Archives
- August 2020 (1)
- October 2019 (2)
- September 2018 (1)
- June 2018 (1)
- April 2018 (3)
- January 2018 (2)
- December 2017 (3)
- August 2017 (2)
- July 2017 (1)
- February 2017 (1)
- January 2017 (5)
- September 2016 (2)
- January 2016 (1)
- November 2015 (1)
- September 2015 (2)
- October 2014 (1)
- April 2014 (1)
- March 2014 (2)
- December 2013 (1)
- November 2013 (1)
- October 2013 (3)
- September 2013 (2)
- July 2013 (3)
- May 2013 (2)
- March 2013 (2)
- February 2013 (2)
- January 2013 (1)
- December 2012 (5)
- November 2012 (5)
- October 2012 (4)
- September 2012 (3)
- August 2012 (7)
- July 2012 (8)
- June 2012 (2)
- May 2012 (2)
- April 2012 (4)
- March 2012 (1)
- January 2012 (1)
- December 2011 (1)
- November 2011 (1)
- October 2011 (2)
- September 2011 (1)
- August 2011 (3)
- July 2011 (4)
Monthly Archives: October 2013
Cisco ASA IPSec Pre Shared Key Recovery
The Cisco ASA firewall is one of the most common firewalls I have encountered while both working in the corporate IT world as well as in the consulting industry with small to medium clients. Most administrators enjoy working with it as it has both a fairly intuitive interface in the form of the ASDM and a powerful CLI as well. One simple but common complaint, however, is that pre shared keys are difficult to recover from the units when working with IPsec tunnels. The solution is quite simple yet often elusive. Continue reading
Posted in Networking Tagged backup, cisco, configuration, IPSec, networking, security, trouble shoot Leave a comment
Cisco ASA Password Recovery
When inheriting used and abused customer networks it becomes necessary to reset passwords on devices the hard way from time to time. Fortunately with the Cisco ASA it’s still not all that complicated. You will see that with each step I included examples of the commands and the output along the way as well. Continue reading
Posted in Networking Tagged cisco, configuration, networking, security, trouble shoot Leave a comment
Route Summarization Basics
With the advent of Variable Length Subnet Masks (VLMS) and classless networking keeping track of where exactly IP address space physically resides on the network has become a bit more complicated simply because we have the options and the flexibility to break networks into smaller subnets. Chances are you are probably at least somewhat familiar with subnetting but may not be as familiar with route summarization. Summarization is basically reversing the same actions of subnetting. This can also be called supernetting by the way. Really, in today’s world you can basically manipulate the subnet mask in any way you like … Continue reading