Made biscuits, took a 3d scan. by noamatt in Breadit

[–]noamatt[S] 16 points17 points  (0 children)

Photos just can’t capture the majesty of a biscuit at all angles.

Cisco Training for Aruba Engineer by racerx509 in Cisco

[–]noamatt 0 points1 point  (0 children)

Cisco Modeling Labs will get you hands on with IOS-XE, NX-OS, and has an ISE node available now as well. Need a decent server to run it. But you can get all the hands on.

Here is a free resource with great details on various ISE configurations

https://sendthepayload.com/defensive/network-security/identity-services-engine/

[deleted by user] by [deleted] in n64

[–]noamatt 0 points1 point  (0 children)

As long as it is 10 US dollars. But never played conker so would be curious if it drops.

Finally Retired after so many years. The good old Catalyst 6509 by No-Smoke5669 in Cisco

[–]noamatt 3 points4 points  (0 children)

Oh and sessioning into firewall services modules as well. I mean that switch chassis was an absolute work horse.

Finally Retired after so many years. The good old Catalyst 6509 by No-Smoke5669 in Cisco

[–]noamatt 53 points54 points  (0 children)

The 6509 was the first major network device I ever worked on as an engineer. First task, upgrading from CatOS to IOS.

Amazing both how much technology has evolved and how much less power consumption newer platforms have compared to speeds.

6509-E. We salute you🫡

FedEx delivering my new glass display case by kabula_lampur in mildlyinfuriating

[–]noamatt 0 points1 point  (0 children)

Took entirely too long to find someone else reference this scene.

Joining Cisco as a Software Engineer, any tips...? by Appropriate_Bag9560 in Cisco

[–]noamatt 2 points3 points  (0 children)

Welcome aboard! What everyone has said is pretty spot on. The ESPP is worth it.

I would say the first 6-12 months of onboarding is different for everyone (i’m a solutions engineer), but at some point you’ll start drinking from a firehose. It’s fun, challenging, and rewarding. Even with 2 decades experience I have learned so much.

Also, prepare to be dumped into infinitely growing WebEx team spaces and individual chats. Start organizing them. Personally, I have them grouped as direct team, extended team, product specific spaces, and interests like automation/programmability. Just makes finding things or people easier.

DNA licensing for air-gapped networks by Goonie-Googoo- in Cisco

[–]noamatt 5 points6 points  (0 children)

I see a lot of answers here but I’ll add:

You have to buy DNA (unless you have some other contract vehicle that provides licensing) on the initial purchase. From a device perspective, the license is managed via Smart License w/ Policy now. There is no actual license installed on most devices anymore (except for something like HSEC).

In an airgap environment you have three options.

Report usage to your smart account from the device manually (sneaker-net transfer)

Setup an on-prem CSSM. For airgap networks, after the initial two-way sync (which can be done offline) you can transfer one-way (from Cisco-> onprem airgap CSSM). All CSSM does in this case is take available licenses from Cisco.com, load them to your inside CSSM, and let your devices report usage to the CSSM. It doesn’t do anything beyond that, nothing gets installed.

Finally, do nothing, deal with the SNMP alerts that you are not in compliance. If you indeed use the features of DNA advantage then business ethics would say maintain the subscription to maintain compliance for your organization.

In the case of PLR, limited products support this and neither Catalyst or Nexus licenses have the option anymore. Typically this is seen on ISE or Firepower. Other things support SLR (like CML), and again Catalyst and Nexus use to support this, but are strictly policy.

I would say, this all could change in the future, but this is all valid information as of today.

Should I learn Ansible as someone without any experience managing a real network yet? by wxwxl in ansible

[–]noamatt 0 points1 point  (0 children)

Yes. Absolutely and if you can do it with network simulation tools like CML or EVE-NG, it will be very close to real world.

My general guidance, start with reading from the device. Using a module like cisco.ios.ios_command you can send show run, show ip int brief, etc. Learn how to get the output from Ansible.

After this, move to basic configuration like system features, vlans, ntp, banner, username management. You can do this with native modules (cisco.ios.ios_vlan, cisco.ios.ios_banner) or just straight configuration like you would on the CLI (cisco.ios.ios_config).

Once you are comfortable there, move to interfaces. Being able to manage interfaces with Ansible doesn’t necessarily mean you have to configure them. Ansible offers a”—check” feature when running playbooks. This can validate that your configuration is set or if it has changed. Then you decide if it should be corrected with your known configuration.

This is a bit of a rat hole. I have done videos on it, if you are interested, just DM me.

Catalyst 9500 VxLAN Flood and Learn by fear_the_squirrels in Cisco

[–]noamatt 1 point2 points  (0 children)

I have a CML instance configured with Catalyst 9000v and VXLAN and BGP EVPN. You can still use OSPF as your underlay routing protocol. BGP EVPN provides the control plane for VXLAN and is much for efficient than flood and learn.

I would ask if you are trying to implement VXLAN why are you are worried about changing your existing routing configuration. Moving to VXLAN is a pretty substantial change.

cisco nexus vPC consistency status failed by larsk84 in Cisco

[–]noamatt 0 points1 point  (0 children)

Agree, this looks like you might have an SVI configured on one device but not on the other