Tcpdump data collection

2008-12-02 Thread Subba Rao
Hello,

I want to collect data on a network and map the data flow and system/port 
traffic. There are 2 scenarios of data collection here.  The first is to 
collect IP traffic only.  In this method I do not want the data portion of the 
IP packet (need IP address, source/destination ports etc).

The second is to collect traffic that will show all the routing protocols 
(non-IP) used on this network.  Today while collecting the data, I saw several 
HSRP packets.  I don't know what portion of the packet is sufficient to capture 
for this purpose.

I used the "-s 0" option on tcpdump which captures the whole packet.  That is 
making the dump file large.  Any help with the filters is appreciated to 
capture the non-data portion of the packets.

Thank you in advance.

Subba Rao


Cisco Audit Tool?

2009-03-05 Thread Subba Rao
For auditing, is there any Cisco Router/Switch configuration analysis tool?

Thank you in advance.

Subba Rao



Nipper and Cisco configuration results

2009-04-02 Thread Subba Rao
I am using Nipper for verifying my Cisco configuration.  Nipper is finding the 
"rlogin" service that is not in the configuration.  I have searched the access 
lists and do not see it anywhere.  The explanation by Nipper about this 
finding, "Telnet protocol implemented by this service" is confusing.  
Here is the Nipper's output:

__
Rlogin Service Settings

The Rlogin service enables remote administrative access to a CLI on Cisco 
Router Devices.  The Telnet protocol implemented by th service is simple and 
provides no encryption of the network communications between client and the 
server.  This section details the Rlogin settings.

Description                Setting
Rlogin Service            Enabled
Service TCP Port        513
__

I have checked a few other routers where SSH was not enabled with the same 
results.

Can someone explain why Nipper is saying "Rlogin is enabled" when I do not see 
it in the configuration file?  Is there something else that I need to be 
looking at?

Thank you in advance for any help.

Subba Rao


RE: Nipper and Cisco configuration results

2009-04-02 Thread Subba Rao
I did not scan the routers yet with nmap.  These results are from Nipper 
analysis.  None of the access lists are showing "port 513" as Nipper is 
complaining about.  The IOS version is 12.4

Subba Rao


--- On Thu, 4/2/09, Jo¢  wrote:

From: Jo¢ 
Subject: RE: Nipper and Cisco configuration results
To: castellan2004-...@yahoo.com, nanog@nanog.org
Date: Thursday, April 2, 2009, 8:18 PM

What IOS version are you using? I don't see that behavior (rlogin/rsh) by
default, but I'm a few revisions behind on the latest. @ 12.2
I do see from the router: 
RCMD-4-RSHPORTATTEMPT Attempted to connect to RSHELL from 192.168.1.52
from nmaps, but theres no response to the SYN packet of the attempting IP. I
think this has been
the case since w-a-y earlier versions of IOS for logging levels but not sure
at which level.
Looks to only be logging an attempt, no session is made, sort of like a
firewall 
just letting you know there was an attempt. The router gets the request but
it falls on deaf
ears, no one home. Unless perhaps theres some other sort of flag/bit that
can be presented to 
open that connection(extremely doubtful) I don't believe theres any way to
connect. 

Perhaps turning down your logging will prevent your testing program from
reporting a false positive?
I'd snoop/sniff the traffic and see if your router is SYN/ACK-ing the
request of rlogin/rsh to be sure.

And make sure their not to close to one another, incase their using
undocumented 
internal wireless units as a means to complete the connection, those Cisco
guys you know..

Regards
Joe Blanchard

> -----Original Message-
> From: Subba Rao [mailto:castellan2004-...@yahoo.com] 
> Sent: Thursday, April 02, 2009 6:33 PM
> To: nanog@nanog.org
> Subject: Nipper and Cisco configuration results
> 
> I am using Nipper for verifying my Cisco configuration.  
> Nipper is finding the "rlogin" service that is not in the 
> configuration.  I have searched the access lists and do not 
> see it anywhere.  The explanation by Nipper about this 
> finding, "Telnet protocol implemented by this 
> service" is confusing.  Here is the Nipper's output:
> 
> __
> Rlogin Service Settings
> 
> The Rlogin service enables remote administrative access to a 
> CLI on Cisco Router Devices.  The Telnet protocol implemented 
> by th service is simple and provides no encryption of the 
> network communications between client and the server.  This 
> section details the Rlogin settings.
> 
> Description                Setting
> Rlogin Service            Enabled
> Service TCP Port        513
> __
> 
> I have checked a few other routers where SSH was not enabled 
> with the same results.
> 
> Can someone explain why Nipper is saying "Rlogin is enabled" 
> when I do not see it in the configuration file?  Is there 
> something else that I need to be looking at?
> 
> Thank you in advance for any help.
> 
> Subba Rao



RE: Nipper and Cisco configuration results

2009-04-02 Thread Subba Rao
Joe,

Thank you for replying.  I am asking about the Nipper complaint.  Why is Nipper 
report saying "Rlogin" is enabled when I don't see any ACL in the config?

