;&quot;&gt;show ip eigrp neighbors&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKMbTTeHvXF9iTfj0TMrgecpgd8hpJabmHrIa4_0Oy5nCaC7b6RPXiMdVCCgG-KaS6cNsPi6IXIiBUQ4cInyo5T6mqiy4GAdHs3rg_PCQvp3LzhJXBrdm1XF1_q88JMDWIoxzxkl9uok8i/s1600/neighbors_eigrp.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;97&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKMbTTeHvXF9iTfj0TMrgecpgd8hpJabmHrIa4_0Oy5nCaC7b6RPXiMdVCCgG-KaS6cNsPi6IXIiBUQ4cInyo5T6mqiy4GAdHs3rg_PCQvp3LzhJXBrdm1XF1_q88JMDWIoxzxkl9uok8i/s1600/neighbors_eigrp.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
R3#&amp;nbsp;&lt;span style=&quot;color: blue;&quot;&gt;show ip route eigrp&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWX9n0qBCXPB_r41KTEI-m5b3rBaaHwSh9Hc-uVN-KQ8a2ASO7G7VhJusqdwzB4d8_FJx3gEGTuQAVOJ4nQr7Ic_9SKuK96FScAsV4fC8T6jWJG9IQCXH27ojzrSNCO1qhw55HnL548qvb/s1600/iproute_eigrp.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;84&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWX9n0qBCXPB_r41KTEI-m5b3rBaaHwSh9Hc-uVN-KQ8a2ASO7G7VhJusqdwzB4d8_FJx3gEGTuQAVOJ4nQr7Ic_9SKuK96FScAsV4fC8T6jWJG9IQCXH27ojzrSNCO1qhw55HnL548qvb/s1600/iproute_eigrp.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormalCxSpFirst&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Configuración de EIGRP en R5.&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
Si
primero hacemos un show ip route en R5, veremos las redes que están solamente
conectadas.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgo51csRhhtK58hyKGzZaJ15RFtcLOohmn0kumpyT78qH30tfw5g5l6-oWHrXd0432K8eXAW9O83VwUDlwWAHKXKzfSkpLQC2wTlhYlAs39Q4SR2bFoEfkF6LEgs53Dm2RjiF1jVbvnnJYC/s1600/eigrp_protocol.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;190&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgo51csRhhtK58hyKGzZaJ15RFtcLOohmn0kumpyT78qH30tfw5g5l6-oWHrXd0432K8eXAW9O83VwUDlwWAHKXKzfSkpLQC2wTlhYlAs39Q4SR2bFoEfkF6LEgs53Dm2RjiF1jVbvnnJYC/s1600/eigrp_protocol.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;pre&gt;&lt;code&gt;R5#&lt;span style=&quot;color: lime;&quot;&gt;configure terminal &lt;/span&gt;
R5(config)#&lt;span style=&quot;color: lime;&quot;&gt;router eigrp 10&lt;/span&gt;
R3(config-router)#&lt;span style=&quot;color: lime;&quot;&gt;no auto-summary&lt;/span&gt;
R5(config-router)#&lt;span style=&quot;color: lime;&quot;&gt;network 192.168.35.0 0.0.0.255 &lt;/span&gt;
R5(config-router)#&lt;span style=&quot;color: lime;&quot;&gt;network 192.168.5.5 0.0.0.0 &lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
</content><link rel='replies' type='application/atom+xml' href='http://delfirosales.blogspot.com/feeds/4396922507154195692/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://delfirosales.blogspot.com/2015/02/configuracion-de-eigrp.html#comment-form' title='6 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/4396922507154195692'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/4396922507154195692'/><link rel='alternate' type='text/html' href='http://delfirosales.blogspot.com/2015/02/configuracion-de-eigrp.html' title='Configuración de EIGRP'/><author><name>delfirosales</name><uri>http://www.blogger.com/profile/08332248815774447288</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKPH2gj8z010YbsumZQ_wwet6Bphm9szSU-DaNJx5h_CZ60yBJCfwsw89XgqDt6CjyQvlpbD8f0hNYXaOwJcmXEF_OBZw-nA4oO1_Ckknk1n1WkpPRNXrLnzc21xm9XeyxhlVTuvRSwiU0/s72-c/EIGRP.jpg" height="72" width="72"/><thr:total>6</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4698096966682789219.post-8675517709090148782</id><published>2014-04-07T22:05:00.000-05:00</published><updated>2020-03-08T00:47:45.796-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="AAA"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco IOS"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco Router"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>AAA en Routers &amp; Switches Cisco </title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;
Las principales funciones de AAA son.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Autenticación:&lt;/b&gt; comprueba que los usuarios y administradores sean quienes dicen ser.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Autorización:&lt;/b&gt; después de la autenticar al usuario o al administrador, decide a qué recursos puede acceder o qué operaciones puede realizar.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Registro (Accounting and Auditing): &lt;/b&gt;guarda el instante temporal en el que se efectúan las operaciones y acceden a los recursos.&lt;/li&gt;
&lt;/ul&gt;
&lt;span style=&quot;text-align: justify;&quot;&gt;Los Routers y Switches Cisco manejan AAA, de hecho también los Firewalls de Cisco pueden manejar AAA, los concentradores de VPN pueden manejar AAA, los Access Point pueden manejar AAA pero para este examen estamos viendo nada más los Routers y Switches.&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Lo hay de tres maneras:&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Cisco Secure ACS Solution Engine:&lt;/b&gt; Este es un equipo que contiene CSA, este casi no se usa en la vida real.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Cisco Secure Access Control Server (ACS):&lt;/b&gt; Se le conoce como ACS y este es el que se usa bastante en la vida real y es el que vamos a ver como se configura pero nada más la parte del router no la parte en si del servidor. El Router o el NAS es el que tiene contacto con el ACS en este caso el NAS puede ser un Router, puede ser un Switch, un Firewall, un concentrador de VPN. Entonces el router o NAS contacta a la base de datos externa el Cisco Secure ACS.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Self-contained AAA:&lt;/b&gt; Se le conoce también como Autenticacion Local y esto quiere decir que el Router no necesita de un equipo externo como el ACS para que pueda funcionar como AAA y simplemente usa la base de datos local de usuarios con contraseña para tener los servicios de AAA.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: yellow; font-size: large;&quot;&gt;¿Cuáles son los servicios más comunes de AAA?&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;Puerto de Consola&lt;/li&gt;
&lt;li&gt;Puerto Auxiliar&lt;/li&gt;
&lt;li&gt;Telnet&lt;/li&gt;
&lt;li&gt;SSH&lt;/li&gt;
&lt;li&gt;HTTP&lt;/li&gt;
&lt;li&gt;HTTPS&lt;/li&gt;
&lt;li&gt;VPNs&lt;/li&gt;
&lt;li&gt;Wireless&lt;/li&gt;
&lt;/ul&gt;
&lt;span style=&quot;text-align: justify;&quot;&gt;Podemos proteger todo el acceso al Router, es decir si por ejemplo queremos accesar al router por CCP ya sea por HTTP o HTTPS podemos usar AAA, si queremos entrar al router por Telnet y SSH se puede proteger con AAA, o de hecho si queremos conectarnos directamente a los puertos de consola y auxiliar podemos protegerlos con AAA.&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
También para los usuarios que entran por medio de VPN a nuestra red, puede ser controlado ese acceso por AAA, nuestros usuarios de Wireless se les puede pedir nombre de usuario y password para entrar a la red Wireless y este también puede estar con AAA. Entonces como podemos ver hay muchas opciones en los que AAA puede entrar en juego.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;color: yellow; font-size: large;&quot;&gt;Configuración de AAA, Autenticacion Local&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Vamos a configurar AAA en el Router usando Autenticacion Local, es decir sin un Servidor ACS o ningún servidor externo. Para configurar AAA vamos a realizarlo paso a paso.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;ol&gt;
&lt;li&gt;La primera es entrar en Modo Privilegiado&lt;/li&gt;
&lt;li&gt;La segunda es habilitar en modo global AAA&lt;/li&gt;
&lt;li&gt;Configurar las Listas de Autenticación que se les conoce como Method List&lt;/li&gt;
&lt;li&gt;Después configurar Autorización&lt;/li&gt;
&lt;li&gt;Configurar el Accounting&lt;/li&gt;
&lt;li&gt;Por ultimo verificar nuestra configuración&lt;/li&gt;
&lt;/ol&gt;
&lt;span style=&quot;text-align: justify;&quot;&gt;El primero paso para configurar AAA es habilitarlo de manera global e indicarle que la Autenticación sea Local.&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;pre&gt;&lt;code&gt;Router#&lt;span style=&quot;color: lime;&quot;&gt;configure terminal&lt;/span&gt;
Router(config)#&lt;span style=&quot;color: lime;&quot;&gt;aaa new-model&lt;/span&gt;
Router(config)#&lt;span style=&quot;color: lime;&quot;&gt;aaa authentication ?&lt;/span&gt;
&lt;span style=&quot;color: #ffd966;&quot;&gt;  arap             Set authentication lists for arap.
