How to configure time-based ACL on Cisco router

1. Create time period Cisco-Router# Cisco-router(config)# time-range WEB-time Cisco-router(config-time-range)# periodic Monday friday 8:00 to 17:00 Cisco-router(config-time-range)# periodic Saturday 8:00 to 12:00   2. Create ACL…

Continue Reading...

How to configure conditional ACL is called Lock & Key

This is a sample configuration for conditional ACL is often called Lock & Key. By the authenticating, router will allow traffic for certain time. Host…

Continue Reading...

How to allow Traceroute and TraceRT on Access-list(ACL)

Here is the sample configuration to allow traceroute(Unix or Network devices) and tracert(MS Windows) "TraceRoute" commands of Unix and Cisco devices send UDP packets, while…

Continue Reading...

Security Warning – Exposed WAN Link Identity by reverse lookup

If someone knows what is your IP address of WAN link, if someone knows what ISP you are currently using, if someone knows where your…

Continue Reading...

[Cisco] How to configure Dyanmic Access List with time-range

Tweet This daynamic access-list is not commonly used, but it is good to know. Below scenario indicated once a client get authrized by telnet login…

Continue Reading...

How to configure Pix 515 for connecting PDM

This is a quick guide for configuring Cisco PIX 515 which is discontinued model. Even though Cisco PIX 515 is kinds of old model, it…

Continue Reading...

How to configure Pix 515 for connecting PDM

This is a quick guide for configuring Cisco PIX 515 which is discontinued model. Even though Cisco PIX 515 is kinds of old model, it…

Continue Reading...

How to install free TACACS+ on Ubuntu

Tweet Here is the simple steps to install free TACACS+ application.  1. Download TACACS+ 2. Install Free TACACS+ on Ubuntu 3. Configure tac_plus.conf 4. Testing…

Continue Reading...

Modifying Huge ACL & prefix- list ?

Tweet Probably, there are multiple way to achieve your goal. Here is one of simple way that I knew and used in my work. (using…

Continue Reading...

How to setup FreeRADIUS server?

Tweet Here is a simple documentation how to setup FreeRADIUS server. It’s written by Korean. http://www.ibm.com/developerworks/kr/library/l-radius/

Continue Reading...

Preventing Security Attacks from all OSI 7 Layer

Tweet Let’s quickly look what kinds of Security Attacks on OSI 7 Layer. Layer 7. Application /6. Presentation/5. Session Layer – Virus, Warms, Tro-hourse, Buffer…

Continue Reading...

How to hide an access-list applied?

Tweet Sometime, you even don’t want to reply ICMP unreachable message response back to requester. It’s very simple. Here is how you do it. (Assume…

Continue Reading...