Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
Recently I've tried to remove an appended route-map that was applied to a "redistribute static" behaviour within EIGRP. I thought the following sequence of IOS commands would remove this route-map, as follows:
Pre-Change
ip access-list standard BLAH...
I currently have a point-to-point Cisco Aironet SAP1602E Wireless Bridge deployment (using RAP and MAP, Wireless Root Bridge and Non-Root Bridge) to extend a Layer 2 VLAN from one Building to another. Currently, this operates uisng Open Authenticatio...
I've read various posts about Resilient Ethernet Protocol (REP) sizing limitations (such as "Maximum nodes in a REP segment?"), which all talk about various numbers of Nodes per REP Segment/Ring - 16, 32 and up to 100 - as being tested, but with no h...
Hopefully a very easy one for someone to answer - given that the internal backplane (FWSM <-> Cat65xx) and (CSM-S <-> Cat65xx) is automatically generated, and seemingly can't be changed (i.e. our CSM-S works on Po262, or 261 and I think the FWSM is s...
I'm having lots of issues having so-called "Clientless-SSL-Tunnel" AnyConnect VPN sessions - that is, those which are enacted by visiting https://<ASA IP> via a Browser, and letting the Java/ActiveX plugin automatically run the AnyConnect VPN Fat Cli...
...and finding out if Cisco Switches support Bridge Assurance or not is no easy feat. Pretty much every non-NX-OS Switch I've connected in doesn't.
For the time poor, do yourself a favour and turn it off with "spanning-tree port type normal".
I hat...
Thanks very much for this - life saver!
I had the same issue, which was made more confusing as the Crypto Map that matches the traffic to be encapsulated needed to be specified in the "Normal" way, where the ACL Src is the actual Local Network.
The f...
Peter,
Thanks - this was driving me absolutely insane with the random "PFC Identity" error the ASA kept throwing up when I tried to do this by setting my equivalent 81.137.x.x/29 Static IP Range as a DMZ Interface. Apparently that's the ASA's way of ...
Hieu,
Thanks for this - was driving me up the bend. Doesn't make sense why I'd need it (I do - same scenario as you, only I'm managing via explicitly-defined VRF) given the whole point of the "line vty" section is to apply to remote access of the box...
In case anyone is interested, this (hitless removal of a "route-map" statement) is possible - but the command to do it is not intuitive.
Command
no redistribute static route-map BLAH
If you've got extra keywords/commands in - such as "subnets" for BG...