Ethical Considerations Hacking A Virtual Environment?
Nov 1, 2012
I am currently finalising my project in Uni and in the project planning section is asks if there are any ethical considerations to be made in my project. I am conducting penetration testing on a VIRTUAL network simulator (GNS3) using Metasploit toolkit. I am guessing I will need permission to download these tools onto the university network, would that count as an ethical consideration? If not, what would I say in this section? note, all of the data I am using in the project was created by myself, and there is no other human participation.
View 3 Replies
ADVERTISEMENT
Apr 28, 2012
My host has an IP of 20.168.1.2 from a router DHCP. I have a virtual environment which has a DC and DNS and the IP is: 192.168.1.x how can I get access from my host to the virtual environment? What do I need to setup on the host OS? (Windows)
View 3 Replies
View Related
Mar 4, 2013
Today, we have a server running SNA that connects to router via the following. Vitrual Server --> Nexus 1000v ---->Nexus 7010 ---->2800 series router.We are trying to move server to new environment where it is Virtual Server ----> Nexus 1000v ----- Fabric Interconnect-----Nexus 55xx-----Nexus 7010-----2800 router.
View 2 Replies
View Related
Dec 9, 2010
I am planning on implementing a metro ethernet circuit to replace a more expensive circuit to connect my office and data center. This circuit will be configured by the provider in a 'transparent' manner, which will allow us to pass vlans freely over the circuit without having to create a QinQ tunnel. This is a layer 2 only metro ethernet circuit.Planning on connecting the office end to a 3750 (switch A) and the data center end to a 2960 (switch B). The data center end will have a couple of other 2960s hanging off of it for server connectivity (switches C & D). I plan to use a 2811 (router A)for layer 3 connectivity in the data center. Switch B will plug into router A and switches C & D will plug into switch B using two port-channelled links. I can post a diagram if needed.I will use rpvst here and configure switch B as the root bridge.There are about 10 vlans that I use between the office and data center. Router A is also used to connect to other environments such as staging, production and also to the internet. I think this should be a straight-forward configuration since it is mostly layer 2. Should switch B be the root bridge?
View 3 Replies
View Related
Sep 29, 2011
I have a 2 wire modem and when I log on to the 2 wire homepage I see the "time since last boot" is not the time I last was on the system.Also when I check the "Enable Router behind Router alert" it is sometimes unchecked when I log back onto the 2 wire homepage.
View 1 Replies
View Related
Dec 29, 2011
how can we see who are connected to our wireless network and as in some types wireless key can be see or hacked, how can we stop or prevent this.
View 1 Replies
View Related
Mar 29, 2012
We are about to install a new network consisting of Cat 4500s with Sup7E at the Access Layer, with Nexus 7000 at the Distribution and Core layers. We have 14 floors with at least three 4500s on each floor. Within the office block where the Access Layer and Distribution Layer reside we need to support secure borderless networking using 802.1x to place users from different parts of the business into segregated networks at layer 3.All switches will have the feature sets to support MPLS/ VRF / OSPF / EIGRP / BGP etc.We quickly dismissed the idea of using VRF-Lite due to the sheer number of Vlans we would need to managage and maintain, the point to point links alone just to get one additional VRF on each floor required far too many Vlans.As a result we are now considering deploying MPLS. The obvious benefits include scalability and manageability, the fact that all switch to switch links can now be routed, instead of having to using SVIs.
View 2 Replies
View Related
May 21, 2011
how to disable certain ports - 25,53,25,138, & 445 - except internet to prevent hacking (can u explain in a way as a novice like me can understand pls)
View 1 Replies
View Related
May 9, 2011
Is there any sort of "hardening-guide" re: preventing people from hacking the DIR-825? I've done the obvious (to me) things, but I'm wondering what the risk is.I'm also interested in how good the DIR-825 is, security-wise, compared with Linksys equivalent routers.Seeming limitations on the admin password has me concerned url...
View 2 Replies
View Related
Jan 5, 2012
I want to create a network with a bunch of routers and switches to be used as a test network for company employees to remotely login and learn networking.I don't want this network to interfere with the rest of the network in any way.I am basically trying to create a stub network or a passive network!!
View 4 Replies
View Related
Aug 27, 2012
I have a small business environment that uses a domain controller and supports about 50+ PCs. Starting this morning multiple computers have lost their ability to obtain an IP address. We have rebooted our domain controller and tried various fixes on local machines with no luck.
View 1 Replies
View Related
Nov 4, 2011
I have a peachtree application installed on a standalone system and needs three other systems to connect to the shared folder to work but each time I click on show workgroup computers, it shows me a blank page on one and only shows the other system on the other.Hence when i try to connect to the peachtree folder, it give error that the system is not accessible?
