Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
I am replacing Catalyst IOS switches with Nexus 9K switches. I am attempting to convert the IOS ospf configurations to NXOS ospf configurations (see configurations below). I can't quite figure out how to convert the redistribute static routes into os...
We have two Firepower 4145 firewall appliances that are clustered together on our network, each node is located in two separate data centers (data center A and data center B). Below the cluster (inside interfaces) we have a pair of Catalyst 6880 swit...
We have two FirePower FTD 4145 firewalls operating in FTD cluster mode. The devices below the firewall cluster is a pair of Catalyst 6807 switches running in vss mode. Above the firewall cluster is a pair of Catalyst 9500 switches that have been stac...
I have two brand new N540-FH-AGG-SYS routers. Configured them with a Call-home profile, it communicates the our Cisco Smart License portal and registers the "N540-Front Haul Aggregation Router Tracking PID in Routers" licenses, one for each to the ro...
Over the years we've been adding layer 3 devices to our OSPF backbone area 0 without too much thought put into it. Plug it in, turn on routing and wait for the OSPF neighbors to show up. It works fine and we've never had a problem with OSPF on our ne...
I am confused by the network configuration in NXOS ospf. The documentation says to put my network summarization on the ospf interface, but I already have a /30 ip address on the ospf interface (see diagram below). When I try to put 10.0.0.0/8 on the ...
I believe I was able to get the static route redistribution done with the following syntax. ip access-list static-routes10 permit ip 10.0.0.0 0.255.255.255 any20 permit ip 192.168.210.0 0.0.0.255 anyroute-map static-in-ospf permit 10 match ip address...
On the Firepower NGFW platforms run FXOS as the base operating system which manages the chassis, you then stand up the firewalls as FTD or ASA for the FW/IPS/IDS/VPN functions. So FTD and ASA are never associated with each other. It is an either/or o...
tvotna,Thank you for your response. Our firewall cluster is running in FTD mode, not ASA mode. The switches above and below the firewall cluster continue to function, just the surviving cluster node fails to pass traffic when it has been failed over ...
Marvin,Thanks for your reply. How often did you see this event on the 9300’s? Ours has only happened twice with almost a year between events? Hopefully it will not become more frequent.Thanks again,Martin