This is the quick-and-dirty guide to getting a wireless gateway running with
the NoCatAuth system. If you simply want to "run a NoCat node", this should
get you going.
For detailed instructions on how to set up your own Authentication Service
(and a good overall view of how this whole thing works), check out
Introduction.txt and AuthService.txt in the doc/ directory.
We don't recommend running the gateway and the authservice on the same machine,
but if you're dead-set on doing it, be sure to read doc/SameMachine.txt *first*.
###
## Installing a Gateway
##
For the terminally impatient
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Check your prerequisites as below. Then, try the following:
$ su -
# tar zvxf NoCatAuth-x.xx.tar.gz
# cd NoCatAuth-x.xx
# make gateway
# cd /usr/local/nocat
# vi nocat.conf
# bin/gateway
If you see something to the effect of:
[2001-12-28 20:38:27] Resetting firewall.
[2001-12-28 20:38:27] Binding listener socket to 0.0.0.0
...then you're up! Watch the progress in 'nocat.log', and give it a try.
Step by step
-=-=-=-=-=-=-
Currently, the gateway is designed to run on a standalone box. If you
have other firewall rules defined, THEY WILL BE OVERWRITTEN by the gateway
process when it starts. See the end of this file for how to get around
this, but please first consider running the gateway on its own machine.
Also, remember that running a gateway requires root permissions.
1. Make sure you have the prerequisites installed:
* Linux 2.4.x with iptables. You'll find a sample kernel configuration
in etc/linux-2.4.config. Support for other OSes is planned,
especially FreeBSD. Support for ipchains is beta, and is currently
broken. Patches welcome.
* gpgv, a PGP signature verifier. gpgv comes with the gnupg package,
which can be downloaded from http://www.gnupg.org/download.html
* You'll probably also want to run dhcpd on this machine, but DHCP
can in some cases be served from your access point or elsewhere on
your local network.
* If you want to try the bandwidth throttling rules, you'll also need a
copy of the 'tc' tool from the iproute2 package. Get it at
ftp://ftp.inr.ac.ru/ip-routing/
* Optionally (and recommended), a local caching DNS server.
2. Unpack the NoCatAuth tarball. You probably already did this if you're
reading this file.
$ tar zvxf NoCatAuth-x.xx.tar.gz
3. Edit the Makefile, if necessary. The only real option at present is
INST_PATH, which determines where NoCatAuth gets installed to. The default
is '/usr/local/nocat', so if that's okay with you, you can skip this step.
4. From the NoCatAuth directory, run 'make gateway'. This will install the
important pieces of the gateway software.
5. Edit the /usr/local/nocat/nocat.conf file to suit. These parameters are
required:
* InternalDevice must be set to the interface name of your wireless card,
or the ethernet card that talks to your AP (e.g., eth0. See
docs/Introduction.txt for more details.)
* ExternalDevice must be set to the name of the network interface
that talks to the Internet. (probably the ethernet card connected to
your DSL or cable modem, or your dialup device: eth1, ppp0, etc.)
* LocalNetwork needs to be set to the network address and mask of your
internal (wireless) network. This typically takes the form
111.222.333.444/255.255.255.0, or 11.22.33.44/24, etc.
* DNSAddr needs to be set to the same domain name server address that
your DHCP server hands out, if and only if you're using a DNS
outside your LocalNetwork (as specified above). Otherwise, if you're
using a caching DNS server on the gateway or anywhere else on your
wireless network, leave this option commented out.
* GatewayMode toggles between Open and Captive mode. An Open gateway
just displays the html file specified in SplashForm for acceptance.
Captive mode implements the whole authentication process. If you
want people to have to login, use Captive mode.
* AuthServiceAddr, AuthServiceURL, and LogoutURL depend on your chosen
auth service (assuming you're using Captive as your GatewayMode.)
Check with your local auth service admins for these values (or leave
the defaults to use our auth service.)
