I know this is really old, but does anyone recall who made the video ? attached by ‘LAMAV’ ? I love this guys teaching style. I’m studying for my CCENT>>>CCNA and I’d love to follow this guy ! The filename that was attached is: 77267-BCMSN05 - STP Part I.wmv.zip 77267-BCMSN05 - STP Part I.wmv https://community.cisco.com/kxiwq67737/attachments/kxiwq67737/6016-discussions-lan-switching-routing/149449/1/77267-BCMSN05%20-%20STP%20Part%20I.wmv.zip Here’s a link to the original post... https://community.cisco.com/t5/switching/stp-root-port-vs-designated-port/td-p/1517842 I can be reached here’s as: ciscoladder or preferably direct to: ciscoladder@gmail.com Man, if you could help me find out who this is, I’ll owe you ! Best Regards, Dave
... View more
HI i can already fix this problem. Just instal new ios from .tar file. You can download .tar file form cisco website or any website. and then ,You must to have only one tool. download it "tftp tool" https://bitbucket.org/phjounin/tftpd64/downloads/Tftpd64-4.64-setup.exe and watch this video https://www.youtube.com/watch?v=utSbMinOID4&t=342s credit the video owner >>> NetworkedMinds next time i will install new firmware with this way. XDXDXDXDXD
... View more
Indeed, but i wonder if the same can be possible on an ASR1001X router for example: keeping this timer for return packets. why ? well, because of Cisco :-) and in particular Cisco WebEx. WebEx by default tries to connect to UDP/9000, but how do i need to match the return traffic if i need to pass the traffic through an ACL on an Internet Border router (before the firewall) ??
Of course, i can open ALL UDP/9000 source traffic, or i can try to limit this to Cisco WebEx server sources only, but it would be great if i did not have to do this manually, but that the router would allow automatic UDP return traffic to the same source port, if the reply comes within 20 seconds or so.
... View more
Hi Guys,
I´d like to expand the question... I`m using in an ACL on an IOS-Device (15.5.3) an object-group Service in the ACE - but in comparison to an ASA when issuing the "Show ip access-list" Output, not each Service Statement is showing up! Is there something I`ve done wrong or I´ve forgotten in my config? OR is this not possible at all?!
e.g.
IOS:
object-group service OBJ-SERVICE_TEST-IOS
tcp-udp eq 102
!
ip access-list extended ACL_TEST-IOS
permit object-group OBJ-SERVICE_TEST-IOS any any
!
IOS#sh ip access-lists ACL_TEST-IOS
Extended IP access list ACL_TEST-IOS
10 permit object-group OBJ-SERVICE_TEST-IOS any any (10 matches)
+++ ONLY ONE LINE
ASA:
object-group service OBJ-SERVICE_TEST-ASA tcp-udp
port-object eq 102
!
access-list TEST_ACL-ASA extended permit object-group OBJ-SERVICE_TEST-ASA any4 any4
!
ASA# sh access-list
access-list TEST_ACL-ASA line 1 extended permit object-group OBJ-SERVICE_TEST-ASA any4 any4 (hitcnt=10)
access-list TEST_ACL-ASA line 1 extended permit tcp any4 any4 eq 102 (hitcnt=5)
access-list TEST_ACL-ASA line 1 extended permit udp any4 any4 eq 102 (hitcnt=5)
+++ AN ENTRY ALSO FOR EACH SERVICE - TCP/UDP +++
gr, Dan
... View more
Hi Kevin, We at Onyx Beacon find your question really interesting, which is why we would like to provide an interesting use case where the bluetooth radio in a Wireless access point would come in handy. The use case is dedicated to asset tracking projects that can assist employees/managers to have a broad overview of their infrastructure on premise. With the bluetooth radio in the AP you can constantly monitor the region and report back to a backend system that can share more comprehensive information on what's happening in your facilities. If you'd like to find out more about this type of implementation, feel free to reach out and we can have a more detailed conversation. Looking forward to hearing from you, Razvan.
... View more
This is the management port meant only to manage the switch. For details see below
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3850/software/release/3se/int_hw_components/configuration_guide/b_int_3se_3850_cg/b_int_3se_3850_cg_chapter_0100.html
HTH
Madhu
... View more
Yeah I have seen this before, its not 'standard' as such but works fine.
As Philip says, the port will be functioning as a Trunk with the Native Vlan set to 34.
As it seems to be connected to an AP (I think), the AP will likely have an IP address in Vlan34 for management and will be tagging packets for whatever SSID's its configured with (assuming its flexconnect).
Just get the customer to remove the 'switchport access vlan 34' bit as it serves no purpose all the time the port is configured statically as a trunk.
... View more
Jon Nice to hear from You. I figured out last Friday that this is exactly what I need to do. I am simply moving the gateway to the ASA interface. Hope you are well! Kevin
... View more
That's correct - the physical parent interface does not have a nameif, IP address or security level (either explicit or derived). Your subinterfaces can be any mix of security levels - all the same, all different or however you need.
... View more
Kevin I am glad that it is configured and working now. Thank you for posting back to the forum to let us know that it is working and that getting EIGRP working was a key element in finding the solution. Thank you for using the rating system to mark this question as answered as this helps other readers in the forum to find information that is helpful. HTH Rick
... View more