Configuration of Jumbo MTU on Nexus 3100, 3500, 5000, 5500, and 6000

In order to configure elevated MTU on the Nexus 3100, 3500, 5000, 5500, and 6000 switchess, create a network-qos policy or modify an existing policy in order to specify the elevated MTU. This configuration applies to all ports. This includes any Cisco Fabric Extender (FEX) ports connected to the switch. Per-port MTU is not supported.

jumbo1

jumbo2

jumbo3

No connection to Database for metasploit after update

While having a failure in connecting  to the Database, I’ve found the correct commands to initialize it. This is due to  Kali Linux Network Services Policy that no network services, including database services, run on boot as a default.

DBinit

And to validate:

DBstatus

Manage a metasploit framework database:

msfdb init # initialize the database
msfdb reinit # delete and reinitialize the database
msfdb delete # delete database and stop using it
msfdb start # start the database
msfdb stop # stop the database

Hope this is able to help you if you were stuck!

Color Codes SecureCRT

If you are sick and tired of the old green/black or black/white themes (white/dark blue in my case) like I was, you starting looking alternatives…

I have found a page that uses a little .ini file to customize Cisco words with colours (also does a great job on Juniper)!

Unfortunately, I cannot find it again to post the direct link, but all the credits goes to this unknown blogger.

The outcome will be this:

colorcli

 

Steps:

  • Download “Cisco Words.ini” File here
  • Search for the installation folder of SecureCRT, and copy the file into folder Config\Keywords.

defaultsessions3

Note: You can check on Global Options -> Configurations Paths

  •  Go to Options -> Global Options..

defaultsessions0

  • Select Default Session -> Edit Default Session…

defaultsessions

  • Terminal -> Appearance -> Highlight keywords -> Name and Select “Cisco Words”

defaultsessions2

After this, you will be ready to see the terminal with a new pair of eyes!

DSL – damnsmalllinux.org – F5 BIG IP Webservers

While doing the F5 training a couple of months ago, I used Ubuntu with LAMP/XAMPP to have, in a Virtual ESXI Lab, WebServers to use.

I decided to write this post cause yesterday I created an .ova file for someone else to do the F5 training, but this time, with a distro that consumes very low resources… And also because eventually I will have to review F5 topics ..

http://www.damnsmalllinux.org/

Damn Small Linux

I added PHP to Monkeyweb following this post and inserted the following script that will show the real IP address while connecting to the VIP from F5:

<html>
<head>
<title> IP Address Verification by #46666 </title>
</head>
<body>
<?php echo $_SERVER[‘SERVER_NAME’]; ?>
</body>
</html>

Just access the http://ip-of-server/jc.php to see it.

IPPHP

Ova File to import in ESXi/Player: here