,

How To Delete Mails From Or To A Specific Email Address From Your Mail Queue (Postfix)

If you get hit by a spam attack that floods your server with hundreds/thousands of emails from the same sender email address or to the same recipient email address, you can clean your mail queue from these emails with one single command before the mail flood takes your server to its knees.

You can check your current mail queue like this:

postqueue -p

To delete all mails from the mail queue that come from falko@example.com or are sent to falko@example.com (the command is the same regardless of if it's the sender or recipient address), you can use this command:

mailq | tail +2 | awk 'BEGIN { RS = "" } / falko@example\.com$/ { print $1 }' | tr -d '*!' | postsuper -d -

Afterwards check your mail queue again:

postqueue -p

It should now be much shorter.

Continue reading How To Delete Mails From Or To A Specific Email Address From Your Mail Queue (Postfix)
,

Setting, Changing And Resetting MySQL Root Passwords

This tutorial explains how you can set, change and reset (if you've forgotten the password) MySQL root passwords. Time and again I see problems like mysqladmin: connect to server at 'localhost' failed error: 'Access denied for user 'root'@'localhost' (using password: YES)'. So I thought it's time to remind you how to solve MySQL related password problems. If you are just looking for a quick fix how to reset a MySQL root password you can find that at the bottom of this tutorial.

mysqladmin Command To Change Root Password

Method 1 - Set up root password for the first time

If you have never set a root password for MySQL, the server does not require a password at all for connecting as root. To set up a root password for the first time, use the mysqladmin command at the shell prompt as follows:

$ mysqladmin -u root password newpass

If you want to change (or update) a root password, then you need to use the following command:

$ mysqladmin -u root -p oldpassword newpass

Enter password:

If you get...

mysqladmin: connect to server at 'localhost' failed
error: 'Access denied for user 'root'@'localhost' (using password: YES)'

then follow the instructions below on how to recover your MySQL password.

Change MySQL password for other users

To change a normal user password you need to type:

$ mysqladmin -u user-name -p oldpassword newpass

Method 2 - Update or change password

MySQL stores usernames and passwords in the user table inside the MySQL database. You can directly update a password using the following method to update or change passwords:

1) Login to the MySQL server, type the following command at the shell prompt:

$ mysql -u root -p

2) Use the mysql database (type commands at the mysql> prompt):

mysql> use mysql;

3) Change password for a user:

mysql> update user set password=PASSWORD("newpass") where User='ENTER-USER-NAME-HERE';

4) Reload privileges:

mysql> flush privileges;
mysql> quit

This method you need to use while using PHP or Perl scripting.

Recover MySQL root password

You can recover a MySQL database server password with the following five easy steps:

Step # 1: Stop the MySQL server process.

Step # 2: Start the MySQL (mysqld) server/daemon process with the --skip-grant-tables option so that it will not prompt for a password.

Step # 3: Connect to the MySQL server as the root user.

Step # 4: Set a new root password.

Step # 5: Exit and restart the MySQL server.

Here are the commands you need to type for each step (log in as the root user):

Step # 1 : Stop the MySQL service:

# /etc/init.d/mysql stop

Output:

Stopping MySQL database server: mysqld.

Step # 2: Start the MySQL server w/o password:

# mysqld_safe --skip-grant-tables &

Output:

[1] 5988
Starting mysqld daemon with databases from /var/lib/mysql
mysqld_safe[6025]: started

Step # 3: Connect to the MySQL server using the MySQL client:

# mysql -u root

Output:

Welcome to the MySQL monitor. Commands end with ; or \g.
Your MySQL connection id is 1 to server version: 4.1.15-Debian_1-log

Type 'help;' or '\h' for help. Type '\c' to clear the buffer.

mysql>


Step # 4: Set a new MySQL root user password:

mysql> use mysql;
mysql> update user set password=PASSWORD("NEW-ROOT-PASSWORD") where User='root';
mysql> flush privileges;
mysql> quit

Step # 5: Stop the MySQL server:

# /etc/init.d/mysql stop

Output:

Stopping MySQL database server: mysqld
STOPPING server from pid file /var/run/mysqld/mysqld.pid
mysqld_safe[6186]: ended

[1]+ Done mysqld_safe --skip-grant-tables

Start the MySQL server and test it:

# /etc/init.d/mysql start
# mysql -u root -p

Continue reading Setting, Changing And Resetting MySQL Root Passwords

Operating System Usage Over the Next 4 Years

These figures are extrapolated from W3Schools.com. I have predicted data for the next 4 years with a linear scale based on the last 5 years. The vertical axis has a logarithmic scale so the OSX and Linux data is meaningful. The graph shows a very slight decline in Windows usage and a notable increase in Apple OSX and Linux usage.


Obviously there are plenty of unforseen changes that could have an effect on this graph. I see the move towards OSX from Windows in the mainstream as inevitable, and I would imagine the change is more likely to be a sudden surge over a period of months rather than a smooth decline of Windows usage over a number of years.

It is interesting to compare the initial Vista predictions made by Steven York just before Vista’s release with the real stats in hindsight. The obviously low take up of Vista leaves most users on Windows XP, which when you compare to the look and feel of modern environments (for example: Websites, Mobile Phones, Latest Apple OS) it’s very clunky and unintuitive.

Continue reading Operating System Usage Over the Next 4 Years

4 Simple Apache tweaks to speed up delivery of your web site

Add these simple directives into your Apache configuration and you should notice a considerable increase in speed in the delivery of pages. As a working example, I performed these tweaks on http://www.shortlist.com/. Here are the before and after stats:





The changes are:

  • Homepage on an empty cache from 956.6k to 658.9k, both 133 requests.
  • Homepage on a primed cache from 153.9k and 128 requests, to 25.9k and 8 requests.

Starting point for client side caching
To be added in the directive.

Adds a 1 week client side cache to GIFs, CSS, JS, SWF and JPEGs. Note once in place this cannot be revoked on the client end, the cache is in the user’s web browser. Be sure the site doesn’t overwrite images etc when using this, images need unqiue names.

Requires mod_expires (expires.load)
#Add client side caching for 604800 seconds
ExpiresActive On
ExpiresByType image/gif A604800
ExpiresByType text/css A604800
ExpiresByType application/x-javascript A604800
ExpiresByType image/jpeg A604800
ExpiresByType application/x-shockwave-flash A604800

If needed you can add more or custom MIME types for the ExpiresByType directive to process by editing /etc/mime.types and adding your own lines to the end.

Enable gzip
To be added in the directive.

Should be used on all sites. This used to effect render time, but PCs are plenty fast enough these days.

