The Community is a hub for connecting with your peers and Cisco specialists to ask for help, share your expertise, build your network, and grow professionally. New Here? Click here to learn more and get started.
Cisco Community is an active and collaborative place to learn more about our products and ask questions of peers and Cisco experts! Check out some of the most popular conversations happening right now!
Hi All, Need to configure an Cluster between Hardware device and Virtual appliance and later will remove the Hardware appliance. Before jumping into configuration i have a some query. 1. Is it sma required after forming an cluster to manage the devic...
Greetings, I'm a bit confused regarding the encapsulation process of an ethernet 2 frame. It seems the destination IP address is obtained prior to data even reaching Layer 3 of the OSI model. Furthermore, in layer 4, to my understanding a virtual cir...
If a frame with a tag corresponding to the native VLAN enters the trunk port, will the switch take down that frame and send it on over the trunk link as untagged, or will it send it with a tag corresponding to the native VLAN?How I understand it:(Let...
I have a couple of switches that are trunked via a LAN cable from another switch. I noticed that these switches sometimes have a hard time to SSH into. I get the error: "Connection timed out". After a while and a few tries I can connect just fine. I ...
Hi all,I'm working on a Packet Tracer project, and I am stumped as to why my ACL will not permit traffic from port 80 and 443 to my web server. With the ACL not binded to G0/0/0.40 I have full access to the web server (HTTP(s), ftp, ping). When I bin...
Hello, I create Ikev2 site to site tunnel between two cisco FPR 1140. I have same subnet on both location and i used source and destionation NAT in one site. My user try access over web some aplication and it is work, but when other site try to acc...
I came across a configuration guide which mentions, in the Intrusion Policies chapter, GID 2 as " Tagged Packets. (Rules for the Tag generator, which generates packets from a tagged session. )" https://www.cisco.com/c/en/us/td/docs/security/firepow...
Hey folks,I'm looking to set up an L3out with static routes for an Active/Standby Firewalls pair, as shown in the diagram below. However, I'm feeling a bit confused, especially when it comes to configuring the L3out with SVI. Any advice on how to pro...
Hello Cisco Community,I've been thinking about the next step in my IT career. I really enjoyed studying for the CCNA, and now? I was able to fill in the few remaining holes, but I'd like to go further.I have a preference in cyber security, however th...
Hello,I want to set up a IPSec IKEv2 VPN to a central ASA. On my side we have a cisco 897.First I tried a crypto map configuration. Didn't work because the IKEv2 SA goes UP and immediately goes DOWN with the error message "IKEv2:(SESSION ID = 1,SA ID...
Hi dears if i see advetise routes prefix to nieghbor X.X.X.X by details for example which community send wightand other bgp parameters How can see thisin bgp nexus switches for examples 9K series???
I am using a Catalyst 3750 V2 switch and have successfully connected to the DaloRadius server. I can log into the switch with the users I created in the Radius server without any problem, Now, I want to grant or restrict access to the end users conne...
So this is a topic that's been mentioned time and time again I'm sure but i wanted to get a bit more specific to my situation. We're replacing our core switch with a C9300 (we currently have a 3750). We have a pretty simple network. Any desk with a c...