top of page

Search


ELAM
ELAM Packet capture: Step 1: Kindly check the hardware module to see what inputs must be there in command i.e. tah/roc/app /// N9K-C*-EX- Leaf ----------------------- tah N9K-C*FX/FXP/FX2 -Leaf ------------ roc N9K-C*-GX – Leaf ----------------------app// Recommended Best Practices: To capture a packet with VLAN encapsulation on a downlink port, use 'in-select 6' . To capture a packet with VXLAN encapsulation (whether from a spine or a vleaf with VXLAN encapsulation

Mukesh Chanderia
Nov 5, 202315 min read


Lab1: Ping Endpoints (Host) to Gateway
Step 1: Let’s configure Host with ip 3.3.3.1/24 As I am using Nexus Switch whose interface eth1/9 is directly connected to Leaf2 int...

Mukesh Chanderia
Nov 3, 20232 min read
Simple & Important
1) MD5 To calculate md5 checksum of file Open cmd & Go to the directory certutil -hashfile YourImageFileName.iso MD5 2) ELAM ///...

Mukesh Chanderia
Jun 24, 20231 min read


NTP in ACI
NTP uses the User Datagram Protocol (UDP) & all NTP communications use Coordinated Universal Time (UTC). NTP uses a Stratum to describe...

Mukesh Chanderia
Jun 17, 20235 min read


ACI Basics
The Cisco Application Policy Infrastructure Controller (APIC) works as a smart policy manager, sending the required policy settings to...

Mukesh Chanderia
Jun 17, 202325 min read
APIC M1/M2/L1/L2 to M3/L3 Cluster Migration
Both APIC L1/M1 and APIC L2/M2 servers have reached their end-of-sales and end-of-life date. APIC servers forming a cluster must all run...

Mukesh Chanderia
Apr 24, 20234 min read
TERRAFORM
Lab Setup Create three VMs of CentOS. One will act as a controller and the rest two as workers. Install ansible rpm -qa | grep ansible...

Mukesh Chanderia
Jan 16, 20231 min read
PYTHON
Search Everywhere Double Shift Go To File Ctrl+Shift+N Recent Files Ctrl+E Navigation Bar Alt+Home Print "Hello Mukesh" --> Right Click +...

Mukesh Chanderia
Jan 16, 20231 min read


Wireless
BSS: Basic Service Set (Range of the wireless adaptor of laptop/mobile) ESS: Extended Service Set (More than one Access Point sharing the...

Mukesh Chanderia
Dec 27, 202214 min read
PANORAMA
Hook Firewall & Panorama Step 1: Go to Firewall and add the IP address of Primary and secondary Panorama. Step 2: Go to Panorama and in...

Mukesh Chanderia
Dec 26, 20222 min read
Manager Interview Questions
1) How do you handle the pressure? I stay calm under pressure and handle it well. My complete focus is on the job done. I will break the...

Mukesh Chanderia
Dec 20, 202214 min read


Interview Preparation
Can you explain what Cisco ACI is and its key features? Cisco ACI, or Application Centric Infrastructure, is a software-defined...

Mukesh Chanderia
Dec 10, 202217 min read


IPsec VPN Configuration
Let's have a look at ip address of two site for which we need to configure site to site VPN Let's configure Router A Step 1: Create an...

Mukesh Chanderia
Nov 5, 20224 min read


IPsec VPN
IPsec rides on Layer3 of TCP/IP. SSH & SSL rides on layers 4 -7. In transport mode layer 4 and above is encrypted whereas in tunnel mode...

Mukesh Chanderia
Nov 4, 20224 min read


IQ
Routing + Switching Loopguard Loopguard come into action only when the BPD's suddenly disappeared. It is incompatible with Root Guard....

Mukesh Chanderia
Oct 28, 202212 min read


Important Questions
R+S What is PTP used for? The Precision Time Protocol (PTP) is a protocol used to synchronize clocks throughout a computer network. On a...

Mukesh Chanderia
Jul 3, 202215 min read


ISE
ISE Use Cases 1) Visibility: What all users & devices are on the network and where are they connected. Where are phones, printers,...

Mukesh Chanderia
Jun 23, 202216 min read


Panorama
It is a centralized controller for PA firewalls. How to add devices in Panorama? Go to Panorama --> Managed Device --> Here you will get...

Mukesh Chanderia
Feb 28, 20221 min read


WildFire & Dos Protection
Create WildFire Profile Attach it in Security Policy as Security Profile Objects > Security Profiles > DoS Protection It is similar to...

Mukesh Chanderia
Feb 1, 20221 min read


PA Interface Mgmt Profile & Captive Portal
Network > Network Profiles > Interface Mgmt It is used to control what protocols are allowed on interface. Now Go to Interface -->...

Mukesh Chanderia
Jan 31, 20221 min read
bottom of page