KEMBAR78
FW & SW Command 1 | PDF | Ip Address | Virtual Private Network
0% found this document useful (0 votes)
4 views12 pages

FW & SW Command 1

Uploaded by

y6c7mn4myg
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views12 pages

FW & SW Command 1

Uploaded by

y6c7mn4myg
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 12

Show running access-group

sh running-config access-list | include (IP) -------------- to check working rule

nat (wafdmz, outside) static 116.50.97.90

object network REAL-10.131.195.123


nat (wafdmz, outside) static 116.50.97.90

sh ip route (IP) ------------ to check the route


sh ip route vrf all IP | include (IP) ----------- check IP in which VRF
sh running-config interface VLAN (Port) ---------------- core and ag switch, where
the Subnet is configured in VLAN
sh object-group id (NAME) ---------------- to check object group IPs
sh run object-group network | i object-group | (IP) ------------ to check IPs are
called on which object group
sh running-config access-group ----------- to check the interface
show xlate | i (IP) ----------- To check Nating

Show running access-group

Switch SW CM.
sh module uptime
show module
No poweroff module 1 (1)
show module internal all

tail -f messages | grep (IP)

tracecert

IPSEC Comm.

show crypto ipsec sa | b 10.92.32.192

clear crypto ipsec sa peer 117.254.196.59

Phase 1 --- sh crypto isakmp sa | b 103.102.65.92


Phase 2 --- show crypto ipsec sa peer 117.254.196.59

Show ip bgp neighbors 10.67.122.252 received-routes vrf O2C

troubleshoot cmd

sf_troubleshoot.pl

show running access-group


packet-tracer input azure tcp 10.45.156.32 111 10.166.164.60 1535----- new rule
command

As requested, access has been allowed. Source: IP Destination: IP Port No: port

admin
cisco@JAM

username: RilENTNetwork@ril.com
password : 3pUxDE6bpRubBMjt

CRT Pass:- Sagar@9876

object network ULIP-STAGE-URL


fqdn v4 ulipstaging.dpiit.gov.in

time-range 21NOV2024-21DEC2024
absolute start 00:00 21 November 2024 end 23:59 21 December 2024

tail -f messages | grep (IP)

tracecert

Show crypto ipsec sa peer 13.232.1.150

sh connection address

sh conn | i IP

sh conn | i

Normal Port Opening


===========================================================================
Show IP route (IP address) ------- to check the specific route
show running-config interface (Vlan224)

raccess.ril.com/entidc
evpn.ril.com

Change to system ----------- to check cluster-info


show cluster Info ----------- to check CPU states

Sagar@122527

show endpoint (IP) ------------- to check Tenent

DMZ PCI
===========================================================================
sh ip route (IP)----- to check a route in AG
show running-config interface (VLAN) ------ to check a VLAN on AG
show route | i (10.129.78.0) IP --------- to check the route and firewall arm,
which is the route that will be injected.
show running-config access-group ------- to check the running access group on the
firewall
show access-list acl_dmz | i (IP) ----- to check specific arms with access list and
host
show access-list | i (access list name) eg.(acl_dmz line 80) to check existing
object groups
Object-group network (Name of object group) -------- to create an object group
Network-object host (IP address), e.g. 10.131.53.28 ----- to create an IP object
Network-object (network address with subnet mask), e.g. 10.129.99.128
255.255.255.128-------- to create a network subnet
Time-range 15APRIL19_15APRIL19(Name can be for a specific duration) ---- to create
a time object
Absolute start 00:00 15 APRIL 2019 end 23:59 15 APRIL 2019 (actual duration) -----
time object
access-list (policy name) extended permit tcp object-group (source IP Object name)
object-group (Destination IP Object name) (destination port) time-range (start date
end date)
packet-tracer input (arm) tcp (Source IP) (source Port) (Destination IP)
(Destination port)----- new rule command
show access-list | i (IP) ---------- to check static IP.

