<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Generic firewall route and interface reporting in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/generic-firewall-route-and-interface-reporting/m-p/3315554#M995790</link>
    <description>1000 commands is a bit exaggerated.&lt;BR /&gt;With show route you'll get all routes the firewall knows (static and dynamic) like netstat -rn on a Linux. Show int ip brief gives you the interface name and the ip address. If this is the only thing you're interested in then those 2 command are enough. &lt;BR /&gt;&lt;BR /&gt;If you want to go deeper in the routing then you'll have a set of command for each protocol, the same applies to interfaces, if you want to see the name zone of the interface or checking interfaces counters&lt;BR /&gt;</description>
    <pubDate>Mon, 22 Jan 2018 00:24:53 GMT</pubDate>
    <dc:creator>Francesco Molino</dc:creator>
    <dc:date>2018-01-22T00:24:53Z</dc:date>
    <item>
      <title>Generic firewall route and interface reporting</title>
      <link>https://community.cisco.com/t5/network-security/generic-firewall-route-and-interface-reporting/m-p/3315524#M995768</link>
      <description>&lt;P&gt;&lt;EM&gt;The forum is not displaying my replies and after editing the original post, the thread has disappeared so I am reposting this without any potential characters in the code snippet that may cause a problem.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have several Cisco based firewalls all with different firmware versions for which I am asked to develop an application to report on all the interfaces and the firewalls routes. A technician has stated that each device requires 1000's of commands to enumerate this information. The question I have is whether the technician is correct in that assertion. I can imagine it may vary from device to device, and even by firmware version (though not frequently I am sure) however I am skeptical of the magnitude of commands suggested.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For example, in FreeBSD, I can obtain all the interfaces with &lt;STRONG&gt;ifconfig&lt;/STRONG&gt; and known routes with &lt;STRONG&gt;netstat&lt;/STRONG&gt;&amp;nbsp;producing information such as:&lt;/P&gt;
&lt;PRE&gt;vmx0: inet x.y.z.255 netmask 0xfffffc00 broadcast 255.255.255.255
vmx1: inet 172.18.0.1 netmask 0xffffff00 broadcast 172.18.0.255
vmx2: inet 172.17.0.1 netmask 0xffffff00 broadcast 172.17.0.255
vmx3: inet 172.16.0.1 netmask 0xffffff00 broadcast 172.16.0.255
vmx4: inet 172.15.0.1 netmask 0xffffff00 broadcast 172.15.0.255
vmx5: inet a.b.c.165 netmask 0xfffffc00 broadcast 255.255.255.255
lo0: inet 127.0.0.1 netmask 0xff000000

Internet:
Destination        Gateway            Flags     Netif Expire
default            x.y.z.1            UGS        vmx0
a.b.c.0/22         link#6             U          vmx5
a.b.c.165          link#6             UHS         lo0
x.y.z.0/22         link#1             U          vmx0
x.y.z.255          link#1             UHS         lo0
127.0.0.1          link#7             UH          lo0
172.15.0.0/24      link#5             U          vmx4
172.15.0.1         link#5             UHS         lo0
172.16.0.0/24      link#4             U          vmx3
172.16.0.1         link#4             UHS         lo0
172.17.0.0/24      link#3             U          vmx2
172.17.0.1         link#3             UHS         lo0
172.18.0.0/24      link#2             U          vmx1
172.18.0.1         link#2             UHS         lo0&lt;/PRE&gt;
&lt;P&gt;Does a similar convention of reasonable command length exist for Cisco based firewalls?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:10:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/generic-firewall-route-and-interface-reporting/m-p/3315524#M995768</guid>
      <dc:creator>erik.morillo</dc:creator>
      <dc:date>2020-02-21T15:10:50Z</dc:date>
    </item>
    <item>
      <title>Re: Generic firewall route and interface reporting</title>
      <link>https://community.cisco.com/t5/network-security/generic-firewall-route-and-interface-reporting/m-p/3315535#M995774</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;What command are you looking for?&lt;BR /&gt;&lt;BR /&gt;For getting all interfaces and their IPs, you can use "show int ip brief" and for routes use "show route"&lt;BR /&gt;</description>
      <pubDate>Sun, 21 Jan 2018 23:03:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/generic-firewall-route-and-interface-reporting/m-p/3315535#M995774</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-01-21T23:03:21Z</dc:date>
    </item>
    <item>
      <title>Re: Generic firewall route and interface reporting</title>
      <link>https://community.cisco.com/t5/network-security/generic-firewall-route-and-interface-reporting/m-p/3315548#M995779</link>
      <description>&lt;P&gt;Hi&amp;nbsp;Francesco,&lt;BR /&gt;So if I was to extrapolate the technicians reaction, it may take a combined total of 1000 or more commands to create and manage all the potential route types on a given firewall, but in the case where I need to simply enumerate the interfaces and all known routes at a given point in time on the device, the commands you provided are sufficient. To be honest, those look pretty basic and&amp;nbsp;likely to be present on most firewall OS's and firmware versions. I'll revisit the concern with the guy but it looks like I can accomplish what I need.&lt;BR /&gt;&lt;BR /&gt;Thanks a lot.&lt;/P&gt;</description>
      <pubDate>Sun, 21 Jan 2018 23:55:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/generic-firewall-route-and-interface-reporting/m-p/3315548#M995779</guid>
      <dc:creator>erik.morillo</dc:creator>
      <dc:date>2018-01-21T23:55:55Z</dc:date>
    </item>
    <item>
      <title>Re: Generic firewall route and interface reporting</title>
      <link>https://community.cisco.com/t5/network-security/generic-firewall-route-and-interface-reporting/m-p/3315554#M995790</link>
      <description>1000 commands is a bit exaggerated.&lt;BR /&gt;With show route you'll get all routes the firewall knows (static and dynamic) like netstat -rn on a Linux. Show int ip brief gives you the interface name and the ip address. If this is the only thing you're interested in then those 2 command are enough. &lt;BR /&gt;&lt;BR /&gt;If you want to go deeper in the routing then you'll have a set of command for each protocol, the same applies to interfaces, if you want to see the name zone of the interface or checking interfaces counters&lt;BR /&gt;</description>
      <pubDate>Mon, 22 Jan 2018 00:24:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/generic-firewall-route-and-interface-reporting/m-p/3315554#M995790</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-01-22T00:24:53Z</dc:date>
    </item>
  </channel>
</rss>

