Archive for the ‘Cisco’ category

Cisco – VPN troubleshooting commands

September 19th, 2012

show crypto isakmp
show vpn-sessiondb summary
clear crypto isakmp sa

if you found this helpful feel free to donate to:
ZEC: t1NQp1UuqQbmnXzazbLTSreS2AbaZpRBuTM
LTC: LZyNF1qkBUA7XFz83m5xwzGgmmj1owQn9d
BTC: 1PY95KFPTEJTR7f2NnSgaB6xB9pwDJkcJz

Cisco – replace peer IP for a VPN

April 5th, 2012

Simple steps to replace a peer IP on a cisco.

First pull up the config of the cisco with the passwords in-case its the same password:

more system:running-config

Once done notice the points where the current IP is. For this example it would be.

crypto map Public_map 4 set peer X.X.X.X
tunnel-group X.X.X.X type ipsec-l2l
tunnel-group X.X.X.X ipsec-attributes
pre-shared-key somekeyorpasswordwhatever

We want to prepare the rules we will add in advance

crypto map Public_map 4 set peer Y.Y.Y.Y
tunnel-group Y.Y.Y.Y type ipsec-l2l
tunnel-group Y.Y.Y.Y ipsec-attributes
pre-shared-key somekeyorpasswordwhatever

now type the following to remove the other settings:

no crypto map Public_map 4 set peer X.X.X.X
clear configure tunnel-group X.X.X.X

This will remove the current settings, now add the rules we prepared previously

crypto map Public_map 4 set peer Y.Y.Y.Y
tunnel-group Y.Y.Y.Y type ipsec-l2l
tunnel-group Y.Y.Y.Y ipsec-attributes
pre-shared-key somekeyorpasswordwhatever

Now have the peer try and connect, to view tunnels run the following command:

sh isa sa
if you found this helpful feel free to donate to:
ZEC: t1NQp1UuqQbmnXzazbLTSreS2AbaZpRBuTM
LTC: LZyNF1qkBUA7XFz83m5xwzGgmmj1owQn9d
BTC: 1PY95KFPTEJTR7f2NnSgaB6xB9pwDJkcJz

asa – reset admin password

April 5th, 2011

Reset the asa password on a cisco:

username admin pass 32brawreP7a
if you found this helpful feel free to donate to:
ZEC: t1NQp1UuqQbmnXzazbLTSreS2AbaZpRBuTM
LTC: LZyNF1qkBUA7XFz83m5xwzGgmmj1owQn9d
BTC: 1PY95KFPTEJTR7f2NnSgaB6xB9pwDJkcJz

Cisco 5505 – reset lost password

January 15th, 2011

How to reset a Cisco Password :

  1. Power cycle the cisco and when prompted press ‘esc’. this will bring up the rommon prompt. it will look like this :
    rommon #0>
  2. At the prompt type the following:
    confreg

    (when prompted answer no)

  3. now type :
    confreg 0x41

    This will cause the cisco to ignore its saved config

  4. now reset the cisco, type:
    boot
  5. When its done booting you should see a generic boot example:
    ciscoasa
  6. now type :
    enable

    , at the password prompt just press the “enter” key.

  7. Now copy the startup configuration file into the running configuration with the following command:
    copy startup-config running-config

    . It will ask “Destination filename [running-config]”, just press enter.

  8. Next, in configuration mode, enter the following command to change the Privileged Mode password to a known value:
    enable password yournewpassword

    . Where yournewpassword is the new password you are creating.

  9. Now we need to reset the configuration register to the default of 0x01 to force it to read the startup configuration on boot. Type the following:
    config-register 0x01
  10. Now to make it persistent we need to save the changes, type:
    copy run start

    it will then say “ource filename [running-config]” press enter to continue.

  11. Now reload the Cisco type:
    reload

    . It will ask: “System config has been modified. Save? [Y]es/[N]o:” type “yes”.

Once its done reloading you should be able to use the new password.

if you found this helpful feel free to donate to:
ZEC: t1NQp1UuqQbmnXzazbLTSreS2AbaZpRBuTM
LTC: LZyNF1qkBUA7XFz83m5xwzGgmmj1owQn9d
BTC: 1PY95KFPTEJTR7f2NnSgaB6xB9pwDJkcJz

Cisco – Reset to factory defaults

August 19th, 2010
###  ###  COPY PASTE  ###  ###
confreg
no
confreg 0x41
#
boot
#
### ### LET THE DEVICE BOOT ### ###
#
enable

wr mem
#
conf t
config-register 0x01
reload
yes
#
#
###  ###  END ### ###
if you found this helpful feel free to donate to:
ZEC: t1NQp1UuqQbmnXzazbLTSreS2AbaZpRBuTM
LTC: LZyNF1qkBUA7XFz83m5xwzGgmmj1owQn9d
BTC: 1PY95KFPTEJTR7f2NnSgaB6xB9pwDJkcJz