INTRODUCTION

This document describes the steps necessary to install the router
audit tool (RAT) on the Windows platform using ActiveState Perl.


PREREQUISITES

To get RAT working on Windows, you will need to install Perl for
Windows.  RAT has been tested with the ActiveState distribution of
Perl available at

http://www.activestate.com/Products/Download/Get.plex?id=ActivePerl


TESTED PLATFORMS

We have successfully tested RAT on the following Microsoft platforms:

- ActiveState Perl 5.6.0 on Windows 2000 Professional
- ActiveState Perl 5.6.0 on Windows Millenium Edition
- ActiveState Perl 5.6.1 on Windows 98
- ActiveState Perl 5.6.1 on Windows 2000 Professional
- ActiveState Perl 5.6.1 on Windows NT 4.0 Workstation

We are always interested to hear reports of people using RAT on other
platforms.  Please send your platform information and the output of
"perl -v" to rat-feedback@cisecurity.org.  Thank you for your
assistance.


INSTALLATION

We have provided a quick-and-dirty batch file that will accommodate most
Windows installations.  From a DOS prompt, change to the directory where
you extracted the RAT ZIP file and run "install.bat".  Manual installation
instructions follow below.

1.  Install ActiveState Perl version 5.6.1 or better.  Make sure the
    path to the perl executable is in your path (this is the normal
    installation procedure).

2.  Download and unzip RAT to a temporary directory (e.g. C:\TEMP).
    RAT is available for download from http://www.cisecurity.org

3.  Download the Net::Telnet and Net::Telnet::Cisco from the perl CPAN
    archives with the ActiveState Perl Package Manager (PPM).  From a 
    DOS prompt, run "ppm install Net-Telnet" and
    "ppm install Net-Telnet-Cisco".

4.  From a DOS prompt, run "perl winmake.pl rat_path" where rat_path
    is the home for rat.  e.g. "perl winmake.pl c:\rat"
    [optional] If you do not wish to use the snarf tool, run
    "perl winmake-nosnarf.pl" instead.

5.  Localize addresses, interfaces names, etc. as needed.  This can be
    done by running "ncat_config".  See LOCALIZE.txt for details.

That's it!  You are now ready to start analyzing your configuration
files with rat.  See the document rat.html in the rat_path\doc
subdirectory for information on getting started.


FOR THE IMPATIENT

You may want to start by running: 

   cd \configfiles
   perl c:\rat\bin\rat cisco_config_file1

and view the resulting cisco_config_file1.html report.


FEEDBACK

We want your feedback!  Send comments to rat-feedback@cisecurity.org

$Id: INSTALL.WIN32.txt,v 1.4 2002/03/21 16:43:41 gmj Exp $