show access-list | include (IP) ------------- to check rule from source IP or


destination IP

show access-list | include (acl_retrelease line 1939) ---------- rule line and acce

================================================================================

sh route | b 10.131

packet-tracker input dmz tcp (Source IP) (Source Port) (Destination IP)
(Destination Port)

SAMARTH-REAL-IP - 10.21.108.140 ---FTD FW NAT Host name


SAMARTH-REAL-PUBLIC-IP - 116.50.90.157

object network REAL-10.131.195.176 >>new


host 10.131.195.176
nat (wafdmz, outside) static 116.50.97.15

-----------------------------------------------------------------------------------
-

ssh-keygen -R 10.44.45.50

HPNNMI Commands
# show processes cpu
# sh cpu usage
# sh cpu utilization
# show module
# show inventory
# show environment all
# show interface port-channel 5
#sh int Ethernet Gi1/0/1
#sh int Ethernet1/29
#show env | i power
#show env power
# sh cpu usage detailed
# show isakmp sa detail
# show port-channel summary
# show environment power
# show environment temperature

# show version | i up
# show environment power-supplies
# show access-list | i
# show interface port-channel 5
# sh interface Ethernet1/28
# sh cpu usage
dsa.msc

# show ip route
# show run interface vlan224
# show run access-group

#show ip arp vrf all | i 10.22.131.22

•To check specific access list with arm details


# show access-list acl_out | i 10.131.37.56

•To check existing object groups


# show access-list | i acl_out line 8646
# show run object-group network | i object-group |

•To check firewall interface


#show run logging
#show ip address

•To check sylogs


$ tail -f messages | grep src/dest IP

tail -f messages | grep 10.129.208.13 | grep Block


more -f messages | grep 10.21.106.34

##To generate Tshoot file on FMC through CLI


>expert
admin@FMC:~$ sudo su
root@FMC:volume/home/admin# sf_troubleshoot.pl

---URL filtering---
*To create object Network,
*command to create object network
#object network GOOGLEAPIS
fqdn v4 fcm.googleapis.com

*were GOOGLEAPIS is name for object network


and public url for which object network created is fcm.googleapis.com

*command to find the object network


sh run object network in-lin | i <OBJ GRP NAME>

*command to find the object network


sh run object network in-lin | i <OBJ GRP NAME>

sh running-config object | i facebook.com


*create fqdn object network -
object network ftp1.tpinformation.com
fqdn v4 ftp1.tpinformation.com

*Packet tracer command -


packet-tracer input dmz-s02 tcp 10.128.78.185 100 fqdn ftp1.tpinformation.com 22

*access-list -
access-list acl_dmz-s02 extended permit tcp object-group CLX-ISCM_DB-SRV object
ftp1.tpinformation.com eq 22

RF599903
Access- Permanent
Source IP- INTERNET-ANY
Destination IP- 10.129.84.58/ 116.50.66.46
Application Port No.- 443
Justification- To run application over the internet.
note- approved for waf vip 10.129.84.58/116.50.66.46 Irm approval required. kindly
update waf sheet.

FW- DMZ-CLUSTER-FMC

***To create New NAT rule***


1. create object for real and natted IP (host object)
2. check arm of the real IP- ex. src ARM RPWAF and Dest Arm OUTSIDE
3. All NAT rule must above the PAT rule.
4. Go to device- NAT- Add rule- Manual NAT-> NAT rule above the PAT rule-> Type-
static
Interface objects- Add source and dest arm
Transaltion-> Original source- select Real IP object grp; Translated Source:
select NAT IP object grp

RSTP-SRV-REAL 10.129.84.58
RSTP-SRV-NAT 116.50.66.46

Src obj grp- INTERNET-ANY


Dst obj grp- RSTP-SRV-REAL

Rule name- INTERNET-RSTP-SRV-ACCESS

Access is allowed on DMZ-CLUSTER FMC.

####Here is how you can open Remote Desktop Connection with Run:

Right-click Start or press Win + X to open the aptly-named WinX menu.

Select Run on that menu.


