manish.y59
Level 1
Level 1
Member since ‎02-21-2013
‎01-20-2026

User Statistics

  • 4 Posts
  • 0 Solutions
  • 0 Helpful votes Given
  • 2 Helpful votes Received
Recent Badges
1 Helpful Vote
First Article
Certifications

User Activity

IntroductionThis document belongs to WAN link terminating on border leaf between two datacenters.ORBorder Leaf to Border Leaf communication between two datacenters / two sites.ORL3OUT configuration of Site 1 Border connecting to Site 2 Border leaf Po...
IntroductionThis is test setup for macsec configuration between two devices. Same can be used to configure on IPN or ISN devices.About MACsecMedia Access Control Security (MACsec) an IEEE 802.1AE along with MACsec Key Agreement (MKA) protocol provide...
Introduction This article belongs to configure the macsec on WAN link terminating on border leaf switches across the datacenters.MACsec is an IEEE 802.1AE standard that provides MAC-layer hop-by-hop encryption for data confidentiality and integrity f...
IntroductionThis document describes how to restore an encrypted backup configuration file on a Application Centric Infrastructure Controller. PrerequisitesUnderstanding of taking of backup externally to server daily. Condition:Suppose the ACI APIC ar...
Community Statistics
Member Since ‎02-21-2013 11:42 PM
Date Last Visited ‎01-20-2026 09:34 AM
Posts 4
Total Helpful Votes Received 2
Helpful Votes From