A few visual maps that display network attacks
If you're not making mistakes, then you're not doing anything.
+
+
+
+
+
+
+
+
+
+
+
+
A few handy LAN-to-LAN Tunnel VPN commands:
To display all current IKE security associations (SAs) at a peer.
show crypto isakmp sa
To display all current IPsec SA’s.
show crypto ipsec sa
restarting all your ISAKMP VPN Tunnels:
clear crypto isakmp sa
If you need to reset one VPN then you need to reset the IPSEC SA to the peer IP at the other end of your tunnel.
clear ipsec sa peer x.x.x.x
Checking the uptime of a vpn tunnel using the following:
show vpn-sessiondb detail l2l
+
+
+
+
+
+
If you are new to Kali Linux, and want to become more familiar with it, then look no further as I run through a vast array of commands that you can run on the Linux based OS. Let’s begin! KALI LINUX COMMANDS 1.
Source: Kali Linux Commands
+
+
+
+
+
+
This page is simply to provide quick and dirty notes for performing standard packet captures on various Cisco devices. I use these fairly often and needed a place for quick reference. Always ref…
Source: Cisco Packet Capture Reference
+
+
+
+
+
+
Here’s some useful ‘built-in’ Wireshark capability, for troubleshooting on the supervisor. The feature only works with process switched traffic.
nexus#ethanalyzer local interface inband capture-filter “udp port 161”
nexus#ethanalyzer local interface inband capture-filter “udp port 161” detail
nexus#ethanalyzer local interface inband capture-filter “udp port 161” write bootflash:snmp.pcap
An ACL log is necessary to capture data plane traffic. Steps for this can be found here: Ethanalyzer Link

+
+
+
+
+
+
+
+
+
+
+
+