BGP – Active open failed – tcb is not available

So i had an issue with BGP where it wouldn’t establish a neighbor relationship.   I ran the usual ‘debug ip bgp’ but it only showed ‘connection timed out’ Here is a sample debug output of one of the neighbour setup attempts; 198.51.100.12 active went from Idle to Active 198.51.100.12 open active, local address 198.51.100.13

Automate your Cisco CCIE Home Lab for the INE Workbook v5

!-!-!-!-!-!-!-!-! !-!-!-!-!-!-!-!-! PLEASE SEE UPDATED 2018 VERSION HERE Update your bookmarks to this link: https://linevty.com/automate-your-cisco-ccie-home-lab-for-the-ine-workbook-v5-updated-2018-2/ !-!-!-!-!-!-!-!-! !-!-!-!-!-!-!-!-! I recently gained access to an INE All Access Pass, which includes the Cisco CCIE Route and Switch v5 Workbook and various labs with a view to taking my lab exam. Whilst it included some rack rental tokens

Reload in.. how about terminal revert?

Ok.. so learnt something new today.. (every days a school day!) Depending on your device and code, you should have the following command available to you… config terminal revert time x What this effectively does is save the running configuration to a backup file on the local flash and will revert to this config after

Cisco CLI shortcuts

So, another addition to a base config, you can save yourself some precious time with these nifty alias shortcuts… My favorites, are; SRI – pipes the ‘include’ statement to a show run, probably my favorite R1(config)#alias exec sri show run | include SHIP – really lazy command, but every second counts when troubleshooting problem R1(config)#alias

Cisco ASA, Email Alerts

This little used feature (at least in my experience) is actually quite useful and works with all ASA versions. The Cisco ASA 55xx Firewalls are actually able to send you an email based on *any* syslog’s that may be generated. This is very useful when you don’t run a syslog server, or just want some

Documentation IP Address's

Throughout all my posts I will be using IP addressing that is purposefully reserved globally for use in documentation, these ranges are; 192.0.2.0/24 (TEST-NET-1) 198.51.100.0/24 (TEST-NET-2) 203.0.113.0/24 (TEST-NET-3) You can read more about this in RFC5737 and I generally use these ranges to document internet connectivity in addition to the standard RFC1918 addressing for internal

Basic Cisco Template

I have a template that I apply each and every time I configure a Cisco router or switch. I find it disheartening that a lot of people don’t take the care and attention to disable unused services and secure the used one’s properly. You only have to do a simple search on SHODAN (free login