Requires mod_deflate (deflate.load) and mod_headers (headers.load)

#Add compression on everything except images, with netscape fix and make sure proxys don't override agent
SetOutputFilter DEFLATE
BrowserMatch ^Mozilla/4 gzip-only-text/html
BrowserMatch ^Mozilla/4\.0[678] no-gzip
BrowserMatch \bMSIE[E] !no-gzip !gzip-only-text/html
SetEnvIfNoCase Request_URI \
\.(?:gif|jpe?g|png)$ no-gzip dont-vary
Header append Vary User-Agent env=!dont-vary

Configure ETAGs
To be added in the directive.

This is best used on HTTP load balancers. It prevents the client seeing 2 pages that are identical on 2 servers as different pages and pulling unnecesarily. If this is added to a site on a single web server, HTML will never get cached increasing the load, but this can have good effects as well.

#Disable ETags to hide multiple servers and aid caching
FileETag none

Prefork Configuration
To be modified in the httpd.conf/apache2.conf directive.

The default configuration top’s out way to fast. Any modern server can handle the load this will allow.

ServerLimit 1024

StartServers 8
MinSpareServers 5
MaxSpareServers 20
MaxClients 1024
MaxRequestsPerChild 4000

Further Reading
Yahoo!’s performance rules: http://developer.yahoo.com/performance/rules.html

Continue reading 4 Simple Apache tweaks to speed up delivery of your web site

Installing PHP 5.2.x on RedHat ES5, CentOS 5, etc

I’ve had to follow this tutorial a few times myself now so decided I should share it with the world.

A few of our applications which make use of SOAP get a Segmentation Fault if run with PHP 5.1.x or lower. We believe this is due to a bug in PHP but can’t be sure, regardless it works fine in PHP 5.2.4 and above.

Problem is, RedHat ES5 does not have support at this time for anything higher than 5.1.6, and we didn’t want to break RPM dependancys etc by installing from source.

To install PHP 5.2.5 (Highest in repository at this time) you can make use of a RPM repository maintained by Remi. He has a repository for each distro, but to save you translating for the ES5 one I’ll give you the commands here. Run the following to get up and running:

wget http://download.fedora.redhat.com/pub/epel/5/i386/epel-release-5-2.noarch.rpm
wget http://rpms.famillecollet.com/el5.i386/remi-release-5-4.el5.remi.noarch.rpm
rpm -Uvh remi-release-5*.rpm epel-release-5*.rpm

You now have the Remi repository on your system, however it is disabled by default. Obviously you don’t want all of your packages been effected by this repository, however to enable it for a specific package, run the following:

yum --enablerepo=remi update php

You should now have the latest PHP5 installed:

# php -v

PHP 5.2.5 (cli) (built: Nov 10 2007 10:52:30)

Copyright (c) 1997-2007 The PHP Group

Zend Engine v2.2.0, Copyright (c) 1998-2007 Zend Technologies
Continue reading Installing PHP 5.2.x on RedHat ES5, CentOS 5, etc

Setting Up a yum Repository

While there are many Linux users who prefer other tools for doing their patch management, yum is designed for RPM-based distributions. Its popularity has grown as Fedora Linux has adapted yum as its primary patch management tool. This chapter will help you set up and configure a yum repository for your Linux distribution.

Configuring a Local yum Server

The skills you need to configure a local yum server are not related to yum. They require knowledge of the FTP, Apache, or NFS services. While this section is not designed to provide a complete guide to any of these services, it provides a description of how you can configure a yum repository server based on the settings described earlier for Fedora Core 4 updates.

Because I personally prefer the efficiency of the FTP and NFS services for sharing files, I’ve covered the configuration steps required only for those services. For completeness, I’ve described how you can configure an Apache server to share files on a RHEL 4 yum repository near the end of this chapter. If you’re configuring a yum server, what you do will vary based on the following factors:

  • Distribution and version

  • Preferred version of a server (configuration steps vary for different FTP and HTTP servers and, to some extent, the way different distributions implement NFS servers)

  • Availability of yum for the distribution (i.e., if it isn’t available, be prepared to compile yum from a source RPM)

As with other network services, yum servers may be sensitive to any firewalls that you may configure. If you have a firewall between the yum server computer and associated clients, you’ll need to make sure traffic can travel through appropriate TCP/IP ports; for example, Apache services require access through TCP/IP port 80. Sure, there are ways to "tunnel" data through other services, such as SSH, but that should not be necessary for updates limited to your internal network. In any case, that level of detail is beyond the scope of this book.

Configuring an FTP yum Server

On current Red Hat/Fedora distributions, the default FTP server is vsFTP. According to its home page at http://vsftpd.beasts.org/, it’s the default FTP server used to share a number of Linux distributions, including Red Hat and Debian. It’s even used to share kernels through ftp.kernel.org.

The default version of vsFTP is configured in the vsftpd RPM. The default installation works well in most cases. The vsFTP configuration file is stored in /etc/vsftpd/vsftpd.conf for Red Hat/Fedora distributions (/etc/vsftpd.conf for SUSE and Debian distributions). In this case, we’re working from the RHEL 4 version of vsFTP.

By default, vsFTP files are stored in the /var/ftp directory. By convention, files that you copy for downloads are stored in the pub/ subdirectory. Therefore, the repository that you create should be in the /var/ftp/pub directory. For the example described earlier, update RPMs are stored in the following directory:

/var/ftp/pub/yum/4/i386/updates

If you’ve used the commands described earlier for Fedora Core 4, you’ll find the update header database in the repodata/ subdirectory.

There is a substantial number of options for vsFTP, most of which you can configure in the vsftpd.conf configuration file. The following is a review of active options in the RHEL 4 version of this file. If you want to check the current defaults for these and other options, read the vsftpd.conf man page associated with your vsFTP RPM.

anonymous_enable=yes

You absolutely want to enable anonymous access for a FTP-based yum server. Anonymous access is normally enabled by default on a vsFTP server.

local_enable=yes

It’s normally best to disable access by regular users to a FTP-based yum server. As it is disabled by default, all you need to do is comment out this option.

write_enable=yes

Naturally, because you do not want anyone (unless authorized) to overwrite (or even add) to a yum-repository, you should disable write access.

local_umask=022

If you do authorize write access (I believe you should not do so on an FTP-based yum server), this option sets the umask for any files created by users who are logged into your FTP server.

dirmessage_enable=yes

If active, this option looks for and reads any .message file that exists in the local directory. This can be useful if you want to send messages to other administrators.

xferlog_enable=yes

If active, this option logs downloads (and uploads) on the vsFTP server in the /var/log/xferlog file. For example, when I downloaded an updated version of yum, the vsFTP server placed the following entry in that file:

Mon Sep 2 17:18:25 2005 1 192.168.0.20 390363 /pub/yum/4/i386/updates/yum-2.4.0-0.fc4.noarch.rpm b _ o a anonymous@ ftp 0 * c

