Password Recovery Procedure for the Cisco IDS Sensor and IDS Services Modules (IDSM-1, IDSM-2)http://www.cisco.com/en/US/products/hw/vpndevc/ps4077/products_password_recovery09186a0080094e83.shtml
Here is sample config for basic LAN-to-LAN IPsec on two routers.http://www.cisco.com/en/US/products/sw/secursw/ps1018/products_configuration_example09186a008073e078.shtmlYou can use any IOS which has Crypto IPsec feature.To identify an IOS for a part...
Hi Paulo,Traffic being encrypted is BASED on the routing table, so anything that points to Tunnel0 is going to be encrypted.In order to force specific traffic (e.g. SMTP), you may have to configure Policy-Based Routing (PBR) i.e. configure class-map ...
Hi SubAa,The 'privilege exec level 15 show' command is incorrect, it shouldn't be there. Remvoe it and it will work. I have added the correction to the errata list.Thanks,Yusuf
IDS should trigger on:3338.0 Windows LSASS RPC Overflow3002.0 TCP SYN Port SweepThere are two tcp ports used for this worm's propagation AFTER the two signatures above have fired. Neither of these exploits a vulnerability inand of itself. These are...