Using IOS 12.4

Cheers,

Subba Rao



--- On Thu, 4/2/09, Jo¢  wrote:

From: Jo¢ 
Subject: RE: Nipper and Cisco configuration results
To: castellan2004-...@yahoo.com, nanog@nanog.org
Date: Thursday, April 2, 2009, 9:09 PM


Subba,

Sorry, perhaps I am confussed about the nature of your question? Did you
have acls up for logging these attempts and they weren't logged? or are you
asking for help from the Nipper portion of this as to why its reporting this
item. 
With my logging turned up to debug I do see entries about RSHPORTATTEMPTs,
but I suspect theres a lesser logging
for that based on facility.
At 12.3 I don't see any sort of problem with an open Rlogin/Rsh, and I have
tested this on a router running a very minimal configuration. Hands out DHCP
and does OSPF, but that's about it. 

Can you clarify your problem a bit? 

-Joe

 


________

    From: Subba Rao [mailto:castellan2004-...@yahoo.com] 
    Sent: Thursday, April 02, 2009 8:25 PM
    To: nanog@nanog.org; Jo¢
    Subject: RE: Nipper and Cisco configuration results
    
    
    I did not scan the routers yet with nmap.  These results are from
Nipper analysis.  None of the access lists are showing "port 513" as Nipper
is complaining about.  The IOS version is 12.4
    
    Subba Rao
    
    
    --- On Thu, 4/2/09, Jo¢  wrote:
    


        From: Jo¢ 
        Subject: RE: Nipper and Cisco configuration results
        To: castellan2004-...@yahoo.com, nanog@nanog.org
        Date: Thursday, April 2, 2009, 8:18 PM
        
        
        What IOS version are you using? I don't see that behavior
(rlogin/rsh) by
        default, but I'm a few revisions behind on the latest. @
12.2
        I do see from the router: 
        RCMD-4-RSHPORTATTEMPT Attempted to connect to RSHELL from
192.168.1.52
        from nmaps, but theres no response to the SYN packet of the
attempting IP. I
        think this has been
        the case since w-a-y earlier versions of IOS for logging
levels but not sure
        at which level.
        Looks to only be logging an attempt, no session is made,
sort of like a
        firewall 
        just letting you know there was an attempt. The router gets
the request but
        it falls on deaf
        ears, no one home. Unless perhaps theres some other sort of
flag/bit that
        can be presented to 
        open that connection(extremely doubtful) I don't believe
theres any way to
        connect. 
        
        Perhaps turning down your logging will prevent your testing
program from
        reporting a false positive?
        I'd snoop/sniff the traffic and see if your router is
SYN/ACK-ing the
        request of rlogin/rsh to be sure.
        
        And make sure their not to close to one another,
incase their using
        undocumented 
        internal wireless units as a means to complete the
connection, those Cisco
        guys you know..
        
        Regards
        Joe Blanchard
        
        > -Original Message-
        > From: Subba Rao [mailto:castellan2004-...@yahoo.com] 
        > Sent: Thursday, April 02, 2009 6:33 PM
        > To: nanog@nanog.org
        > Subject: Nipper and Cisco configuration results
        > 
        > I am using Nipper for verifying my Cisco configuration.  
        > Nipper is finding the "rlogin" service that is not in the 
        > configuration.  I have searched the access lists and do
not 
        > see it anywhere.  The explanation by Nipper about this 
        > finding, "Telnet protocol implemented by this 
        > service" is confusing.  Here is the Nipper's output:
        > 
        > __
        > Rlogin Service Settings
        > 
        > The Rlogin service enables remote administrative access to
a 
        > CLI on Cisco Router Devices.  The Telnet protocol
implemented 
        > by th service is simple and provides no encryption of the 
        > network communications between client and the server.
This 
        > section details the Rlogin settings.
        > 
        > Description                Setting
        > Rlogin Service            Enabled
        > Service TCP Port        513
        > __
        > 
        > I have checked a few other routers where SSH was not
enabled 
        > with the same results.
        > 
        > Can someone explain why Nipper is saying "Rlogin is
enabled" 
        > when I do not see it in the configuration file?  Is there 
        > something else that I need to be looking at?
        > 
        > Thank you in advance for any help.
        > 
        > Subba Rao
        
        

        



Re: Nipper and Cisco configuration results

2009-04-03 Thread Subba Rao
I will check this as soon as I go to work this morning.  One thing I noticed 
was about the Nipper results is that any router where SSH was disabled/Rlogin 
was enabled and vice versa.

I will go thru the configuration file once again.

Thank you very much for checking this out!

