Unfortunately, easy reversion requires advance planning. * if you have a text copy of the previous configuration, you can revert to it with a reload: prep: copy running-config old-config.txt (make changes, decide to revert) revert: copy old-config.txt saved-config reload
* if you were making access-list changes, keep before & after versions of the lists old config: access-list outside-ingress-01 ... access-group outside-ingress-01 in interface outside prep: access-list outside-ingress-02 ... go live: access-group outside-ingress-02 in interface outside revert: access-group outside-ingress-01 in interface outside
* if you were making a policy change, keep before & after versions policy-map global_policy_1 ... policy-map global_policy_2 ... and then switch foward with: service-policy global_policy_2 global or backward with: service-policy global_policy_1 global
Sadly, the common theme is that you have to plan how you might revert before making the change. -- Jim Leinweber, WI State Lab of Hygiene
Are you responsible for risk management, compliance management and auditing of a network?
If so, we’d like to speak with you to learn your current processes of enforcing compliance and managing risk to help us develop services that will ...
Once you've expanded Cisco Secure Endpoint connector deployment to about 50% of your licensed count (check out this article that shows you how to do that), it's time to put those connectors to action i.e. convert them to Protect from Audit mode for vari...
Hello! I’m Betsy, UX Researcher, on the Cisco+ Secure Connect Now team. Nice to meet you all .We have a short survey to learn about your Zero Trust Network Access (ZTNA) journey. Whether you have, plan to, or have not implemented a ...
A set of interface access rules can cause the Cisco Adaptive Security Appliance to permit or deny a designated host to access another particular host with a specific network application (service). When there is only one client, one host and one se...
How To: Cisco ISE Captive Portals with Aruba Wireless
Authors: Adam Hollifield, Brad Johnson
IntroductionPrerequisitesMinimum RequirementsComponents UsedConfigurationAruba Wireless ControllerWLAN CreationAuthentication ConfigurationRole & Policy Confi...