* IncludePorts and ExcludePorts can be set to restrict ports that public
users can access (say, to disallow email traffic.) If you use
IncludePorts, only the ports listed will be allowed. Using
ExcludePorts makes all ports available *except* the ports listed.
Currently, only TCP ports are supported.
###
## Starting the gateway
##
You should now be able to start the portal by running bin/gateway as root.
You'll see a message to the effect of:
[2001-12-28 20:38:27] Resetting firewall.
[2001-12-28 20:38:27] Binding listener socket to 0.0.0.0
If it doesn't start cleanly, read on.
The portal needs to know where to find (a) its perl libraries, and (b) its
nocat.conf configuration file. NoCatAuth tries very hard to figure out these
values on its own. If you installed to /usr/local/nocat, you should have no
problems.
Otherwise, you *may* need to add the following variables to the
shell environment before running the gateway script:
$ export PERL5LIB=/path/to/nocat/lib:$PERL5LIB
$ export NOCAT=/path/to/nocat/nocat.conf
Utilities like iptables, modprobe, and gpgv need should be in your $PATH
somewhere (if they aren't already). For example:
$ export PATH=$PATH:/sbin:/usr/sbin:/usr/local/sbin
Starting the gateway is then as simple as: (from a root prompt)
# /path/to/nocat/bin/gateway
NOTE: You MUST run the gateway program as root, in order for it to be able to
update the firewall rules as needed. Arguably, this is a bug. Patches welcome.
To start the gateway service automatically at boot time, check out the
etc/nocat.rc script. Install it by copying it to /etc/rc.d/init.d, and
either add a call to it in your rc.local, or symlink it to your runlevel,
like this:
# ln -s /etc/rc.d/init.d/nocat.rc /etc/rc.d/rc3.d/S99nocat
Congratulations. You're now running a gateway.
###
## Important Notes for the Gateway
##
* Make sure that your dhcp server hands out the same DNS address listed in
nocat.conf (if you're using external DNS). Otherwise, your wireless
clients won't be able to resolve hostnames.
* We have designed this software to be run on very modest hardware (a 486/50
with 32MB ram should be plenty.) Please consider running the gateway on a
dedicated machine before simply installing it on your existing firewall.
IP security is a complicated enough already... NoCat adds to the
complexity by introducing dynamic firewall rules that are triggered by
completely anonymous users (via the wireless.) While no security system is
foolproof, risk can be minimized by isolating your wireless node from the
rest of your network.
Please read docs/Introduction.txt (and a good book on firewalls) for more
details.
### Thanks for using NoCatAuth. GOOD LUCK! PATCHES WELCOME!
Saturday, February 17, 2007
Hotspot Server Installation Guide
I. Creating the Admin Account
[ Skip to Section II if you already have a Less Networks username (and password) that you will use as the administrator account for this hotspot server. ]
II. Building the Hotspot Server
[ Skip to Section III if your computer already has Linux, NoCat, and LESS Networks software. ]
ACCEPT
" when prompted. root
". use the password "
imag3micr0
" [numbers 3 and 0];otherwise, use the password "
foobar
". [root@localhost root]# passwd
III. Connecting the Hotspot Server to Internet and Wireless Network
Dynamic Network Connection
[ This is the default type of network connection. ]Quick Method for Dynamic
4. If you have subsequent problems obtaining an IP address on either NIC:
Alternative Method for Dynamic
ipconfig /release
", then "ipconfig /renew
". ifdown eth0
", then "ifup eth0
". ssh
to 192.168.168.1 (the Hotspot Server) as "root
". ssh
client is available for most platforms at www.openssh.com ] /etc/sysconfig/network-scripts/ifcfg-eth0
to include the following lines: -
BOOTPROTO=dhcp
-
ONBOOT=yes
BOOTPROTO
) ] ssh
connection. ssh
