Port Mirroring or Monitoring Cisco 857 Router

Port Mirroring or Monitoring Cisco 857 Router

If you want to check what traffice is going on or you want to use Wireshark with your router cisco 857 so Clients are connected to port Fa0 and and your Wireshark Machine is connected to Fa1 then use below command.

Conf  t

monitor session 1 source interface Fa0
monitor session 1 destination interface Fa1

you can also use VLAN 1 as your source to capture everything

Posted in Uncategorized | Tagged | Leave a comment

VMware ESX 5.0 Available commands

VMware ESX 5.0 Available commands

BootModuleConfig.sh du halt net-lbt spmd vm-support
Formatters.py echo hbrfilterctl netlogond spmdctl vmcp
Formatters.pyc egrep head nohup ssh vmdumper
InstallHelper.sh eject hexdump nologin stat vmfs-support
Session.py emmett host-ind nslookup statedumper vmkbacktrace
Session.pyc enum_instances host_reboot.sh ntp-keygen storageRM vmkchdev
env host_shutdown.sh ntpd strace vmkdevmgr
            – esxcfg-advcfg hostd ntpdc stty vmkdump_extract
addgroup esxcfg-dumppart hostname ntpq su vmkerrcode
adduser esxcfg-fcoe hotswap.sh od sum vmkeventd
amldump esxcfg-hwiscsi hwclock openssl summarize-dvfilter vmkfstools
apply-host-profiles esxcfg-info hwinfo openwsmand sync vmkiscsi-tool
applyHostProfile esxcfg-init id partedUtil tail vmkiscsid
ash esxcfg-ipsec iked passwd tar vmkload_mod
authd esxcfg-module inetd pidof tcpdump-uw vmkmicrocode
auto-backup.sh esxcfg-mpath init ping techsupport.sh vmkmkdev
awk esxcfg-nas init-launcher ping6 tee vmkperf
backup.sh esxcfg-nics initterm.sh pkill test vmkping
basename esxcfg-rescan jumpstart powerOffVms ticket vmkramdisk
bootOption esxcfg-resgrp kdestroy poweroff time vmksystemswap
busybox esxcfg-route kill printf tmpwatch.py vmkvsitools
cat esxcfg-scsidevs kinit prop_of_instances touch vmtar
chgrp esxcfg-swiscsi klist ps traceroute vmware
chkconfig esxcfg-vmknic less python TRUE vmware-autostart.sh
chmod esxcfg-volume ln randomSeed uname vmware-usbarbitrator
chown esxcfg-vswitch localcli readlink uniq vmware-vimdump
chvt esxcli lockfile reboot unzip vmx
cim-diagnostic.sh esxcli.cgi logchannellogger remoteDeviceConnect uptime vmx-buildtype
cim_host_powerops esxcli.py logger reset useradd vmx-debug
cimslp esxtop login resize userdel vmx-stats
cksum esxupdate ls rm usermod vprobe
clear ethtool lsassd rmdir usleep vprobed
cp expr lsof scantools vdf vscsiStats
crond FALSE lspci scp vdu vsi_traverse
cut fdisk lsusb secpolicytools vem vsish
date fgrep lw-lsa sed vem-connect watch
dcbd find lwiod sensord vem-health watchdog.sh
dcui firmwareConfig.sh md5sum seq vem-remove wc
dcuiweasel ft-stats memstats services.sh vem-support wget
dd gdbserver mkdir setsid vem-swiscsi which
delgroup generate-certificates mkfifo sfcb-config.py vemcli.sh who
deluser getty mknod sfcbd vemcmd whoami
df grabCIMData mktemp sh vemdpalog xargs
dhclient-uw grep more sha1sum vemlog zcat
diff groupadd mv shutdown.sh vemlog-info
dirname groupdel nc sleep vempkt
dmesg groups net-cdp slpd vemset
doat gunzip net-dvs smbiosDump vi
dosfsck gzip net-fence sort vim-cmd
Posted in VMware | Tagged | Leave a comment

