networkrare.com
Open in
urlscan Pro
2606:4700:3030::ac43:8025
Public Scan
Submitted URL: http://networkrare.com/
Effective URL: https://networkrare.com/
Submission: On December 13 via api from US — Scanned from US
Effective URL: https://networkrare.com/
Submission: On December 13 via api from US — Scanned from US
Form analysis
3 forms found in the DOMPOST https://networkrare.com/wp-comments-post.php
<form action="https://networkrare.com/wp-comments-post.php" method="post" id="commentform" class="comment-form">
<p class="comment-notes"><span id="email-notes">Your email address will not be published.</span> <span class="required-field-message" aria-hidden="true">Required fields are marked <span class="required" aria-hidden="true">*</span></span></p>
<p class="comment-form-comment"><label for="comment">Comment <span class="required" aria-hidden="true">*</span></label> <textarea id="comment" name="comment" cols="45" rows="8" maxlength="65525" required="required"></textarea></p>
<p class="comment-form-author"><label for="author">Name <span class="required" aria-hidden="true">*</span></label> <input id="author" name="author" type="text" value="" size="30" maxlength="245" required="required"></p>
<p class="comment-form-email"><label for="email">Email <span class="required" aria-hidden="true">*</span></label> <input id="email" name="email" type="text" value="" size="30" maxlength="100" aria-describedby="email-notes" required="required"></p>
<p class="comment-form-url"><label for="url">Website</label> <input id="url" name="url" type="text" value="" size="30" maxlength="200"></p>
<p class="comment-form-cookies-consent"><input id="wp-comment-cookies-consent" name="wp-comment-cookies-consent" type="checkbox" value="yes"> <label for="wp-comment-cookies-consent">Save my name, email, and website in this browser for the next time
I comment.</label></p>
<p class="form-submit"><input name="submit" type="submit" id="submit" class="submit" value="Post Comment"> <input type="hidden" name="comment_post_ID" value="2" id="comment_post_ID">
<input type="hidden" name="comment_parent" id="comment_parent" value="0">
</p>
</form>
GET https://networkrare.com/
<form role="search" method="get" id="searchform" class="searchform" action="https://networkrare.com/">
<div>
<label class="screen-reader-text" for="s">Search for:</label>
<input type="text" value="" name="s" id="s">
<input type="submit" id="searchsubmit" value="Search">
</div>
</form>
GET https://networkrare.com/
<form role="search" method="get" id="searchform" class="searchform" action="https://networkrare.com/">
<div>
<label class="screen-reader-text" for="s">Search for:</label>
<input type="text" value="" name="s" id="s">
<input type="submit" id="searchsubmit" value="Search">
</div>
</form>
Text Content
Network Rare Exploring Network Skip to content * Home * Courses * Blog * Border Gateway Protocol * BGP Best Path Selection * BGP Remove Private AS and Replace ASN * Booting Cisco Router From USB Flash * Cisco Alias * Cisco Fabric Services * Cisco Offset-List Command * cisco asa active standby failover configuration example * Cisco ASA Firewall Active Standby Failover * Cisco Nexus Checkpoint * Cisco Nexus Enhance Object Tracking – Boolean OR in VPC * ASA Active standby Failover * Cisco Nexus FEX Configuration * Cisco Nexus Packet Captures With Ethanalyzer * Cisco Overlay Transport Virtualization (OTV) * Cisco Power Redundancy Mode * Cisco Role Based Access Control * Cisco Router Password Recovery * Cisco Storm-Control Configuration * cisco switch password recovery * Cisco Switchport Protected * Cisco TCL Script Example * DHCP Snooping * Etherchannel Load Balancing * GLBP Gateway Load Balancing Protocol * How to upload the IOS in rommon mode * HSRP Protocol * Introduction to Virtual Extensible LAN (VXLAN) * Nexus Generic Online Diagnostics (GOLD) * Nexus Port Profile * Nexus Source Guard And IOS IP Verify Unicast Source * OSPF Fast Hello packets * OSPF Graceful Shutdown Cisco * Power Over Ethernet * Private VLAN Cisco * SOO (Site Of Orgin) – BGP Extended Community Attribute * Spanning-Tree Bridge Assurance * Subnet Zero And All Ones Subnet * Using Ethanalyzer On Nexus Platform For Control-Plane And Data-Plane Traffic Analysis * VRRP Protocol * VSS Configuration * Why We need BGP * VPC Self Isolation * Quiz * R&S Online Test * OSPF Online Test * BGP Online Test * Q & A * BGP Interview Questions * Wireless Questions * BGP Interview Questions * ASA Interview Questions * Computer Tips & Tricks * Find The WiFi Password * Disable USB Port * Latest Tips and Tricks * Free Screen Recorder * Google Chrome Tricks * Download * Cisco ASA * Cisco Router IOS * Cisco Switch IOU/IOL * GNS3 & EVE-NG * Nexus 9k in Eve-ng * Nexus 5k in Eve-ng * IOU in GNS3 * ASA In EVE-NG * IOS In GNS3 & EVE NG * About us MenuHOMECOURSESBLOG- Border Gateway Protocol- BGP Best Path Selection- BGP Remove Private AS and Replace ASN- Booting Cisco Router From USB Flash- Cisco Alias- Cisco Fabric Services- Cisco Offset-List Command- cisco asa active standby failover configuration example- Cisco ASA Firewall Active Standby Failover- Cisco Nexus Checkpoint- Cisco Nexus Enhance Object Tracking – Boolean OR in VPC- ASA Active standby Failover- Cisco Nexus FEX Configuration- Cisco Nexus Packet Captures With Ethanalyzer- Cisco Overlay Transport Virtualization (OTV)- Cisco Power Redundancy Mode- Cisco Role Based Access Control- Cisco Router Password Recovery- Cisco Storm-Control Configuration- cisco switch password recovery- Cisco Switchport Protected- Cisco TCL Script Example- DHCP Snooping- Etherchannel Load Balancing- GLBP Gateway Load Balancing Protocol- How to upload the IOS in rommon mode- HSRP Protocol- Introduction to Virtual Extensible LAN (VXLAN)- Nexus Generic Online Diagnostics (GOLD)- Nexus Port Profile- Nexus Source Guard And IOS IP Verify Unicast Source- OSPF Fast Hello packets- OSPF Graceful Shutdown Cisco- Power Over Ethernet- Private VLAN Cisco- SOO (Site Of Orgin) – BGP Extended Community Attribute- Spanning-Tree Bridge Assurance- Subnet Zero And All Ones Subnet- Using Ethanalyzer On Nexus Platform For Control-Plane And Data-Plane Traffic Analysis- VRRP Protocol- VSS Configuration- Why We need BGP- VPC Self IsolationQUIZ- R&S Online Test- OSPF Online Test- BGP Online TestQ & A- BGP Interview Questions- Wireless Questions- BGP Interview Questions- ASA Interview QuestionsCOMPUTER TIPS & TRICKS- Find The WiFi Password- Disable USB Port- Latest Tips and Tricks- Free Screen Recorder- Google Chrome TricksDOWNLOAD- Cisco ASA- Cisco Router IOS- Cisco Switch IOU/IOLGNS3 & EVE-NG- Nexus 9k in Eve-ng- Nexus 5k in Eve-ng- IOU in GNS3- ASA In EVE-NG- IOS In GNS3 & EVE NGABOUT US HOME ASA BASICS ASDM ASDM provides the GUI (Graphical user interface) to configure and manage the ASA. After enabling the ASDM we can use it in two different ways. 1. through accessing in browser. 2. through installing application on desktop. If we want to access through application then we can download it from ASA when first time accessing the ASDM through browser. ENABLING ASDM 1. Check the ASDM bin file into flash (show disk0:) if is not present then upload it. 2. After that tell to ASA which ASDM file will be use. ASA1(config)# asdm image disk0:/asdm-731.bin 3. Enable the HTTP. By default it is disabled. ASA1(config)# http server enable hostname(config)# http server enable 443 NOTE: Port 443 is the default port for ASDM. If you want to change this port number then you can do it. If you are changing the port number for ASDM then you have to use this port number in your URL when you are accessing the ASDM. Example, if you change the port number to 444, Then enter the following: https://10.1.1.1:444 4. Restrict the access (We should restrict the access. Here I have allowed the full subnet of /24 but in real environment you should use only particular IP addresses for the hosts, from which you want to access the ASDM) ASA1(config)# http 192.168.1.0 255.255.255.0 INSIDE 5. Configure the username and password ASA(config)#username cisco password cisco privilege 15 6. Now we can access web page from browser or through ASDM-IDM Launcher application