{"id":316,"date":"2015-09-02T08:08:33","date_gmt":"2015-09-02T08:08:33","guid":{"rendered":"http:\/\/www.safekom.pl\/blog\/?p=316"},"modified":"2015-09-02T19:38:28","modified_gmt":"2015-09-02T19:38:28","slug":"cisco-user-read-only","status":"publish","type":"post","link":"https:\/\/www.safekom.pl\/blog\/cisco\/cisco-user-read-only\/","title":{"rendered":"Cisco &#8211; user read only"},"content":{"rendered":"<p>ostatnio siedzia\u0142em nad problemem jak szybko utworzy\u0107 usera read only na urz\u0105dzeniu Cisco. Poni\u017cej instrukcja dla potomnych.<\/p>\n<p>Definiujemy privilege level 5 oraz tworzymy konto test<\/p>\n<pre class=\"lang:sh decode:true\">privilege exec all level 5 show running-config\r\nprivilege exec level 5 show\r\nusername test privilege 5 secret 0 test<\/pre>\n<p>ale po zalogowaniu si\u0119 na urz\u0105dzenie userem test, po wydaniu komendy 'show run&#8217; nie widzimy konfigu:<\/p>\n<pre class=\"lang:sh decode:true\">SW-LAB-SAFEKOM#show running-config \r\nBuilding configuration...\r\n\r\nCurrent configuration : 211 bytes\r\n!\r\n! Last configuration change at 06:28:31 UTC Wed Sep 2 2015 by admin\r\n! NVRAM config last updated at 06:28:32 UTC Wed Sep 2 2015 by admin\r\n!\r\nboot-start-marker\r\nboot-end-marker\r\n!\r\n!\r\n!\r\n!\r\n!\r\n!\r\nend<\/pre>\n<p>rozwi\u0105zaniem tego problemu wywo\u0142anie komendy<\/p>\n<pre class=\"lang:sh decode:true \">show run view full<\/pre>\n<p>wynik:<\/p>\n<pre class=\"lang:sh decode:true\">SW-LAB-SAFEKOM#show run view full\r\nBuilding configuration...\r\n\r\nCurrent configuration : 20572 bytes\r\n!\r\n! Last configuration change at 06:28:31 UTC Wed Sep 2 2015 by admin\r\n! NVRAM config last updated at 06:28:32 UTC Wed Sep 2 2015 by admin\r\n!\r\nversion 15.2\r\nno service pad\r\nservice timestamps debug datetime msec\r\nservice timestamps log datetime msec\r\nservice password-encryption\r\n!\r\nhostname SW-LAB-SAFEKOM\r\n!\r\nboot-start-marker\r\nboot-end-marker\r\n!\r\nusername test privilege 5 secret 5 $1$90...............7wrOKgK\/C1\r\nusername admin privilege 15 secret 5 $1........................V0\r\n\r\nno aaa new-model\r\nswitch 1 provision ws-c2960x-48ts-l\r\nswitch 2 provision ws-c2960x-48ts-l\r\nip routing\r\n!\r\n!\r\nno ip domain-lookup\r\nip domain-name safekom.pl\r\nvtp mode off\r\n!\r\n!\r\n.............<\/pre>\n<p>Mam nadziej\u0119 \u017ce komu\u015b si\u0119 przyda ten wpis.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ostatnio siedzia\u0142em nad problemem jak szybko utworzy\u0107 usera read only na urz\u0105dzeniu Cisco. Poni\u017cej instrukcja dla potomnych. Definiujemy privilege level 5 oraz tworzymy konto test privilege exec all level 5 show running-config privilege exec level 5 show username test privilege 5 secret 0 test ale po zalogowaniu si\u0119 na urz\u0105dzenie userem test, po wydaniu komendy [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":319,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"jetpack_post_was_ever_published":false},"categories":[4],"tags":[13,85,87,18,17,86],"class_list":["post-316","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cisco","tag-cisco","tag-ios","tag-lab","tag-router","tag-switch","tag-user"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cisco - user read only - SafeKom Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.safekom.pl\/blog\/cisco\/cisco-user-read-only\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cisco - user read only - SafeKom Blog\" \/>\n<meta property=\"og:description\" content=\"ostatnio siedzia\u0142em nad problemem jak szybko utworzy\u0107 usera read only na urz\u0105dzeniu