How to analyze traffic with SPAN feature
Usually when we admin a network, we need to know what are the protocols used more frequently, and why not, discover if someone are using improper P2P software; so we can use SPAN. The Switched Port...
View ArticleHow to decode G.729
I have decided to write this tutorial (only for test purpose) to show how it is simple decode a G.729 stream using SPAN port, Wireshark, VoiceAge G.729 decoder and Audacity software. What is G.729?...
View ArticleIP traffic export: how to mirror traffic on a router
The Switched Port Analyzer (SPAN) feature, which is sometimes called port mirroring or port monitoring, selects network traffic, from a switched port, for analysis by a network analyzer. Unfotunately...
View ArticleSwitchport capture: a good alternative to SPAN port
Do you remember the article “How to analyze traffic with SPAN feature“? The SPAN port is a feature that mirror traffic (on physical or virtual port) to a specific port. In general, behind this...
View ArticleCisco Unity Express Multiple Vulnerabilities
The Cisco Unity Express software contains two important vulnerabilities: CVE ID: CVE-2013-1114: Cisco Unity Express software prior to version 8.0 contains vulnerabilities that could allow an...
View ArticleNAT Virtual Interface aka NVI, what is that?!
Not everyone knows that from IOS version 12.3(14)T, Cisco has introduced a new feature called NAT Virtual Interface; NVI removes the requirements to configure an interface as either NAT inside or NAT...
View ArticleFebruary 2013: four Cisco vulnerabilities
The Cisco Product Security Incident Response Team (PSIRT) has published four important vulnerability advisories: Cisco Unified Communications Manager Multiple Denial of Service Vulnerabilities Cisco...
View ArticleCisco Video Surveillance Operations Manager 6.3.2 – Multiple vulnerabilities
Part of the Cisco Video Surveillance Manager product suite, the Cisco Video Surveillance Operations Manager enables the efficient and effective configuration and management of video throughout an...
View ArticleMarch 2013: seven Cisco vulnerabilities
The Cisco Product Security Incident Response Team (PSIRT) has published seven important vulnerability advisories: Cisco IOS Software Zone-Based Policy Firewall Session Initiation Protocol Inspection...
View ArticlePBR: Route a packet based on source IP address
Everyone knows that the routing table lists the routes to particular network destinations, but is it possible define the next-hop based on source ip, packet size or other criteria? Obviously yes!...
View ArticleApril 2013: ten Cisco vulnerabilities
The Cisco Product Security Incident Response Team (PSIRT) has published ten important vulnerability advisories: Multiple Vulnerabilities in Cisco NX-OS-Based Products Cisco Device Manager Command...
View ArticleUsing IP SLA to change routing
Cisco IP SLAs is a part of Cisco IOS that allows Cisco customers to analyze IP service levels for IP applications and services by using active traffic monitoring for measuring network performance. With...
View ArticleReload in X? Why don’t you rollback or replace the configuration?
Do you remember the article ‘How to schedule a reload‘? This feature (reload in ‘x’) is useful when you must apply a critical configuration on a remote device, for instance new route or new acl. In...
View ArticleMay 2013: two Cisco vulnerabilities
The Cisco Product Security Incident Response Team (PSIRT) has published two important vulnerability advisories: Cisco TelePresence Supervisor MSE 8050 Denial of Service Vulnerability Multiple...
View ArticleJune 2013: five Cisco vulnerabilities
The Cisco Product Security Incident Response Team (PSIRT) has published five important vulnerability advisories: Multiple Vulnerabilities in Cisco Web Security Appliance Multiple Vulnerabilities in...
View ArticleJuly 2013: five Cisco vulnerabilities
The Cisco Product Security Incident Response Team (PSIRT) has published five important vulnerability advisories: Authenticated Command Injection Vulnerability in Multiple Cisco Content Network and...
View ArticleHow to save configurations using SNMP
Everyone knows there are software to get the configuration using SNMP; but how can you copy the configuration if you don’t have any tool? Let me explain what is SNMP before show you how to implement...
View ArticleAugust 2013: six Cisco vulnerabilities
The Cisco Product Security Incident Response Team (PSIRT) has published six important vulnerability advisories: Cisco Secure Access Control Server Remote Command Execution Vulnerability Multiple...
View ArticleWhoisUP v0.2 released!
One year ago, I had published Whoisup v0.1, a script that monitors hosts via ICMP and shows the status in a web page. The script had obtained a good success, so I have decides to continue the WhoisUP...
View ArticleSeptember 2013: eleven Cisco vulnerabilities
The Cisco Product Security Incident Response Team (PSIRT) has published eleven important vulnerability advisories: Cisco IOS Software Queue Wedge Denial of Service Vulnerability Cisco IOS Software...
View Article