to the Hotspot Server from the client computer. [root@localhost root]# ping yahoo.com
Static Network Connection
ipconfig /release
", then "ipconfig /renew
". ifdown eth0
", then "ifup eth0
". ssh
to 192.168.168.1 (the Hotspot Server) as "root
". ssh
client is available for most platforms at www.openssh.com ] ssh
connection, edit /etc/resolv.conf
to reflect your DNS ("nameserver" settings): -
nameserver
-
nameserver
ssh
connection, edit /etc/sysconfig/network-scripts/ifcfg-eth0
to include the following: -
DEVICE=eth0
-
BOOTPROTO=static
-
ONBOOT=yes
-
IPADDR=
-
GATEWAY=
-
NETMASK=
BOOTPROTO
) ] ssh
connection, edit /usr/local/nocat/nocat.conf
and /opt/less/files_to_be_copied/nocat.conf.tmpl
to include the following: -
DNSAddr
ssh
connection. ssh
to the Hotspot Server from the client computer. [root@localhost root]# ping yahoo.com
PPPoE Network Connection
[ If you have an Efficient/SBCYahoo 5100B DSL Modem, first read the document at www.midasnetworks.com/5100AB.html ]ipconfig /release
", then "ipconfig /renew
". ifdown eth0
", then "ifup eth0
". ssh
to 192.168.168.1 (the Hotspot Server) as "root
". ssh
client is available for most platforms at www.openssh.com ] adsl-setup
" on the command line of the Hotspot Server ssh
connection, and answer the questions. 0
". ifup ppp0
" on the Hotspot Server command line. ssh
connection. ssh
to the Hotspot Server from the client computer. [root@localhost root]# ping yahoo.com
IV. Configuring your AP (Access Point)
disable dhcp server
" Gateway only
" V. Setting the Admin Account and Customizing your Hotspot
www.google.com
". VI. Powering Down the Hotspot Server
ssh
to 192.168.168.1 and login as "root
". [root@localhost root]# shutdown -h now
VII. Changing Hotspot Server Connection Configuration
/etc/sysconfig/network-scripts/ifcfg-eth0
to include the following lines: -
BOOTPROTO=dhcp
-
ONBOOT=yes
BOOTPROTO
) ] [root@localhost root]# ifconfig ppp0 down
[root@localhost root]# ifdown pp0
[root@localhost root]# ifconfig eth0 up
[root@localhost root]# ifup eth0
/etc/sysconfig/network-scripts/ifcfg-eth0
to include the following lines: -
BOOTPROTO=dhcp
-
ONBOOT=yes
BOOTPROTO
) ] VIII. Basic Troubleshooting
[root@localhost root]# service network restart
[root@localhost root]# service dhcpd restart
Monday, February 12, 2007
Update IOS Switch
Buat admin yang (mungkin) terkena amnesia mendadak dan tiba2 lupa password switch catalystnya , bisa mencoba metode ini untuk merecovery password. pengalaman pribadi nih :P. udah coba dioprek di Catalyst 2950 & 2960 ,dan menurut white papper juga berlaku untuk switch seri 35xx keatas
buat yang mo nyoba, ga disaranin dicoba di switch yang masih operasional, kalo ada apa-apa dipecat gw ngga tanggung jawab
pertama-tama tentunya harus punya akses fisik ke switch yang mau direcovery. Nah untuk langkah awal kita coba grepe2 badan switch kita ini dulu :D, biasanya selain button power ada satu button lagi yang labelnya MODE. ok kalo udah ketemu jangan dipencet dulu.. idupin switchnya dulu ( ya iya lah.. :P) tapi jangan kelamaan, pas proses start-up cepet2 pencet tombol MODE hingga tampilannya berubah kaya gini :
The system has been interrupted prior to initializing the
flash filesystem. The following commands will initialize
the flash filesystem, and finish loading the operating
system software:
flash_init
load_helper
boot
nah trus tungguin sampe keluar prompt kaya gini neh :
Switch:
setelah itu masukin perintah :
Switch: load_helper
Load_helper — Load and initialize a helper image
klo kata systemnya sih fungsinya itu….. buat nambah2in perintah yg di hidden.
ok, lanjut masukin perintah ini :
Switch: flash_init
Initializing Flash…
flashfs[0]: 18 files, 2 directories
flashfs[0]: 0 orphaned files, 0 orphaned directories
flashfs[0]: Total bytes: 7741440
flashfs[0]: Bytes used: 3966464
flashfs[0]: Bytes available: 3774976
flashfs[0]: flashfs fsck took 7 seconds.
