Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
Hi folks,Raising within this community board because it had the most hits for SSH questions,I have a number of "%SEC_LOGIN-4-LOGIN_FAILED" failed SSH authentication attempts which I've tracked down to being a scanning-type behaviour from a customer's...
Hi folks, Apologies if this question is in the wrong place, any redirection will be humbly noted... I wanted to ask about the behaviour of a single 5Mbps policy-map when applied on 4 sub-interfaces simultaneously. In this case I'm traffic shaping and...
Great stuff thank you Rob, that got me the info I was needing!I wasn't thinking outside of the box there, I was thinking, "Surely there's a 'debug' clause or something I can use to invoke the collection of a destination IP/Interface within the SSH co...
Excellent, this could be the subtlety I needed - my access lists are standard numbered by default. I'll try replicating it as named and switch that in, and return with the results
Yes I totally agree. In this case these are from within the private address space for that customer, and this is "rogue" behaviour from one of their 3rd party service providers, no firewalls in the way unfortunately.This is more of a "where do I find...
Absolutely, there are a few solutions to tackle the SSH attempts, there is currently an ACL allowing the 10.x.x.x /8 as the customer's private addressing space, but we hadn't expected these SSH attempts from within their network. They're coming from ...
It's bizarre that any user should be able to reserve a 72 hour session on such a valuable shared resource. For this it seems like 4 hours is reasonable, and anybody needing over that should be buying it. I've read the other thread about the systems h...