Cisco. Poni\u017cej instrukcja dla potomnych. Definiujemy privilege level 5 oraz tworzymy konto test privilege exec all level 5 show running-config privilege exec level 5 show username test privilege 5 secret 0 test ale po zalogowaniu si\u0119 na urz\u0105dzenie userem test, po wydaniu komendy [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.safekom.pl\/blog\/cisco\/cisco-user-read-only\/\" \/>\n<meta property=\"og:site_name\" content=\"SafeKom Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/safekompl\" \/>\n<meta property=\"article:published_time\" content=\"2015-09-02T08:08:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-09-02T19:38:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/09\/cisco-logo.png?fit=400%2C300&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Micha\u0142 Iwa\u0144czuk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@MIwaczuk\" \/>\n<meta name=\"twitter:site\" content=\"@MIwaczuk\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"Micha\u0142 Iwa\u0144czuk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuta\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.safekom.pl\\\/blog\\\/cisco\\\/cisco-user-read-only\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.safekom.pl\\\/blog\\\/cisco\\\/cisco-user-read-only\\\/\"},\"author\":{\"name\":\"Micha\u0142 Iwa\u0144czuk\",\"@id\":\"https:\\\/\\\/www.safekom.pl\\\/blog\\\/#\\\/schema\\\/person\\\/fd4cc931b624af4b7353d36d92ba7181\"},\"headline\":\"Cisco &#8211; user read only\",\"datePublished\":\"2015-09-02T08:08:33+00:00\",\"dateModified\":\"2015-09-02T19:38:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.safekom.pl\\\/blog\\\/cisco\\\/cisco-user-read-only\\\/\"},\"wordCount\":66,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.safekom.pl\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.safekom.pl\\\/blog\\\/cisco\\\/cisco-user-read-only\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.safekom.pl\\\/blog\\\/wp-content\\\/uploads\\\/2015\\\/09\\\/cisco-logo.png?fit=400%2C300&ssl=1\",\"keywords\":[\"cisco\",\"ios\",\"lab\",\"router\",\"switch\",\"user\"],\"articleSection\":[\"Cisco\"],\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.safekom.pl\\\/blog\\\/cisco\\\/cisco-user-read-only\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.safekom.pl\\\/blog\\\/cisco\\\/cisco-user-read-only\\\/\",\"url\":\"https:\\\/\\\/www.safekom.pl\\\/blog\\\/cisco\\\/cisco-user-read-only\\\/\",\"name\":\"Cisco - user read only - SafeKom Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.safekom.pl\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.safekom.pl\\\/blog\\\/cisco\\\/cisco-user-read-only\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.safekom.pl\\\/blog\\\/cisco\\\/cisco-user-read-only\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.safekom.pl\\\/blog\\\/wp-content\\\/uploads\\\/2015\\\/09\\\/cisco-logo.png?fit=400%2C300&ssl=1\",\"datePublished\":\"2015-09-02T08:08:33+00:00\",\"dateModified\":\"2015-09-02T19:38:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.safekom.pl\\\/blog\\\/cisco\\\/cisco-user-read-only\\\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.safekom.pl\\\/blog\\\/cisco\\\/cisco-user-read-only\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/www.safekom.pl\\\/blog\\\/cisco\\\/cisco-user-read-only\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.safekom.pl\\\/blog\\\/wp-content\\\/uploads\\\/2015\\\/09\\\/cisco-logo.png?fit=400%2C300&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.safekom.pl\\\/blog\\\/wp-content\\\/uploads\\\/2015\\\/09\\\/cisco-logo.png?fit=400%2C300&ssl=1\",\"width\":400,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.safekom.pl\\\/blog\\\/cisco\\\/cisco-user-read-only\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/www.safekom.pl\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cisco &#8211; user read only\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.safekom.pl\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.safekom.pl\\\/blog\\\/\",\"name\":\"SafeKom Blog\",\"description\":\"Notatki Architekta i in\u017cyniera zwi\u0105zanego rozwi\u0105zaniami on-prem\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.safekom.pl\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.safekom.pl\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.safekom.pl\\\/blog\\\/#organization\",\"name\":\"SafeKom Blog\",\"url\":\"https:\\\/\\\/www.safekom.pl\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/www.safekom.pl\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.safekom.pl\\\/blog\\\/wp-content\\\/uploads\\\/2015\\\/05\\\/cropped-logo.png?fit=512%2C512&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.safekom.pl\\\/blog\\\/wp-content\\\/uploads\\\/2015\\\/05\\\/cropped-logo.png?fit=512%2C512&ssl=1\",\"width\":512,\"height\":512,\"caption\":\"SafeKom Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.safekom.pl\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/safekompl\",\"https:\\\/\\\/x.com\\\/MIwaczuk\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/michaliwanczuk\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.safekom.pl\\\/blog\\\/#\\\/schema\\\/person\\\/fd4cc931b624af4b7353d36d92ba7181\",\"name\":\"Micha\u0142 Iwa\u0144czuk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cc6dda4ee8d21d1f254147e5ee6f5e38881b88a4a12a5774ca42380597e52014?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cc6dda4ee8d21d1f254147e5ee6f5e38881b88a4a12a5774ca42380597e52014?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cc6dda4ee8d21d1f254147e5ee6f5e38881b88a4a12a5774ca42380597e52014?s=96&d=mm&r=g\",\"caption\":\"Micha\u0142 Iwa\u0144czuk\"},\"description\":\"Pasjonat komputerowy od zawsze oraz maniak w zakresie sieci, wirtualizacji oraz bezpiecze\u0144stwa IT. Kompetentny in\u017cynier z du\u017cym do\u015bwiadczeniem w realizacji projekt\u00f3w informatycznych i telekomunikacyjnych. Wieloletni administrator IT, kt\u00f3ry utrzymuje systemy informatyczne dostosowuj\u0105c je do wymog\u00f3w biznesowych z zapewnieniem dost\u0119pno\u015bci 24\\\/7\\\/365.\",\"url\":\"https:\\\/\\\/www.safekom.pl\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cisco - user read only - SafeKom Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.safekom.pl\/blog\/cisco\/cisco-user-read-only\/","og_locale":"pl_PL","og_type":"article","og_title":"Cisco - user read only - SafeKom Blog","og_description":"ostatnio siedzia\u0142em nad problemem jak szybko utworzy\u0107 usera read only na urz\u0105dzeniu Cisco. Poni\u017cej instrukcja dla potomnych. Definiujemy privilege level 5 oraz tworzymy konto test privilege exec all level 5 show running-config privilege exec level 5 show username test privilege 5 secret 0 test ale po zalogowaniu si\u0119 na urz\u0105dzenie userem test, po wydaniu komendy [&hellip;]","og_url":"https:\/\/www.safekom.pl\/blog\/cisco\/cisco-user-read-only\/","og_site_name":"SafeKom Blog","article_publisher":"https:\/\/www.facebook.com\/safekompl","article_published_time":"2015-09-02T08:08:33+00:00","article_modified_time":"2015-09-02T19:38:28+00:00","og_image":[{"width":400,"height":300,"url":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/09\/cisco-logo.png?fit=400%2C300&ssl=1","type":"image\/png"}],"author":"Micha\u0142 