Easiest way to block SSH, telnet, and all remote access to the router is the following:line vty 0 4 (or 0 15, look at your config and see how many vty lines are configured) transport input none
Lealaohoo is correct. With Nexus VDCs, there is no way to make traffic go between two of them across the back plane. Even for your Internal and DMZ VDCs to talk to each other you must connect a physical cable between the same Nexus switch, and config...
Yes you need to clear the bgp neighbors for this to happen. One option is to configure all your neighbors for soft reconfiguration inbound, then you can do a 'clear ip bgp * soft [in | out]' to update the routes without hard dropping your neighbor re...
There isn't a limitation on the number of areas, however with your small network of only 4 switches you'll be fine with leaving everything in area 0. The design you are looking for will be possible with the OSPF routed access restrictions. The below ...
I'm curious how you plan on getting 3 switches on the same STP segment... are you planning on using a hub? or unmanaged switch that isn't running STP? Generally best practices dictate only direct links between switches.