Category Archives: Networking

Its all about Networking

What is Cisco Champion program?

After being selected as Cisco Champion 2017, often people asked what is Cisco Champion? Some of them don’t know what Cisco Champion Program offers and what benefits they can avail be becoming a Cisco Champion.

ciscochampion2017-250

Cisco Champion Program was started by Cisco Systems with an aim to create and nurture a group of people ( Cisco geeks) who are highly influential IT technical experts, who enjoy sharing their knowledge , expertise, ideas and thoughts in innovative way across the social web be it in the form of blogs, supporting the online community by answering their queries  or with Cisco

The Cisco Champion program is open all the individuals who are either 18 years in age or older with following qualities

  • Is active on social media
  • Expresses balanced view of Cisco
  • Has Cisco-related expertise
  • Has overall expertise in IT industry
  • Chooses to actively participated in conversations relevant to Cisco and the IT industry

One can either nominate himself/ herself to Cisco Champion Program at the end of year calendar year or their peers can nominate them. Generally the nominations begins after October and cover wide variety following main interest areas

Read more…….

How to reset the Cisco Iron Port Appliance to factory default settings?

Resetting the Cisco Iron Port C370 appliance is an easy task.

In order to reset the Cisco Iron Port C 370 appliance either we need a console or ssh access (telnet access will also do).

Step 1

Log into Cisco Iron Port C370 appliance either console or shh.

C370step1]

Step 2

Suspend the Cisco Iron Port C370 appliance as without suspending the appliance we cannot reset it.

So used the “suspend” command to suspend the appliance

c370step2

Step 3

Use the command “resetconfig”to reset the Cisco Iron Port C370 appliance

For further details read more……………………………..

 

Multiple Cisco Products are affected by OSPF LSA Manipulation Vulnerability

The recent security advisory suggests that multiple Cisco products are affected by a vulnerability involving the Open Shortest Path Frist (OSPF) Routing Protocol Link State Advertisement (LSA) database. With the help of this vulnerability an unauthenticated attacker can take control of the OSPF Autonomous System (AS) domain routing table, backhole traffic and intercept traffic. Which could cause a huge damage to the attacked network.

The attacker could trigger this vulnerability by injecting crafted OSPF packets. Successful exploitation could cause flushing of the routing table on a targeted router, as well as propagation of the crafted OSPF LSA type 1 update throughout the OSPF AS domain.

To exploit this vulnerability, an attacker must accurately determine certain parameters within the LSA database on the target router. This vulnerability can only be triggered by sending crafted unicast or multicast LSA type 1 packets. No other LSA type packets can trigger this vulnerability. Read More…………………..

Cisco UCS Outperforms HP and IBM Blade Servers on East-West Latency

These days the focus is increasing towards lower latency and high performing server-to-server data traffic (East-West). Cisco claims that they specifically designed their UCS unified fabric for this type of traffic. Cisco want to prove the claim made by their competitors that Cisco UCS unified fabric would increase latency and slow blade-to-blade traffic. Cisco ran the tests, and the results were simply amazing.

According to the recent concluded test by Cisco claims that HP and IBM blade architectures rely on placing networking switches (HP Virtual Connect; IBM Flex System Fabric Switches) inside of every 16 or 14 blade chassis. These legacy vendors imply that data can communicate from one blade to another more efficiently because their networking switches reside within the chassis.  They fail to mention two critical points: Read more………………

Upgrading ASA 5500 Series firewall, things to be considered – Series 1

When it comes to upgrade an ASA 5500 Series firewall from 8.2 version to 8.3 or so, many things comes into the picture.  Recently we upgraded our ASA 5540 Firewall from the IOS version 8.2.1 to 8.4.6. I would like to share the details about the upgrade.

Stating IOS version 8.3 and later there is pre-requisite related to memory of the ASA. Most of new ASA manufactured after Feb 2010 comes with the upgraded memory. However if your ASA was manufactured before February 2010 you may need to upgrade the memory of the ASA as per the below mentioned table.

* Note:  The maximum memory supported for the ASA-5520 and ASA-5540 is 2 Gb.  If you install 4 Gb of memory in these units, they will go into a boot loop.

The first thing you need is to determine the existing memory your ASA has , which can be done in two ways first by using a command line interface (CLI) do issue a command show version | include RAM …….. Read  more…………………

How to integrate Windows Deployment Services Server with a typical Cisco Networking devices – Series 1

Recently we tried to deploy Windows Deployment Services Server in our environment to enable the deployment of Windows operating systems over the network for our workstations, so that our technical support team do not have to install each operating system directly from a CD or DVD.

Our Windows Deployment Services Server was connected to Cisco Nexus 5000 Series Switch as shown in the below layout. We do have a redundant network devices at each layer but to make things easier I have removed them. Read more………………………