Jump to content

Search the Community

Showing results for tags 'solutions'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • ANNOUNCEMENTS
    • ANNOUNCEMENTS
  • CERTIFICATION - - - - - NO REQUESTS IN THESE FORUMS - - - - -
    • CISCO SYSTEMS
    • COMPTIA
    • LINUX
    • MICROSOFT
    • ORACLE
    • PROJECT MANAGEMENT
    • SECURITY CERTIFICATIONS
    • SUN MICROSYSTEMS
    • WIRELESS
    • OTHER CERTIFICATIONS
  • CISCO TECHNICAL SECTION
    • CISCO LABS
    • GNS3
    • NETWORK INFRASTRUCTURE
    • SECURITY
    • WIRELESS
    • SERVICE PROVIDERS
    • COLLABORATION, VOICE AND VIDEO
    • DATA CENTER
    • SMALL BUSINESS
  • MICROSOFT TECHNICAL SECTION
  • OTHER TECHNICAL SECTION
  • TRAINING OFFERS & REQUESTS
  • CERTCOLLECTION MALL
  • GENERAL FORUMS
  • COMMUNITY CENTER

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests

Found 4 results

  1. AWS Certified Solution Architect Associate Dump (SAA-C01) Latest Update: May 24, 2020 File Type : PDF Download Link DLUpload [hide][Hidden Content]] DropGalaxy [hide][Hidden Content]] Downloading Instructions from DLUpload for those having issues Keep looking for the Download button in blue on any page you get redirected to
  2. INE – Introduction to Cisco’s SD-WAN Solution INE – Introduction to Cisco’s SD-WAN Solution English | Size: 159.61 MB Category: Cisco | Networking SD-WAN is a substantial technology advancement in the WAN edge. It is more than just a new protocol. It is a smart architecture that uses a centralized orchestrator to intelligently send traffic across the WAN. Thanks to the massive worldwide adoption, SD-WAN became a global billion-dollar business. Traditional WANs are based on legacy protocols that are slow, inflexible, and require individual management. SD-WAN monitors applications and resources at the WAN edge and can adapt to network conditions when they are degraded. In this course you will learn about the roots of SD-WAN: Software Defined Networks; then examine the history of Viptela and how it became Cisco’s SD-WAN. Despite its recent adoption, SD-WAN is growing at a fast speed; however, Cisco is not the only vendor offering it. We will examine how Cisco compares to other vendors and we will review the recent market status of SD-WAN using Gartner’s Magic Quadrant. Download Links DLUpload [hide][Hidden Content]] DropGalaxy [hide][Hidden Content]]
  3. Please kindly share CCIE DC LAB3 solutions it will be helpful for many future students Thanks
  4. 1- Frame Relay FR2 int s0/0 frame-relay lmi-type cisco int s0/1 frame-relay lmi-type cisco R23 map-class frame-relay CGR frame-relay end-to-end keepalive mode bidirectional /passive-only router ospf 1 network 10.1.1.23 0.0.0.0 area 2 int s0/0 encapsulation frame-relay frame-relay map ip 172.16.12.1 23 broadcast frame-relay lmi-type cisco no frame-relay inverse-arp ip ospf network point-to-point R22 map-class frame-relay CGR frame-relay end-to-end keepalive mode bidirectional int s1/0 ip add 172.16.12.1 255.255.255.252 encapsulation frame-relay frame-relay map ip 172.16.12.2 22 broadcast frame-relay lmi-type cisco do telnet 10.1.1.23 /source-interface loopback 0 2-MST SW2 vtp mode transparent vtp domain CCI3 change vtp mode to client SW1 int e1/0 no swi acc vlan 113 swi acc vlan 114 int e2/3 spanning-tree