https://192.168.1.254 SECURITY LEVEL Security level indicates how we trust an interface , comparing to other interfaces. A interface with high security level is more trusted then a interface which having lower security level. On ASA, we defines each interface with a security level and interface with security level acts like a zone. By default, ASA not follow the zone concept. Zone is the concept of PALO ALTO and Checkpoint etc. An interface with a high security level can access an interface with a low security level. But interface with low security level is not allowed to access an interface which is having high security level. If it is required then we can configure ACL for allow the traffic from low security level to higher security level. But reverse traffic from lower security level to higher security level will be allow. Means, if we are sending a packet from INSIDE (Higher Security Level) to OUTSIDE (Lower Security Level) then reply packet will be allowed automatically. because ASA maintains session / connection table. By default, Communication between two interfaces of same security level is also not allowed. If it is required then we can allow it using the command ASA(config)#same-security-traffic permit inter-interface NOTE: If you are one who is still confused with security level then you can understand it in the way of water flow. Water always can flow from higher place to lower place but it can’t flow from lower place to higher place and same is with ASA security levels. If we we are giving the name INSIDE to a interface then security level will be set to 100 automatically and if we are giving the name OUTSIDE to a interface then security level will be set to 0 automatically. But we can change it if we want. Security level can be set between 0 and 100. Example: Below example is showing that traffic can move from higher security level to lower security level INSIDE interface configuration ASA1(config)# interface gi0/0 ASA1(config-if)# nameif INSIDE INFO: Security level for “INSIDE” set to 100 by default. ASA1(config-if)# ip address 10.10.10.254 255.255.255.0 ASA1(config-if)# no shutdown Or ASA1(config-if)# security-level 100 OUTSIDE interface configuration ASA1(config)# interface gi0/1 ASA1(config-if)# nameif OUTSIDE INFO: Security level for “OUTSIDE” set to 0 by default. ASA1(config-if)# ip address 192.168.0.1 255.255.255.252 ASA1(config-if)# no shutdown Or ASA1(config-if)# security-level 0 NOTE: write erase command is used to erase the configuration. ASA doesn’t support erase startup-configuration command. FACTORY DEFAULT The factory default configuration is available only for routed firewall mode and single context mode. ASA(config)# configure factory-default 192.168.1.1 255.255.255.0 Based on the management IP address and mask, the DHCP address pool size is reduced to 253 from the platform limit 256 WARNING: The boot system configuration will be cleared. The first image found in disk0:/ will be used to boot the system on the next reload. Verify there is a valid image on disk0:/ or the system will not boot. Begin to apply factory-default configuration: Clear all configuration Executing command: interface management0/0 Executing command: nameif management INFO: Security level for “management” set to 0 by default. Executing command: ip address 192.168.1.1 255.255.255.0 Executing command: security-level 100 Executing command: no shutdown Executing command: exit Executing command: http server enable Executing command: http 192.168.1.0 255.255.255.0 management Executing command: dhcpd address 192.168.1.2-192.168.1.254 management Executing command: dhcpd enable management Executing command: logging asdm informational Factory-default configuration is completed 15 THOUGHTS ON “HOME” 1. Avon February 20, 2020 neural Reply ↓ 1. admin Post authorFebruary 20, 2020 Hi Avon, My apologies if you have faced any difficulties. We are just under construction face as well as we are looking for suggestions. so please feel free for share your feedback. It will be helpful for us. Regards, Admin networkrare.com