As you can see, this lists the date and time of the transfer, the client IP address, as well as the size and location of the file. This is a standard format shared with the WU-FTP server and can be mined as a database for more information on client computers that connect to your server.

connect_from_port_20=yes

Some FTP clients require this option, which uses TCP/IP port 20 for data transfers.

xferlog_std_format=yes

If you’ve activated the xferlog_enable option noted earlier, this option supports a standard format shared with the WU-FTP server.

pam_service_name=vsftpd

The pam_service_name option defers to Pluggable Authentication Modules to help secure the vsFTP service. This particular option sets rules in /etc/pam.d/vsftpd. One of the key options in this file prohibits users listed in /etc/vsftpd.ftpusers from logging into this vsFTP server.

userlist_enable=YES

As configured, this is redundant with the previous command. When enabled, it makes the vsFTP server read the /etc/vsftpd.user_list file and deny access to all who attempt to connect as one of the users listed in this file. By default, this file contains the same list of users as shown in /etc/vsftpd.users.

listen=YES

By default, Red Hat / Fedora configures the vsFTP server as a standalone service, with a vsftpd activation script in the /etc/rc.d/init.d directory. In contrast, SUSE does not configure vsFTP as a stand-alone service and configures listen=NO by default.

tcp_wrappers=YES

As configured, Red Hat / Fedora configures the vsFTP server for one more level of security, through TCP Wrappers support, which allows you to configure more security related commands in the /etc/hosts.allow and /etc/hosts.deny files.When you’re satisfied with the configuration, you should activate the vsFTP server with the following command (which is not required if you’ve set listen=NO):

/etc/init.d/vsftpd start 

Finally, you can make sure that vsFTP is active the next time you reboot Linux with the following command:

chkconfig vsftpd on

This command activates the vsFTP server whenever you’re in run levels 2, 3, 4, or 5. (If you configure vsFTP in xinetd, it activates it in the /etc/xinetd.d directory.) For the purpose of this chapter, assume the name of this server is yum.example.com.

Configuring a yum Client for an FTP-Based yum Repository

After you’ve configured this FTP yum server, configuring the associated yum client is a straightforward process. As you’ve seen in Chapter 6, yum configuration files that point to yum servers are normally configured in the /etc/yum.repos.d directory. For Fedora Core 4, we will examine the client file that points to the yum Update server: fedora-updates.repo.

For the yum FTP server as configured, all you need to include in the fedora-updates.repo file is the following:

[updates-released]
name=Fedora Core $releasever - $basearch - Released Updates
baseurl=ftp://yum.example.com/pub/yum/4/i386/updates
enabled=1
gpgcheck=1

As described earlier, for a vsFTP server, this means that update RPMs as well as the associated repodata/ subdirectory are stored on the yum.example.com computer in the /var/ftp/pub/yum/4/i386/updates directory.

Configuring an NFS yum Server

On current Red Hat/Fedora distributions, an NFS server is installed by default, courtesy of the nfs-utils RPM. The default installation works well in most cases. You can specify shared NFS directories in the /etc/exports configuration file. In this case, we’re working from the RHEL 4 version of NFS.

You can share directories as configured on an NFS server. For the example described earlier, update RPMs are stored in the following directory:

/var/ftp/pub/yum/4/i386/updates

Therefore, you can share this directory at any level, as long as the mount point on the NFS client is consistent. For example, I’ve added the following line to my /etc/exports configuration file:

/var/ftp/pub  192.168.1.0/24(ro,sync)

This particular configuration command shares the /var/ftp/pub directory. It limits access to clients in the noted IP address range. Clients are allowed read-only (ro) access. Changes are committed to disk before any new requests are made (sync).

For more information, see the exports man page Linux Administration Handbook by Evi Nemeth, Garth Snyder, and Trent Hein (Upper Saddle River, NJ: Prentice Hall, 2002). After you’re satisfied with the configuration in /etc/exports, deactivate the NFS server with the following command:

/etc/init.d/nfs stop 

By default, this should stop any NFS services, quotas, the NFS daemon, as well as the mountd daemon. Next, export the changes to /etc/exports with the following command:

exportfs -a

Now restart the NFS services with the following command:

/etc/init.d/nfs start 

Confirm the exports in from the local list with the following command:

showmount -e

If you’re on another system, you can find the shared NFS directories. For example, you can list those on a server named yum.example.com with the following command:

showmount -e yum.example.com

Finally, you can make sure that NFS is active the next time you reboot Linux with the following command:

chkconfig nfs on

This command activates the NFS server whenever you’re in run levels 2, 3, 4, or 5.

Configuring an NFS yum Client

You’ll need to mount the NFS share on an appropriate local directory, and then configure the associated file in /etc/yum.repos.d to point to that share. Because we’re configuring a share for Fedora updates, we’ll modify the fedora-updates.repo file.

First, on the NFS client, you should confirm your ability to connect to a shared NFS directory. The following command connects to the yum.example.com NFS server to find what shares are available on that server:

showmount -e yum.example.com

You’ll see the shared directories that you configured earlier, including /var/ftp/pub. I’ve mounted it on the local /var/yum directory with the following command:

mount yum.example.com:/var/ftp/pub /var/yum

If the /var/yum directory does not yet exist, you’ll get an error message. Now you can configure your fedora-updates.repo file in your /etc/yum.repos.d directory. For the yum NFS server as configured, all you need in fedora-updates.repo is the following:

[updates-released]
name=Fedora Core $releasever - $basearch - Released Updates
baseurl=file:///var/yum/yum/4/i386/updates
enabled=1
gpgcheck=1

As described earlier, for a vsFTP server, this means that update RPMs as well as the associated repodata/ subdirectory are stored in the yum/4/i386/updates subdirectory, mounted on the /var/yum directory.

Note the syntax associated with the baseurl command. The file: command works in place of ftp: or http:. The triple forward slash (///) is the standard syntax required for mounted directories.

If you’ve configured a Fedora Updates repository on a Fedora Core server, this command may be slightly different. Based on the directory specified earlier, you would substitute the following baseurl command:

baseurl=file:///var/ftp/pub/yum/4/i386/updates 

Naturally, you may want to configure this shared directory as part of the boot process for each NFS client. It’s possible to configure it in the default /etc/fstab configuration file, as well as through the Automounter daemon. I recommend the latter, which avoids hangups when there are network problems. The Automounter daemon is easy to configure; it requires the autofs RPM. After that RPM is installed, here’s how you can configure a NFS client for Fedora updates as configured in this chapter:

  1. Install the autofs RPM; if you’ve configured yum, the simplest way is with the following command. Even if you’re not sure if autofs is installed, this command makes sure that you have the latest version of the Automounter:

    yum install autofs
  2. Configure the Automounter master file to read from /etc/auto.misc. Open the /etc/auto.master configuration file. You’ll see sample commands; activate the following to read from the noted file. The timeout prevents your system from hanging if there’s a problem with your network or the NFS server.

