Cisco IOS: Difference between revisions

From Dave-Wiki
Jump to navigation Jump to search
(Created page with "Packet Capture (Catalyst 6506-E) # show monitor # Show run | inc monitor session (config)# no monitor session 1 (config)# monitor session 1 source vlan 1309 (config)# monitor session 1 destination interface Gi2/1/3 ACLs Insert into existing Standard ACL # show access-list 24 (config)# ip access-list standard 24 (config-std-nacl)# 15 permit 10.1.2.0 0.0.0.255 (config-std-nacl)# exit (config)# ip access-list resequence 24 10 10 Insert into existing Extended ACL # sh a...")
 
No edit summary
Line 1: Line 1:
Packet Capture (Catalyst 6506-E)
=Packet Capture=
# show monitor
(This example is on a Catalyst 6506-E)


# Show run | inc monitor session
# <code># show monitor</code>
 
# <code># Show run | inc monitor session</code>
(config)# no monitor session 1
# <code>(config)# no monitor session 1</code>
 
# <code>(config)# monitor session 1 source vlan 1309</code>
(config)# monitor session 1 source vlan 1309
# <code>(config)# monitor session 1 destination interface Gi2/1/3</code>
 
(config)# monitor session 1 destination interface Gi2/1/3


ACLs
ACLs
Line 22: Line 20:
(config-ext-nacl)# 1421 permit tcp object-group VPN.CLIENTS host 10.1.49.23 eq 3389
(config-ext-nacl)# 1421 permit tcp object-group VPN.CLIENTS host 10.1.49.23 eq 3389
(config)# ip access-list resequence vlan2-out 10 10
(config)# ip access-list resequence vlan2-out 10 10
VPN
 
Some Useful Links
=VPN=
 
==Some Useful Links==


[https://www.cisco.com/c/en/us/support/docs/routers/1700-series-modular-access-routers/71462-rtr-l2l-ipsec-split.html LAN-to-LAN IPsec Tunnel Between Two Routers Configuration Example]
[https://www.cisco.com/c/en/us/support/docs/routers/1700-series-modular-access-routers/71462-rtr-l2l-ipsec-split.html LAN-to-LAN IPsec Tunnel Between Two Routers Configuration Example]

Revision as of 02:55, 12 February 2024

Packet Capture

(This example is on a Catalyst 6506-E)

  1. # show monitor
  2. # Show run | inc monitor session
  3. (config)# no monitor session 1
  4. (config)# monitor session 1 source vlan 1309
  5. (config)# monitor session 1 destination interface Gi2/1/3

ACLs Insert into existing Standard ACL

  1. show access-list 24

(config)# ip access-list standard 24 (config-std-nacl)# 15 permit 10.1.2.0 0.0.0.255 (config-std-nacl)# exit (config)# ip access-list resequence 24 10 10 Insert into existing Extended ACL

  1. sh access-lists vlan2-out

(config)# ip access-list extended vlan2-out (config-ext-nacl)# 1421 permit tcp object-group VPN.CLIENTS host 10.1.49.23 eq 3389 (config)# ip access-list resequence vlan2-out 10 10

VPN

Some Useful Links

LAN-to-LAN IPsec Tunnel Between Two Routers Configuration Example

Cisco IOS VPN Configuration Guide

Site-to-Site IKEv2 Tunnel between ASA and Router Configuration Examples