Cisco IOS XRv Vagrant Box for VMware Fusion

And yet another virtual network appliance to Vagrantize… Ingredients used in this guide: macOS Mojave (10.14) VMware Fusion 11 Pro Vagrant 2.2.3 VMware provider for Vagrant Cisco IOS XRv Router v6.1.3 The Cisco IOS XRV Router image is available as part of your Cisco VIRL subscription. Steps 1. Convert the disk image format type. The Cisco IOS XRv Router is provided in the qcow2 (QEMU) disk image format. The QEMU disk image utility (qemu-img) is required to convert the disk image to the vmdk (VMware) format. The utility is included with the qemu package. Use either MacPorts or Homebrew to install. ...

January 6, 2019 · 7 min

FortiGate Vagrant Box for VMware Fusion

Continuing my journey to Vagrantize more virtual network appliances… Ingredients used in this guide: macOS Mojave (10.14) VMware Fusion 11 Pro Vagrant 2.2.2 VMware provider for Vagrant FortiGate-VM The FortiGate VM includes a limited embedded 15-day trial license that supports: 1 CPU maximum 1 GB RAM maximum Low encryption only (no HTTPS administrative access) All features except FortiGuard updates Steps 1. Download and unzip the FortiGate VM deployment package for VMware. FortiGate VM deployment packages are included with FortiGate firmware images on the Customer Service & Support site. I will be using FortiGate VM v6.0.2 for my example. ...

December 26, 2018 · 5 min

Store and retrieve GNS3 images with Azure Blob Storage

This post is a companion to the previous GNS3 with Microsoft Azure post. For many of us, an asymmetrical Internet connection usually equates to a much slower upload than download speed. Specifically, in our case, this results in a time-consuming process of uploading GNS3 image files to our remote gns3server VM instance. What if we need to recreate the disk attached to our gns3server VM instance? Modify the type (i.e., HDD to SSD) or decrease the size of the disk, which again would require us to recreate the disk? What if we need to spin up multiple gns3server VM instances for training purposes? Each situation may require a good amount of unnecessary (re)uploading. ...

October 24, 2018 · 4 min

GNS3 with Microsoft Azure

Microsoft Azure is one of the big three public cloud computing providers for services such as virtual machines (VMs), containers, server-less computing, and machine learning. Azure is a large platform, but we’re focused solely on the Infrastructure as a Service (IaaS) resources in this guide. The GNS3 architecture is comprised of three primary components: User Interface (UI), Controller, and the (Compute) Server. The Server is the component that puts a strain on computer hardware resources. The more routers, switches, firewalls, and servers we add to our GNS3 topologies, the more CPU, RAM, and data storage we require. We usually come to a point where the hardware requirements of our GNS3 labs may exceed what our laptops and desktops can deliver. ...

September 24, 2018 · 11 min

Real-time VMnet packet capture and display for VMware Fusion

Steps Identify or create the VMnet for capturing network traffic. If you’re using the standard version of VMware Fusion, this will be Share with my Mac (vmnet8), Private to my Mac (vmnet1), or Bridged (vmnet0). VMware Fusion Pro includes the feature to create additional custom VMnets with the virtual network editor. Note that a host adapter is not required to capture traffic on the VMnet. Create a named pipe (FIFO) file for the VMnet. I prefer to create a separate file for each VMnet. It provides the flexibility to capture and display on multiple VMnets simultaneously. Run the following command in Terminal: ...

May 31, 2015 · 2 min

Compile and install Wireshark on Fedora and Ubuntu Linux

Wireshark is the world’s most popular network analyzer. A network protocol analyzer is usually required to get the deepest visibility in determining network issues. Grabbing the newest Wireshark release for Windows and Mac OS X is easy enough. You just direct your web browser to the Wireshark site to grab it. Things can be a little trickier if using Linux. The Wireshark package listed with most Linux distribution repositories is usually a version or two behind the current stable release. Even if the repositories have the latest stable release, what do you do if you want to try out the bleeding edge features of the latest development release? You may have no other choice except to do a source-based installation. This post will show you how to do just that. ...

May 13, 2011 · 4 min

Cisco Security Device Manager on the Mac

Cisco Router and Security Device Manager (SDM) is a Web-based device-management tool that enables you to deploy and manage the services on a Cisco IOS router. Even if you decide to do your initial configuration with the CLI, the Monitoring mode of SDM is a great way to display a graphical real-time pulse of the state of your router. The SDM application can run either as an application installed on your Windows PC or from the router’s flash thru the web browser. This post will show you how to run the SDM application on Mac OS X. This should go without saying, but don’t expect official support from Cisco regarding this configuration. ...

May 8, 2011 · 6 min

Convert AC3 audio to MP3 for XviD files with FFmpeg

I recently had an issue where I wanted to play a movie on one of my portable devices, but the file’s audio stream is encoded in the AC3 (Dolby Digital) format. But of course, the device doesn’t support AC3, so I need to convert it to a compatible format. Handbrake is my go-to tool for media file conversion, but it no longer supports output to XviD – specifically the AVI container. I could convert the whole file, but I was looking for a way to transcode the audio but leave the XviD video stream intact. This method is ideal because transcoding video is the most time-consuming operation of the media file conversion process. I researched further with the knowledge that Handbrake leverages FFmpeg. ...

June 12, 2010 · 3 min

PowerShell version of uptime command

I created a PowerShell advanced function that emulates the uptime command for Unix-like operating systems. The uptime command displays the current time, the length of time the system has been up, the number of users, and the load average of the system over the last 1, 5, and 15 minutes. uptime output: 21:33 up 7 days, 11:10, 2 users, load averages: 0.05 0.08 0.08 My function returns a custom PowerShell object, so we have the option to pass it to the pipeline for further processing and/or formatting. ...

May 10, 2010 · 2 min

SSH using Public-Key Authentication

Lately, I’ve been implementing a solution to make SSH connections more secure and manageable (i.e., getting away from password authentication). A couple of benefits public-key authentication has over the default password authentication is: Memorize only the passphrase of your private key rather than possibly dozens of username/password combinations for remote hosts. A password sent across the network, even protected by an SSH secure channel, can be captured when it arrives on the remote host if that host has been compromised. Steps Generate the key pair. RSA authentication will need a passphrase to encrypt the private key. It’s highly recommended to create a strong passphrase for the private key. A strong passphrase is at least 10 - 15 characters long and not a grammatical sentence. The following command creates a 4096-bit RSA key pair and also prompts you for a passphrase: ...

March 29, 2010 · 2 min