background preloader

Cisco

Facebook Twitter

Cisco Host Upgrade Utility 3.0 User Guide - Updating the Firmware on Cisco UCS C-Series Servers [Cisco UCS C-Series Rack Servers] Cadx106 supervisor desktop user guide. Unified Networking. Cisco Nexus 5000 Series NX-OS Fabric Extender Command Reference - Show Commands [Cisco Nexus 5000 Series Switches] Show Commands This chapter describes the Cisco NX-OS show commands used to manage a Cisco Nexus 2000 Series Fabric Extender from a Cisco Nexus 5000 Series switch. show diagnostic result fex To display the results from the diagnostic tests for a Fabric Extender chassis, use the show diagnostic result fex command. show diagnostic result fex chassis_ID Syntax Description Command Default None Command Modes EXEC mode Command History Examples.

Cisco Nexus 5000 Series NX-OS Fabric Extender Command Reference - Show Commands [Cisco Nexus 5000 Series Switches]

Change Radius-server host to Radius server. Another I.T. blog: IOS Upgrade on Cisco WS-C4507R Chassis with Dual Supervisor V Engines. Today we will upgrade the IOS version on both WS-X4516 supervisor engines V in a WS-C4507R chassis.

Another I.T. blog: IOS Upgrade on Cisco WS-C4507R Chassis with Dual Supervisor V Engines

This blog post assumes that your 4507R chassis's supervisor engine already has network support for you to SSH into it. First, go to the Cisco support site and download the latest IOS version (you need a Cisco support contract to have access to new IOS images). Place this image on your TFTP server. In this example, the TFTP server is a CentOS Linux machine called alice.company.com. Nexus 5500 Series NX-OS Software Upgrade and Downgrade Guide, Release 7.1(4)N1(1) Table of Contents.

Nexus 5500 Series NX-OS Software Upgrade and Downgrade Guide, Release 7.1(4)N1(1)

Cisco Nexus 5500 Series NX-OS Software Upgrade and Downgrade Guide, Release 7.1(4)N1(1) 802.1x DACL, Per-User ACL, Filter-ID, and Device Tracking Behavior. Introduction This document describes how the IP device tracking feature works, which includes what the triggers are to add and remove a host.

802.1x DACL, Per-User ACL, Filter-ID, and Device Tracking Behavior

Also, the impact of device tracking on the 802.1x Downloadable Access Control List (DACL) is explained. The behavior changes between versions and platforms. The second part of the document focuses on the Access Control List (ACL) returned by the Authentication, Authorization, and Accounting (AAA) server and applied to the 802.1x session. A comparison between the DACL, Per-User ACL and Filter-ID ACL is presented. Device Tracking Theory Device tracking adds an entry when: IEEE 802.1X with ACL Assignments  [Support] You can download ACLs and redirect URLs from a RADIUS server to the switch during 802.1X authentication or MAC authentication bypass of the host.

IEEE 802.1X with ACL Assignments  [Support]

You can also download ACLs during web authentication. If more than one host is authenticated and the host is in single-host, MDA, or multiple-authentication mode, the switch changes the source address of the ACL to the host IP address. You can apply the ACLs and redirect URLs to all devices that are connected to the 802.1X-enabled port. If no ACLs are downloaded during 802.1X authentication, the switch applies the static default ACL on the port to the host. On a voice VLAN port that is configured in multiple-authentication or MDA mode, the switch applies the ACL only to the phone as part of the authorization policies. Beginning with Cisco IOS Release 12.2(55)SE, if there is no static ACL on a port, a dynamic auth-default-ACL is created, and policies are enforced before dACLs are downloaded and applied.

Pbroute. Cisco Nexus 7000 Series NX-OS Security Configuration Guide, Release 4.1 - Configuring RADIUS [Cisco Nexus 7000 Series Switches] Configuring RADIUS.

Cisco Nexus 7000 Series NX-OS Security Configuration Guide, Release 4.1 - Configuring RADIUS [Cisco Nexus 7000 Series Switches]

Collecting CUCM Traces from CUCM 8.6.2 for a TAC SR. This document will focus on collecting traces for CUCM 8.6.2.

Collecting CUCM Traces from CUCM 8.6.2 for a TAC SR

It should be mostly the same for any recent CUCM release. CUCM traces give us the signalling going across the CUCM as well as give extremely detailed logs of what CUCM is doing when processing calls. It's important to note that traces must be turned on before the problem call/test call is made. If a problem happened once and CUCM traces were not turned on, we cannot go back and get logs. Configure Traces First, go to CUCM and log into Unified CM Serviceability. Navigate to Trace -> Configuration. Configuring iscsi tlv.

Cisco Nexus 5000 Troubleshooting Guide - Troubleshooting FCoE Issues [Cisco Nexus 5000 Series Switches] Data Center Bridging VFC (FCoE) interface not online This section includes the following topics: General troubleshooting Possible Cause An FCoE-attached server has no connectivity to FC, or FCoE-attached storage, and the show interface command for the virtual Fibre Channel interface mapped to this server's port reveals that the VFC interface is down.

Cisco Nexus 5000 Troubleshooting Guide - Troubleshooting FCoE Issues [Cisco Nexus 5000 Series Switches]

Solution. DCX-No ACK in 100 PDUs Error Message. Introduction This document describes this error message and how to identify the root cause: "%ETHPORT-2-IF_DOWN_ERROR_DISABLED: Interface Ethernet115/1/17 is down (Error disabled.

DCX-No ACK in 100 PDUs Error Message

Reason CX-No ACK in 100 PDUs). " Prerequisites Requirements Cisco recommends that you have knowledge of these topics: Using trusted SSL’s in Cisco Unified Communications Manager 10.0. So you’ve got a spiffy Cisco Unified Communications Manager (CUCM), formerly Cisco Call Manager, install for your company’s phone service?

Using trusted SSL’s in Cisco Unified Communications Manager 10.0

Maybe you have their Cisco Unified Contact Center Express (UCCX) installed too for your help desk? Well, out of the box, they have the incredibly stupid expectation that you’ll download the self-signed SSL certs off of the thing and push them out to all of your users’ desktops in a way that will work. So that means importing them into the certificate repository of Windows for the IE users, doing the Firefox “accept this SSL” trick for that browser, ignoring the error with Chrome each time and who knows how you deal with it on Safari or others. Umm yeah, I just spent a minimum of tens of thousands of dollars on my CUCM install but I want to run cheap self signed SSL certs for my users to interact with the system. Certs cost $8/year these days, there is simply no reason to not use trusted certs. There are two prerequisites to this: Success! Good luck! Cisco Support Community.

Voice

Cisco Nexus 5000 Series Command Reference - Fabric Extender Commands [Cisco Nexus 5000 Series Switches] Fabric Extender Commands This chapter describes the Cisco NX-OS commands used to manage a Cisco Nexus 2000 Series Fabric Extender from a Cisco Nexus 5000 Series switch. attach fex To access the CLI of a connected Fabric Extender to run diagnostic commands, use the attach fex command. attach fex chassis_ID Syntax Description Command Default None. Cisco.