22/04/2013
The following batch file calls Wireshark and carries out a capture without the gui component. The following script is based upon a 50MByte file with a rolling buffer of 50 files.
@echo off
# # -p disable promiscous mode
# -i specify interface use “tshark -D” to identify
# -w where to save files
# -b filesize in KB
# -b number of files to loop
#
cd “Program Files\Wireshark”
tshark -p -i “\Device\NPF_{AD47A206-AC68-4A33-8D45-75B59D330695}” -w D:\WIRESHARK_LOGS\Tuesday\tshark-out.pcap -b filesize:50000 -b files:50
Leave a Comment » | Monitoring, Troubleshooting | Permalink
Posted by swampie51
02/04/2013
!
!
!
ip local pool IPADDR_VPN_POOL x.x.x.x x.x.x.x
!
aaa new-model
!
aaa authentication login LETMEIN_GROUPx local
aaa authentication login userauthen local
aaa authorization network LETMEIN_GROUPx local
!
username AVAYAx1 password 0 xxxx1
username AVAYAx2 password 0 xxxx2
username AVAYAx3 password 0 xxxx3
username AVAYAx4 password 0 xxxx4
!
crypto isakmp policy 1
encr 3des
hash md5
authentication pre-share
group 2
!
crypto isakmp client configuration group LETMEIN_GROUPx
key $x$x$
pool IPADDR_VPN_POOL
pfs
!
crypto ipsec transform-set MYTSET_3DESx esp-3des esp-md5-hmac
!
crypto ipsec security-association lifetime seconds 86400
!
crypto dynamic-map dynmap2 20
set transform-set MYTSET
set pfs group2
reverse-route
!
crypto map clientmap client authentication list userauthen
crypto map clientmap isakmp authorization list groupauthor
crypto map clientmap client configuration address respond
!
!
interface XXX/XXX
ip address X.X.X.X X.X.X.X
!
crypto map clientmap
crypto map clientmap 20 ipsec-isakmp dynamic dynmap2
!
Leave a Comment » | About Me, ACE, CCNP, CSM, DMVPN, Firewall, IP SLA, iPAD/iPhone, IPSEC, IUWNE, Layer2, Layer3, Linux, LYNC, Monitoring, Proxy, Rancid, Routing, SWITCH, Switching, Troubleshooting, VPN, Wireless | Permalink
Posted by swampie51