Mikrotik hotspot setup

Mikrotik hotspot setup

copy and paste line by line

/ip address
add address=172.16.1.1/24 comment=LAN disabled=no interface=LAN network=172.16.1.0
add address=192.168.137.100/24 comment=WAN disabled=no interface=WAN network=192.168.137.0
———————————————————————————————
/ip pool
add name=hs-pool-1 ranges=172.16.1.10-172.16.1.255
———————————————————————————————
/ip dns
set allow-remote-requests=yes cache-max-ttl=1w cache-size=10000KiB max-udp-packet-size=512 servers=192.168.137.1
———————————————————————————————
/ip dhcp-server
add address-pool=hs-pool-1 authoritative=after-2sec-delay bootp-support=static disabled=no interface=LAN lease-time=1h name=dhcp1
/ip dhcp-server config set store-leases-disk=5m
/ip dhcp-server network add address=172.16.1.0/24 comment=”hotspot network” gateway=172.16.1.1
———————————————————————————————
/ip hotspot profile
set default dns-name=”” hotspot-address=0.0.0.0 html-directory=hotspot http-cookie-lifetime=3d http-proxy=0.0.0.0:0 login-by=cookie,http-chap name=default rate-limit=”” smtp-server=0.0.0.0 split-user-domain=no use-radius=no
add dns-name=login.aacable.net hotspot-address=172.16.1.1 html-directory=hotspot http-cookie-lifetime=1d http-proxy=0.0.0.0:0 login-by=cookie,http-chap name=hsprof1 rate-limit=”” smtp-server=0.0.0.0 split-user-domain=no use-radius=no
/ip hotspot
add address-pool=hs-pool-1 addresses-per-mac=2 disabled=no idle-timeout=5m interface=LAN keepalive-timeout=none name=hotspot1 profile=hsprof1
/ip hotspot user profile
set default idle-timeout=none keepalive-timeout=2m name=default shared-users=1 status-autorefresh=1m transparent-proxy=no
add address-pool=hs-pool-1 advertise=no idle-timeout=none keepalive-timeout=2m name=”512k Limit” open-status-page=always rate-limit=512k/512k shared-users=1 status-autorefresh=1m transparent-proxy=yes
add address-pool=hs-pool-1 advertise=no idle-timeout=none keepalive-timeout=2m name=”256k Limit” open-status-page=always rate-limit=256k/256k shared-users=1 status-autorefresh=1m transparent-proxy=yes
/ip hotspot service-port set ftp disabled=yes ports=21
/ip hotspot walled-garden ip add action=accept disabled=no dst-address=172.16.1.1
/ip hotspot set numbers=hotspot1 address-pool=none
/ip firewall nat add action=masquerade chain=srcnat disabled=no
/ip hotspot user
add disabled=no name=admin password=123 profile=default
add disabled=no name=zaib password=test profile=”512k Limit” server=hotspot1
add disabled=no name=test-256k password=test profile=”256k Limit” server=hotspot1
———————————————————————————————
/ip route
add disabled=no distance=1 dst-address=0.0.0.0/0 gateway=192.168.137.1 scope=30 target-scope=10

Sorce Link click here

Posted in Mikrotik | Tagged | Leave a comment

How to limit upload and download to all users in network using mikrotik RouterOS

How to limit upload and download to all users in network using mikrotik RouterOS

There are two ways how to make this: using mangle and queue trees, or, using simple queues.

1. Mark all packets with packet-marks upload/download: (lets constider that ether1-LAN is public interface to the Internet and ether2-LAN is local interface where clients are connected

/ip firewall mangle add chain=prerouting action=mark-packet in-interface=ether1-LAN new-packet-mark=client_upload

/ip firewall mangle add chain=prerouting action=mark-packet in-interface=ether2-WAN new-packet-mark=client_download

2. Setup two PCQ queue types – one for download and one for upload. dst-address is classifier for user’s download traffic, src-address for upload traffic:

/queue type add name=”PCQ_download” kind=pcq pcq-rate=64000 pcq-classifier=dst-address

/queue type add name=”PCQ_upload” kind=pcq pcq-rate=32000 pcq-classifier=src-address

3. Finally, two queue rules are required, one for download and one for upload:

/queue tree add parent=global-in queue=PCQ_download packet-mark=client_download

/queue tree add parent=global-out queue=PCQ_upload packet-mark=client_upload

If you don’t like using mangle and queue trees, you can skip step 1, do step 2, and step 3 would be to create one simple queue as shown here:

/queue simple add target-addresses=192.168.0.0/24 queue=PCQ_upload/PCQ_download packet-marks=client_download,client_upload

Sorce link:- Click here

 

Posted in Mikrotik | Tagged | Leave a comment

VMware ESX Command line

VMware ESX Command line Management

This documentation describes the concepts, tasks, and commands that you use to administer your virtual environment through the command line. vSphere provides several command-line interfaces that you can use to automate common tasks that you perform to deploy and support your virtual datacenter. For example, you can use vSphere command-line actions to configure and manage storage for the ESXi hosts in your datacenter, set up networking for virtual machines, perform virtual machine power operations, monitor hosts, and many other activities

http://pubs.vmware.com/vsphere-51/index.jsp

 

Posted in VMware | Tagged | Leave a comment

Security tools

I am  very impressed by the collective smarts of the security community and I highly recommend reading the whole list and investigating any tools you are unfamiliar with. Click any tool name for more details on that particular application, including the chance to read (and write) reviews. Many site elements are explained by tool tips if you hover your mouse over them. Enjoy!