…done initializing flash.
Boot Sector Filesystem (bs:) installed, fsid: 3
Parameter Block Filesystem (pb:) installed, fsid: 4
fungsinya adalah untuk inisialisasi flash system image yg ada pada switch.
Setelah itu kita bisa mengecek isi dari switch ini dengan menggunakan perintah “dir”
contoh:
switch: dir
List of filesystems currently registered:
flash[0]: (read-write)
xmodem[1]: (read-only)
null[2]: (read-write)
bs[3]: (read-only)
silahkan jalan2 & liat2 jeroan nih switch sekarang :), tapi inget.. tujuan kita adalah mereset password switch yang dilupain ama admin nyah okeh.. hm.. dari list diatas itu ada folder2 yg ada di dalem switch, mari kita intip isi flash nya
switch: dir flash:
Directory of flash:/
2 -rwx 2664051 c2950-i6q4l2-mz.121-11.EA1.bin
3 -rwx 269 env_vars
4 -rwx 2296 vlan.dat
5 -rwx 3441 config.text
6 -rwx 5 private-config.text
7 drwx 704 html
19 -rwx 109 info
20 -rwx 109 info.ver
3774976 bytes available (3966464 bytes used)
oke, gw review dikit beberapa file diatas yang menarik :
c2950-i6q4l2-mz.121-11.EA1.bin <—- ini cisco IOS nya vlan.dat <—- file konfigurasi vlan neeh… config.text <—- file konfigurasi switch, alias startup-config nyah nah.. , kepikiran sesuatu ngga :D, klo kita bisa edit file config.text yang mana adalah akan diload waktu switch booting. kita bisa memanipulasi tuh enable secret , that’s how it works okeh, kita langsung ke serangan utama (weleh kayak mo ngapain aja, ) rename file config.text menjadi config.text.lama , caranya adalah sebagai berikut : switch: rename flash: config.text flash: config.text.lama kemudian kita cek hasil nya : switch: dir flash: Directory of flash:/ 2 -rwx 2664051 c2950-i6q4l2-mz.121-11.EA1.bin
3 -rwx 269 env_vars
4 -rwx 2296 vlan.dat
5 -rwx 3441 config.text.lama
6 -rwx 5 private-config.text
7 drwx 704 html
19 -rwx 109 info
20 -rwx 109 info.ver
3774976 bytes available (3966464 bytes used)
switch:
nah sekarang nama filenya udah berubah , sekarang reboot switchnya dengan perintah :
switch: boot
setelah kita eksekusi maka akan keluar seperti:
File “flash:/c2950-i6q4l2-mz.121-11.EA1.bin” uncompressed and installed, entry point: 0×80010000
executing…
Restricted Rights Legend
Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706
Cisco Internetwork Operating System Software
IOS ™ C2950 Software (C2950-I6Q4L2-M), Version 12.1(11)EA1, RELEASE SOFTWARE (fc1)
Copyright (c) 1986-2002 by cisco Systems, Inc.
Compiled Wed 28-Aug-02 10:25 by antonino
Image text-base: 0×80010000, data-base: 0×80528000
Initializing flashfs…
flashfs[1]: 18 files, 2 directories
flashfs[1]: 0 orphaned files, 0 orphaned directories
flashfs[1]: Total bytes: 7741440
flashfs[1]: Bytes used: 3966464
flashfs[1]: Bytes available: 3774976
flashfs[1]: flashfs fsck took 7 seconds.
flashfs[1]: Initialization complete.
