Lately we have been looking at various automation topics like Python where we can do some configuration or grab some output on a few boxes. Today we are going to kick the tires with Cisco’s Embedded Event Manager (EEM), the neat difference with this feature is that it runs directly on the Cisco device so it can run based on events like a command being entered or the router getting a new CDP neighbor.
I wrote this for the CCNA sub but might as well share it here a well
Since everyone loves Infrastructure topics (right?!?!?) lets play with a neat feature on the R&S exam called IP SLA. I figure I might highlight some of the more overlooked topics in this sub.
cumulus@cumulus:~$ sudo ifconfig swp1 10.1.2.1/24
cumulus@cumulus:~$ sudo ifconfig swp1 up
cumulus@cumulus:~$ sudo vtysh
Hello, this is FRRouting (version 3.1+cl3u1).
Copyright 1996-2005 Kunihiro Ishiguro, et al.
cumulus# conf t
cumulus(config)# host CSW01
babel Make Babel instance command
bgp BGP information
eigrp Start EIGRP configuration
isis ISO IS-IS
ospf Start OSPF configuration
ospf6 Open Shortest Path First (OSPF) for IPv6
CSW01(config)# router ei 123
CSW01(config-router)# network 10.1.2.0/24
CSW01# show ip eigrp neighbors
EIGRP neighbors for AS(123)
H Address Interface Hold Uptime SRTT RTO Q Seq
(sec) (ms) Cnt Num
0 10.1.2.2 swp1 10 0 0 2 0 2
My my, I’ve been meaning to make a few SDN posts for ages! Fortunately my golf game got cancelled today and I figured it was finally time to get this started.
Since I still have my ASA lab up, let’s play with two types of VPNs.
So now we talked about a somewhat more specialized routing protocol, let’s talk about a protocol that probably only a few of you would know about here.
On Demand Routing!
Today we’ll be playing around with the routing protocol that never seems to get much R&S certification love out outside of the written and the SP track, IS-IS!
Hi CCNA Security Gang,
Since VIRL now supports private vlans, let’s do a private vlan post since it seems to be confuse a lot of people.
There seems be a lot of people interested in CCNA Security so let’s have a brief look at Zone Based Firewalls.
In this post I’ll be looking at using CumulusVX to doing some routing with a Cisco router, why Cumulus? It is a great Linux distribution / virtual switch that has a strong Quagga implementation.
Need a another router for your BGP lab and can’t be annoyed to create another router in VIRL/GNS3 or plug in another router for your lab? Never ~feel~ fear, use Windows instead!
I recently rebuilt my ISE lab to play with 2.2 and figured I may as well do some security posts while I’m at it. Today we’ll briefly dip our toes in the water by playing with TACACS+’s Command Authorization.
Here is a quickie but a goodie if you work with Anyconnect. Anyconnect only remembers the last connection which can get very annoying if you are like me and have to connect many different VPNs throughout the day.
Since I’m still in security mode until I can get my massive SDN post completed, lets have a look at using Yersinia to have some fun with native vlans and DTP to remind everyone DON’T USE VLAN 1!!!!
To finish off our fun with show commands series, likes look at one of my favourite tools, the pipe command!
Just for some Friday night fun….
Let’s look into some of the options that are available in the
show ip route command that everyone may not be aware of.
Continuing the theme of showing what show commands can do, let’s look at
show run for a bit.
Well as luck will have it I won one of those CCNA CyberOps scholarships and it starts….September…of next year…thanks Cisco! So since I haven’t managed to publish anything in a while, here is a entry I did for Reddit’s CCNA sub.
Today we’re going to play with bridging!!! Why are we talking about bridging in 2016 you ask? Well because I’m going to making a few posts as I work my way through the CCNP Cloud certification as well as catching myself up on the new CCIE DC blueprint so I’ll be talking a lot about VXLANs for a least a couple posts. Since bridging is making a come back in L2VPNs and such I figured why not start here? Also I just want to write about something that doesn’t need 50 screenshots 🙂
I found myself in a awkward situation the other weekend where I lost access to Check Point’s internal networks after switching over some networks due to anti-spoofing and after a short adventure of spinning up a new management server in Azure, pointing the firewall to it and pushing a more permissive rule I was back online!!!!
However the problem now was that if I reset the SIC to point it back to the old mgmt station it would do a CPSTOP and CPSTART which would unload the happy policy and I would be back offline and no I could not go onsite!