  attempts         Set the maximum number of authentication attempts
  banner           Message to use when starting login/authentication.
  dot1x            Set authentication lists for IEEE 802.1x.
  enable           Set authentication list for enable.
  eou              Set authentication lists for EAPoUDP
  fail-message     Message to use for failed login/authentication.
  login            Set authentication lists for logins.
  password-prompt  Text to use when prompting for a password
  ppp              Set authentication lists for ppp.
  sgbp             Set authentication lists for sgbp.
  username-prompt  Text to use when prompting for a username&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Con el signo de interrogacion podemos ver todo lo que podemos configurar con AAA.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;attempts: &lt;/b&gt;Cuantas veces o numero maximo de autentications queremos preguntarle a un usuario y password.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;banner:&lt;/b&gt; Podemos configurarle un Banner.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;enable:&lt;/b&gt; Podemos autenticar el enable&lt;/li&gt;
&lt;li&gt;&lt;b&gt;fail-message:&lt;/b&gt; Cual es el mensaje que se debe mostrar si la autenticación falla&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Login:&amp;nbsp;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;password-prompt: &lt;/b&gt;Lo mismo para el password, cual es el texto que quiero que diga cuando salga el password.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;ppp: &lt;/b&gt;Autenticar ppp, en el caso de que si queremos autenticar a alguien que se conecte por ppp, esto se usaba mucho cuando eran por modem.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;username-prompt: &lt;/b&gt;Si queremos cambiar en lugar de preguntar un username y password cambiarle a que diga usuario y contraseña por ejemplo.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Por ejemplo nosotros queremos autenticar el login, entonces le vamos a indicar que la Autenticación va hacer login, Luego le indicaremos que sea &lt;i&gt;desde la Base de datos Local&lt;/i&gt;. Para esto ingremos el siguiente comando.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;pre&gt;&lt;code&gt;Router(config)#&lt;span style=&quot;color: lime;&quot;&gt;aaa authentication login default local&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
Con esto estamos indicando que la autenticación por default es la base de datos local. Ahora si verificamos Accediendo por telnet al Router.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #ffd966;&quot;&gt;User Access Verification&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #ffd966;&quot;&gt;Username: delfi&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #ffd966;&quot;&gt;Password: cisco&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #ffd966;&quot;&gt;Router&amp;gt;enable&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #ffd966;&quot;&gt;% Error in authentication.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #ffd966;&quot;&gt;Router&amp;gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhx0tmxbMUM5tA0MreA1deUDOFazoQLcFwjCySuWShtkarFE0P1pWRPBv0SYM-zer6jZzHL21e5Qd11iqi7EeII6XsL4h5Ak1ySqSH1f-YhKFJDaq8AlJvBEhJleSg09q7AmY2qzDvLvD4t/s1600/AAA_Router_Cisco.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;291&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhx0tmxbMUM5tA0MreA1deUDOFazoQLcFwjCySuWShtkarFE0P1pWRPBv0SYM-zer6jZzHL21e5Qd11iqi7EeII6XsL4h5Ak1ySqSH1f-YhKFJDaq8AlJvBEhJleSg09q7AmY2qzDvLvD4t/s640/AAA_Router_Cisco.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Si le tratamos de ingresar &lt;i&gt;enable&lt;/i&gt;, envía un mensaje de error en la Autenticación porque el &lt;i&gt;enable &lt;/i&gt;no está dado de alta. Así que lo damos de alta el enable desde configuracion global.&lt;br /&gt;
&lt;br /&gt;
Router(config)#&lt;span style=&quot;color: lime;&quot;&gt;enable secret cisco&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Volvemos verificar ingresando nuevamente el comando &lt;i&gt;enable&lt;/i&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #ffd966;&quot;&gt;Router&amp;gt;en&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #ffd966;&quot;&gt;Password:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #ffd966;&quot;&gt;Router#&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiI27wPsC09mNu-urMz43fnyZgcebSea2yD0_XNXJDorpQtopqWS5UDE4J-IwRHoRyjbqRSn9w7c-xURelakiwynBgPCW3C1FQcdIyvrK7YQPKNPvv91ThG34MqPL2Ht3yFvonsV-KVJMsq/s1600/AAA_ios_cisco_gns3.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;292&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiI27wPsC09mNu-urMz43fnyZgcebSea2yD0_XNXJDorpQtopqWS5UDE4J-IwRHoRyjbqRSn9w7c-xURelakiwynBgPCW3C1FQcdIyvrK7YQPKNPvv91ThG34MqPL2Ht3yFvonsV-KVJMsq/s640/AAA_ios_cisco_gns3.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://delfirosales.blogspot.com/feeds/8675517709090148782/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://delfirosales.blogspot.com/2014/04/aaa-en-routers-switches-cisco.html#comment-form' title='3 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/8675517709090148782'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/8675517709090148782'/><link rel='alternate' type='text/html' href='http://delfirosales.blogspot.com/2014/04/aaa-en-routers-switches-cisco.html' title='AAA en Routers &amp; Switches Cisco '/><author><name>delfirosales</name><uri>http://www.blogger.com/profile/08332248815774447288</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhx0tmxbMUM5tA0MreA1deUDOFazoQLcFwjCySuWShtkarFE0P1pWRPBv0SYM-zer6jZzHL21e5Qd11iqi7EeII6XsL4h5Ak1ySqSH1f-YhKFJDaq8AlJvBEhJleSg09q7AmY2qzDvLvD4t/s72-c/AAA_Router_Cisco.jpg" height="72" width="72"/><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4698096966682789219.post-3864389206888323837</id><published>2014-04-06T12:40:00.000-05:00</published><updated>2015-12-11T22:17:21.676-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco Router"/><title type='text'>No service password recovery</title><content type='html'>&lt;div class=&quot;MsoNormalCxSpFirst&quot; style=&quot;text-align: justify;&quot;&gt;
Este
comando puede ser muy muy peligroso, de hecho en los Routers está escondido, si
ponemos en consola “&lt;i&gt;no service
password-recove ?&lt;/i&gt;” vamos a ver que no aparece pero si se puede configurar.