Done initializing flashfs.
POST: System Board Test : Passed
POST: Ethernet Controller Test : Passed
ASIC Initialization Passed
POST: FRONT-END LOOPBACK TEST : Passed
cisco WS-C2950-24 (RC32300) processor (revision G0) with 20402K bytes of memory.
Processor board ID FOC0652Y1DH
Last reset from system-reset
Running Standard Image
24 FastEthernet/IEEE 802.3 interface(s)
32K bytes of flash-simulated non-volatile configuration memory.
Base ethernet MAC Address: 00:0B:BE:DE:C2:40
Motherboard assembly number: 73-5781-11
Power supply part number: 34-0965-01
Motherboard serial number: FOC06520A0V
Power supply serial number: PHI06470GKF
Model revision number: G0
Motherboard revision number: A0
Model number: WS-C2950-24
System serial number: FOC0652Y1DH
— System Configuration Dialog —
Would you like to enter the initial configuration dialog? [yes/no]:
well.. lihat apa yang kita lakukan…, kayak switch baru kan
okeh ke langkah selanjutnya dulu.. pilih no untuk membypass initial configuration
langkah berikutnya :
Switch>en
Switch#dir
Directory of flash:/
2 -rwx 2664051 Mar 01 1993 00:03:22 c2950-i6q4l2-mz.121-11.EA1.bin
3 -rwx 269 Jan 01 1970 00:01:24 env_vars
4 -rwx 2296 Mar 28 1993 22:10:35 vlan.dat
5 -rwx 3441 Mar 08 1993 22:54:27 config.text.lama
6 -rwx 5 Mar 08 1993 22:54:27 private-config.text
7 drwx 704 Mar 01 1993 00:03:59 html
19 -rwx 109 Mar 01 1993 00:04:01 info
20 -rwx 109 Mar 01 1993 00:04:01 info.ver
7741440 bytes total (3774976 bytes free)
Switch#rename flash:config.text.lama flash:config.text
Destination filename [config.text]?
maksud perintah ini adalah mengganti file config.text (yang masih polosan) dengan file config.text.lama (config yang asli) sehingga settingan2 kita yang lama tetep muncul. Kecuali kalo emang niat diilangin sekalian :P, okeh..
untuk memasukkan configurasi lama kedalam running config, cukup dengan perintah :
Switch# copy flash: config.text system: running-config
Source filename [config.text]?
Destination filename [running-config]?
yup, anda sudah kembali kawan
SwitchPuntodewo#
sekarang enaknya ngapain ya…, hehe. ya jelas.. kita ubah enable secret nyaa… hehe…
SwitchPuntodewo# configure terminal
SwitchPuntodewo (config)# enable secret khayangan
SwitchPuntodewo (config)# exit
SwitchPuntodewo# write memory
Building configuration…
[OK]
yup, silahkan letakkan kembali switch anda ditempat yang terlihat manis..
dan lanjutkan maen game online lagi heheh…
buat yang mo nyoba, ga disaranin dicoba di switch yang masih operasional, kalo ada apa-apa dipecat gw ngga tanggung jawab
pertama-tama tentunya harus punya akses fisik ke switch yang mau direcovery. Nah untuk langkah awal kita coba grepe2 badan switch kita ini dulu :D, biasanya selain button power ada satu button lagi yang labelnya MODE. ok kalo udah ketemu jangan dipencet dulu.. idupin switchnya dulu ( ya iya lah.. :P) tapi jangan kelamaan, pas proses start-up cepet2 pencet tombol MODE hingga tampilannya berubah kaya gini :
The system has been interrupted prior to initializing the
flash filesystem. The following commands will initialize
the flash filesystem, and finish loading the operating
system software:
flash_init
load_helper
boot
nah trus tungguin sampe keluar prompt kaya gini neh :
Switch:
setelah itu masukin perintah :
Switch: load_helper
Load_helper — Load and initialize a helper image
klo kata systemnya sih fungsinya itu….. buat nambah2in perintah yg di hidden.
ok, lanjut masukin perintah ini :
Switch: flash_init
Initializing Flash…
flashfs[0]: 18 files, 2 directories
flashfs[0]: 0 orphaned files, 0 orphaned directories
flashfs[0]: Total bytes: 7741440
flashfs[0]: Bytes used: 3966464
flashfs[0]: Bytes available: 3774976
flashfs[0]: flashfs fsck took 7 seconds.
