It is becoming a fairly common practice to "Black-hole" malware, adware, and malicious domain names by creating Zone File and SOA records to make the local DNS server act as authoritative for those domain names. The SOA record then points these queries such as "x.xerro.net" to 127.0.0.1 or 0.0.0.0. In practice, if you wish to monitor/track this activity you could also point to an internal machine that reponds to the query (single-pixel web server, text file with warning statement, etc).
I am trying to determine if it is possible to create the same condition in the Cisco CNR? Any suggestions on how to set this up? Limitations on number of entries? Thanks in advance for your responses!
Question We run asr9001 with XR 6.1.3, and we have a very long delay to
login w/ SSH 1 or 2 to the device compare to IOS device. After
investigation, the there is 1s delay between the client KEXDH_INIT and
the server (XR) KEXDH_REPLY. After debug ssh serv...
Introduction The purpose of this document is to demonstrate the Open
Shortest Path First (OSPF) behavior when the V-bit (Virtual-link bit) is
present in a non-backbone area. The V-bit is signaled in Type-1 LSA only
if the router is the endpoint of one or ...
Hi, I am seeing quite a few issues with patch install and wanted to
share my experience and workaround to this. Login to admin via CLI, then
access root with the “shell” command Issue “df –h” and you’ll probably
see the following directory full or nearly ...