Lo que hace es que no podemos hacerle un &lt;i&gt;password recovery&lt;/i&gt; al router, si
intentamos hacer un &lt;i&gt;password recovery&lt;/i&gt;
va borrar la configuración y puede que borre el IOS. Es un hecho de que va
borrar la configuración y dependiendo de la plataforma puede que perdamos más
cosas.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
Tener
en mente de que ROMMON no podrá ser accesible si tenemos habilitado el “&lt;i&gt;no service password-recovery&lt;/i&gt;”. Hay que
usarlo con mucho cuidado.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Configurar no &lt;/b&gt;&lt;b&gt;&lt;span lang=&quot;EN-US&quot;&gt;service
password-recovery &amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;span lang=&quot;EN-US&quot;&gt;Router(config)#&lt;span style=&quot;color: lime;&quot;&gt;no service password-recovery&amp;nbsp;&lt;/span&gt;&amp;nbsp;
&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span lang=&quot;EN-US&quot;&gt;&amp;nbsp;&amp;nbsp; &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;WARNING&lt;/span&gt;&lt;/b&gt;:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;color: orange;&quot;&gt;&amp;nbsp;&amp;nbsp; Executing this command will
disable password recovery mechanism.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;color: orange;&quot;&gt;&amp;nbsp;&amp;nbsp; Do not execute this command
without another plan for&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;color: orange;&quot;&gt;&amp;nbsp;&amp;nbsp; password recovery.&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;color: orange;&quot;&gt;Are you sure you want to continue?
[yes/no]:&lt;/span&gt; &lt;b&gt;yes&lt;/b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;span lang=&quot;EN-US&quot;&gt;Router(config)#&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;span lang=&quot;EN-US&quot;&gt;Si revisamos la configuracion
podremos ver que si aparece el &lt;i&gt;no service
password-recovery&lt;/i&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;span lang=&quot;EN-US&quot;&gt;Router#&lt;span style=&quot;color: lime;&quot;&gt;show running-config&lt;/span&gt; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;span lang=&quot;EN-US&quot; style=&quot;color: #999999;&quot;&gt;&lt;i&gt;Building configuration...&lt;o:p&gt;&lt;/o:p&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;span lang=&quot;EN-US&quot; style=&quot;color: #999999;&quot;&gt;&lt;i&gt;!&lt;o:p&gt;&lt;/o:p&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;span lang=&quot;EN-US&quot; style=&quot;color: #999999;&quot;&gt;&lt;i&gt;version 12.4&lt;o:p&gt;&lt;/o:p&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;span lang=&quot;EN-US&quot; style=&quot;color: #999999;&quot;&gt;&lt;i&gt;service timestamps debug datetime
msec&lt;o:p&gt;&lt;/o:p&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;span lang=&quot;EN-US&quot; style=&quot;color: #999999;&quot;&gt;&lt;i&gt;service timestamps log datetime msec&lt;o:p&gt;&lt;/o:p&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;span lang=&quot;EN-US&quot; style=&quot;color: #999999;&quot;&gt;&lt;i&gt;no service password-encryption&lt;o:p&gt;&lt;/o:p&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #999999;&quot;&gt;&lt;b&gt;no service password-recovery&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;span lang=&quot;EN-US&quot; style=&quot;color: #999999;&quot;&gt;&lt;i&gt;&lt;span style=&quot;color: white;&quot;&gt;!&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;&lt;span lang=&quot;EN-US&quot;&gt;Habilitar el service password-recovery&amp;nbsp;&amp;nbsp;
&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;span lang=&quot;EN-US&quot;&gt;Router(config)#&lt;span style=&quot;color: lime;&quot;&gt;service password-recovery&lt;/span&gt;&amp;nbsp; &amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://delfirosales.blogspot.com/feeds/3864389206888323837/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://delfirosales.blogspot.com/2014/04/no-service-password-recovery.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/3864389206888323837'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/3864389206888323837'/><link rel='alternate' type='text/html' href='http://delfirosales.blogspot.com/2014/04/no-service-password-recovery.html' title='No service password recovery'/><author><name>delfirosales</name><uri>http://www.blogger.com/profile/08332248815774447288</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4698096966682789219.post-4924595356723637027</id><published>2014-04-06T03:49:00.000-05:00</published><updated>2020-03-08T00:48:13.419-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco IOS"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco Router"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Autenticación, utilizando la Base de Datos Local</title><content type='html'>&lt;b&gt;Autenticar en el Router mediante un Username y Password&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
Lo que vamos a ver ahora es que a la hora de Autenticarnos en el Router nos pida el ingreso de nombre de usuario y contraseña.&lt;br /&gt;
&lt;br /&gt;
El primer paso es definir desde configuración global el username y el password.&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;Router#&lt;span style=&quot;color: lime;&quot;&gt;configure terminal&lt;/span&gt;
Router(config)#&lt;span style=&quot;color: lime;&quot;&gt;username delfirosales password cisco&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
Con esto ya hemos creado un nombre de usuario con su respectiva contraseña. Ahora tenemos que indicarle al router que autentique con un username y un password. Esto se hace con el commando&lt;i&gt; login local&lt;/i&gt;. En lugar de usar el commando &lt;i&gt;login&lt;/i&gt;, vamos usar el&lt;i&gt; login local&lt;/i&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Habilitar Login local para la Linea de Consola

&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;Router(config)#&lt;span style=&quot;color: lime;&quot;&gt;line console 0&lt;/span&gt;
Router(config-line)#&lt;span style=&quot;color: lime;&quot;&gt;login local&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
Con esto estamos indicándole al router que ya no le haga caso al password configurado en consola, si no que busque la base de datos local de usuario y password.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Verificamos&lt;/b&gt;&lt;br /&gt;
&lt;span style=&quot;color: yellow;&quot;&gt;&lt;i&gt;User Access Verification&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: yellow;&quot;&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/span&gt;
&lt;span style=&quot;color: yellow;&quot;&gt;&lt;i&gt;Username: delfirosales&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: yellow;&quot;&gt;&lt;i&gt;Password:&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: yellow;&quot;&gt;&lt;i&gt;Router&amp;gt;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Vemos que ahora nos pide un usuario y password desde consola.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Habilitar Login local en las Lineas VTY

&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;Router#&lt;span style=&quot;color: lime;&quot;&gt;configure terminal&lt;/span&gt;
Router(config)#&lt;span style=&quot;color: lime;&quot;&gt;line vty 0 4&lt;/span&gt;
Router(config-line)#&lt;span style=&quot;color: lime;&quot;&gt;login local&lt;/span&gt;
Router(config-line)#&lt;span style=&quot;color: lime;&quot;&gt;exit&lt;/span&gt;
Router(config)#&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
&lt;b&gt;Verificamos Telnet&lt;/b&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCEK2tLWP05Xdiy5bo6A_-YoW8L60nXwmcytFSTdGiL4AkkS66hkRqYRB8Jd6tQnyCLcem1xhmawvKG_C9ColB40y5XRHa95-JYVStMFN7KoFm6p9hdlJ3gfO4kxFE5uvCnoPV3PPQq8pf/s1600/Putty_login_local_cisco_ios.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;249&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCEK2tLWP05Xdiy5bo6A_-YoW8L60nXwmcytFSTdGiL4AkkS66hkRqYRB8Jd6tQnyCLcem1xhmawvKG_C9ColB40y5XRHa95-JYVStMFN7KoFm6p9hdlJ3gfO4kxFE5uvCnoPV3PPQq8pf/s1600/Putty_login_local_cisco_ios.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://delfirosales.blogspot.com/feeds/4924595356723637027/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://delfirosales.blogspot.com/2014/04/autenticacion-utilizando-la-base-de.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/4924595356723637027'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/4924595356723637027'/><link rel='alternate' type='text/html' href='http://delfirosales.blogspot.com/2014/04/autenticacion-utilizando-la-base-de.html' title='Autenticación, utilizando la Base de Datos Local'/><author><name>delfirosales</name><uri>http://www.blogger.com/profile/08332248815774447288</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCEK2tLWP05Xdiy5bo6A_-YoW8L60nXwmcytFSTdGiL4AkkS66hkRqYRB8Jd6tQnyCLcem1xhmawvKG_C9ColB40y5XRHa95-JYVStMFN7KoFm6p9hdlJ3gfO4kxFE5uvCnoPV3PPQq8pf/s72-c/Putty_login_local_cisco_ios.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4698096966682789219.post-1403069798033067514</id><published>2014-04-05T18:21:00.001-06:00</published><updated>2020-03-08T00:48:31.013-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco IOS"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco Router"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Passwords en los Routers Cisco</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;&lt;i&gt;¿Que tipo de Passwords se pueden configurar en los Routers Cisco?&amp;nbsp;&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