…done initializing flash.
Boot Sector Filesystem (bs:) installed, fsid: 3
Parameter Block Filesystem (pb:) installed, fsid: 4
fungsinya adalah untuk inisialisasi flash system image yg ada pada switch.
Setelah itu kita bisa mengecek isi dari switch ini dengan menggunakan perintah “dir”
contoh:
switch: dir
List of filesystems currently registered:
flash[0]: (read-write)
xmodem[1]: (read-only)
null[2]: (read-write)
bs[3]: (read-only)
silahkan jalan2 & liat2 jeroan nih switch sekarang :), tapi inget.. tujuan kita adalah mereset password switch yang dilupain ama admin nyah okeh.. hm.. dari list diatas itu ada folder2 yg ada di dalem switch, mari kita intip isi flash nya
switch: dir flash:
Directory of flash:/
2 -rwx 2664051
3 -rwx 269
4 -rwx 2296
5 -rwx 3441
6 -rwx 5
7 drwx 704
19 -rwx 109
20 -rwx 109
3774976 bytes available (3966464 bytes used)
oke, gw review dikit beberapa file diatas yang menarik :
c2950-i6q4l2-mz.121-11.EA1.bin <—- ini cisco IOS nya vlan.dat <—- file konfigurasi vlan neeh… config.text <—- file konfigurasi switch, alias startup-config nyah nah.. , kepikiran sesuatu ngga :D, klo kita bisa edit file config.text yang mana adalah akan diload waktu switch booting. kita bisa memanipulasi tuh enable secret , that’s how it works okeh, kita langsung ke serangan utama (weleh kayak mo ngapain aja, ) rename file config.text menjadi config.text.lama , caranya adalah sebagai berikut : switch: rename flash: config.text flash: config.text.lama kemudian kita cek hasil nya : switch: dir flash: Directory of flash:/ 2 -rwx 2664051
3 -rwx 269
4 -rwx 2296
5 -rwx 3441
6 -rwx 5
7 drwx 704
19 -rwx 109
20 -rwx 109
3774976 bytes available (3966464 bytes used)
switch:
nah sekarang nama filenya udah berubah , sekarang reboot switchnya dengan perintah :
switch: boot
setelah kita eksekusi maka akan keluar seperti:
File “flash:/c2950-i6q4l2-mz.121-11.EA1.bin” uncompressed and installed, entry point: 0×80010000
executing…
Restricted Rights Legend
Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706
Cisco Internetwork Operating System Software
IOS ™ C2950 Software (C2950-I6Q4L2-M), Version 12.1(11)EA1, RELEASE SOFTWARE (fc1)
Copyright (c) 1986-2002 by cisco Systems, Inc.
Compiled Wed 28-Aug-02 10:25 by antonino
Image text-base: 0×80010000, data-base: 0×80528000
Initializing flashfs…
flashfs[1]: 18 files, 2 directories
flashfs[1]: 0 orphaned files, 0 orphaned directories
flashfs[1]: Total bytes: 7741440
flashfs[1]: Bytes used: 3966464
flashfs[1]: Bytes available: 3774976
flashfs[1]: flashfs fsck took 7 seconds.
flashfs[1]: Initialization complete.
Done initializing flashfs.
POST: System Board Test : Passed
POST: Ethernet Controller Test : Passed
ASIC Initialization Passed
POST: FRONT-END LOOPBACK TEST : Passed
cisco WS-C2950-24 (RC32300) processor (revision G0) with 20402K bytes of memory.
