Author Archives: Adam

TACACS+, Linux, and Cisco Command Accounting

I recently finished configuring our medium sized corporate network devices to authenticate via Radius against windows Network Policy Server. Never being satisfied I wanted to take it a step further and account for administrative actions taken on our routers and switches. Basically, I want a record of every command typed into the network devices. Its like a key logger of sorts for your Cisco devices… I know Cisco and other vendors offer some commercial TACACS+ servers but all were outside of the budget for this project. Continue reading

Posted in Linux | Tagged , , , , | 5 Comments

What is My Phone Number?

I know that sounds like a stupid question but I have heard it a lot over the years…  Particularly with cell phones that make it easy to just shoot your information to someone via email or Bluetooth.  There are many ways to find this seemingly obvious but easily forgotten bit of information but my personal favorite is dialing 1-800-444-4444.  This is some type of MCI auto attendant that reads back your calling number.  This works with individual lines such as a POTS (Plain Old Telephone Service) or cell phone.  If your phone is controlled by a corporate phone system your … Continue reading

Posted in Telephony | Tagged , | Leave a comment

Configure Hurricane Electric IPv6 over IPv4 Tunnel with Monowall

We have been holding on to IPv4 for a long time. We are well past the initial “run out of addresses” date thanks to VLSM, NAT and some other addressing tricks. The facts are, however, that IPv4 is running to its end and will eventually become obsolete. Fortunately, however, there are ways to ease into IPv6. One that I found, since my ISP does not yet offer IPv6 service, was to create a tunnel to someone who does. Tunnelbroker.net powered by Hurricane Electric was one of the options. Another tunnel broker you might consider is Core Transit who will tunnel … Continue reading

Posted in Networking | Tagged , , | Leave a comment

Capturing Traffic with the Cisco ASA

I have written quite a few things lately about capturing traffic so why not write another? This time we will be taking a look at capturing data from another key place in the network; the firewall. Continue reading

Posted in Networking, Security | Tagged , , , , , , | Leave a comment