&lt;ul&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Console&amp;nbsp;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;AUX&amp;nbsp;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;VTY&amp;nbsp;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;HTTP/HTTPS&amp;nbsp;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Enable secret&amp;nbsp;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Enable password&lt;/li&gt;
&lt;/ul&gt;
&lt;b style=&quot;text-align: justify;&quot;&gt;&lt;i&gt;¿Cuales son las mejores practicas para un password que si sea fuerte, que si sea seguro?&amp;nbsp;&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Por lo menos debe de tener 10 caracteres&amp;nbsp;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Usar minúsculas, mayúsculas, números y caracteres especiales&amp;nbsp;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Que no sea una palabra común, es decir que no esté en un diccionario&amp;nbsp;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Debemos de cambiar el password de manera periódica. Seria una muy buena idea es de que si tenemos una política de seguridad por escrito que ahí se mencione que tan seguido se debe de cambiar el password y que realmente se haga.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Configurando Password en los Routers Cisco&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Confiurar Password de Consola&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;Router#&lt;span style=&quot;color: lime;&quot;&gt;configure terminal&lt;/span&gt;
Router(config)#&lt;span style=&quot;color: lime;&quot;&gt;line console 0&lt;/span&gt;
Router(config-line)#&lt;span style=&quot;color: lime;&quot;&gt;password console&lt;/span&gt;
Router(config-line)#&lt;span style=&quot;color: lime;&quot;&gt;login&lt;/span&gt;
Router(config-line)#&lt;span style=&quot;color: lime;&quot;&gt;exit&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
&lt;b&gt;Configurar Password de AUX&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;Router#&lt;span style=&quot;color: lime;&quot;&gt;configure terminal&lt;/span&gt;
Router(config)#&lt;span style=&quot;color: lime;&quot;&gt;line aux 0&lt;/span&gt;
Router(config-line)#&lt;span style=&quot;color: lime;&quot;&gt;password passaux&lt;/span&gt;
Router(config-line)#&lt;span style=&quot;color: lime;&quot;&gt;login&lt;/span&gt;
Router(config-line)#&lt;span style=&quot;color: lime;&quot;&gt;exit&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
&lt;b&gt;Configurar Password en las Lineas VTY&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;Router&lt;span style=&quot;color: lime;&quot;&gt;#configure terminal&lt;/span&gt;
Router(config)#&lt;span style=&quot;color: lime;&quot;&gt;line vty 0 4&lt;/span&gt;
Router(config-line)#&lt;span style=&quot;color: lime;&quot;&gt;password vty&lt;/span&gt;
Router(config-line)#&lt;span style=&quot;color: lime;&quot;&gt;login&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
Si en estos momentos vemos la configuración con el comando &lt;i&gt;show running-config.&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
Router#&lt;span style=&quot;color: lime;&quot;&gt;show running-config&lt;/span&gt;&lt;br /&gt;
Building configuration...&lt;br /&gt;
&lt;i&gt;!&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;line con 0&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;exec-timeout 0 0&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;b&gt;&lt;span style=&quot;color: yellow;&quot;&gt;password console&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;logging synchronous&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;login&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;line aux 0&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;exec-timeout 0 0&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;privilege level 15&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;span style=&quot;color: yellow;&quot;&gt;&lt;b&gt;password passaux&lt;/b&gt;&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;logging synchronous&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;login&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;line vty 0 4&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;span style=&quot;color: yellow;&quot;&gt;&lt;b&gt;password vty&lt;/b&gt;&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;login&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;!&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Vemos los passwords tal cual. Esta manera de guardar las contraseñas es muy insegura ya que se pueden ver. Para esto Cisco tiene una manera de encriptar los passwords, que por cierto no es muy segura, el comando se llama&lt;i&gt; service password-encryption&lt;/i&gt;.&amp;nbsp;&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;Configurar el service password-encryption&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;Router#&lt;span style=&quot;color: lime;&quot;&gt;configure terminal&lt;/span&gt;
Router(config)#&lt;span style=&quot;color: lime;&quot;&gt;service password-encryption&lt;/span&gt;
Router(config)#&lt;span style=&quot;color: lime;&quot;&gt;exit&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
Si ahora le revisamos con un &lt;i&gt;show running-config,&lt;/i&gt; veremos los passwords encriptados, pero tal como se ha mencionado esta encriptacion no es muy segura.&lt;br /&gt;
&lt;br /&gt;
Router#&lt;span style=&quot;color: lime;&quot;&gt;show running-config&lt;/span&gt;&lt;br /&gt;
Building configuration...&lt;br /&gt;
&lt;i&gt;!&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;line con 0&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;exec-timeout 0 0&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;span style=&quot;color: yellow;&quot;&gt;password 7 02050B5518090324&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;logging synchronous&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;login&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;line aux 0&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;exec-timeout 0 0&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;privilege level 15&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;span style=&quot;color: yellow;&quot;&gt;password 7 140713181F053F33&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;logging synchronous&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;login&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;line vty 0 4&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;span style=&quot;color: yellow;&quot;&gt;&lt;b&gt;password 7 08375857&lt;/b&gt;&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;login&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;!&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
Cuando veamos en la configuración&lt;i&gt; password 7&lt;/i&gt; lo que sigue significa que esta encriptado y tal como se menciona, esta encriptacion no es segura. Podemos descifrar el password con cualquier herramienta que podamos encontrar en google, como de la pagina &lt;a href=&quot;https://packetlife.net/toolbox/type7/&quot; target=&quot;_blank&quot;&gt;Packetlife.net&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvYuIQ6fr4CgGpvsg3FRRiOeipmF11SRDuq1WHNPtG3hM_VdMX4GzH9TUex19_uMUsTcVP8D9fTpta2FocbBqDENPXhWMnDMdNTBRip8L1qqKSMTgUa6FD3Id6-z94FtxIfUXM0pQ5ftyI/s1600/password_cracked_cisco_ios.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvYuIQ6fr4CgGpvsg3FRRiOeipmF11SRDuq1WHNPtG3hM_VdMX4GzH9TUex19_uMUsTcVP8D9fTpta2FocbBqDENPXhWMnDMdNTBRip8L1qqKSMTgUa6FD3Id6-z94FtxIfUXM0pQ5ftyI/s1600/password_cracked_cisco_ios.jpg&quot; height=&quot;448&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Algo importante que debemos de saber es si quitamos el &lt;i&gt;service password-encryption&lt;/i&gt; (no service password-encryption).&lt;br /&gt;