Processor board ID FOC0652Y1DH
Last reset from system-reset
Running Standard Image
24 FastEthernet/IEEE 802.3 interface(s)
32K bytes of flash-simulated non-volatile configuration memory.
Base ethernet MAC Address: 00:0B:BE:DE:C2:40
Motherboard assembly number: 73-5781-11
Power supply part number: 34-0965-01
Motherboard serial number: FOC06520A0V
Power supply serial number: PHI06470GKF
Model revision number: G0
Motherboard revision number: A0
Model number: WS-C2950-24
System serial number: FOC0652Y1DH
— System Configuration Dialog —
Would you like to enter the initial configuration dialog? [yes/no]:
well.. lihat apa yang kita lakukan…, kayak switch baru kan
okeh ke langkah selanjutnya dulu.. pilih no untuk membypass initial configuration
langkah berikutnya :
Switch>en
Switch#dir
Directory of flash:/
2 -rwx 2664051 Mar 01 1993 00:03:22 c2950-i6q4l2-mz.121-11.EA1.bin
3 -rwx 269 Jan 01 1970 00:01:24 env_vars
4 -rwx 2296 Mar 28 1993 22:10:35 vlan.dat
5 -rwx 3441 Mar 08 1993 22:54:27 config.text.lama
6 -rwx 5 Mar 08 1993 22:54:27 private-config.text
7 drwx 704 Mar 01 1993 00:03:59 html
19 -rwx 109 Mar 01 1993 00:04:01 info
20 -rwx 109 Mar 01 1993 00:04:01 info.ver
7741440 bytes total (3774976 bytes free)
Switch#rename flash:config.text.lama flash:config.text
Destination filename [config.text]?
maksud perintah ini adalah mengganti file config.text (yang masih polosan) dengan file config.text.lama (config yang asli) sehingga settingan2 kita yang lama tetep muncul. Kecuali kalo emang niat diilangin sekalian :P, okeh..
untuk memasukkan configurasi lama kedalam running config, cukup dengan perintah :
Switch# copy flash: config.text system: running-config
Source filename [config.text]?
Destination filename [running-config]?
yup, anda sudah kembali kawan
SwitchPuntodewo#
sekarang enaknya ngapain ya…, hehe. ya jelas.. kita ubah enable secret nyaa… hehe…
SwitchPuntodewo# configure terminal
SwitchPuntodewo (config)# enable secret khayangan
SwitchPuntodewo (config)# exit
SwitchPuntodewo# write memory
Building configuration…
[OK]
yup, silahkan letakkan kembali switch anda ditempat yang terlihat manis..
dan lanjutkan maen game online lagi heheh…
Saturday, February 10, 2007
Recovering IOS from ROMMON via TFTP
This information is here primarily for my reference at customer sites; for some odd reason, I seem to be recovering IOS images through ROMMON quite a bit lately. These are the minimum fields to get this going through TFTP rather than XModem.
rommon 1 > IP_ADDRESS=192.168.1.100
rommon 2 > IP_SUBNET_MASK=255.255.255.0
rommon 3 > DEFAULT_GATEWAY=192.168.1.1
rommon 4 > TFTP_SERVER=192.168.1.50
rommon 5 > TFTP_FILE=c2600-adventerprisek9-mz.124-5a.bin
rommon 6 > tftpdnld (this command kicks off the tftp download)
rommon 1 > IP_ADDRESS=192.168.1.100
rommon 2 > IP_SUBNET_MASK=255.255.255.0
rommon 3 > DEFAULT_GATEWAY=192.168.1.1
rommon 4 > TFTP_SERVER=192.168.1.50
rommon 5 > TFTP_FILE=c2600-adventerprisek9-mz.124-5a.bin
rommon 6 > tftpdnld (this command kicks off the tftp download)
Subscribe to:
Posts (Atom)