Reply ↓ 2. Dalibor Harald July 31, 2020 i read most of blogs. great job Reply ↓ 3. Travisdrype August 2, 2020 good but it will more helpful if you will share articles on new technologies Reply ↓ 4. Royal CBD August 2, 2020 Hello my loved one! I want to say that this post is awesome, great written and include approximately all vital infos. Reply ↓ 5. Royal CBD August 6, 2020 Highly descriptive blog, I enjoyed that bit. Will there be a part 2? Reply ↓ 6. JamesAxomy August 15, 2020 please keep sharing on ASA. i know its now legacy but still in demand Reply ↓ 7. Jeremy Kennedy August 20, 2020 Good work ! Reply ↓ 8. Jimmy Scowley August 21, 2020 please also upload the post on sadwan Reply ↓ 9. Janiffer August 25, 2020 I have read this article and if I could I want to suggest you some attention-grabbing things or tips. Perhaps you can write subsequent articles relating to this article. I wish to learn more issues approximately it! Reply ↓ 10. Jimmyput August 25, 2020 excellent Reply ↓ 11. DelorisLoalt September 7, 2020 could you share the study material on BGP ? Reply ↓ 12. sugar daddy September 14, 2020 You cover more useful information than I have seen elsewhere. Please could you share your sourceexperience with us? Reply ↓ 13. lucy September 14, 2020 Fantastic ! Reply ↓ 14. Lindsay Johnson September 16, 2020 Hi, I hope you are doing well. I want to contribute a guest post article to your website that may interest your readers. Reply ↓ LEAVE A REPLY CANCEL REPLY Your email address will not be published. Required fields are marked * Comment * Name * Email * Website Save my name, email, and website in this browser for the next time I comment. Support Our Work By Donating ……. Donate by UPI Search for: Categories * Cisco ASA Firewall (7) * Cisco Routing & Switching (57) * Computer Tips & Tricks (5) * Download (21) * Excel Sheets (4) * Personal Finance (4) * Interview Questions (2) * Nexus (16) * SD-WAN (4) * Uncategorized (12) Recent Posts * How to create EC2 (Elastic Compute Cloud) instance in AWS March 19, 2023 * AWS Services March 19, 2023 * Comparison between AWS and Azure cloud computing March 19, 2023 * What is AWS lambda ? March 19, 2023 * Differences between traditional routing and Cisco Viptela SDWAN March 19, 2023 Search for: Blogs * cisco asa active standby failover configuration example * BGP Interview Questions * cisco asa active standby failover configuration example * Cisco ASA ICMP inspection * Cisco ASA Firewall Active Standby Failover * Most Common Cisco ASA Interview Questions * OSPF Fast Hello packets * OSPF Graceful Shutdown Cisco * How to upload the IOS in rommon mode * Cisco Router Password Recovery * cisco switch password recovery * Power Over Ethernet * Cisco Power Redundancy Mode * GLBP Gateway Load Balancing Protocol * VRRP Protocol * HSRP Protocol * Etherchannel Load Balancing * Cisco Switchport Protected * Private VLAN Cisco * Border Gateway Protocol * Subnet Zero And All Ones Subnet * DHCP Snooping * Spanning-Tree Bridge Assurance * Using Ethanalyzer On Nexus Platform For Control-Plane And Data-Plane Traffic Analysis * Cisco Nexus Packet Captures With Ethanalyzer * Nexus Source Guard And IOS IP Verify Unicast Source * Cisco Storm-Control Configuration * Cisco Role Based Access Control * Cisco Fabric Services * Nexus Port Profile * Booting Cisco Router From USB Flash * Nexus Generic Online Diagnostics (GOLD) * Cisco Overlay Transport Virtualization (OTV) * Introduction to Virtual Extensible LAN (VXLAN) * Cisco Nexus Checkpoint * Cisco Nexus FEX Configuration * BGP Best Path Selection * Booting Cisco Router From USB Flash * VSS Configuration * Why We need BGP * Wireless Communication Interview Questions * Cisco Alias * SOO (Site Of Orgin) – BGP Extended Community Attribute * BGP Remove Private AS and Replace ASN * Cisco Offset-List Command Copyright 2020 Network Rare Iconic One Theme | Powered by Wordpress * Facebook * Twitter * LinkedIn * Email * More Networks Share via Facebook Twitter LinkedIn Mix Email Print Copy Link Powered by Social Snap Copy link CopyCopied Powered by Social Snap