Iwa\u0144czuk","twitter_card":"summary_large_image","twitter_creator":"@MIwaczuk","twitter_site":"@MIwaczuk","twitter_misc":{"Napisane przez":"Micha\u0142 Iwa\u0144czuk","Szacowany czas czytania":"1 minuta"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.safekom.pl\/blog\/cisco\/cisco-user-read-only\/#article","isPartOf":{"@id":"https:\/\/www.safekom.pl\/blog\/cisco\/cisco-user-read-only\/"},"author":{"name":"Micha\u0142 Iwa\u0144czuk","@id":"https:\/\/www.safekom.pl\/blog\/#\/schema\/person\/fd4cc931b624af4b7353d36d92ba7181"},"headline":"Cisco &#8211; user read only","datePublished":"2015-09-02T08:08:33+00:00","dateModified":"2015-09-02T19:38:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.safekom.pl\/blog\/cisco\/cisco-user-read-only\/"},"wordCount":66,"commentCount":0,"publisher":{"@id":"https:\/\/www.safekom.pl\/blog\/#organization"},"image":{"@id":"https:\/\/www.safekom.pl\/blog\/cisco\/cisco-user-read-only\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/09\/cisco-logo.png?fit=400%2C300&ssl=1","keywords":["cisco","ios","lab","router","switch","user"],"articleSection":["Cisco"],"inLanguage":"pl-PL","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.safekom.pl\/blog\/cisco\/cisco-user-read-only\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.safekom.pl\/blog\/cisco\/cisco-user-read-only\/","url":"https:\/\/www.safekom.pl\/blog\/cisco\/cisco-user-read-only\/","name":"Cisco - user read only - SafeKom Blog","isPartOf":{"@id":"https:\/\/www.safekom.pl\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.safekom.pl\/blog\/cisco\/cisco-user-read-only\/#primaryimage"},"image":{"@id":"https:\/\/www.safekom.pl\/blog\/cisco\/cisco-user-read-only\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/09\/cisco-logo.png?fit=400%2C300&ssl=1","datePublished":"2015-09-02T08:08:33+00:00","dateModified":"2015-09-02T19:38:28+00:00","breadcrumb":{"@id":"https:\/\/www.safekom.pl\/blog\/cisco\/cisco-user-read-only\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.safekom.pl\/blog\/cisco\/cisco-user-read-only\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/www.safekom.pl\/blog\/cisco\/cisco-user-read-only\/#primaryimage","url":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/09\/cisco-logo.png?fit=400%2C300&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/09\/cisco-logo.png?fit=400%2C300&ssl=1","width":400,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.safekom.pl\/blog\/cisco\/cisco-user-read-only\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/www.safekom.pl\/blog\/"},{"@type":"ListItem","position":2,"name":"Cisco &#8211; user read only"}]},{"@type":"WebSite","@id":"https:\/\/www.safekom.pl\/blog\/#website","url":"https:\/\/www.safekom.pl\/blog\/","name":"SafeKom Blog","description":"Notatki Architekta i in\u017cyniera zwi\u0105zanego rozwi\u0105zaniami on-prem","publisher":{"@id":"https:\/\/www.safekom.pl\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.safekom.pl\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/www.safekom.pl\/blog\/#organization","name":"SafeKom Blog","url":"https:\/\/www.safekom.pl\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/www.safekom.pl\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/05\/cropped-logo.png?fit=512%2C512&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/05\/cropped-logo.png?fit=512%2C512&ssl=1","width":512,"height":512,"caption":"SafeKom Blog"},"image":{"@id":"https:\/\/www.safekom.pl\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/safekompl","https:\/\/x.com\/MIwaczuk","https:\/\/www.linkedin.com\/in\/michaliwanczuk\/"]},{"@type":"Person","@id":"https:\/\/www.safekom.pl\/blog\/#\/schema\/person\/fd4cc931b624af4b7353d36d92ba7181","name":"Micha\u0142 Iwa\u0144czuk","image":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/secure.gravatar.com\/avatar\/cc6dda4ee8d21d1f254147e5ee6f5e38881b88a4a12a5774ca42380597e52014?