home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
chilidog.highland.cc.ks.us
/
chilidog.highland.cc.ks.us.zip
/
chilidog.highland.cc.ks.us
/
backup
/
bradford.20100830.bsc-campusMgr-master_loader-telnetMibs.tar.gz
/
bradford.20100830.bsc-campusMgr-master_loader-telnetMibs.tar
/
bsc
/
campusMgr
/
master_loader
/
telnetMibs
/
ciscoASA.mib
< prev
next >
Wrap
Text File
|
2010-03-23
|
5KB
|
164 lines
//Cisco Adaptive Security Appliance Software Version 7.1(2)
//Device Manager Version 5.1(2)
TELNET_PARAMETERS=
{
WAITFOR=PARAM.USER_PROMPT
WRITE=PARAM.USER
WAITFOR=Password:
WRITE=PARAM.PASSWORD
WAITFOR=PARAM.ENABLE_WAITFOR_1
WRITE=PARAM.ENABLE_WRITE
WAITFOR=PARAM.ENABLE_WAITFOR_2
WRITE=PARAM.ENABLE
WAITFOR=#
WRITE=terminal pager 0
WAITFOR=#
}
TELNET_CONTROL_WORDS=
{
WAITFOR=Continue
WRITE=SPACE
WAITFOR=More
WRITE=SPACE
}
TELNET_CONTROL_CHARS_ALLOWED=
{
ALLOW_CONTROL=10
ALLOW_CONTROL=13
}
// Command used to retrieve the list of configured connection profiles
/ (formerly "tunnel groups") on the ASA:
//
// ASA5510# show running-config all tunnel-group | grep general-attributes
// tunnel-group DefaultL2LGroup general-attributes
// tunnel-group DefaultRAGroup general-attributes
// tunnel-group DefaultWEBVPNGroup general-attributes
// tunnel-group BNVPN general-attributes
// tunnel-group VANGUNDY general-attributes
// tunnel-group internalwirelesstg general-attributes
// tunnel-group InternalTest general-attributes
ATTRIBUTE_NAME=GroupSummary
{
GROUP=GroupSummary
ATTRIBUTE=GroupSummary
WRITE= show running-config all tunnel-group | grep general-attributes
RETVAL=#
}
// Command used to retrieve the list of configured group policies
/ on the ASA:
//
// ASA5510# show running-config all group-policy | grep internal
// group-policy DfltGrpPolicy internal
// group-policy webvpnpolicy internal
// group-policy internalwirelesstg internal
// group-policy internalwirelesstg attributes
// group-policy VANGUNDY internal
// group-policy BNVPN internal
// group-policy cm-test-policy internal
// FooASA5550# show running-config group-policy | grep internal
// group-policy RemoteFooAdmin internal
// group-policy RemoteFooAcad internal
// group-policy RemoteFooStudent internal
// group-policy RemoteFooIT internal
ATTRIBUTE_NAME=PolicySummary
{
GROUP=PolicySummary
ATTRIBUTE=PolicySummary
WRITE= show running-config group-policy | grep internal
RETVAL=#
}
// Command used to retrieve the list of connected IpSec VPN users
//
// ASA5510# show vpn-sessiondb detail full remote | grep Session ID
// Session ID: 12 | EasyVPN: 0 | Username: moe | Group: internalwirelesstg | Tunnel Group: internalwirelesstg | IP Addr: 172.16.201.10 | Public IP: 172.16.200.3 | Protocol: IKE IPsec | Session Subtype: None | Encryption: 3DES AES128 | Login Time: 08:36:20 EST Thu Dec 6 2007 | Duration: 0h:22m:04s | Bytes Tx: 0 | Bytes Rx: 6786 | NAC Result: Unknown | Posture Token: | VLAN Mapping: N/A | VLAN: 0 ||
//
ATTRIBUTE_NAME=UserTableIpSec
{
GROUP=UserTableIpSec
ATTRIBUTE=UserTableIpSec
WRITE=show vpn-sessiondb detail full remote | grep Session ID
RETVAL=#
}
// Command used to retrieve the list of connected SSL VPN users
//
// ASA5510# show vpn-sessiondb detail full svc | grep Session ID
// Session ID: 57 | EasyVPN: 0 | Username: moe | Group: internalwirelesstg | Tunnel Group: CampusManager | IP Addr: 172.16.201.10 | Public IP: 172.16.200.3 | Protocol: Clientless SSL-Tunnel DTLS-Tunnel | License: SSL VPN | Session Subtype: With client | Encryption: RC4 AES128 | Login Time: 08:00:26 UTC Mon Feb 25 2008 | Duration: 0h:04m:57s | Bytes Tx: 2569032 | Bytes Rx: 1408973 NAC Result: Unknown | Posture Token: | VLAN Mapping: N/A | VLAN: 0 ||
//
ATTRIBUTE_NAME=UserTableSSL
{
GROUP=UserTableSSL
ATTRIBUTE=UserTableSSL
WRITE=show vpn-sessiondb detail full svc | grep Session ID
RETVAL=#
}
// Command to retrieve IP to MAC mapping when device is used as Firewall.
//
// ASA5510# show arp
// GREEN 192.168.15.1 0009.4378.91ff
// RED 216.153.209.1 0020.d227.11fc
// LINKSYS 172.16.200.3 001c.109e.4b8c
ATTRIBUTE_NAME=ShowArp
{
GROUP=ShowArp
ATTRIBUTE=ShowArp
WRITE=show arp
RETVAL=#
}
// {0} is the index number of the session to clear
//
ATTRIBUTE_NAME=ClearUser
{
GROUP=ClearUser
ATTRIBUTE=ClearUser
SET=vpn-sessiondb logoff ipaddress {0} noconfirm
WAITFOR=#
}
// {0} is the index number of the session to clear
//
ATTRIBUTE_NAME=ClearUser_SSL
{
GROUP=ClearUser_SSL
ATTRIBUTE=ClearUser_SSL
SET=vpn-sessiondb logoff ipaddress {0} noconfirm
WAITFOR=#
}
// {0} is the remote user's IP on which the ACL restriction is to be removed.
// {1} is the network group object to which the IP should be added back
// so that it will be a "restricted" IP when reassigned to a newly connecting
// client.
//
ATTRIBUTE_NAME=ClearACL
{
GROUP=ClearACL
ATTRIBUTE=ClearACL
WRITE=config t
WAITFOR=#
SET=object-group network {1}
WAITFOR=#
SET=no network-object host {0}
WAITFOR=#
SET=network-object host {0}
WAITFOR=#
}
ATTRIBUTE_NAME=Logout
{
GROUP=Logout
ATTRIBUTE=Logout
WRITE=exit
}