top of page

Search


EndPoint
Endpoint Definition: An Endpoint comprises: One MAC Address Zero or More IP Addresses Traditional Network Address Tables: In...

Mukesh Chanderia
Nov 13, 202326 min read
TCPDUMP
This is a very useful tool for capturing traffic destined for the leaf, spine or APIC i.e. within fabric. This method can be used also...

Mukesh Chanderia
Nov 11, 20239 min read


Lab2: Ping Two Endpoint (Host) connected to different EPG
Step 1: Take one more host say 6.6.6.2/24 Let’s assign 6.6.6.2/24 to interface eth1/21 of NX-Sw which is directly connected to eth1/11 of...

Mukesh Chanderia
Nov 5, 20232 min read


ELAM
ELAM Packet capture: Step 1: Kindly check the hardware module to see what inputs must be there in command i.e. tah/roc/app /// N9K-C*-EX- Leaf ----------------------- tah N9K-C*FX/FXP/FX2 -Leaf ------------ roc N9K-C*-GX – Leaf ----------------------app// Recommended Best Practices: To capture a packet with VLAN encapsulation on a downlink port, use 'in-select 6' . To capture a packet with VXLAN encapsulation (whether from a spine or a vleaf with VXLAN encapsulation

Mukesh Chanderia
Nov 5, 202315 min read


Lab1: Ping Endpoints (Host) to Gateway
Step 1: Let’s configure Host with ip 3.3.3.1/24 As I am using Nexus Switch whose interface eth1/9 is directly connected to Leaf2 int...

Mukesh Chanderia
Nov 3, 20232 min read
Simple & Important
1) MD5 To calculate md5 checksum of file Open cmd & Go to the directory certutil -hashfile YourImageFileName.iso MD5 2) ELAM ///...

Mukesh Chanderia
Jun 24, 20231 min read


NTP in ACI
NTP uses the User Datagram Protocol (UDP) & all NTP communications use Coordinated Universal Time (UTC). NTP uses a Stratum to describe...

Mukesh Chanderia
Jun 17, 20235 min read


ACI Basics
The Cisco Application Policy Infrastructure Controller (APIC) works as a smart policy manager, sending the required policy settings to the fabric and applying any needed changes. It is separate from both the control and data planes, meaning it doesn't get involved in the traffic flow or affect traffic flow in any way . This separation allows the APIC to manage policies efficiently without affecting the movement of data in the network. The rules to connect the APIC server to l

Mukesh Chanderia
Jun 17, 202325 min read
APIC M1/M2/L1/L2 to M3/L3 Cluster Migration
Both APIC L1/M1 and APIC L2/M2 servers have reached their end-of-sales and end-of-life date. APIC servers forming a cluster must all run...

Mukesh Chanderia
Apr 24, 20234 min read
TERRAFORM
Lab Setup Create three VMs of CentOS. One will act as a controller and the rest two as workers. Install ansible rpm -qa | grep ansible...

Mukesh Chanderia
Jan 16, 20231 min read
PYTHON
Search Everywhere Double Shift Go To File Ctrl+Shift+N Recent Files Ctrl+E Navigation Bar Alt+Home Print "Hello Mukesh" --> Right Click +...

Mukesh Chanderia
Jan 16, 20231 min read


Wireless
BSS: Basic Service Set (Range of the wireless adaptor of laptop/mobile) ESS: Extended Service Set (More than one Access Point sharing the...

Mukesh Chanderia
Dec 27, 202214 min read
PANORAMA
Hook Firewall & Panorama Step 1: Go to Firewall and add the IP address of Primary and secondary Panorama. Step 2: Go to Panorama and in...

Mukesh Chanderia
Dec 26, 20222 min read
Manager Interview Questions
1) How do you handle the pressure? I stay calm under pressure and handle it well. My complete focus is on the job done. I will break the...

Mukesh Chanderia
Dec 20, 202214 min read


Interview Preparation
Can you explain what Cisco ACI is and its key features? Cisco ACI, or Application Centric Infrastructure, is a software-defined...

Mukesh Chanderia
Dec 10, 202217 min read


IPsec VPN Configuration
Let's have a look at ip address of two site for which we need to configure site to site VPN Let's configure Router A Step 1: Create an...

Mukesh Chanderia
Nov 5, 20224 min read


IPsec VPN
IPsec rides on Layer3 of TCP/IP. SSH & SSL rides on layers 4 -7. In transport mode layer 4 and above is encrypted whereas in tunnel mode...

Mukesh Chanderia
Nov 4, 20224 min read


IQ
Routing + Switching Loopguard Loopguard come into action only when the BPD's suddenly disappeared. It is incompatible with Root Guard....

Mukesh Chanderia
Oct 28, 202212 min read


Important Questions
R+S What is PTP used for? The Precision Time Protocol (PTP) is a protocol used to synchronize clocks throughout a computer network. On a...

Mukesh Chanderia
Jul 3, 202215 min read


ISE
ISE Use Cases 1) Visibility: What all users & devices are on the network and where are they connected. Where are phones, printers,...

Mukesh Chanderia
Jun 23, 202216 min read
bottom of page