Cisco VIRL and Windows VMs

VIRL-logo-eOne of the neat features of Cisco VIRL is it runs on an open platform, with OpenStack as the orchestration program running on top of an Ubuntu operating system. This gives VIRL additional flexibly by being able to run third-party VMs with KVM begin the hypervisor. In this guide I’ll walk through some of the steps I took to get Windows XP up and running in VIRL. 🙂 Continue reading

Advertisements

Factory Reset Firepower 4100 & 9300

I got my hands on some Cisco Firepower 4100 units and after playing around with them I wanted to reset them to factory settings, essentially erase the “startup-config” on the FXOS. The Firepower units act a little differently than your normal Cisco IOS or ASA and you can’t just erase startup-config and reload the device, that would be too easy. I was able to find that if you do a password recovery on the unit it erases the configuration  and that’s as close as I got for a factory reset. Continue reading

Passed the 640-916 DCICT

It’s been a little more than year in the making since I passed my last Cisco exam the 640-911 but I finally did it and passed the 640-916. I can now call myself CCNA Data Center Certified. 🙂 If you ever get the chance to take go up Data Center route it really is interesting of all the products and services Cisco has in their portfolio. Cisco UCS, OTV, Fabicpath and FCoE are just really cool technologies to learn about. The main studying tool I used was the Cisco Official Certification Guide and I poked around the Cisco Learning Network on the Data Center study group.

So what’s next for me? Well I think its time to take another step forward and climb up to the professional level of Cisco Certifications. I don’t know when I want to start that but it’ll probably be sooner rather than later.

It’s been a little more than five years of when I passed my first Cisco certification. After finishing the Cisco Network Academy I was able to tackle the ICND1 and looking back at the ICND1 its changed curriculum twice since I took it, which is a common theme in this industry. 😉

 

 

RBAC Radius with Microsoft NPS 2012 R2

safe-access-controlIn this configuration I’m at looking at using Microsoft NPS 2012 R2 as radius server and I’m going to skip the installation of NPS because it really is just a next, next, finish installation. In this demo I already have this NPS system connected to a Windows domain, my goal is to create role based access on Cisco IOS routers while using radius to login. I’ll have a couple for active directory accounts each them will represent different types of allowed access to these IOS routers. One account will get full administrative access while the other will only get read access, how cool cat is that 😉 !

Continue reading

Rancid can’t SSH to older ISRs?

Well its 2016 and you still have that one-of-kind Cisco ISR 2811 or 3845 running in the environment? You followed and installed Rancid, all the new stuff works like it should but when you try to connect to that “one-of-kind” 2811 with Rancid it closes the connection… :/

This is a simple fix and the bug is reported here: LINK. The bug is something with OpenSSH which is installed on your Linux operating system and Rancid rides on top of it. You would have the same issue if you just tried SSH to thing directly from your Rancid machine. The bug looked to be fixed starting OpenSSH 6.9 but as right now at least in Centos 7 the version it goes up to is OpenSSH 6.6. You can verify this by using sshd -V to output the OpenSSH version you are using.

Simple fix is to modify the ssh_config file usually located at /etc/ssh/ssh_config and at the bottom of the file put the host you are connecting to. Copy what you have in your router.db file meaning if you are using DNS names put DNS names of the devices that won’t connect into this file. If you are using IP address use IP address in this file. In this example I’m using IP addresses and DNS names, the following is at the bottom of the ssh_config file:

# Custom Rancid Configuration (Issues with Connecting SSH with Older Devices)
# Bug Report 740307 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=740307
#
Host 192.168.3.1
	KexAlgorithms=diffie-hellman-group14-sha1
#
Host Router03.example.com
	KexAlgorithms=diffie-hellman-group14-sha1
#
Host Router02.example.com
	KexAlgorithms=diffie-hellman-group14-sha1
#

You should be good to go after that. You can test this by using clogin or by connecting directly. If you noticed on the bug report you could also up the Diffie-Hellman size to 4096 on the router itself by using the ip ssh dh min size 4096 command as well. I hope this helps if you ever need it 🙂