top of page

Simple & Important

  • Writer: Mukesh Chanderia
    Mukesh Chanderia
  • Jun 24, 2023
  • 1 min read

Updated: Nov 5, 2023

1) MD5


To calculate md5 checksum of file


Open cmd & Go to the directory


certutil -hashfile YourImageFileName.iso MD5



2) ELAM



/// N9K-C*-EX- Leaf ----------------------- tah

N9K-C*FX/FXP/FX2 -Leaf ------------ roc

N9K-C*-GX – Leaf ----------------------app//



vsh_lc

deb pla in tah/roc/app elam asic 0

Trigger reset

trigger init in-select 6 out-select 1

set outer ipv4 src_ip 6.6.6.1 dst_ip 9.9.9.1

start

status

ereport


Modul

e-1(DBG-TAH-elam-insel6)# report | grep ovec


Lookup Drop

------------------------------------------------------------------------------------------------------------------------------------------------------

RW drop reason : no drop

LU drop reason : no drop



3) Pervasive Gateway


In ACI (Application Centric Infrastructure), a pervasive gateway refers to a design approach where a single default gateway is provided across multiple bridge domains or VRFs (Virtual Routing and Forwarding). This approach simplifies the network architecture by consolidating the default gateway functionality and reduces the complexity of routing configurations.


With the pervasive gateway design, a single Layer 3 Out (L3Out) connection is used to provide connectivity between the ACI fabric and the external network. This L3Out connection acts as the default gateway for all the bridge domains or VRFs within the ACI fabric. Instead of deploying separate Layer 3 external connections for each bridge domain or VRF, the pervasive gateway allows the consolidation of these connections into a single L3Out.


The pervasive gateway design offers benefits such as reduced configuration complexity, optimized use of external routing resources, and easier management of default gateway settings across multiple bridge domains or VRFs. It simplifies the deployment and operation of the ACI fabric while maintaining efficient and scalable communication between the fabric and external networks.




 
 
 

Recent Posts

See All
Wireshark

1. What is Wireshark? Wireshark is a network packet capture tool . It shows every packet of data moving through your network. Think of it...

 
 
 
MultiCast In ACI

Understanding Multicast in Cisco ACI 1. Multicast Traffic Flow in ACI In ACI, multicast traffic is primarily managed within Bridge...

 
 
 
Quality of Service (QoS) in Cisco ACI

Configuring Quality of Service (QoS)  in Cisco ACI (Application Centric Infrastructure)  involves creating and applying QoS policies that...

 
 
 

Comentarios


Follow me

© 2021 by Mukesh Chanderia
 

Call

T: 8505812333  

  • Twitter
  • LinkedIn
  • Facebook Clean
©Mukesh Chanderia
bottom of page