Interface description is one of the most important configuration when bringing up interfaces between two devices. In a bundle or port-channel interface, there is a way to find the partner interface or which member in that bundle is your interface or port is connected especially if there’s no description or outdated. Here are the steps and commands to find LACP partner interface or port in Cisco Router and Switch Fig1.1 (Cisco IOS-XR) Assuming we have this Fig1.1, two…
Category: <span>Cisco</span>
Here are the steps on performing the switchover of Route Switch Processor (RSP) or Route Processor (RP) in Cisco ASR9000 platforms running in Cisco IOS-XR. show redundancy Example: RP/0/RSP0/CPU0:IOS-XR#show redundancyRedundancy information for node 0/RSP0/CPU0:==========================================Node 0/RSP0/CPU0 is in ACTIVE roleNode Redundancy Partner (0/RSP1/CPU0) is in STANDBY roleStandby node in 0/RSP1/CPU0 is readyStandby node in 0/RSP1/CPU0 is NSR-not-configuredNode 0/RSP0/CPU0 is in process group PRIMARY roleProcess Redundancy Partner (0/RSP1/CPU0) is in BACKUP roleBackup node in 0/RSP1/CPU0 is readyBackup node in 0/RSP1/CPU0 is NSR-ready…
Here’s the basic BGP (eBGP) configuration of connecting 3 different router vendors namely Huawei, Juniper and Cisco Routers. Assuming we connect via their physical interfaces and incoming and outgoing policies are basically allow all. Sample Configuration Huawei <Huawei>system-view Enter system view, return user view with return command. [~Huawei] interface GigabitEthernet1/0/0 description Connection to Cisco ip address 192.168.0.1 255.255.255.252 interface GigabitEthernet1/0/1 description Connection to Juniper ip address 192.168.1.1 255.255.255.252 xpl route-filter Cisco-Import approve end-filter xpl route-filter Cisco-Export approve end-filter xpl route-filter…
Here are the sample VLAN configuration and commands comparing Cisco Nexus and Huawei switches. VLAN Creation: Cisco Huawei configure system-view vlan 88name VLAN 88 vlan 88name VLAN88 Access Interfaces: Cisco Huawei interface Ethernet1/1description Connection to Server1switchportswitchport access vlan 88no shutdown interface GigabitEthernet1/1/1description Connection to Server1port link-type accessport default vlan 88undo shutdown Trunk Interfaces: Cisco Huawei interface Ethernet2/1description Connect to Switch2switchportswitchport mode trunkswitchport trunk allowed vlan 10,20no shutdown interface GigabitEthernet2/1/1description Connect to Switch2port link-type trunkport trunk allow-pass vlan 10 20undo shutdown…
Here are sample configuration on resequencing access lists in Cisco Routers for IOS, IOS-XE, IOS-XR and Nexus OS Cisco IOS/IOS-XE a. Show the existing access-list IOS#show access-lists acl_123 Extended IP access list acl_123 10 permit tcp 192.168.10.8 255.255.255.255 192.168.20.5 255.255.255.255 eq 22 20 permit tcp 172.16.0.10.8 255.255.255.255 192.168.20.5 255.255.255.255 eq 22 30 deny ip any any b. Add the new access list before the last deny rule IOS(config)#ip access-list extended acl_123 IOS(config-ext-nacl)#21 permit tcp host 192.168.11.8 host 192.168.20.5 eq 22…
Cisco uses RPL (Route Policy Language) while Huawei uses XPL (Extended Route Policy language). Basically they are the same concept but of course the commands are slightly different, though editing the policy or prefix-set requires vi/vim knowlege. Cisco IOS-XR RPL Huawei NE40E XPL Adding Prefix-Set:prefix-set FNT-Prefixes 192.168.0.0/24, 172.16.0.0/23end-set Adding Prefix-Set:xpl ip-prefix-list FNT-Prefixes192.168.0.0 24,172.16.0.0 23end-list Creating Route Policy:route-policy FNT-EXPORT if (destination in FNT-Prefixes) then prepend as-path 65555 2 endifend-policy Creating Route Policy:xpl route-filter FNT-EXPORT if ip route-destination in FNT-Prefixes then …
Here are common and useful Cisco IOS-XR commands to check any hardware-related information. General/Overall: admin show inventory chassis admin show inventory all admin show inventory rack admin show environment all admin show environment alarms admin show diag admin show diag chassis admin show hw-module fpd location all admin show environment trace admin show platform admin show platform summary location all show pfm location all show inventory trace error show shelfmgr trace show controllers i2c server trace Power Supply: admin show…
uRPF or Unicast Reverse Path Forwarding is a security feature/tool that help verifies reachability of source address in packets being forwarded. It can prevents malicious and spoofing attacks as it will perform forwarding table lookup on the source IP address. – it as defined in RFC3704 – it follows RFC2827 for ingress filtering. – it relies on the CEF (Cisco Express Forwarding) or FIB table to perform lookups. – preferably implemented at the network edge facing internet, customers and servers…
Leave a Comment