Run Wireshark from a batch file

22/04/2013

The following batch file calls Wireshark and carries out a capture without the gui component. The following script is based upon a 50MByte file with a rolling buffer of 50 files.

 

@echo off

# # -p disable promiscous mode

# -i specify interface use “tshark -D” to identify

# -w where to save files

# -b filesize in KB

# -b number of files to loop

#

cd “Program Files\Wireshark”

tshark -p -i “\Device\NPF_{AD47A206-AC68-4A33-8D45-75B59D330695}” -w D:\WIRESHARK_LOGS\Tuesday\tshark-out.pcap -b filesize:50000 -b files:50

Advertisements

Cisco Router and Avaya Phone VPN example

02/04/2013

!
!
!
ip local pool IPADDR_VPN_POOL x.x.x.x x.x.x.x
!
aaa new-model
!
aaa authentication login LETMEIN_GROUPx local
aaa authentication login userauthen local
aaa authorization network LETMEIN_GROUPx local
!
username AVAYAx1 password 0 xxxx1
username AVAYAx2 password 0 xxxx2
username AVAYAx3 password 0 xxxx3
username AVAYAx4 password 0 xxxx4
!
crypto isakmp policy 1
encr 3des
hash md5
authentication pre-share
group 2
!
crypto isakmp client configuration group LETMEIN_GROUPx
key $x$x$
pool IPADDR_VPN_POOL
pfs
!
crypto ipsec transform-set MYTSET_3DESx esp-3des esp-md5-hmac
!
crypto ipsec security-association lifetime seconds 86400
!
crypto dynamic-map dynmap2 20
set transform-set MYTSET
set pfs group2
reverse-route
!
crypto map clientmap client authentication list userauthen
crypto map clientmap isakmp authorization list groupauthor
crypto map clientmap client configuration address respond
!
!
interface XXX/XXX
ip address X.X.X.X X.X.X.X
!
crypto map clientmap

crypto map clientmap 20 ipsec-isakmp dynamic dynmap2
!