    /misc /etc/auto.misc --timeout=60 

    Automounter shares configured in /etc/auto.misc are configured as subdirectories of /misc.

  3. Configure the Automounter /etc/auto.misc file to read from the shared NFS directory. Based on the shared directory and NFS server name described earlier, add the following line to that file:

    yum  -ro,soft,intr   yum.example.com:/var/ftp/pub
  4. Start the Automounter service with the following command:

    /etc/init.d/autofs start 
  5. Test the result. If your network is connected and the NFS server is running, you should be able to see the shared NFS directory with the following command:

    ls /misc/yum

    Occasionally, you may need to run this command more than once to establish the connection.

  6. Configure the /etc/yum.repos.d/fedora-updates.repo file to point to this directory as shared. Based on the previously shared NFS directory, the baseurl command would be

    baseurl=file:///var/ftp/pub/yum/4/i386/updates 
  7. Test the result with the yum update command. You should see messages similar to a regular yum update from other local or remote servers.

Continue reading Setting Up a yum Repository

Adding Yum to CentOS 5

I use a lot of VPS and often times, they don’t actually have yum to make my life easier. So here is a quick HOWTO on installing yum on a CentOS box. This assumes that you have rpm and wget already installed. Note: This will only work on CentOS 5.2 while the mirror is still active.

Run the following code in a temporary directory to download all the RPMs.

#!/bin/bash

for file in \
elfutils-0.125-3.el5.i386.rpm \
elfutils-libs-0.125-3.el5.i386.rpm \
expat-1.95.8-8.2.1.i386.rpm \
gmp-4.1.4-10.el5.i386.rpm \
libxml2-2.6.26-2.1.2.1.i386.rpm \
libxml2-python-2.6.26-2.1.2.1.i386.rpm \
m2crypto-0.16-6.el5.2.i386.rpm \
python-2.4.3-21.el5.i386.rpm \
python-elementtree-1.2.6-5.i386.rpm \
python-iniparse-0.2.3-4.el5.noarch.rpm \
python-sqlite-1.1.7-1.2.1.i386.rpm \
python-urlgrabber-3.1.0-2.noarch.rpm \
readline-5.1-1.1.i386.rpm \
rpm-4.4.2-48.el5.i386.rpm \
rpm-libs-4.4.2-48.el5.i386.rpm \
rpm-python-4.4.2-48.el5.i386.rpm \
sqlite-3.3.6-2.i386.rpm \
yum-3.2.8-9.el5.centos.1.noarch.rpm \
yum-metadata-parser-1.1.2-2.el5.i386.rpm
do wget http://mirror.centos.org/centos-5/5.2/os/i386/CentOS/$file;
done

Once you have downloaded the necessary files. Install them all by typing:
# rpm -Uvh *.rpm

Then feel free to # yum -y update to bring your system up to date.