View 1 Replies
View Related
Jan 23, 2013
Currently I'm with a pure Cisco shop, running every LAN Switched infrastructure (even in the HQ datacenter) with PVST+, I'm noticing in the documentation I've read and labs I've created that RSTP is... great, and I've observed that even the uplinkfast functionality seems to be build in by just enabling rapid-pvst. Of course I'll propose a migration plan, document the network, diagram it entirely and provide effective steps to implement the change, but that's assumed from any get'go.
View 1 Replies
View Related
Oct 4, 2011
I'm trying to use RDC to connect to my home PC from work. I've tested everything on my laptop from another network and the connection works fine but the same settings don't seem to work when I'm at work.
I'm pretty sure I have everything set up correctly. Using the default port forwarded to the desired computer.
View 1 Replies
View Related
Feb 11, 2012
I got a $7 per month plan on a server and I have a problems with FTP connection. I am trying to upload a 20MB file with multiple folders and files in it and the connection is very choppy and I literally was not able to do that since yesterday.
View 1 Replies
View Related
Mar 11, 2012
i am using L3MPLS VPN services from a provider.They are doing QOS, like my Voice, Data, ICMP. all traffic is classified in their network and take different paths.Now sometime when we face voice issues, simple ICMP ping , TCP ping, will not give me insight if there are any packet losses, since Voice packets are taking someother path with in MPLS cloud due to DSCP marking of Voice pack to 46.is there any tool in which i can change DSCP value of my packets and test out network response? or any monitoring tool that can do this by default?i am looking for freeware at the moment or trial
View 1 Replies
View Related
Nov 9, 2011
question 1. in the typical active directory environment and doing wireless/wired 802.1x authentication on endpoints, should ACS join as a domain computer?
question 2. for the endpoint (domain computer) join the domain, in this case is the endpoint will trust the ACS ( also domain computer) ?
question 3. what if there's a GPO policy to install the rootCA certificate toward the endpoints. In this case, ACS should issue the CSR and let the domain CA to signed as the identity certificate? Am i correct?
View 2 Replies
View Related
Feb 4, 2013
I'm having some serious sound problem with some 2950 Cisco switches that I have in my CCNA lab these switches sound like a jet I've gone in and made sure the fans are clean and I even replaced one they still are too loud. So I have a few options I can run them without a fan which I really don't want to do but I want to look at two other options. The first option would be to put a heat sink on the chip that's producing heat I also thought about cutting a whole in the top and mounting a 120mm fan.
View 4 Replies
View Related
Feb 27, 2011
I am using the "File exist"-check in my Dynamic Access Policies to be sure that VPN-computers are corporate. I would like to place the file in each users %APPDATA%-directory, but it seem that the ASA cannot use variables when specifying the path? Is there a way to do this or do I have to use a absolute path in the check?I am running a ASA 5520 with sw 8.4(1).
View 1 Replies
View Related
Feb 25, 2013
I have a domain controller witch is in a C7000 enclosure, the ethernet switch in the rear of the enclosure has channeled the ports to our core switch ( Hp procurve 5400 series ) for better bandwidth.My problem is can I give this DC 1 nic and make it accessable to 2 vlans in my enviroment. ( how do I do this )The channeling of the ehternet switch in the rear of the C7000 enclosure makes it impossible to give just that one DC access to the 2 vlans , cause the other servers also go over this line.
View 4 Replies
View Related
May 16, 2011
i have recently added to a domain. The initial setup is a server running windows 2003 and several xp machines which logon to the domain using mandatory profiles. However, after adding windows 7 machines and logging them on to the system it doesnt load the profiles. (which is fine as I understand you cannot use the same profiles with windows 7+xp)The problem is it automatically creates a roaming profile when logging off and saves it back to the same path as the other profiles under user.V2 which is growing considerably and causing huge logoff and logon times.How can I get the windows 7 machines to not attempt roaming profiles back to the server and instead to just save the profiles locally when logging off.
View 14 Replies
View Related
Nov 8, 2012
Here is what I am attempting to do.
1. I have a 1042N AP configured as a Workgroup-Bridge attaching to a Lightweight Access Point.
2. LWAPP AP is on a 5508 series Controller.
3. I have MAC Authentication configured through an Ciso ACS box running 5.2 code. And that portion is working.
4. I want to lock this WGB down even further with a second layer of security. I am thinking WPA2 -AES.
View 2 Replies
View Related
Oct 17, 2011
I am looking for a Cisco firewall to replace a Sonicwall NSA240 firewall in SME environment?
View 3 Replies
View Related
Apr 26, 2011
Need securing a wireless environment in a hotel? The SSID has to be broadcast of course but how can we protect guests from man in the middle attacks, etc.? Currently the environment is all AP1200s with no hardware upgrades in the near future. There is also a 2811 router in place but nothing else. We would love to be able to force users to authenticate with a password in order to get out to the Internet as well.