Type mstsc in the Open box.

Click the OK button to open Remote Desktop Connection.

Trouble shooting command –


1. To check no of active tunnel
RCP-IDC1-TR-1R01-RETAIL-FW-PRI/Internet# sh crypto isakmp stats
2. To check route
RCP-IDC1-TR-1R01-RETAIL-FW-PRI/Internet# sh route | i 10.120.88.208(Remote site LAN
ip)
V 10.120.88.208 255.255.255.240 connected by VPN (advertised), outside

3. to clear Phase 2 Tunnel


RCP-IDC1-TR-1R01-RETAIL-FW-PRI/Internet# clear crypto ipsec sa peer (IP)

4. If route is not present and Phase 2 is UP, Then ask WAN Team to re initiate the
tunnel.
As in Dynamic VPN. Reverse Route injected Post Completion of Phase 2.

#show ip arp vrf all | i 10.128.254.24


# show mac address-table address 0050.569b.7795
# show cdp neighbors interface port-channel 11 detail

RCP-IDC1-SH02-3R13-9K-CS1# show ip arp vrf all | i 10.128.254.24


10.128.254.24 00:11:43 0050.569b.7795 Vlan251 +
RCP-IDC1-SH02-3R13-9K-CS1# show ma
mac mac-list maintenance
RCP-IDC1-SH02-3R13-9K-CS1# show mac
mac mac-list
RCP-IDC1-SH02-3R13-9K-CS1# show ip
ip ipv6
RCP-IDC1-SH02-3R13-9K-CS1# show mac
mac mac-list
RCP-IDC1-SH02-3R13-9K-CS1# show mac a
access-lists address-table
RCP-IDC1-SH02-3R13-9K-CS1# show mac a
access-lists address-table
RCP-IDC1-SH02-3R13-9K-CS1# show mac address-table address 0050.569b.7795
Legend:
* - primary entry, G - Gateway MAC, (R) - Routed MAC, O - Overlay MAC
age - seconds since last seen,+ - primary entry using vPC Peer-Link,
(T) - True, (F) - False, C - ControlPlane MAC, ~ - vsan
VLAN MAC Address Type age Secure NTFY Ports
---------+-----------------+--------+---------+------+----+------------------
+ 251 0050.569b.7795 dynamic 0 F F Po11
RCP-IDC1-SH02-3R13-9K-CS1# show cdp neighbors interface port-channel 11 detail
----------------------------------------
Device ID:RCP-IDC1-SH02-1R08-AC1.ril.com(FDO252502AU)
System Name: RCP-IDC1-SH02-1R08-AC1

Interface address(es): 1
IPv4 Address: 10.22.26.18
Platform: N9K-C93180YC-FX, Capabilities: Router Switch IGMP Filtering Supports-STP-
Dispute
Interface: Ethernet7/2, Port ID (outgoing port): Ethernet1/49
Holdtime: 170 sec

Version:
Cisco Nexus Operating System (NX-OS) Software, Version 9.3(8)
Advertisement Version: 2

Native VLAN: 777


Duplex: full

MTU: 9216
Mgmt address(es):
IPv4 Address: 10.22.26.18
Local Interface MAC: 6c:13:d5:03:76:bc
Remote Interface MAC: 00:00:00:00:00:00
----------------------------------------
Device ID:RCP-IDC1-SH02-1R07-AC1.ril.com(FDO25250HTQ)
System Name: RCP-IDC1-SH02-1R07-AC1

Interface address(es): 1
IPv4 Address: 10.22.26.17
Platform: N9K-C93180YC-FX, Capabilities: Router Switch IGMP Filtering Supports-STP-
Dispute
Interface: Ethernet8/2, Port ID (outgoing port): Ethernet1/49
Holdtime: 140 sec

Version:
Cisco Nexus Operating System (NX-OS) Software, Version 9.3(8)