Continue reading Adding Yum to CentOS 5

A huge collection of cisco IOS

http://rapidshare.com/files/161462239/QoS_642-642_Pass4sure.rar

http://rapidshare.com/files/163377890/c1811-advipservicesk9-mz.124-11.T3.bin

http://rapidshare.com/files/163379681/c1841-advsecurityk9-mz.124-12c.bin

http://rapidshare.com/files/163381550/c2600-ipvoice-mz.124-12c.bin

tp://rapidshare.com/files/163381718/c2900XL-c3h2s-mz-120.5-XU.bin

http://rapidshare.com/files/163381985/c2900xl-c3h2s-tar.120-5.WC7_1_.zip

http://rapidshare.com/files/163382259/c2900xl-c3h2s-tar.120-5.WC7.zip

http://rapidshare.com/files/163382412/c2950-c3h2s-mz.120-5.3.WC.1.bin

http://rapidshare.com/files/163382757/c2950-i6k2l2q4-mz.121-22.EA8a.bin

http://rapidshare.com/files/163382956/c2950-i6q4l2-mz.121-6.EA2b.bin

http://rapidshare.com/files/163383152/c2950-i6q4l2-mz.121-6.EA2c.bin

http://rapidshare.com/files/163383362/c2950-i6q4l2-mz.121-9.EA1.bin

http://rapidshare.com/files/163383581/c2950-i6q4l2-mz.121-9.EA1d.bin

http://rapidshare.com/files/163383841/c2950-i6q4l2-mz.121-22.EA1.bin

http://rapidshare.com/files/163384178/c2950-i6q4l2-mz.121-22.EA10.bin

http://rapidshare.com/files/163384503/c2950-i6q4l2-tar.121-9.EA1.zip

http://rapidshare.com/files/163384960/c1200-k9w7-tar.123-8.JEB.tar

http://rapidshare.com/files/163386202/c1700-advsecurityk9-mz.124-12c.bin

http://rapidshare.com/files/163387577/c1700-k9o3sy7-mz.124-12c.bin

http://rapidshare.com/files/163397377/c3500xl-c3h2s-tar.120-5.WC15.tar

http://rapidshare.com/files/163398347/c3550_ipservices_mz.122_25.sec.bin

http://rapidshare.com/files/163399038/c3550-i5k2l2q3-mz.121-19.ea1a.bin

http://rapidshare.com/files/163399807/c3550-i5k2l2q3-mz.121-22.ea1.bin

http://rapidshare.com/files/163400634/c3550-i5k2l2q3-tar.121-11.EA1.zip

http://rapidshare.com/files/163401269/c3550-i5q3l2-mz.121-13.ea1.bin

http://rapidshare.com/files/163401945/c3550-i5q3l2-mz.121-14.ea1a.bin

http://rapidshare.com/files/163402647/c3550-i5q3l2-mz.121-20.ea1.bin

http://rapidshare.com/files/163733891/c3550-ipservicesk9-mz.122-25.sed.bin

http://rapidshare.com/files/163734664/c3550-i9q3l2-mz.122-25.se.bin

http://rapidshare.com/files/163735741/c3550-ipservicesk9-mz.122-25.seb1.bin

http://rapidshare.com/files/163736805/c3550-ipservicesk9-mz.122-25.seb4.bin

http://rapidshare.com/files/163737955/c3550-ipservicesk9-mz.122-25.sec2.bin

http://rapidshare.com/files/163739263/c3550-ipservicesk9-mz.122-25.SEE4.bin

http://rapidshare.com/files/163740895/c3550-ipservicesk9-mz.122-44.SE.bin

http://rapidshare.com/files/163749876/c3560-advipservicesk9-mz.122-37.SE.bin

http://rapidshare.com/files/163751521/c3560-advipservicesk9-mz.122-40.SE.bin

http://rapidshare.com/files/163753188/c3560-advipservicesk9-mz.122-44.SE.bin

http://rapidshare.com/files/163754306/c3550-ipservicesk9-mz_122-25_sed.bin

http://rapidshare.com/files/163755297/c3550-ipservices-mz.122-25.seb4.bin

http://rapidshare.com/files/163756587/c3560-advipservicesk9-mz.122-25.SEE4.bin

http://rapidshare.com/files/163767500/c3620-ik9s-mz.122-7b.bin

http://rapidshare.com/files/163771366/c3620-ik9s-mz.122-40a.bin

http://rapidshare.com/files/163773229/c3620-i-mz.121-5.T10.bin

http://rapidshare.com/files/163774867/c3620-do3s-mz.122-2.T.bin

http://rapidshare.com/files/163777635/c3620-ik2s-mz.121-27b.bin

http://rapidshare.com/files/163782755/c3660-is56i-mz.120-7.XK.bin

http://rapidshare.com/files/163784993/c3660-is-mz.121-6.bin

http://rapidshare.com/files/163787171/c3660-is-mz.121-27b.bin

http://rapidshare.com/files/163790774/c3660-is-mz.122-46a.bin

http://rapidshare.com/files/163791077/c3660-is-mz.123-5a.bin

http://rapidshare.com/files/163798106/c3660-is-mz.123-11.T2.bin

http://rapidshare.com/files/163804254/c3660-is-mz.123-23.bin

http://rapidshare.com/files/163810870/C3660-Jk9S-Mz_123-3.bin

http://rapidshare.com/files/163814044/c3660-jo3s56i-mz.120-7.XK1.bin

http://rapidshare.com/files/164136286/c7200-is-mz.123-14.T1.bin
http://rapidshare.com/files/164139043/c7200-is-mz.123-22.bin
http://rapidshare.com/files/164142437/c7200-is-mz.124-1c.bin
http://rapidshare.com/files/164146304/c7200-is-mz.124-13b.bin
http://rapidshare.com/files/164149892/c7200-is-mz.19991126
http://rapidshare.com/files/164152475/c7200-ik2s-mz.121-27b.bin
http://rapidshare.com/files/164157302/c7200-ik8s-mz.122-15.T17.bin
http://rapidshare.com/files/164160711/c7200-ik9o3s-mz.122-40a.bin
http://rapidshare.com/files/164165626/c7200-ik9o3s-mz.123-1a.bin
http://rapidshare.com/files/164170367/c7200-ik9o3s-mz.123-20.bin
http://rapidshare.com/files/164174828/c7200-ik9o3s-mz.123-22.bin
http://rapidshare.com/files/164180158/c7200-ik9o3s-mz.124-3.bin
http://rapidshare.com/files/166057805/c7200-advipservicesk9-mz.124-2.T.bin
http://rapidshare.com/files/166058498/c7200-boot-mz.120-10.S
http://rapidshare.com/files/166059211/c7200-boot-mz.120-16.S
http://rapidshare.com/files/166064238/c7200-h1is-mz.123-14.YX.bin
http://rapidshare.com/files/166066522/c7200-ik2s-mz.121-27b.bin
http://rapidshare.com/files/166070439/c7200-ik8s-mz.122-15.T17.bin
http://rapidshare.com/files/166083627/c7200-ik9s-mz.124-13b.bin
http://rapidshare.com/files/166087902/c7200-ik91s-mz.122-31.SB3.bin
http://rapidshare.com/files/166091484/c7200-io3s-mz.122-15.T13.bin
http://rapidshare.com/files/166093316/c7200-is-mz.121-27b.bin
http://rapidshare.com/files/166096172/c7200-is-mz.122-11.T6.bin
http://rapidshare.com/files/166099304/c7200-is-mz.122-13.T.bin
http://rapidshare.com/files/166101754/c7200-ik9o3s-mz.122-40a.bin
http://rapidshare.com/files/166105496/c7200-ik9o3s-mz.123-1a.bin
http://rapidshare.com/files/166109075/c7200-ik9o3s-mz.123-20.bin
http://rapidshare.com/files/166112746/c7200-ik9o3s-mz.123-22.bin
http://rapidshare.com/files/166117018/c7200-ik9o3s-mz.124-3.bin
http://rapidshare.com/files/166121979/c7200-ik9o3s-mz.124-18.bin
http://rapidshare.com/files/166124035/c7200-ik9s-mz.122-40a.bin
http://rapidshare.com/files/166127132/c7200-ik9s-mz.123-10.bin
http://rapidshare.com/files/166136822/c7200-is-mz.122-40a.bin
http://rapidshare.com/files/166139321/c7200-is-mz.123-1a.bin
http://rapidshare.com/files/166141878/c7200-is-mz.123-3.bin
http://rapidshare.com/files/166144390/c7200-is-mz.123-3g.bin
http://rapidshare.com/files/166146690/c7200-is-mz.123-6a.bin
http://rapidshare.com/files/166149706/c7200-is-mz.123-14.T1.bin