a good website for internet security tools information http://sectools.org/

Posted in Uncategorized | Tagged | Leave a comment

how to know who is accessing your files

how to know who is accessing your files

ShareWatch allows you to see who is connected to a computer and what files they are accessing. Have you ever wondered why your hard drive or modem is active, but you aren’t doing anything to cause it to be active?  It is possible a remoteuser is accessing your computer.  Have you ever had a file locked but you don’t know why? ShareWatch can tell you if a network user is using the file and allows you to disconnect them so that you can edit/delete the file.  Have you ever wanted to shutdown a computer, but don’t want to drop people using the
computer.  ShareWatch will show you all resources in use by remote users.

download share watch

Posted in Uncategorized | Tagged | Leave a comment

Free Personal PC Audit Tool

Free Personal PC Audit  Tool

The Belarc Advisor
builds a detailed profile of your installed software and hardware, network
inventory, missing Microsoft hotfixes, anti-virus status, security benchmarks,
and displays the results in your Web browser. All of your PC profile information
is kept private on your PC and is not sent to any web server.

http://www.belarc.com/free_download.html

Posted in Uncategorized | Tagged | Leave a comment

Intel Tools and Utilities

Intel Tools and Utilities

+Compatibility Tools

Tool Description Internet application Desktop application
Intel Product Information Find and compare Intel product specifications. Run n/a
Desktop Boards and Processors
Intel® Processors and Boards Compatibility Tool Find compatible Intel® Processors and Intel® Desktop Boards. Run n/a
Servers
Server Configurator Tool Select compatible components to design a complete server system. After configuring, the tool provides a parts list you can print or export to send to your Intel® Authorized Distributor. Run n/a
Memory Configuration Checker Find optimal memory configurations for Intel® Xeon® 5500, 5600 and 3400 Processor series platforms. Includes a diagnostic utility for checking memory configuration on Windows Server Systems, and features for building/ordering new systems. Run Download

+Identification Tools
Tool Description Internet application Desktop application
Intel System Identification Utility Know what computer components, operating system, and driver versions you have on your computer. Run n/a
Chipsets
Intel® Chipset Identification Utility Identify the Intel® chipset on your motherboard. Download
Processors
Intel® Processor Identification Utility download for Windows* Identify characteristics of the processor inside your computer. Download
Desktop
Intel® Board ID Tool Know if an Intel desktop board is installed on your computer. If an Intel desktop board is found, the tool identified board model and version, BIOS version, and operating system. Run Download
Network Adapter
Yottamark* Authentication Labels Yottamark* sticker is an authentication label that allows anyone to verify the authenticity of Intel® Network Adapter. Run

+Update Tools
Tool Description Internet application Desktop application
Intel Driver Update Utility Know if you have the latest Intel drivers for your computer components. Run
Chipsets
Intel® Chipset Software Installation Utility Automatically detect chipset component and find a driver download. Run Download
Network Adaptor
Intel® Ethernet Connections Boot Utility Program the PCI option ROM on the flash memory of supported Intel PCI and PCI-Express-based network adapters and to update configurations. Download
Solid-State Drives
Intel SATA Solid-State Drive Firmware Update Tool Get the latest firmware. Download

+Diagnostic Tools
Tool Description Internet application Desktop application
Processors
Intel® Processor Diagnostic Tool Know what processor is in your computer and verify the processor operating frequency. The tool also tests specific processor features and performs a stress test on the processor. Download
Solid-State Drives
Intel Solid-State Drive Toolbox Access Intel SSD management features, and run diagnostic scans on Intel Solid-State Drive. Download

+Monitoring Tools
Monitoring Tools

Tool Description Internet application Desktop application
Turbo Boost Monitor Monitors processor frequency activity. Download (Windows 7 only)
Intel® Desktop Utilities Intel® Desktop Utilities provides you with the means to monitor system temperatures, voltages, fan speeds, and hard drive health; view detailed system information, and test your system hardware for common errors. Intel Desktop Utilities will display and log alerts if system parameters deviate from optimal setting to let users take preventative action. Download
Intel® Extreme Tuning Utility The Intel® Extreme Tuning Utility helps you overclock (processor, memory and system clocks) and monitor temperatures, voltages and fan speeds. Download
Posted in Uncategorized | Tagged | Leave a comment

how to edit Alarm in VMware VCenter

how to edit Alarm in VMware VCenter

Change Alarm Attributes   You can rename alarms and change alarm triggers, reporting, and actions.

Required privilege: Alarm.Modify Alarm   Procedure

1 Display the object in the inventory on which the alarm is defined.

2 Select the object and click the Alarms tab.

3 Click Definitions.

The Defined in column lists the object on which the alarm is defined. If the value is not This object, click the object name. The alarms list for the object opens in the Alarms tab.

4 Double-click the alarm to open the Alarm Settings dialog box.

5 Edit the alarm general settings, triggers, reporting, or actions, as needed.

For help on how to configure the values on each tab, click Help.

6 Click OK.

vCenter Server verifies the configuration of the alarm and updates the alarm for the selected object.

Posted in VMware | Tagged | Leave a comment