So i had an issue with BGP where it wouldn’t establish a neighbor relationship. I ran the usual ‘debug ip bgp’ but it only showed ‘connection timed out’ Here is a sample debug output of one of the neighbour setup attempts; 198.51.100.12 active went from Idle to Active 198.51.100.12 open active, local address 198.51.100.13
!-!-!-!-!-!-!-!-! !-!-!-!-!-!-!-!-! PLEASE SEE UPDATED 2018 VERSION HERE Update your bookmarks to this link: https://linevty.com/automate-your-cisco-ccie-home-lab-for-the-ine-workbook-v5-updated-2018-2/ !-!-!-!-!-!-!-!-! !-!-!-!-!-!-!-!-! I recently gained access to an INE All Access Pass, which includes the Cisco CCIE Route and Switch v5 Workbook and various labs with a view to taking my lab exam. Whilst it included some rack rental tokens
Ok.. so learnt something new today.. (every days a school day!) Depending on your device and code, you should have the following command available to you… config terminal revert time x What this effectively does is save the running configuration to a backup file on the local flash and will revert to this config after
This Post is for Point to Point, I will do a further post on Point to MultiPoint So, as part of my CCIE practice lab I’ve got a frame relay cloud for testing point to point and multipoint connections. Totally forgot how to do this (the phrase use it or loose it comes to mind!)
So, another addition to a base config, you can save yourself some precious time with these nifty alias shortcuts… My favorites, are; SRI – pipes the ‘include’ statement to a show run, probably my favorite R1(config)#alias exec sri show run | include SHIP – really lazy command, but every second counts when troubleshooting problem R1(config)#alias
This little used feature (at least in my experience) is actually quite useful and works with all ASA versions. The Cisco ASA 55xx Firewalls are actually able to send you an email based on *any* syslog’s that may be generated. This is very useful when you don’t run a syslog server, or just want some
Throughout all my posts I will be using IP addressing that is purposefully reserved globally for use in documentation, these ranges are; 192.0.2.0/24 (TEST-NET-1) 198.51.100.0/24 (TEST-NET-2) 203.0.113.0/24 (TEST-NET-3) You can read more about this in RFC5737 and I generally use these ranges to document internet connectivity in addition to the standard RFC1918 addressing for internal
I have a template that I apply each and every time I configure a Cisco router or switch. I find it disheartening that a lot of people don’t take the care and attention to disable unused services and secure the used one’s properly. You only have to do a simple search on SHODAN (free login