config ap cert-expiry-ignore mic enable
config ap cert-expiry-ignore ssc enable
Awesome Possum
config ap cert-expiry-ignore mic enable
config ap cert-expiry-ignore ssc enable
If you accidentally disable the large file size warning (check the box that says don't display this message again) you can re-enable it through the settings.ini file.
Settings file - %APPDATA%\Notepad2\Notepad2.ini
Remove the MsgFileSizeWarning=1 line from the [Suppressed Messages] section.
[Suppressed Messages]
MsgFileSizeWarning=1
! sender (server) side - use your IP here
ntttcp -s -m 1,*,10.1.1.8 -l 128K -t 60
! receiver (client) side - use the sender's IP here
ntttcp -r -m 1,*,10.1.1.8 -t 60
Ntttcp does something called pre-posting receives, which is unique to this tool. This reduces application wait time as part of network stack isolation, allowing for quicker than normal application responses to socket messages.
-r is receiver, and -s is sender.
-m is a mapping of values that are: <num threads>, <CPU affinity>, <Target IP>. In this test we use a single thread, no CPU affinity (*), and both -r and -s side uses the target IP address as the final value.
-t is test time, in seconds.
-l sets the buffer length. You can use K|M|G with ntttcp as shorthand for kilo-, mega-, and giga-bytes.
https://techcommunity.microsoft.com/t5/networking-blog/three-reasons-why-you-should-not-use-iperf3-on-windows/ba-p/4117876
https://learn.microsoft.com/en-us/azure/virtual-network/virtual-network-bandwidth-testing?tabs=windows
Cisco AP Flash corruption issues.
Any IOS-based AP (1700/2700/3700/1570) downloading a new image from WLC running any version after December 4th 2022.
The AP can leave and re-join any WLC after Dec 4th 2022 provided it does not have to download a new image, if it has to download a new image (regardless of the version, 9800 IOS-XE or AireOS), it will fail.
For any WLC that has APs stuck in the downloading state:
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwd80290
https://www.cisco.com/c/en/us/support/docs/wireless/aironet-700-series-access-points/218447-ios-ap-image-download-fails-due-to-expir.html
https://www.cisco.com/c/en/us/support/docs/field-notices/725/fn72524.html
Here is an AHK script to reformat MAC addresses. It takes a MAC address from the clipboard with :, -, ., or no separators and reformats it into several options each on their own line in the clipboard.
Output:
AA:AA:BB:BB:CC:CC
AA-AA-BB-BB-CC-CC
AAAABBBBCCCC
AAAA.BBBB.CCCC
Script:
;reformats MAC addresses. Press ALT+Shift+M
!+m::
Clipboard := StrReplace(Clipboard,"-","")
Clipboard := StrReplace(Clipboard,":","")
Clipboard := StrReplace(Clipboard,".","")
sleep 10
var1 := Clipboard
var2 := RegExReplace(Clipboard,"(?<!^.)(..)(?=[^$])","$1:")
var3 := RegExReplace(Clipboard,"(?<!^.)(..)(?=[^$])","$1-")
var4 := RegExReplace(Clipboard,"(?<!^.)(....)(?=[^$])","$1.")
var5 = %var2%`n%var3%`n%var1%`n%var4%
Clipboard := var5
return
ARP scanning a subnet in Windows can be done with Nmap but some AV/security utilities don't like Nmap and it's a bit heavy. arp-scan-windows can be used as a simple standalone program to scan a subnet.
Link: https://github.com/rsweet2/arp-scan-windows
And send traffic to remote wireshark.
https://www.cisco.com/c/en/us/support/docs/wireless-mobility/80211/200527-Fundamentals-of-802-11-Wireless-Sniffing.html#anc12
Wireshark Capture filter - host 10.1.1.3 more info
Here are the steps in order to collect a trace using a sniffer mode LAP
The AP will reboot and it will not be able to serve clients.
If using Wireskark to receive the traffic, follow the steps below:
This filter is optional but strongly recommended as it excludes all the non-wireless related traffic from the capture. Consider that the WLC sends traffic to a UDP port there’s no application listening on the sniffer side; this results in having a ICMP port-unreachable response for each packet received from the WLC.
Although this is expected, the filter above helps to exclude also this traffic which is useless and so it can only cause the trace to be bigger and more difficult to read.
The RF info shown above (e.g. the channel, signal strength, noise..) are added by the AP.
test service-module integrated-Service-Engine 0/0 console
let's you see the most recent console output without needing to actually log in.
You are unable to open a session to the CUE module or you do not see any output on the console.
You can use this command in order to check the console messages on the CUE module without the need to open a session to it:
Router# test service-module service-engine slot/unit console
By default, this command displays the most recent 80 lines stored in the console buffer. However, it is possible to specify an offset of greater or less than 80, or to view all the messages stored in the console buffer with this command:
Router# test service-module service-Engine slot/unit console ?
<1-20456> Offset into console buffer
all Entire console buffer
Configuration information for configuring multiple WAN interfaces
Should work for Comcast EDI (Fiber) circuits
https://www.sonicwall.com/support/knowledge-base/configuring-multiple-wan-subnets-using-static-arp-with-sonicos-enhanced/170503911164326/
https://www.carlc.com/modules/Wordpress_Blog/configure-sonicwall-router-for-comcast-business-fiber-ethernet-multiple-ip-segmentsranges/
Pretty sure this should work too - assigning it to a DMZ zone http://starforce.cyou/
base64 -d -i "SonicWallConfig.exp" | sed 's/&/\n/g' > SonicwallConfig.txt
https://www.sonicwall.com/support/knowledge-base/how-to-get-the-configurations-of-the-firewall-based-on-the-exporting-exp-file/170503330364045/
To access the diag page on gen 7 firewalls go to
/sonicui/7/m/mgmt/settings/diag
e.g. https://10.1.1.1/sonicui/7/m/mgmt/settings/diag
Change the Switchvox PBX to use Inband DTMF in the SIP provider settings for the Sangoma gateway provider.
The default on the PBX is RFC4733 and the default on the gateway is RFC2833 so I'm not sure why this is required.
This worked on a Vega 60Gv2 gateway.