&lt;br /&gt;
Router(config)#&lt;span style=&quot;color: lime;&quot;&gt;no service password-encryption&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Y le ponemos de nuevo un &lt;i&gt;show running-config&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
Router#&lt;span style=&quot;color: lime;&quot;&gt;show running-config &lt;/span&gt;&lt;br /&gt;
Building configuration...&lt;br /&gt;
!&lt;br /&gt;
&lt;i&gt;line con 0&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;exec-timeout 0 0&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;span style=&quot;color: yellow;&quot;&gt;password 7 02050B5518090324&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;logging synchronous&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;login&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;line aux 0&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;exec-timeout 0 0&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;privilege level 15&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;span style=&quot;color: yellow;&quot;&gt;password 7 140713181F053F33&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;logging synchronous&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;login&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;line vty 0 4&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;span style=&quot;color: yellow;&quot;&gt;password 7 08375857&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;login&lt;/i&gt;&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
Vamos a ver que los deja encriptados. Es bien imporante el entender que si vemos que dice&lt;i&gt; password 7&lt;/i&gt;y lo que sigue esta encriptado. Si nosotros copiamos &lt;i&gt;password 7 08375857&lt;/i&gt; y lo pegamos en otro Router el password que le estamos poniendo &amp;nbsp;no es 08375857, es el que esta encriptado porque le estamos poniendo un 7. Si le pusieramos password 0 (el 0 significa que lo que sigue no esta encriptado).&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Habilitar enable password&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;Router#&lt;span style=&quot;color: lime;&quot;&gt;configure terminal&lt;/span&gt;
Router(config)#&lt;span style=&quot;color: lime;&quot;&gt;enable password passenable&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
&lt;b&gt;Habilitar enable secret&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;Router#&lt;span style=&quot;color: lime;&quot;&gt;configure terminal&lt;/span&gt;
Router(config)#&lt;span style=&quot;color: lime;&quot;&gt;enable secret cisco2&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
Veamos la configuracion&lt;br /&gt;
&lt;br /&gt;
Router#&lt;span style=&quot;color: lime;&quot;&gt;show running-config&lt;/span&gt;&lt;br /&gt;
Building configuration...&lt;br /&gt;
!&lt;br /&gt;
&lt;span style=&quot;color: yellow;&quot;&gt;enable secret 5 $1$SfXz$VTQcZ6eOOVgZCBfvtmMBC0&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: yellow;&quot;&gt;enable password passenable&lt;/span&gt;&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
Podemos ver que el &lt;i&gt;enable password&lt;/i&gt; tiene como contraseña &lt;i&gt;passenable &lt;/i&gt;y el &lt;i&gt;enable secret&lt;/i&gt; tiene un Hash de MD5. Cuando configuramos el enable secret ingrasamos cisco2 y automaticamente puso un 5 y un hash de MD5. Cualquier password que se ingrese automaticamente lo va convertir en un hasd de MD5 con valor de 128 bits aunque no tengamos habilitado el service password-encryption. Si en alguna configuracion ven enable secret 5 lo que sigue no es el password, es el hash de MD5.</content><link rel='replies' type='application/atom+xml' href='http://delfirosales.blogspot.com/feeds/1403069798033067514/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://delfirosales.blogspot.com/2014/04/passwords-en-los-routers-cisco.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/1403069798033067514'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/1403069798033067514'/><link rel='alternate' type='text/html' href='http://delfirosales.blogspot.com/2014/04/passwords-en-los-routers-cisco.html' title='Passwords en los Routers Cisco'/><author><name>delfirosales</name><uri>http://www.blogger.com/profile/08332248815774447288</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvYuIQ6fr4CgGpvsg3FRRiOeipmF11SRDuq1WHNPtG3hM_VdMX4GzH9TUex19_uMUsTcVP8D9fTpta2FocbBqDENPXhWMnDMdNTBRip8L1qqKSMTgUa6FD3Id6-z94FtxIfUXM0pQ5ftyI/s72-c/password_cracked_cisco_ios.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4698096966682789219.post-4842901166079636875</id><published>2014-03-23T00:06:00.000-06:00</published><updated>2020-03-08T00:48:54.856-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco IOS"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco Router"/><category scheme="http://www.blogger.com/atom/ns#" term="Firewall"/><category scheme="http://www.blogger.com/atom/ns#" term="GNS3"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Configuración de Cisco IOS Zone - Based Policy Firewall </title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
Una de las principales diferencias entre un firewall usando &lt;i&gt;CBAC &lt;/i&gt;y &lt;i&gt;ZBPFW (zone based Firewall)&lt;/i&gt; es el uso de zonas de seguridad. Estas zonas separan las áreas específicas de seguridad dentro de una red. Cada organización tiene sus propias divisiones específicas de seguridad que deben ser definidos antes de la implementación de un ZBPFW.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqMYmpOSiyBN2zsF3FVrZgn55IAVGHzPma-l-C4GAwxz4oI9rIrxjGaMnVLJ6_rNi1BikfkADheFPYufeStIU7IqI48hbWQJa4IblyZWCZKvjFiH1KHQ825rO9zLOHyhBOry9V6Eveo95H/s1600/Cisco_IOS_Zone_Based_Firewall.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;321&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqMYmpOSiyBN2zsF3FVrZgn55IAVGHzPma-l-C4GAwxz4oI9rIrxjGaMnVLJ6_rNi1BikfkADheFPYufeStIU7IqI48hbWQJa4IblyZWCZKvjFiH1KHQ825rO9zLOHyhBOry9V6Eveo95H/s1600/Cisco_IOS_Zone_Based_Firewall.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;Topologia de ejemplo para la Configuracion del IOS Zone Firewall.&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
Lo primero es crear el Par de Zonas, desde configuración global.&lt;br /&gt;
&lt;div&gt;
&lt;i&gt;Creamos el inside security zona con el nombre de inside&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;Creamos el otra zona con el nombre de Outside&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;Router#&lt;span style=&quot;color: lime;&quot;&gt;configure terminal &lt;/span&gt;
Router(config)#&lt;span style=&quot;color: lime;&quot;&gt;zone security inside&lt;/span&gt;
Router(config-sec-zone)#&lt;span style=&quot;color: lime;&quot;&gt;exit&lt;/span&gt;
Router(config)#&lt;span style=&quot;color: lime;&quot;&gt;zone security outside&lt;/span&gt;
Router(config-sec-zone)#&lt;span style=&quot;color: lime;&quot;&gt;exit&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
Creamos un class map con el nombre de MI-CLASS-MAP, luego los Matchs de ICMP y telnet.

&lt;br /&gt;
&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;Router(config)#&lt;span style=&quot;color: lime;&quot;&gt;class-map type inspect match-any MI-CLASS-MAP&lt;/span&gt;
Router(config-cmap)#&lt;span style=&quot;color: lime;&quot;&gt;match protocol telnet&lt;/span&gt;
Router(config-cmap)#&lt;span style=&quot;color: lime;&quot;&gt;match protocol icmp&lt;/span&gt;  
Router(config-cmap)#&lt;span style=&quot;color: lime;&quot;&gt;exit&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
Creamos una politica de servicio con el nombre de MI-POLITICA, identificamos el class map MI-CLASS-MAP
Inspeccionamos todo el trafico.&lt;br /&gt;
&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;Router(config)#&lt;span style=&quot;color: lime;&quot;&gt;policy-map type inspect MI-POLITICA&lt;/span&gt;
Router(config-pmap)#&lt;span style=&quot;color: lime;&quot;&gt;class type inspect MI-CLASS-MAP&lt;/span&gt;
Router(config-pmap-c)#&lt;span style=&quot;color: lime;&quot;&gt;inspect &lt;/span&gt;
Router(config-pmap-c)#&lt;span style=&quot;color: lime;&quot;&gt;exit&lt;/span&gt;
Router(config-pmap)#&lt;span style=&quot;color: lime;&quot;&gt;exit&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
Creamos una Par de Zona o Zone pair identicando la zona fuente (inside) y el destino (outside). Asignamos la política de servicio MI-POLITICA para todo el trafico que pasa  del origen al destino.