Advertisement Version: 2

Native VLAN: 777


Duplex: full

MTU: 9216
Mgmt address(es):
IPv4 Address: 10.22.26.17
Local Interface MAC: f8:7a:41:b5:f5:e0
Remote Interface MAC: d4:77:98:29:c0:47

RCP-IDC1-SH02-1R08-AC1# show mac address-table address 0050.569b.7795


Legend:
* - primary entry, G - Gateway MAC, (R) - Routed MAC, O - Overlay MAC
age - seconds since last seen,+ - primary entry using vPC Peer-Link,
(T) - True, (F) - False, C - ControlPlane MAC, ~ - vsan
VLAN MAC Address Type age Secure NTFY Ports
---------+-----------------+--------+---------+------+----+------------------
* 251 0050.569b.7795 dynamic 0 F F Po35
RCP-IDC1-SH02-1R08-AC1# show por
port-channel port-profile
RCP-IDC1-SH02-1R08-AC1# show port-channel summary interface po35
Flags: D - Down P - Up in port-channel (members)
I - Individual H - Hot-standby (LACP only)
s - Suspended r - Module-removed
b - BFD Session Wait
S - Switched R - Routed
U - Up (port-channel)
p - Up in delay-lacp mode (member)
M - Not in use. Min-links not met
--------------------------------------------------------------------------------
Group Port- Type Protocol Member Ports
Channel
--------------------------------------------------------------------------------
35 Po35(SU) Eth LACP Eth1/1(P)
RCP-IDC1-SH02-1R08-AC1# show interface ethernet1/1
Ethernet1/1 is up
admin state is up, Dedicated Interface
Belongs to Po35
Hardware: 100/1000/10000/25000 Ethernet, address: d477.9829.c048 (bia
d477.9829.c048)
MTU 9216 bytes, BW 25000000 Kbit , DLY 10 usec
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, medium is broadcast
Port mode is trunk
full-duplex, 25 Gb/s, media type is 25G
Beacon is turned off
Auto-Negotiation is turned off FEC mode is Auto
Input flow-control is off, output flow-control is off
Auto-mdix is turned off
Rate mode is dedicated
Switchport monitor is off
EtherType is 0x8100
EEE (efficient-ethernet) : n/a
admin fec state is auto, oper fec state is Fc-fec
Last link flapped 6week(s) 3day(s)
Last clearing of "show interface" counters 106w0d
14 interface resets
Load-Interval #1: 30 seconds
30 seconds input rate 119376 bits/sec, 14 packets/sec
30 seconds output rate 19608 bits/sec, 17 packets/sec
input rate 119.38 Kbps, 14 pps; output rate 19.61 Kbps, 17 pps
Load-Interval #2: 5 minute (300 seconds)
300 seconds input rate 209808 bits/sec, 5 packets/sec
300 seconds output rate 148144 bits/sec, 14 packets/sec
input rate 209.81 Kbps, 5 pps; output rate 148.14 Kbps, 14 pps
RX
95983932235 unicast packets 6508400 multicast packets 19343 broadcast packets
95990459978 input packets 90713761339840 bytes
38138772428 jumbo packets 0 storm suppression bytes
0 runts 0 giants 0 CRC 0 no buffer
0 input error 0 short frame 0 overrun 0 underrun 0 ignored
0 watchdog 0 bad etype drop 0 bad proto drop 0 if down drop
0 input with dribble 0 input discard
0 Rx pause
TX
74790954127 unicast packets 500644161 multicast packets 143946991 broadcast
packets
75435545279 output packets 56144262538621 bytes
24375568613 jumbo packets
0 output error 0 collision 0 deferred 0 late collision
0 lost carrier 0 no carrier 0 babble 0 output discard
0 Tx pause