http://rapidshare.com/files/166152121/c7200-is-mz.123-22.bin
http://rapidshare.com/files/168201766/c3640-is-mz.123-6.bin
http://rapidshare.com/files/168209570/c3640-is-mz.123-8.T_96_32_Plus.bin
http://rapidshare.com/files/168220614/c3640-is-mz.124-16.bin
http://rapidshare.com/files/168223515/c3640-is-mz_120-7_t.bin
http://rapidshare.com/files/168230016/C3640-Is-Mz_123-6.bin
http://rapidshare.com/files/168231808/c3640-ix-mz.122-6a.bin
http://rapidshare.com/files/168235959/c3640-ix-mz.123-12a.bin
http://rapidshare.com/files/168242381/c3640-jk8o3s-mz.122-26.bin
http://rapidshare.com/files/168253563/c3640-jk9o3s-mz-123-8T3.bin
http://rapidshare.com/files/168262821/c3640-jk9o3s-mz.122-15.T9.bin
http://rapidshare.com/files/168269642/c3640-jk9o3s-mz.122-26.bin
http://rapidshare.com/files/168279317/c3640-jk9o3s-mz.123-10.bin
http://rapidshare.com/files/168292431/c3640-jk9o3s-mz.123-14.T2.bin
http://rapidshare.com/files/168305135/c3640-jk9o3s-mz.123-14.T3.bin
http://rapidshare.com/files/168318084/c3640-jk9o3s-mz.123-14.T7.bin
http://rapidshare.com/files/168329843/c3640-jk9o3s-mz.123-8.T3.bin
http://rapidshare.com/files/168341146/C3640-Jk9o3S-Mz_123-8_t3.bin
http://rapidshare.com/files/168349003/c3640-is-mz.122-15.T8.bin
http://rapidshare.com/files/168354343/c3640-is-mz.122-46a.bin
http://rapidshare.com/files/168362415/c3640-is-mz.123-10.bin
http://rapidshare.com/files/168370184/c3640-is-mz.123-1a.bin
http://rapidshare.com/files/168378647/c3640-is-mz.123-23.bin
http://rapidshare.com/files/168382163/X-Lite_Win32_1011s_41150.exe
http://rapidshare.com/files/170445957/asdm-521.bin
http://rapidshare.com/files/170446766/asdm-603.bin
http://rapidshare.com/files/170450033/asa803-k8.bin
http://rapidshare.com/files/170458021/asa803-k8.bin
http://rapidshare.com/files/170459541/asdm-512.bin
http://rapidshare.com/files/170460735/asdm-521.bin
http://rapidshare.com/files/170466499/BOOTIMG.BIN
http://rapidshare.com/files/170466500/BOOTIMG.BIN
http://rapidshare.com/files/170897267/c6ace-t1k9-mz.3.0.0_A1_4.bin
http://rapidshare.com/files/170897298/c6k222-jk9sv-mz.122-14.SY3.bin
http://rapidshare.com/files/170897662/c6msfc2-boot-mz.121-8a.EX
http://rapidshare.com/files/170897717/c6msfc2-boot-mz.121-19.E1.bin
http://rapidshare.com/files/170900193/c6msfc2-dsv-mz.121-11b.E4.bin
http://rapidshare.com/files/170900512/c6msfc2-psv-mz.121-19.E1.bin
http://rapidshare.com/files/170903630/c2800nm_ipbasek9_mz.124_3.bin
http://rapidshare.com/files/170915450/c2800nm-advsecurityk9-mz.124-5.bin
http://rapidshare.com/files/170920479/c2800nm-advsecurityk9-mz.124-9.t1.bin
http://rapidshare.com/files/170924238/c2800nm-ipbasek9-mz.124-12.bin
http://rapidshare.com/files/170930149/c2800nm-ipvoice-mz.124-4.t1.bin
http://rapidshare.com/files/170936642/c2801-advipservicesk9-mz.124-16.bin
http://rapidshare.com/files/170940136/c2801-ipvoice_ivs-mz.124-11.T1.bin
http://rapidshare.com/files/170944704/c2800nm-adventerprisek9_ivs-mz.124-4.t1.bin
http://rapidshare.com/files/170948772/c2800nm-adventerprisek9_ivs-mz.124-5a.bin
http://rapidshare.com/files/170953831/c2800nm-adventerprisek9_ivs-mz.124-9.t.bin
http://rapidshare.com/files/170957920/c2800nm-adventerprisek9-mz.124-5a.bin
http://rapidshare.com/files/170962327/c2800nm-adventerprisek9-mz.124-6.t.bin
http://rapidshare.com/files/170967010/c2800nm-adventerprisek9-mz.124-9.t.bin
http://rapidshare.com/files/170970418/c2800nm-adventerprisek9-mz.124-11.t.bin
http://rapidshare.com/files/170972932/c2800nm-advipservicesk9-mz.124-12.bin
http://rapidshare.com/files/170974109/c7200-ik2s-mz.121-27b.bin
http://rapidshare.com/files/170977940/c7200-ik9o3s-mz.124-18.bin
http://rapidshare.com/files/170979511/c7200-ik9s-mz.122-40a.bin
http://rapidshare.com/files/174882539/c7200-h1is-mz.123-14.YX.bin
http://rapidshare.com/files/174884562/c7200-ik2s-mz.121-27b.bin
http://rapidshare.com/files/174891237/c7200-ik9o3s-mz.124-18.bin
http://rapidshare.com/files/174894195/c7200-ik9s-mz.122-40a.bin
http://rapidshare.com/files/174898589/c7200-ik9s-mz.123-10.bin
http://rapidshare.com/files/174905966/c7200-ik9s-mz.124-13b.bin
http://rapidshare.com/files/174909924/c7200-io3s-mz.122-15.T13.bin
http://rapidshare.com/files/174911779/c7200-is-mz.121-27b.bin
http://rapidshare.com/files/174914947/c7200-is-mz.122-11.T6.bin
http://rapidshare.com/files/174918371/c7200-is-mz.122-13.T.bin
http://rapidshare.com/files/174923189/c2801-ipvoicek9-mz.124-5b.bin
http://rapidshare.com/files/174929123/c7200-advipservicesk9-mz.124-2.T.bin
http://rapidshare.com/files/174929926/c7200-boot-mz.120-10.S
http://rapidshare.com/files/174930654/c7200-boot-mz.120-16.S
http://rapidshare.com/files/174935378/c7200-jk9o3s-mz.122-28.bin
http://rapidshare.com/files/174940705/c7200-jk9o3s-mz.123-8.T.bin
http://rapidshare.com/files/174946771/c7200-jk9o3s-mz.124-8.bin
http://rapidshare.com/files/174949587/c7200-is-mz.122-40a.bin
http://rapidshare.com/files/174953286/c7200-is-mz.123-1a.bin
http://rapidshare.com/files/174956914/c7200-is-mz.123-3.bin
http://rapidshare.com/files/174960472/c7200-is-mz.123-3g.bin
http://rapidshare.com/files/174964027/c7200-is-mz.123-6a.bin
http://rapidshare.com/files/174969031/c7200-is-mz.123-14.T1.bin
http://rapidshare.com/files/174971639/c7200-is-mz.123-22.bin
http://rapidshare.com/files/174977466/c7200-is-mz.124-1c.bin
http://rapidshare.com/files/174998235/c7200-is-mz.124-13b.bin
http://rapidshare.com/files/175004237/c7200-is-mz.19991126
http://rapidshare.com/files/175014410/c7200-jk8o3s-mz.122-17a.bin




Login here for more: http://rapidshare.com/users/8ZVSZJ
Continue reading A huge collection of cisco IOS

Turbocharge PuTTY with 12 Powerful Add-Ons - Software for Geeks

PuTTY is hands-down the best, free, and lightweight SSH client for Windows. I have provided list of 12 powerful PuTTY add-ons with screenshots, that will solve few shortcomings of the original PuTTY. Play around with these add-ons and choose the one that suites your need.

1. PuTTY Connection Manager

PuTTYCM gives a nice feature to arrange several PuTTY sessions in tabs . While starting PuTTYCM for the first time, you should specify the location of the original PuTTY. This requires .NET 2.0 to be installed on the windows system. Following screen-shot displays three putty sessions in tabs within the same window.