&lt;br /&gt;
&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;Router(config)#&lt;span style=&quot;color: lime;&quot;&gt;zone-pair security IN-TO-OUT source inside destination outside&lt;/span&gt;
Router(config-sec-zone-pair)#&lt;span style=&quot;color: lime;&quot;&gt;service-policy type inspect MI-POLITICA&lt;/span&gt;
Router(config-sec-zone-pair)#&lt;span style=&quot;color: lime;&quot;&gt;exit&lt;/span&gt;
Router(config)#&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
Asignamos las interfaces a su respectivas zonas.

&lt;br /&gt;
&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;Router(config)#&lt;span style=&quot;color: lime;&quot;&gt;interface fastEthernet0/0&lt;/span&gt; 
Router(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;description Es la Zona Inside&lt;/span&gt;
Router(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;zone-member security inside&lt;/span&gt;
Router(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;exit&lt;/span&gt;
Router(config)#&lt;span style=&quot;color: lime;&quot;&gt;interface fastEthernet0/1&lt;/span&gt;
Router(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;description Es la Zona Outside&lt;/span&gt;
Router(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;zone-member security outside&lt;/span&gt;
Router(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;exit&lt;/span&gt;
Router(config)#&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2577BoriFw8geZvmzkdiSCsCOk-ja2IX2kScFBkA88HyMmMPW5GySlXUDOA2eNR9tmFaINeiNUHFP1NhYffJclnuRMbvAtFKnqBmpdUqr29AqFPtCppo8e_iydsrUtoWuuaAkQrZODpwY/s1600/Prueba_IOS_Firewall_Zone.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;344&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2577BoriFw8geZvmzkdiSCsCOk-ja2IX2kScFBkA88HyMmMPW5GySlXUDOA2eNR9tmFaINeiNUHFP1NhYffJclnuRMbvAtFKnqBmpdUqr29AqFPtCppo8e_iydsrUtoWuuaAkQrZODpwY/s640/Prueba_IOS_Firewall_Zone.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;Verificación&amp;nbsp;desde el Cliente o Inside.&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Video - Implementación de Cisco IOS Zone-Based Firewall usando CCP&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;280&quot; mozallowfullscreen=&quot;&quot; src=&quot;//player.vimeo.com/video/89884533&quot; webkitallowfullscreen=&quot;&quot; width=&quot;500&quot;&gt;&lt;/iframe&gt; &lt;br /&gt;
&lt;a href=&quot;https://vimeo.com/89884533&quot;&gt;Usando CCP para Configurar Cisco IOS Zone - Based Firewall&lt;/a&gt; from &lt;a href=&quot;https://vimeo.com/user3144455&quot;&gt;delfirosales&lt;/a&gt; on &lt;a href=&quot;https://vimeo.com/&quot;&gt;Vimeo&lt;/a&gt;.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://delfirosales.blogspot.com/feeds/4842901166079636875/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://delfirosales.blogspot.com/2014/03/configuracion-de-cisco-ios-zone-based.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/4842901166079636875'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/4842901166079636875'/><link rel='alternate' type='text/html' href='http://delfirosales.blogspot.com/2014/03/configuracion-de-cisco-ios-zone-based.html' title='Configuración de Cisco IOS Zone - Based Policy Firewall '/><author><name>delfirosales</name><uri>http://www.blogger.com/profile/08332248815774447288</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqMYmpOSiyBN2zsF3FVrZgn55IAVGHzPma-l-C4GAwxz4oI9rIrxjGaMnVLJ6_rNi1BikfkADheFPYufeStIU7IqI48hbWQJa4IblyZWCZKvjFiH1KHQ825rO9zLOHyhBOry9V6Eveo95H/s72-c/Cisco_IOS_Zone_Based_Firewall.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4698096966682789219.post-4821006944546479628</id><published>2012-10-26T02:50:00.000-05:00</published><updated>2020-03-08T00:49:40.340-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco IOS"/><category scheme="http://www.blogger.com/atom/ns#" term="Core Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="GNS3"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Qemu"/><category scheme="http://www.blogger.com/atom/ns#" term="Ubuntu"/><title type='text'>Qemu &amp; GNS3 en Ubuntu 12.10</title><content type='html'>Primero instalar algunas aplicaciones necesarias.
&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;root@cisco:/home/delfi# &lt;span style=&quot;color: lime;&quot;&gt;apt-get update&lt;/span&gt;
root@cisco:/home/delfi# &lt;span style=&quot;color: lime;&quot;&gt;apt-get install libpcap-dev&lt;/span&gt;
root@cisco:/home/delfi# &lt;span style=&quot;color: lime;&quot;&gt;apt-get install build-essential libssl-dev uuid-dev zlib1g-dev libncurses5-dev libx11-dev&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
Segundo, creamos carpetas y asignamos permisos
&lt;br /&gt;
&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;root@cisco:/home/delfi# &lt;span style=&quot;color: lime;&quot;&gt;mkdir GNS3&lt;/span&gt;
root@cisco:/home/delfi# &lt;span style=&quot;color: lime;&quot;&gt;chmod 777 GNS3&lt;/span&gt;
root@cisco:/home/delfi# &lt;span style=&quot;color: lime;&quot;&gt;cd GNS3&lt;/span&gt;
root@cisco:/home/delfi/GNS3# &lt;span style=&quot;color: lime;&quot;&gt;mkdir Dynamips&lt;/span&gt;
root@cisco:/home/delfi/GNS3# &lt;span style=&quot;color: lime;&quot;&gt;mkdir IOS&lt;/span&gt;
root@cisco:/home/delfi/GNS3# &lt;span style=&quot;color: lime;&quot;&gt;mkdir Proyectos&lt;/span&gt;
root@cisco:/home/delfi/GNS3# &lt;span style=&quot;color: lime;&quot;&gt;mkdir Capturas&lt;/span&gt;
root@cisco:/home/delfi/GNS3# &lt;span style=&quot;color: lime;&quot;&gt;mkdir working&lt;/span&gt;
root@cisco:/home/delfi/GNS3# &lt;span style=&quot;color: lime;&quot;&gt;mkdir qemu&lt;/span&gt;
root@cisco:/home/delfi/GNS3# &lt;span style=&quot;color: lime;&quot;&gt;chmod 777 Dynamips&lt;/span&gt;
root@cisco:/home/delfi/GNS3# &lt;span style=&quot;color: lime;&quot;&gt;chmod 777 IOS&lt;/span&gt;
root@cisco:/home/delfi/GNS3# &lt;span style=&quot;color: lime;&quot;&gt;chmod 777 Proyectos&lt;/span&gt;
root@cisco:/home/delfi/GNS3# &lt;span style=&quot;color: lime;&quot;&gt;chmod 777 Capturas&lt;/span&gt;
root@cisco:/home/delfi/GNS3# &lt;span style=&quot;color: lime;&quot;&gt;chmod 777 working&lt;/span&gt;
root@cisco:/home/delfi/GNS3# &lt;span style=&quot;color: lime;&quot;&gt;chmod 777 qemu&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
Luego descargamos GNS3 v0.8.3.1 en su&amp;nbsp;versión&amp;nbsp;mas reciente, descomprimos y asignamos permisos.

