Tag Archives: networking

Configure Cisco IOS 802.1x Supplicant

If you have an intermediate familiarity with Ethernet switching you are more than likely familiar with 802.1x port based authentication. With that assumption let’s assume your environment is locked down tight enough to the point where this security is enabled. Great! However, what if you needed to add another Cisco device to a client facing switch port? Not so great… How do you get the device to authenticate the same way as your PC does? Fortunately the IOS includes a supplicant for 802.1x that will allow us to authenticate just like a wired windows client! Let’s check out the config … Continue reading

Posted in Networking | Tagged , , , , | 2 Comments

Cisco SSH Console Server

Did you know a Cisco router can be used as a console server? Continue reading

Posted in Networking | Tagged , , , | Leave a comment

Collecting CLI Data from Cisco Devices Via HTTP

I always try to approach technical challenges with the thought that “just because something can’t be done doesn’t mean it can’t be done”.   Sure enough I had a problem like this cross my desk again the other day.   I wanted a simple way to get the number of active calls on a handful of MGCP PRI gateway routers.  Unfortunately I couldn’t find a single SNMP data point for this information.  I knew IOS routers had an HTTP interface so I started checking around to see how easy it would be to script against. Sure enough, it really wasn’t all that … Continue reading

Posted in Networking, PHP | Tagged , , | 2 Comments

Understanding Prefix Lists

When filtering and manipulating routing protocols and routing updates there are a number of options on the Cisco platforms we as engineers can take advantage of.  In a previous post I briefly discussed the use of standard ACL’s to filter updates.  ACLs filter every packet, or in this case advertised network, that falls within the range is specifies.  This is useful for all or nothing or specific inclusions but does not allow us to us easily filter or permit based on the actual prefix length, ie subnet mask length.  Enter prefix lists. To begin the discussion lets establish a topology … Continue reading

Posted in Networking | Tagged , , , , | 2 Comments