Subba Rao


--- On Thu, 4/2/09, Lee  wrote:

From: Lee 
Subject: Re: Nipper and Cisco configuration results
To: castellan2004-...@yahoo.com
Cc: nanog@nanog.org
Date: Thursday, April 2, 2009, 11:31 PM

On 4/2/09, Subba Rao  wrote:
> I am using Nipper for verifying my Cisco configuration.  Nipper is finding
> the "rlogin" service that is not in the configuration.  I have searched the
> access lists and do not see it anywhere.  The explanation by Nipper about
> this finding, "Telnet protocol implemented by this service" is
> confusing.  Here is the Nipper's output:
  <..snip ..>
> Can someone explain why Nipper is saying "Rlogin is enabled" when I do not
> see it in the configuration file?  Is there something else that I need to be
> looking at?

I played with it a bit - removing the "transport input telnet" on a
vty line got me the rlogin service is enabled.  Add it back & nipper
says it's disabled...

Do you have a "transport input telnet" on each vty?  If not, does
adding it fix the nipper report?

Regards,
Lee


Re: Nipper and Cisco configuration results

2009-04-03 Thread Subba Rao
I did see a few false positives too with Nipper.  What do you think about 
Router Audit Tool (RAT) instead?  I downloaded ncat (aka RAT), but it does not 
have a global configuration file which I can use for all the routers and 
switches I have.  Any tips on ncat/RAT configuration?  I could not find any 
examples on using ncat.

Subba Rao

--- On Fri, 4/3/09, Christopher  wrote:

From: Christopher 
Subject: Re: Nipper and Cisco configuration results
To: "nanog" 
Date: Friday, April 3, 2009, 12:36 PM

On Thu, 2009-04-02 at 15:33 -0700, Subba Rao wrote:
> I am using Nipper for verifying my Cisco configuration.  Nipper is
>  finding the "rlogin" service that is not in the configuration.  I have
>  searched the access lists and do not see it anywhere.  The explanation
>  by Nipper about this finding, "Telnet protocol implemented by this
>  service" is confusing.

The problem, IMHO, is nipper.  You might or might not have the rlogin
service enabled, but nipper has so many false positives I find is almost
useless.  In my case, it caught some obvious things I had forgotten to
do, but everything else was useless.  For instance from the nipper
source code:

struct vulnerability report_vuln_ios11 = {9, 0, 0, 12, 4, 0,
                          "CVE-2007-0479", "22208",
                          "IPv4 TCP listener denial of service",
                          true, false,
                          vuln_req_none, false, &report_vuln_ios12};

What the above means to nipper is any IOS version 12.0.x, 12.1.x,
12.2.x, 12.3.x is vulnerable, while every 12.4.x version is OK.  This is
obviously false on *both* counts.  
http://www.cisco.com/en/US/products/products_security_advisory09186a00807cb0e4.shtml


I spent a lot of time trying to explain this to $corporate audit guy
that had never even logged into a router, let alone had to choose a
stable IOS version for 6500/7600 class hardware.



>   Here is the Nipper's output:
> 




> Thank you in advance for any help.
> 
> Subba Rao
-- 
Christopher McCrory
 "The guy that keeps the servers running"
 
chris...@pricegrabber.com
 http://www.pricegrabber.com
 
To the optimist, the glass is half full.
To the pessimist, the glass is half empty.
To the engineer, the glass is twice as big as it needs to be.





Re: Nipper and Cisco configuration results

2009-04-04 Thread Subba Rao
I looked at the configurations yesterday on the routers.  The vty line does not 
have any "transport" line below it.  All the routers showing "Rlogin enabled" 
have similar configuration.

What are the default services that are enabled for vty on IOS 12.4?  I know 
there are only telnet, SSH and Rlogin.  Is there any particular sequence that 
IOS processes the vty access?

Subba Rao

--- On Thu, 4/2/09, Lee  wrote:

From: Lee 
Subject: Re: Nipper and Cisco configuration results
To: castellan2004-...@yahoo.com
Cc: nanog@nanog.org
Date: Thursday, April 2, 2009, 11:31 PM

On 4/2/09, Subba Rao  wrote:
> I am using Nipper for verifying my Cisco configuration.  Nipper is finding
> the "rlogin" service that is not in the configuration.  I have searched the
> access lists and do not see it anywhere.  The explanation by Nipper about
> this finding, "Telnet protocol implemented by this service" is
> confusing.  Here is the Nipper's output:
  <..snip ..>
> Can someone explain why Nipper is saying "Rlogin is enabled" when I do not
> see it in the configuration file?  Is there something else that I need to be
> looking at?

I played with it a bit - removing the "transport input telnet" on a
vty line got me the rlogin service is enabled.  Add it back & nipper
says it's disabled...

Do you have a "transport input telnet" on each vty?  If not, does
adding it fix the nipper report?

Regards,
Lee


Configuration Compliance tools??

2011-04-16 Thread Subba Rao
Hi,

I am tasked to analyze the configuration of several Layer 2 Switches for
compliance.  Most of these switches are from Foundry (now Brocade).
What tools are available to perform this task?  I could write up a Perl
script to parse thru the configuration files.  I was wondering if there
are some already out there for use.

Any information appreciated.

Thank you in advance.

Subba Rao