How do you know for certain that a router in your network has not been altered with since you deployed it? Wouldn’t it be great if you can cryptographically challenge your router to provide its unique identity? In addition to this, what if the underlying OS provides a secure mechanism to detect if the software has been tampered with during boot time and runtime?
Tune in to this podcast to understand the aspects of establishing trust and the security features incorporated in both hardware and software to ensure the trustworthiness of IOS-XR platforms. With 5G deployments gaining traction, networks are being depended on as critical infrastructure. The new security features will ensure customers can validate the authenticity of their devices in both hardware and software.
Cisco Champion Hosts: David Penaloza Seijas (twitter.com/davidsamuelps), Verizon Business, Principal Engineer Mark Sibering (twitter.com/netcicd), Devoteam, Principal Architect Michael Rhoades (twitter.com/ciscomikey), North American Hoganas, Manager IT
Does anyone have any simple EEM Scripts handy that can shut down a bgp neighbor based on syslog entry? Right now I have some IPSLA's and track statements setup, but am clueless on the EEM part. (It was so much easier in regular IOS) all I want i...
In the setup, there will be 2 x BGP routers capable of doing up to 400g routing (non-cisco) and 2 more BGP cisco routers capable of doing multiple 10g routing. In day to day operation, definitely, there won't be such a crazy amount of traffic. Just f...
Hi, Is there anyone configured cisco communication manager (CUCM) for direct calls to SIP Trunk provided by the Service Provider (Without Voice Gateway or CUBE)? I am looking for configuration steps Thanks
Hi, I might be missing something, but for some reason IOS XRv 9000 (7.2.2) doesn't seem to impose an inner (VPN) label to transit traffic only. For traffic that originates from the IOS XRv 9000 itself it seems to be working as expected. Sim...