&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;root@cisco:/home/delfi/GNS3# &lt;span style=&quot;color: lime;&quot;&gt;wget https://voxel.dl.sourceforge.net/project/gns-3/GNS3/0.8.3.1/GNS3-0.8.3.1-src.tar.gz&lt;/span&gt;
root@cisco:/home/delfi/GNS3# &lt;span style=&quot;color: lime;&quot;&gt;tar -xvzf GNS3-0.8.3.1-src.tar.gz&lt;/span&gt;
root@cisco:/home/delfi/GNS3# &lt;span style=&quot;color: lime;&quot;&gt;chmod 777 GNS3-0.8.3.1-src&lt;/span&gt;
root@cisco:/home/delfi/GNS3# &lt;span style=&quot;color: lime;&quot;&gt;cd GNS3-0.8.3.1-src&lt;/span&gt;
root@cisco:/home/delfi/GNS3/GNS3-0.8.3.1-src# &lt;span style=&quot;color: lime;&quot;&gt;chmod 777 *.*&lt;/span&gt;
root@cisco:/home/delfi/GNS3/GNS3-0.8.3.1-src# &lt;span style=&quot;color: lime;&quot;&gt;cd ..&lt;/span&gt;
root@cisco:/home/delfi/GNS3# &lt;span style=&quot;color: lime;&quot;&gt;ls&lt;/span&gt;
&lt;span style=&quot;color: #6fa8dc;&quot;&gt;Capturas  Dynamips  GNS3-0.8.3.1-src&lt;/span&gt;  GNS3-0.8.3.1-src.tar.gz  &lt;span style=&quot;color: #6fa8dc;&quot;&gt;IOS  Proyectos  qemu&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
Realizamos lo mismo con Dynamips.
&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;root@cisco:/home/delfi/GNS3# &lt;span style=&quot;color: lime;&quot;&gt;cd Dynamips/&lt;/span&gt;
root@cisco:/home/delfi/GNS3/Dynamips# &lt;span style=&quot;color: lime;&quot;&gt;wget https://voxel.dl.sourceforge.net/project/gns-3/Dynamips/0.2.8-RC3-community/dynamips-0.2.8-RC3-community-x86.bin&lt;/span&gt;
root@cisco:/home/delfi/GNS3/Dynamips# &lt;span style=&quot;color: lime;&quot;&gt;chmod 77 dynamips-0.2.8-RC3-community-x86.bin&lt;/span&gt;
root@cisco:/home/delfi/GNS3/Dynamips# &lt;span style=&quot;color: lime;&quot;&gt;cd ..&lt;/span&gt;
root@cisco:/home/delfi//GNS3# &lt;span style=&quot;color: lime;&quot;&gt;./gns3&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEho0s-caBstFKY7KRWITulxWwg5le2POLdUJW-olgEiwIN6Sm4bLra2ulPO70WAeVQz4oebEVhWjctQSlFMCHYxwy8raiPrSO1SdLySP9g79sciLkZDpyAmEThMmnVJblQMB37v66uYNXo/s1600/Dynamips_GNS3_Ubuntu.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;br class=&quot;Apple-interchange-newline&quot; /&gt;&lt;img border=&quot;0&quot; height=&quot;390&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEho0s-caBstFKY7KRWITulxWwg5le2POLdUJW-olgEiwIN6Sm4bLra2ulPO70WAeVQz4oebEVhWjctQSlFMCHYxwy8raiPrSO1SdLySP9g79sciLkZDpyAmEThMmnVJblQMB37v66uYNXo/s400/Dynamips_GNS3_Ubuntu.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;Configuración de Dynamips en GNS3.&lt;/i&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Configuración de Qemu&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
Ahora toca configurar&amp;nbsp;Qemu&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;root@cisco:/home/delfi/GNS3# &lt;span style=&quot;color: lime;&quot;&gt;cd qemu&lt;/span&gt;
root@cisco:/home/delfi/GNS3/qemu# &lt;span style=&quot;color: lime;&quot;&gt;wget https://download.savannah.gnu.org/releases/qemu/qemu-0.11.0.tar.gz&lt;/span&gt;
root@cisco:/home/delfi/GNS3/qemu# &lt;span style=&quot;color: lime;&quot;&gt;tar xvzf qemu-0.11.0.tar.gz&lt;/span&gt;
root@cisco:/home/delfi/GNS3/qemu# &lt;span style=&quot;color: lime;&quot;&gt;ls&lt;/span&gt;
&lt;span style=&quot;color: #6fa8dc;&quot;&gt;qemu-0.11.0&lt;/span&gt;  qemu-0.11.0.tar.gz
root@cisco:/home/delfi/GNS3/qemu# &lt;span style=&quot;color: lime;&quot;&gt;cd qemu-0.11.0&lt;/span&gt;
root@cisco:/home/delfi/GNS3/qemu/qemu-0.11.0# &lt;span style=&quot;color: lime;&quot;&gt;wget https://voxel.dl.sourceforge.net/project/gns-3/Qemu/qemu-0.11.0-olive.patch&lt;/span&gt;
root@cisco:/home/delfi/GNS3/qemu/qemu-0.11.0# &lt;span style=&quot;color: lime;&quot;&gt;patch -p1 -i qemu-0.11.0-olive.patch&lt;/span&gt;
&lt;span style=&quot;color: #6fa8dc;&quot;&gt;patching file Makefile.target
patching file configure
patching file hw/e1000.c
patching file hw/eepro100.c
patching file net.c
patching file qemu-options.hx&lt;/span&gt;
root@cisco:/home/delfi/GNS3/qemu/qemu-0.11.0# &lt;span style=&quot;color: lime;&quot;&gt;./configure --target-list=i386-softmmu&lt;/span&gt;
root@cisco:/home/delfi/GNS3/qemu/qemu-0.11.0# &lt;span style=&quot;color: lime;&quot;&gt;make&lt;/span&gt;
root@cisco:/home/delfi/GNS3/qemu/qemu-0.11.0# &lt;span style=&quot;color: lime;&quot;&gt;make install&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
Averiguamos donde se encuentra qemu y qemu-img con el comando which.