Note: If the PuTTY Connection Manager opens the original PuTTY in a separate window, instead of opening as a TAB, please go to Tools -> Options -> Select the check-box “Enable additional timing for PuTTY capture (ms)” -> set the value to 300 ms. This will open the PuTTY window inside the TAB as shown below.

PuTTY Connection Manager - Multiple Tab
Fig - PuTTY Connection Manager with multiple Tabs

2. PuTTYcyg

Cygwin users will absolutely love PuTTYcyg. This lets you use PuTTY as a local cygwin terminal. If you use cygwin on your windows, I’m sure you’ll hate the default MS-DOS looking cygwin window. Using PuTTYcyg, you can run cygwin inside PuTTY. I love this add-on and use it for my cygwin on Windows.

On PuTTYcyg, click on cygterm radio button in the Connection type. Enter - (hyphen) in the “Command (use - for login shell“, to connect to the cygwin on the windows laptop using PuTTY as shown below.

PuTTYcyg Cygterm radio-button
Fig - PuTTYcyg with Cygterm option

3. PuTTYtray

Using PuTTYtray, you can minimize the PuTTY window to the system tray on windows. By default, original PuTTY stores the session information in the registry. This is painful, when you want to transfer PuTTY sessions from one laptop to another. In PuTTYtray, there is an additional radio button “Sessions from file” as shown below, that will let you store session information in a file.

PuTTYtray
Fig - PuTTYtray with “Session from file” option

4. PuttyTabs

PuttyTabs provides a floating bar, that will display the open PuTTY sessions in TABs. Clicking on one of the tabs will bring the respective PuTTY session to the foreground. While starting PuTTYTabs for the first time, you should specify location of the original PuTTY. It reads the windows registry to get all the available PuTTY sessions. This also requires .NET 2.0 to be installed on the windows system. Following screen-shot displays three putty sessions arranged in tab.

PuTTYTabs Screenshot
Fig - PuTTYTabs with multiple Tabs

5. Quest PuTTY

Quest Software modified the PuTTY to add Active Directory (GSSAPI Kerberos) single sign-on feature. Quest PuTTY uses Microsoft’s Security Service Provider Interface (SSPI), which is Microsoft’s version of the GSSAPI, with which it is wire compatible. This version of PuTTY adds a new menu-item called GSSAPI, under Connection -> SSH, as shown below.

Quest PuTTY with GSSAPI
Fig - Quest PuTTY with GSSAPI option

6. Modified PuTTY

This modified PuTTY stores the PuTTY sessions in folder instead of storing it in the registry. If you already have sessions stored in the registry, it will display those also. The sessions stored in registry will be marked as [registry] as shown below. When you create a session using this PuTTY, this creates a sub-folder called session in the same folder where putty.exe is located, to store all the sessions in the file.

Modified Putty
Fig - Modified Putty displaying both registry and file sessions

7. PocketPuTTY

PocketPuTTY runs on Windows Mobile 2003/5.0 operating system. After I got my blackberry, I have dumped my Dell Axim that was running on Windows Mobile. So, I have not tried PocketPuTTY myself. If you’ve used PocketPuTTY or other mobile version of PuTTY, please leave your feedback.

PocketPuTTY UI
Fig - PocketPuTTY for Windows Mobile

8. portaPuTTY

portaPuTTY is a modified version of the PuTTY that stores the session information in a file by default, instead of storing it in the windows registry. The session files are stored under .putty/sessions folder. The .putty folder is created under the same directory where the putty.exe is located.

9. PuTTY Portable

PuTTY Portable is part of PortableApps suite. Use this to launch PuTTY from the USB drive and carry the sessions along with you.

10. PuTTY Launchy Plugin

If you are using Launchy, the open source keystroke launcher for windows, you can use Putty Launchy Plugin, to launch putty sessions from Launchy very easily. i.e you can type “ssh” or “putty” followed by tab or space to list all of your PuTTY sessions. Once you select a particular session, Launchy will automatically launch that particular PuTTY session.

PuTTY Launchy Plugin
Fig - PuTTY Launchy Plugin. Type ssh followed by tab.

11. PuTTY Session Manager

PuTTY Session Manager will let you organize the PuTTY sessions into folders and assign hotkeys. This requires Microsoft .NET 2.0. Right click on the PSM icon in the system track and select “Session Hotkeys” to assign hot-keys for PuTTY session as shown below.

PuTTY Session Manager Hot Key Assignment
Fig - PuTTY Session Manager with session hot-key

To create a folder, right click on a particular PuTTY session -> Session Management -> New Folder. To move a existing session to a folder, just drag the session and drop to the corresponding folder.

PSM Session List with folders
Fig - PuTTY Session Manager with sessions inside sub-folder

12. PuTTY Command Sender

PuTTYCS is very helpful little tool that can boost your productivity by eliminating repetitive tasks performed on different servers. Using PuTTYCS, you can send a unix command to multiple PuTTY windows at the same time. You can use this to backup files, view log files, start and stop processes, copying file etc., on multiple servers, just by executing the command once, as shown below.

PuTTY Command Sender
Fig - PuTTYCS sends unix command to multiple PuTTY session
Continue reading Turbocharge PuTTY with 12 Powerful Add-Ons - Software for Geeks

How To Monitor VPN Active Sessions and Temperature Using Nagios

In this article, let us review how to monitor active sessions and temperature of VPN device using Nagios. You can monitor pretty much anything about a hardware using the nagios check_snmp plug-in.

1. Identify a cfg file to define host, hostgroup and services for VPN device

You can either create a new vpn.cfg file or re-use one of the existing .cfg file. In this article, I’ve added the VPN service and hostgroup definition to an existing switch.cfg file. Make sure the switch.cfg line in nagios.cfg file is not commented as shown below.

