------------------------------------------------------------------------------------------------ Please remember to rate useful posts, and mark questions as answered
HTH, Steve
------------------------------------------------------------------------------------------------ Please remember to rate useful posts, and mark questions as answered
What is Log4j? The Log4j vulnerability allows malicious attackers to execute code remotely on any targeted computer, the Apache Software Foundation disclosed a security vulnerability in a widely-used Java software library called Log4j. What is t...
view more
Below procedure for installing from prime 3.10 to 3.10.1
Pre-requisite for any MR release upgrade
Take the backup of prime db on external tftp server (recommended).
If you are running on VM than take a snap-shop of prime VM so you can resto...
view more
Overview
This article compares Prime Infra (PI) and DNA Center for a wireless user of Catalyst 9800 controller. As a Quality assurance test engineer for Prime Infra, there was always an inquisitiveness to compare Prime Infra with DNA Center for a specific...
view more
SymptomsYou want to automate guest-user creation on your Cisco 9800 Wireless LAN Controller SolutionSince new WLCs do not allow adding guest users via SNMP, I have created a new script that uses RESTCONF via HTTPS.Tested on Cisco 9800-CL virtual wire...
view more
In some cases, there may be an abnormality in one of the part files of these COS APs, which makes it impossible to convert to Mobility Express. At this time, you will encounter the following error.##########################################################...
view more