PIX#sh access-list | grep -v hticnt=0
sh access-list TACACS | grep -v hitcnt=0
access-list TACACS; 4 elements
access-list TACACS line 4 extended permit icmp any host 136.1.125.100 (hitcnt=1)
ROUTER(config)#default ?
aaa Authentication, Authorization and Accounting.
access-list Add an access list entry
….
ASA(config)# vpnsetup ?
configure mode commands/options:
ipsec-remote-access Display IPSec Remote Access Configuration Commands
l2tp-remote-access Display L2TP/IPSec Configuration Commands
site-to-site Display IPSec Site-to-Site Configuration Commands
ssl-remote-access Display SSL Remote Access Configuration Commands
ASA#sh ip audit count | i Echo
2000 I ICMP Echo Reply 0
2004 I ICMP Echo Request 0
2000 I ICMP Echo Reply 0
2004 I ICMP Echo Request 0
ROUTER#show ip port-map | in tacacs|radius
Default mapping: tacacs udp port 49 system defined
Default mapping: radius udp port 1812,1813 system defined
Default mapping: tacacs-ds tcp port 65 system defined
ROUTER#erase nvram:startyp-config
ROUTER#config replace nvram:startup-config list force
IPS#erase current-config;Dynamips (‘dyna’) commands:
IPS#reset
SWITCH#vtp file nvram:vlan.dat
Or
SWITCH#format flash
SWITCH#no cdp log mismatch duplex
Have a question about something in this article? You can receive help directly from the article author. Sign up for a free trial to get started.
Comments (0)