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/cc6dda4ee8d21d1f254147e5ee6f5e38881b88a4a12a5774ca42380597e52014?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cc6dda4ee8d21d1f254147e5ee6f5e38881b88a4a12a5774ca42380597e52014?s=96&d=mm&r=g","caption":"Micha\u0142 Iwa\u0144czuk"},"description":"Pasjonat komputerowy od zawsze oraz maniak w zakresie sieci, wirtualizacji oraz bezpiecze\u0144stwa IT. Kompetentny in\u017cynier z du\u017cym do\u015bwiadczeniem w realizacji projekt\u00f3w informatycznych i telekomunikacyjnych. Wieloletni administrator IT, kt\u00f3ry utrzymuje systemy informatyczne dostosowuj\u0105c je do wymog\u00f3w biznesowych z zapewnieniem dost\u0119pno\u015bci 24\/7\/365.","url":"https:\/\/www.safekom.pl\/blog\/author\/admin\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/09\/cisco-logo.png?fit=400%2C300&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p7i9ri-56","jetpack-related-posts":[{"id":41,"url":"https:\/\/www.safekom.pl\/blog\/cisco\/cisco-catalyst-polityka-hasel\/","url_meta":{"origin":316,"position":0},"title":"Cisco catalyst &#8211; polityka hase\u0142","author":"Micha\u0142 Iwa\u0144czuk","date":"20.04.2015","format":false,"excerpt":"Ostatnio dosta\u0142em za zadanie ustawienie polityk\u0119 hase\u0142 na Switch'u Cisco poni\u017cej config kt\u00f3ry ustawia polityk\u0119 hase\u0142: aaa new-model aaa authentication login default local aaa authorization exec default local aaa authorization network default local ! aaa common-criteria policy Profil_pass min-length 8 max-length 64 numeric-count 1 upper-case 1 lower-case 1 special-case 1\u2026","rel":"","context":"W \u201eCisco&quot;","block_context":{"text":"Cisco","link":"https:\/\/www.safekom.pl\/blog\/category\/cisco\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":171,"url":"https:\/\/www.safekom.pl\/blog\/cisco\/lab-ipsec-juniper-srx-cisco-router\/","url_meta":{"origin":316,"position":1},"title":"Lab &#8211; IPSEC Juniper SRX &#8211; Cisco router","author":"Micha\u0142 Iwa\u0144czuk","date":"21.08.2015","format":false,"excerpt":"Dzi\u015b postanowi\u0142em opisa\u0107 troch\u0119 labowania, temat ostatnio bardzo mocno przerabiany IPSEC. Poni\u017cej opisz\u0119 wariant policy base vpn, kt\u00f3ry jest bardzo elastyczny. Za\u0142o\u017cenia: Faza 1 aes256 sha-1 pfs g2 3600s Faza 2 aes256 sha-1 pfs g2 3600s Cisco Juniper SRX Sieci kt\u00f3re b\u0119d\u0105 podlega\u0142y szyfrowaniu 172.16.10.0\/24 10.10.10.0\/24 Cisco Juniper SRX Interfejs\u2026","rel":"","context":"W \u201eCisco&quot;","block_context":{"text":"Cisco","link":"https:\/\/www.safekom.pl\/blog\/category\/cisco\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/08\/junos_multicolor_burst.png?fit=361%2C393&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":610,"url":"https:\/\/www.safekom.pl\/blog\/cisco\/asav-pierwsze-uruchomienie-w-labie\/","url_meta":{"origin":316,"position":2},"title":"ASAv &#8211; pierwsze uruchomienie w labie","author":"Micha\u0142 Iwa\u0144czuk","date":"06.03.2016","format":false,"excerpt":"Pierwsze uruchomienie Cisco ASAv w Labie. Pokazuj\u0119 podstawow\u0105 konfiguracj\u0119 od importu po zalogowanie si\u0119 po ssh lub asdm.","rel":"","context":"W \u201eCisco&quot;","block_context":{"text":"Cisco","link":"https:\/\/www.safekom.pl\/blog\/category\/cisco\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/09\/cisco-logo.png?fit=400%2C300&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":481,"url":"https:\/\/www.safekom.pl\/blog\/cisco\/lab-cisco-ise-2-0-w-labie-cz1\/","url_meta":{"origin":316,"position":3},"title":"LAB &#8211; Cisco ISE 2.0 w Labie &#8211; cz1","author":"Micha\u0142 Iwa\u0144czuk","date":"02.02.2016","format":false,"excerpt":"Postanowi\u0142em pozna\u0107 co to jest oraz z czym to si\u0119 je - ISE w wersji 2.0. Uda\u0142o mi si\u0119 zdoby\u0107 wersj\u0119 demonstracyjn\u0105 na 90dni z pe\u0142n\u0105 funkcjonalno\u015bci\u0105. \u00a0Poni\u017cej przedstawi\u0119 jak instaluj\u0119 w labie. Importujemy plik ova do Workstation Wybieramy file --> open wybieramy nasz plik ova, poni\u017cej kolejny ju\u017c krok\u2026","rel":"","context":"W \u201eCisco&quot;","block_context":{"text":"Cisco","link":"https:\/\/www.safekom.pl\/blog\/category\/cisco\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/09\/cisco-logo.png?fit=400%2C300&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":690,"url":"https:\/\/www.safekom.pl\/blog\/cisco\/cisco-asa-jak-wgrac-ponownie-plik-z-image-jak-wlasciwy-jest-uszkodzony\/","url_meta":{"origin":316,"position":4},"title":"Cisco ASA &#8211; jak wgra\u0107 ponownie plik z Image jak w\u0142a\u015bciwy jest uszkodzony","author":"Micha\u0142 Iwa\u0144czuk","date":"30.03.2016","format":false,"excerpt":"Ostatnio aktualizowa\u0142em Cisco ASA i po wgraniu nowego pliku z softem i zmianie parametry boot w konfiguracji zrobi\u0142em reload i lipa urz\u0105dzenie nie wstaje. w konsoli widz\u0119: Booting system, please wait... CISCO SYSTEMS Embedded BIOS Version 1.0(11)5 08\/28\/08 15:11:51.82 Low Memory: 631 KB High Memory: 1024 MB PCI Device Table.\u2026","rel":"","context":"W \u201eCisco&quot;","block_context":{"text":"Cisco","link":"https:\/\/www.safekom.pl\/blog\/category\/cisco\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/09\/cisco-logo.png?fit=400%2C300&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1916,"url":"https:\/\/www.safekom.pl\/blog\/lab\/heterogeniczna-infrastruktura-sieciowa-vol-1\/","url_meta":{"origin":316,"position":5},"title":"Heterogeniczna infrastruktura sieciowa vol. 1","author":"Micha\u0142 Iwa\u0144czuk","date":"01.08.2017","format":false,"excerpt":"Ostatnio pracuj\u0119 w \u015brodowisku heterogenicznej infrastruktury sieciowej. Ale co to znaczy dzi\u015b heterogeniczna infrastruktura sieciowa jest to tw\u00f3r w kt\u00f3rym mamy kliku r\u00f3\u017cnych producent\u00f3w sprz\u0119tu. Co raz cz\u0119\u015bciej w spotykam si\u0119 z sytuacj\u0105, \u017ce dany blog funkcjonalny jest realizowany przez jakiego\u015b producenta, np. sie\u0107 WAN Sie\u0107 LAN Sie\u0107 DC z\u2026","rel":"","context":"W \u201eArista&quot;","block_context":{"text":"Arista","link":"https:\/\/www.safekom.pl\/blog\/category\/arista\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2017\/06\/cropped-logo-rastrowe-bez-t%C5%82a.png?fit=512%2C512&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/posts\/316","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/comments?post=316"}],"version-history":[{"count":0,"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/posts\/316\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/media\/319"}],"wp:attachment":[{"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/media?parent=316"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/categories?post=316"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/tags?post=316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}