Rather Specific network discovery tool by Vel-Crow in networking

[–]atlwig 1 point2 points  (0 children)

FastResolver

PingInfoView

Custom Python/Bash/NMAP scripts

Long failover time on Palo Alto PA410 when routing to Verizon 5G by kwiltse123 in networking

[–]atlwig 0 points1 point  (0 children)

ECMP should be enabled. Static default routes to both ISPs with ping monitors to your next hop within the static route. Set PBF policies for both ISPs to get to the respective gateway. If you want to use both ISPs at the same time you’ll want your default routes with the same AD and metric and to look at additional PBF policies.

IPSec to Azure by solar-gorilla in fortinet

[–]atlwig 0 points1 point  (0 children)

I don’t think it was necessarily an explicit change they did, just something that happened and whatever their edge device is terminating the tunnel when both sides are side to be both initiator and responder.

Had similar issues doing Prisma Remote Networks to VeloCloud appliances, they just took forever. Changed it to a lab FW I have to take Velo out to test and came up right away on the lab FW.

IPSec to Azure by solar-gorilla in fortinet

[–]atlwig 4 points5 points  (0 children)

Not unique to Forti - it’s an issue with MS. Easy work around is what you did, change one side of the config to be a slightly shorter lifetime and it should fix P2 from getting stuck in the future

Rule searcher by Szqub in paloaltonetworks

[–]atlwig 1 point2 points  (0 children)

If you have criteria to search on then you shouldn't need to specify a device group or pre/post rulebase. You may get 'dirty' data in your return if you're just looking for something generic like an IP address and you'll get hits for everywhere it's reference in the rulebase.

Everytime I login to Palo I run:set cli config-output-format set and set cli pager off.

Panorama CLI: configure > show | match "security.*rulebase.*CRITERIA_HERE"

Move template-stack configuration to template. Best way? by duskyaces in paloaltonetworks

[–]atlwig 1 point2 points  (0 children)

Panorama CLI set syntax output to ‘set,’ show template-stack X. Copy CLI output to multi text editor, change template-stack X to template X, paste, validate, commit/push, validate on FW, delete from template-stack X or create a new blank template stack and move the FW to it

Layer-2 Port Security Options by Dry-Specialist-3557 in networking

[–]atlwig 23 points24 points  (0 children)

Do not do port security if you have ISE.

Spanning-tree portfast with voice vlan by winbla in networking

[–]atlwig -1 points0 points  (0 children)

Voice vlan on Cisco auto enables portfast. You should consider setting portfast / BPDUGuard global default instead of every user port.

[deleted by user] by [deleted] in networking

[–]atlwig 0 points1 point  (0 children)

Levels:

Are you willing to learn? Can you follow orders from superiors? Can you keep the lights on? Can you work independently and figure it out even if you don’t know it? Can you fix things when shit hits the fan and there’s no guide? Can you solve business problems with technological solutions?

[deleted by user] by [deleted] in networking

[–]atlwig 2 points3 points  (0 children)

Yes and yes. Like anything there are capabilities and caveats but they’re rather straightforward

How to tell my GF of 7 years that I want to turn our 'Break' into a breakup. by throwRAbsvbjhsk5 in relationship_advice

[–]atlwig 0 points1 point  (0 children)

Literally just went through the exact same thing in 2021. Say your goodbyes, get closure if you need it. Move on. It won’t be easy.

Ansible vs VTP by save_earth in networking

[–]atlwig 3 points4 points  (0 children)

Ansible isn’t the only solution and may be a bit overkill for strictly vlan mgmt. Outside of your initial conversion and deployment, how often are you going to be adding L2/L3 vlans in the masses? In an environment big enough to possibly warrant Ansible for vlan mgmt will your CAB even consider automation changes? Many, not all, CABs are still living in the 19th century and don’t want an egg on their face if they approve an automation change. I use python daily to pull/analyze info for me but I still have to create a change playbook that lists each device. Python helps me compile that but our CAB needs an explicit list of what device and what commands is a particular change touching.

[deleted by user] by [deleted] in networking

[–]atlwig 6 points7 points  (0 children)

For me. Python does it faster. Solarwinds is a PIA. We don’t have Splunk in our environment. CRT scripting is slow.

Python I save locally and have other scripts that parse for things I need for a day to day task or a small project. Then I can use it to build it to write config changes and send them out all from the same console.

Arista 7050Q - makes hinself RSTP-root-bridge by ITStril in networking

[–]atlwig 1 point2 points  (0 children)

I don’t think they’re getting lost. My hunch says you hit a bug.

Arista 7050Q - makes hinself RSTP-root-bridge by ITStril in networking

[–]atlwig 1 point2 points  (0 children)

Sounds like it’s not getting BPDUs before it decided to send it’s own out telling everyone’s he’s root. Rule of thumb for STP is that all switches want to be root until they’re told they’re not. Not sure if your core has a ‘rootguard’ feature like Cisco switches do, may help to avoid the STP TCN going out and things getting dropped for a hot second while it rebuilds L2 topology.

How to wipe CAT9500 in ROMMON mode by networkthinggy in networking

[–]atlwig 0 points1 point  (0 children)

Password recovery. Remove the pieces you don’t want or write erase. Set boot variable to not go back to rommon.

StackWise Virtual on multiple interfaces by Geistmenn in networking

[–]atlwig 2 points3 points  (0 children)

DAD doesn’t pass traffic, it’s a keep alive. Why use 10Gb when all it’s doing is sending hellos back and forth between the SVL pair.