View 2 Replies
View Related
Mar 7, 2013
I was asked to mount ACESMs on each of the CAT6K switches of a VSS cluster (one ACESM on each individual switch).On a non-VSS environment, the "svclc module <slot> vlan-group <group>" command is used to bind the VLAN group to the module on a certain slot. But now I am facing a VSS scenario, I will need to combine switch and slot in order to reference each of the individual modules...
How do I "index" each of the ACESMs in a VSS cluster? ¿Is there an extension of the aforementioned command to be able to combine switch and slot information?
View 1 Replies
View Related
Aug 2, 2011
I am looking to slowly migrate some of our wireless devices (Aironet 1231 and 1232's) to the Wireless N spec - 1260's.I currently have four AP locations that I want to upgrade first before anywhere else. At the minute, these four AP's work on the 2.4Ghz G band.
how the new 1260's will work in the mixed environment. I believe I will need to purchase the 1262 (which is the dual band version) so that I can operate the AP in both the 2.4Ghz G band range and the 5Ghz N range at the same time, is this correct?If I was to purchase the 1261 (which is the single band version), will I only be able to operate in either th 2.4Ghz or 5Ghz, but not at the same time?
For the mixed environment, would you suggest the dual band version? Can I place the same SSID on multiple Radios if this is the case? Following example: Say I have the SSID called 'Company' - this at the minute is operating on the G band 2.4Ghz range. If I was to purcahse the dual band 1262, could I put this SSID on both the G radio and the N radio? Would clients with an N adapter automatically connect to the 5Ghz range (N Radio) and legacy G and B adapters automatically connect to the 2.4Ghz (G Radio)?
View 5 Replies
View Related
Mar 18, 2013
We have the following BYOD environment:
WLC 5508 (7.4.100.0)Cisco Identity Services EngineVersion : 1.1.2.145 Patch Version : 3
During BOYD implementation we faced some problems with Android devices:
1) The Netwrok Setup Assistant (NSA) download process corrupts during the self-provisioning process (captured on 4.1.1 and 4.2.2 version)
2) If NSA is already installed, the network setup process (downloading profile, certificate) stops at last step: connecting to network, meanwhile the connection itself successfully establishes. This bug is captured on 4.2.2 version, 4.1.1 is ok.
Google ACL is configured according to TrustSec docs and permits all traffic to google networks 173.194.0.0/16 and 74.125.0.0/16.
View 5 Replies
View Related
Jul 10, 2011
I have decided build an open source firewall in linux environment. I have exactly one year to complete this project. The firewall will be a stateful packet filtering firewall working at network, transport and application layers. I would also be provided log analysis features. What I want to know is whether this is a good enough project or put in other words, is it a worthwhile project to undertake?
View 13 Replies
View Related
Feb 28, 2006
Ihave a 3560 w/multicast support and I'm trying to configure a simple environment. I have 2 ports configured, one for the multicast server and the other for the client. Each are on their own subnet, so I have an ip route between the two. My run config on both ports is:
ip multicast-routing distributed
interface fastethernet 0/3 & 0/4
ip pim version 2
ip pim sparse-dense-mode
I'm using vlc server /client configured to use 224.0.0.1 on my isolated network. I can see the mulitcast traffic going into the port, and I the client is sending reports, but I think the 3560 is dropping the packets, since I don't see them coming in the client port. Need to configure a simple multicast environment using 2 ports on a Cisco 3560.
View 4 Replies
View Related
Apr 15, 2012
I can't find any information that the AP1231G-A-K9 AP is supported in a 5508 Controller Based environment with Prime NCS.Could one of the experts confirm or deny?
View 1 Replies
View Related
May 29, 2012
Does the FWSM for a 6506/6509 is supported in a VSS environment?Also, does the FWSM work with the 2T supervisor module?
View 1 Replies
View Related
Feb 23, 2012
I have been tasked with attempting to setup an enviroment that allows users to VPN from home and use Dameware to connect, from home, to another machine in another users home that is VPN'd into the same network. Is this possible?
We are using 2 5520 ASA's and CiscoAnyConnect.
View 1 Replies
View Related
May 1, 2013
we have some pairs of 6509-VSS, which partially have old (no more officially supported) 6509-Chassis.All linecards in the VSS are the same (Sup 720-10GE-3C, 67XX).
We now bought some new 6509-E-Chassis and want to change the old chassis by the new ones in a ISSU manner, that means:
1. putting the partner, which chassis changes, in redundancy mode, switch it off, exchange chassis (old "Catalyst 6509", new "Catalyst 6509-E")
2. inserting the line-cards exactly in the same slots and connecting all cables
3. switch on the new chassis, witing to come up in VSS
I'm not sure of having to set the switch number for VSS (is that in the Sup?; configuration? or part of the chassis-memory?)
I've looked up cisco for some hints, but don't found anything.
View 5 Replies
View Related