10.92.33.64

----------------------------------------------------

show port channel summary


show enpoint interface port channel po7 detail

show cluster in
show cpu-usage sorted non-zer0

show processess cpu

show cpu usage detail

show capture

tmatch compile thread is running

show conn count

sysytem support diagnostic-cli

show access-list element-count

show process cpu-hog

sho cluster history

********************************************************************************

connect fxos

connect ftd

system support diagnostic-cli

show failover

configure high-availability disable


yes
yes
sync-from-peer system
show failover
show ip add
show conn count
connect fxos
connect local-mamt
exit
scope firmware
download image usbA:/cisco-asa-fp1k.9.20.3.16.SPA
show download-task
show package
scop auto-install
install security-pack version 9.20.3.16
yes
yes

Command given by tac


show detail
int m0/0
ip address <ip><subnet>
Anvesh Pathak 27-05-2025 10:57 • int m0/0
no nameif
ip address <ip><subnet>
int g0/0
nameif inside
security-lvl 100
ip address <ip><subnet> standby <ip>
no shut

int g0/1
nameif outside
security-lvl 0
ip address <ip><subnet>
no shut

show ip

ssh 0 0 outside
route outside 0 0 {next hop ip address}
username {} password {} privilege 15
aaa authentication ssh console LOCAL
ssh timeout 60

----

interface

configure high-availablity resume

write memory

failover active

scope auto-install

yes
yes
show detail

#reload
>reboot

show crypto ikev1 stats


show crypto ipsec stats
system support diagnostic-cli

-----------------------------------------------------------------------------------
------------------------------------------------------------------
===================================================================================
========================================================================

M&S IP Pool Migration & Static to Dynamic.

Note: - Kindly confirm the Pool IP and Peer IPs for the User & take details by
mail.

There are 2 firewalls for M&S


1) M&S IP SEC Tunnel: - IP
2) ACL FIREWALL FOR VPN VENDOR: - IP
3) IP

Stapes For
1) M&S IP SEC Tunnel: - IP

• Log in to IP FW and add a New IP pool in MnS-STORE-NW Object Group


CLI Command Below
E.g.
object-group network MnS-STORE-NW
network-object IP /Subnet

• Add to the access List for the New IP POOL


E.g.
access-list MnS standard permit IP /Subnet

object-group network MnS-STORE-NW

RCP-IDC1-TR-1R04-MS-FW-PRI# show running-config | i IP


network-object IP /Subnet
access-list MnS standard permit IP /Subnet
route outside IP /Subnet Route IP 1

2) ACL FIREWALL FOR VPN VENDOR: - IP

• Add to the access List for the New IP POOL


E.g.
access-list EXTNNP standard permit IP /Subnet

• Add as a Route in 10.128.0.242 Firewall


E.g.
route m&S IP /Subnet Router IP

• Login to IP FW and add a New IP pool in M&S-NEW-IP-POOL Object Group


CLI Command Below
E.g.
object-group network M&S-NEW-IP-POOL
network-object IP /Subnet

3) Add a New IP POOL in RDP Login 10.128.3.100 and M&S IP SEC Tunnel IP IP
• Login a RDP IP
• Login to Cisco ASDM by IP
• Click on Configuration => Click on Site-to-Site VPN => Go down and Click on
Search =>
Paste Peer IPs => and search you will get a VPN Tunnel => open that Tunnel => You
will able to see a Remote Network => Click on that and Remove an Old Lan Pool IP &
Add a New Lan Pool IP in it. => Click on OK => Click on Apply => Click on Save.
Screenshot of your Reference.

Before Image

After Image
Static to dynamic

Note: - Confirm a Peer IP and Lan Pool IP for the User on mail.

• Login a RDP IP
• Login to Cisco ASDM by IP
• Click on Configuration => Click on Site-to-Site VPN => Go down and Click on
Search =>
Paste Peer IPs => and search you will get a VPN Tunnel => Click on That VPN Tunnel
=> Click on Delete => Click on Apply => Click on Save.

Screenshot of your Reference.

Open Cisco ASDM-IDM Launcher.

Login to in Cisco ASDM-IDM Launcher.

After Login Page

Click on Configuration Then Site-to-Site VPN

Go Down & Search with Peer IPs.


Select That VPN Tunnel you will see the Delete option Click on that.
Then Apply & Save

You might also like