&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;root@cisco:/home/delfi/GNS3/qemu/qemu-0.11.0# &lt;span style=&quot;color: lime;&quot;&gt;which qemu&lt;/span&gt;
&lt;span style=&quot;color: orange;&quot;&gt;/usr/local/bin/qemu&lt;/span&gt;
root@cisco:/home/delfi/GNS3/qemu/qemu-0.11.0# &lt;span style=&quot;color: lime;&quot;&gt;which qemu-img&lt;/span&gt;
&lt;span style=&quot;color: orange;&quot;&gt;/usr/local/bin/qemu-img&lt;/span&gt;
root@cisco:/home/delfi/GNS3/qemu/qemu-0.11.0#&lt;/code&gt;&lt;/pre&gt;
Finalmente la&amp;nbsp;configuración de Qemu en GNS3 debe quedar como se muestra en la siguiente imagen.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5FNGPx7RWfvvORMakZTg7_PA0P8V9fsjP3fqJuIKamZdBPfJAXTDdu17FkrzVTannmsdm1jHLMgQsR_wzs9p5mOdsG7TN0_chcESrr4h2rWBWA9HeSegVfbMCOorlzb5Rod0feQuZJnE/s1600/Qemu_GNS3_Ubuntu.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;390&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5FNGPx7RWfvvORMakZTg7_PA0P8V9fsjP3fqJuIKamZdBPfJAXTDdu17FkrzVTannmsdm1jHLMgQsR_wzs9p5mOdsG7TN0_chcESrr4h2rWBWA9HeSegVfbMCOorlzb5Rod0feQuZJnE/s400/Qemu_GNS3_Ubuntu.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;Configuración de Qemu en GNS3.&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Configuración de Linux Microcore en GNS3.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Descargamos&amp;nbsp;Linux Microcore (linux-microcore-3.8.2.img) del siguiente enlace.&lt;br /&gt;
&lt;a href=&quot;https://sourceforge.net/projects/gns-3/files/Qemu%20Appliances/&quot;&gt;https://sourceforge.net/projects/gns-3/files/Qemu%20Appliances/&lt;/a&gt;&lt;br /&gt;
Una vez que hallamos descargado la imagen, el siguiente paso es abrir GNS3 y dirigirmos al&amp;nbsp;Menú.&lt;br /&gt;
&lt;i&gt;Edit &amp;gt; Preferences &amp;gt; Qemu &amp;gt; Qemu Guest&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
Finalmente&amp;nbsp;quedaría&amp;nbsp;como se muestra a continuación.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1TYA01BdXDhMqB_ARSw5RLQMexlwlQE7osVCvsFHo6xsSQNpepFu0GeCS3BKt5tihAw45qSZukVpgb_fNxbqC_IRD_feoLoD_Qp7f0UFGpQ9oZ1qB6V7uFieb5Ipirm2CKLKQhKLbj9Q/s1600/Linux_Microcore_GNS3.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;381&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1TYA01BdXDhMqB_ARSw5RLQMexlwlQE7osVCvsFHo6xsSQNpepFu0GeCS3BKt5tihAw45qSZukVpgb_fNxbqC_IRD_feoLoD_Qp7f0UFGpQ9oZ1qB6V7uFieb5Ipirm2CKLKQhKLbj9Q/s400/Linux_Microcore_GNS3.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;Configuración de Linux Microcore en GNS3.&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Simple Lab&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwhQbH_-XocQGWM0KktHsCGyRIp9x0Wv9s3_gZrqAR83goEBcFV_kphm-GgQNF8shNi2Qt_SETL9B932F-FcuWsjOh9omuBohQNNmLqB14PvhRbk3nvv-amQRamyeTeFOztjSkgKHgJRE/s1600/GNS3_Microcore_Router.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;150&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwhQbH_-XocQGWM0KktHsCGyRIp9x0Wv9s3_gZrqAR83goEBcFV_kphm-GgQNF8shNi2Qt_SETL9B932F-FcuWsjOh9omuBohQNNmLqB14PvhRbk3nvv-amQRamyeTeFOztjSkgKHgJRE/s640/GNS3_Microcore_Router.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Arrastramos un Router y Quemu Guest al area de trabajo de GNS3, realizamos las conexiones y luego los inicializamos. Primero le configuramos al Router una&amp;nbsp;dirección&amp;nbsp;IP y habilitamos la interface.&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;R1#&lt;span style=&quot;color: lime;&quot;&gt;conf t&lt;/span&gt;
R1(config)#&lt;span style=&quot;color: lime;&quot;&gt;int f0/0&lt;/span&gt;      
R1(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;ip add 192.168.10.1 255.255.255.0&lt;/span&gt;
R1(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;no shut&lt;/span&gt;
R1(config-if)#&lt;span style=&quot;color: lime;&quot;&gt;end&lt;/span&gt;
R1#&lt;span style=&quot;color: lime;&quot;&gt;show ip int brief&lt;/span&gt;
Interface                  IP-Address      OK? Method Status                Protocol
&lt;span style=&quot;color: #6fa8dc;&quot;&gt;FastEthernet0/0            192.168.10.1    YES manual up                    up   &lt;/span&gt; 
FastEthernet0/1            unassigned      YES unset  administratively down down  
R1#&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
Realizamos lo mismo con Linux Microcore.
&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;Micro Core Linux
box login: login[1451]: root login on &#39;tty1&#39;

Micro Core Linux
box login: &lt;span style=&quot;color: lime;&quot;&gt;root&lt;/span&gt;
Password: &lt;span style=&quot;color: lime;&quot;&gt;root&lt;/span&gt;

tc@box:~$&lt;span style=&quot;color: lime;&quot;&gt; sudo su&lt;/span&gt;
root@box:~# &lt;span style=&quot;color: lime;&quot;&gt;ifconfig eth0 192.168.10.2 netmask 255.255.255.0 up&lt;/span&gt;
root@box:~# &lt;span style=&quot;color: lime;&quot;&gt;ifconfig eth0&lt;/span&gt;
eth0      Link encap:Ethernet  HWaddr 00:AB:29:8C:3E:00
          inet addr:192.168.10.2  Bcast:192.168.10.255  Mask:255.255.255.0
          inet6 addr: fe80::2ab:29ff:fe8c:3e00/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:36 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:0 (0.0 B)  TX bytes:10278 (10.0 KiB)&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
Finalmente realizamos una prueba de conectividad.

&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;R1#&lt;span style=&quot;color: lime;&quot;&gt;ping 192.168.10.2&lt;/span&gt;

Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.10.2, timeout is 2 seconds:
.!!!!
Success rate is 80 percent (4/5), round-trip min/avg/max = 8/11/12 ms
R1#

root@box:~# &lt;span style=&quot;color: lime;&quot;&gt;ping 192.168.10.1&lt;/span&gt;
PING 192.168.10.1 (192.168.10.1): 56 data bytes
64 bytes from 192.168.10.1: seq=0 ttl=255 time=13.310 ms
64 bytes from 192.168.10.1: seq=1 ttl=255 time=11.636 ms
64 bytes from 192.168.10.1: seq=2 ttl=255 time=3.861 ms
&lt;/code&gt;&lt;/pre&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKEsTiXhzs5ktp92EkMFhgmx18_bsV-jDfCPLENkxKVYkJU1egCf950045gfaDW1Pq9L4VF8NWT9zZmZtECan82QBFFViwpBHL5U_1i3busNHaZcM3_zW4X5Bosjau998cgSlWzE3egr8/s1600/Microcore_GNS3_Ubuntu.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;216&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKEsTiXhzs5ktp92EkMFhgmx18_bsV-jDfCPLENkxKVYkJU1egCf950045gfaDW1Pq9L4VF8NWT9zZmZtECan82QBFFViwpBHL5U_1i3busNHaZcM3_zW4X5Bosjau998cgSlWzE3egr8/s640/Microcore_GNS3_Ubuntu.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://delfirosales.blogspot.com/feeds/4821006944546479628/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://delfirosales.blogspot.com/2012/10/qemu-gns3-en-ubuntu-1210.html#comment-form' title='1 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/4821006944546479628'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4698096966682789219/posts/default/4821006944546479628'/><link rel='alternate' type='text/html' href='http://delfirosales.blogspot.com/2012/10/qemu-gns3-en-ubuntu-1210.html' title='Qemu &amp; GNS3 en Ubuntu 12.10'/><author><name>delfirosales</name><uri>http://www.blogger.com/profile/08332248815774447288</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEho0s-caBstFKY7KRWITulxWwg5le2POLdUJW-olgEiwIN6Sm4bLra2ulPO70WAeVQz4oebEVhWjctQSlFMCHYxwy8raiPrSO1SdLySP9g79sciLkZDpyAmEThMmnVJblQMB37v66uYNXo/s72-c/Dynamips_GNS3_Ubuntu.jpg" height="72" width="72"/><thr:total>1</thr:total></entry></feed>