Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
We have two P2P's that we are installing between our data center and a Colo location. They are requesting we do Layer 2 extension with Vxlan L2VNI. Having never set that up, I am some questions on best practice and configuration. We do have a Nexu...
I am new to VXlan, but we are going to have two CoLo Data Centers that they want L2 Extension at each. There will be a P2P circuit between the locations and we want to have a Firewall as well. We have Nexus at the core at the main Place and they a...
I am trying to use Event Manager applet on a Nexus to do a couple things on several Vlans.event manager applet Linkdownevent track 8 state downaction 1.1 cli conf taction 1.2 cli interface Vlan120action 1.3 cli no ip policy route-map v6action 1.4 cli...
I have been trying to limit SSH on a router and my ACL doesn't seem to be workingip access-list extended 10710 permit ip host 10.20.0.20 host 3.3.3.3 log15 permit ip host 10.20.0.20 host 4.4.4.4 log20 permit tcp host 10.20.0.20 host 4.4.4.4 eq 2225 p...
Sorry I thought I included both, this is what I have:event manager applet LinkUpevent track 8 state upaction 1.1 cli conf taction 4.5 cli interface Vlan555action 4.6 cli no ip policy route-map vr7action 4.7 cli ip policy route-map vr6event manager ap...
I can connect from inside my network to the IP address on the E2. When I did a show users I came from a 10.20.0.20 address. I can also come from outside the network and connect to the E2 (Public address). I need to deny that traffic, but still b...
I don't want any public address to be able to SSH to my device only private.There isn't much to the config but one interface to the Lan, one interface to the WAN and the access list applied to Wan as ip access-group 107 in
The interface I am applying this to is the WAN port. I don't want the outside network being able to ssh only the inside which is why I am trying to limit it. With line 25 I just was trying to say if the source is that IP and trying SSH leave it in...
How does the ip summary-address eigrp command work. On the core switch that has the circuits on the remote end would I add this statement on the interfaces? I don't want to advertise a default route.