# grep switch.cfg /usr/local/nagios/etc/nagios.cfg

cfg_file=/usr/local/nagios/etc/objects/switch.cfg

2. Add new hostgroup for VPN device in switch.cfg

Add the following ciscovpn hostgroup to the /usr/local/nagios/etc/objects/switch.cfg file.

define hostgroup{

hostgroup_name ciscovpn
alias Cisco VPN Concentrator
}

3. Add new host for VPN device in switch.cfg

In this example, I’ve defined two hosts–one for primary and another for secondary Cisco VPN concentrator in the /usr/local/nagios/etc/objects/switch.cfg file. Change the address directive to your VPN device ip-address accordingly.

define host{

use generic-host
host_name cisco-vpn-primary
alias Cisco VPN Concentrator Primary
address 192.168.1.7
check_command check-host-alive
max_check_attempts 10
notification_interval 120
notification_period 24x7
notification_options d,r
contact_groups admins
hostgroups ciscovpn
}

define host{
use generic-host
host_name cisco-vpn-secondary
alias Cisco VPN Concentrator Secondary
address 192.168.1.9
check_command check-host-alive
max_check_attempts 10
notification_interval 120
notification_period 24x7
notification_options d,r
contact_groups admins
hostgroups ciscovpn
}

4. Add new services to monitor VPN active sessions and temperature in switch.cfg

Add the “Temperature” service and “Active VPN Sessions” service to the /usr/local/nagios/etc/objects/switch.cfg file.

define service{

use generic-service
hostgroup_name ciscovpn
service_description Temperature
is_volatile 0
check_period 24x7
max_check_attempts 4
normal_check_interval 10
retry_check_interval 2
contact_groups admins
notification_interval 960
notification_period 24x7
check_command check_snmp!-l Temperature -o .1.3.6.1.4.1.3076.2.1.2.22.1.29.0,.1.3.6.1.4.1.3076.2.1.2.22.1.33.0 -w 37,:40 -c :40,:45
}

define service{
use generic-service
hostgroup_name ciscovpn
service_description Active VPN Sessions
is_volatile 0
check_period 24x7
max_check_attempts 4
normal_check_interval 5
retry_check_interval 1
contact_groups admins
notification_interval 960
notification_period 24x7
check_command check_snmp!-l ActiveSessions -o 1.3.6.1.4.1.3076.2.1.2.17.1.7.0,1.3.6.1.4.1.3076.2.1.2.17.1.9.0 -w :70,:8 -c :75,:10
}

5. Validate the check_snmp from command line

Check_snmp plug-in uses the ’snmpget’ command from the NET-SNMP package. Make sure the net-snmp is installed on your system as shown below. If not, download it from NET-SNMP website.

# rpm -qa | grep -i net-snmp

net-snmp-libs-5.1.2-11.el4_6.11.2
net-snmp-5.1.2-11.el4_6.11.2
net-snmp-utils-5.1.2-11.EL4.10

Make sure the check_snmp works from command line as shown below.

# /usr/local/nagios/libexec/check_snmp -H 192.168.1.7 \

-P 2c -l Temperature -w :35,:40 -c :40,:45 \
-o .1.3.6.1.4.1.3076.2.1.2.22.1.29.0,.1.3.6.1.4.1.3076.2.1.2.22.1.33.0

Temperature OK - 35 38 | iso.3.6.1.4.1.3076.2.1.2.22.1.29.0=35
iso.3.6.1.4.1.3076.2.1.2.22.1.33.0=38

# /usr/local/nagios/libexec/check_snmp -H 192.168.1.7 \
-P 2c -l ActiveSessions -w :80,:40 -c :100,:50 \
-o 1.3.6.1.4.1.3076.2.1.2.17.1.7.0,1.3.6.1.4.1.3076.2.1.2.17.1.9.0

ActiveSessions CRITICAL - *110* 20 | iso.3.6.1.4.1.3076.2.1.2.17.1.7.0=110
iso.3.6.1.4.1.3076.2.1.2.17.1.9.0=20

In this example, following parameters are passed to the check_snmp:

  • -H, –hostname=ADDRESS Host name, IP Address, or unix socket (must be an absolute path)
  • -P, –protocol=[1|2c|3] SNMP protocol version
  • -l, –label=STRING Prefix label for output from plugin. i.e Temerature or ActiveSessions
  • -w, –warning=INTEGER_RANGE(s) Range(s) which will not result in a WARNING status
  • -c, –critical=INTEGER_RANGE(s) Range(s) which will not result in a CRITICAL status
  • -o, –oid=OID(s) Object identifier(s) or SNMP variables whose value you wish to query. Make sure to refer to the manual of your device to see all the supported and available oid’s for your equipment. If you have more than two oid’s, separate them with comma.

In the ActiveSessions example, two OID’s are getting monitored. i.e one for VPN LAN-2-LAN tunnels (iso.3.6.1.4.1.3076.2.1.2.17.1.7.0) and another for PPTP sessions (iso.3.6.1.4.1.3076.2.1.2.17.1.9.0). In the above example, VPN LAN-2-LAN active sessions has exceeded the critical limit of 100.

Object Identifier (OID) is arranged in a hierarchical Management Information Base (MIB) tree with roots and branches based on the internet standard.

6. Validate configuration and restart nagios

Verify the nagios configuration to make sure there are no warnings and errors.

# /usr/local/nagios/bin/nagios -v /usr/local/nagios/etc/nagios.cfg


Total Warnings: 0
Total Errors: 0
Things look okay - No serious problems were detected during the pre-flight check

Restart the nagios server to start monitoring the VPN device.

# /etc/rc.d/init.d/nagios stop

Stopping nagios: .done.

# /etc/rc.d/init.d/nagios start
Starting nagios: done.

Verify the status of the ActiveSessions and Temperature of the VPN device from the Nagios web UI (http://{nagios-server}/nagios) as shown below.

Nagios Web UI with Cisco VPN device
Fig - Nagios Web UI showing VPN Device Status

7. Troubleshooting

Issue: check_snmp works without any issues from Linux command line, but Nagios web UI displays following error:

Status Information:	SNMP problem - No data received from host

CMD: /usr/bin/snmpget -t 1 -r 5 -m '' -v 1 [authpriv] 192.168.1.7:161

Solution: Make sure the check_command definition for check_snmp plugin in the switch.cfg file is properly defined. The arguments to the check_snmp command should match the check_snmp definition in the /usr/local/nagios/etc/commands.cfg

check_command check_snmp!Temperature!.1.3.6.1.4.1.3076.2.1.2.22.1.29.0,.1.3.6.1.4.1.3076.2.1.2.22.1.33.0!37,:40!:40,:45

[Note: This is wrong, as it is passing 4 arguments to check_snmp command
The value after the exclamation is considered as one argument. !{argument1}!{argument2}]


check_command check_snmp!-l Temperature -o .1.3.6.1.4.1.3076.2.1.2.22.1.29.0,.1.3.6.1.4.1.3076.2.1.2.22.1.33.0 -w 37,:40 -c :40,:45
[Note: This is correct, as it is passing 1 argument to check_snmp command
The value after the exclamation is considered as one argument. !{argument1}]

In the check_snmp command definition shown below, there is only one $ARG1$ argument. So, in the switch.cfg, while defining the check_snmp, you need to pass only one argument as shown above.

# 'check_snmp' command definition

define command{
command_name check_snmp
command_line $USER1$/check_snmp -H $HOSTADDRESS$ $ARG1$
}
Continue reading How To Monitor VPN Active Sessions and Temperature Using Nagios