mst 2 port-priority 0 R14#do telnet 10.1.1.8 /sour lo0 3- OSPF NSSA R26 router rip version 2 no auto-summary router ospf 1 network 10.1.1.26 0.0.0.0 area 1 R24 ip access-list ext 100 no 40 40 permit ip 200.20.20.0 0.0.0.255 any R 25 interface Loopback1 shutdown OR no ip ospf network point-to-point router ospf 1 router-id 10.1.1.25 do clear ip ospf process yes R 21 router ospf 1 area 1 nssa area 0 range 200.20.20.0 255.255.255.0 ! do show run | sec access-list ip access ex 111 ( Be careful here ) no 40 40 per ip any any dscp cs6 OR do show run | sec access no access-list 111 access-list 111 permit ip any any dscp cs6 and then add the rest.. no ip prefix-list 10 seq 15 permit 200.0.0.0/8 ip prefix-list 10 seq 15 permit 200.20.20.0/24 R20 do ping 192.168.20.1 do ping 192.168.20.1 source lo3 4- BGP R1: router bgp 3 address-family ipv4 neighbor 10.1.1.3 route-reflector-client ip route 10.1.1.6 255.255.255.255 Null0 255 R2: do show run | s policy-map policy-map COPP_LDP class LDP_R4 police cir 10000 no conform-action drop conform-action transmit do show run | sec access-list no access-list 11 permit 10.0.0.0 0.3.255.255 access-list 11 permit 10.0.0.0 0.7.255.255 R3: router bgp 3 address-family ipv4 no neighbor 10.1.1.1 weight 10 R6 router bgp 3 address-family ipv4 no network 10.1.1.6 mask 255.255.255.255 network 10.6.6.6 mask 255.255.255.255 do clear ip bgp * soft do sh ip bgp 5-MPLS R1 mpls label protocol ldp access-list 12 permit 10.1.1.4 access-list 100 permit tcp any any eq 646 no ip route 10.1.1.6 255.255.255.255 Null0 ip route 10.1.1.6 255.255.255.255 Null0 255 R2 access-list 100 permit tcp any any eq 646 policy-map COPP_LDP class LDP_R4 no police cir 10000 conform-action drop exceed-action drop police cir 10000 conform-action tran exceed-action drop router bgp 3 address-family vpnv4 neighbor 10.1.1.5 activate neighbor 10.1.1.5 send-community extended neighbor 10.1.1.5 route-reflector-client R4 mpls label protocol ldp no mpls ldp router-id lo0 force mpls ldp router-id Loopback 0 ip prefix-list Site-A seq 15 permit 10.10.10.4/30 router ospf 101 vrf Site-A redistribute bgp 3 subnets do clear ip bgp * R5 ip cef do show run int e0/2 interface e0/2 ip vrf forwarding Site-A ip address 10.10.10.5 255.255.255.252 router bgp 3 address-family ipv4 vrf Site-A redistribute ospf 101 match internal external 1 external 2 router ospf 101 vrf Site-A redistribute bgp 3 subnets R8 do ping 171.2.2.2 source lo1 6-IPV6 R5 int e0/2 no ipv6 nd ra suppress no ipv6 access-list CCIE ipv6 access-list CCIE perm ipv6 any any R8 int e0/0 ipv6 address autoconfig def R4 ipv6 router ospf 1 no router-id 10.1.1.2 router-id 10.1.1.4 do clear ipv6 ospf proc yes int lo100 ipv6 ospf 1 area 0 R8 do ping 2001:CC1E:100::100 7-QoS R9 Ping from both R11 and R12 are working ; given the fact correct service policy is applied at the correct output interface... conf t int e0/1 service-policy output POLICY class-map match-any SILVER no match ip precedence 4 match ip precedence 3 policy-map POLICY class SILVER police cir 8000000 <---------changed ;service-policy has small CIR, raise it to 8000000. no conform-action drop conform-action transmit <--------fixed set ip precedence 5 <---------NEW R12 : do ping Reference : [Hidden Content] 8-EEM R27 conf t event manager applet NOSHUT event syslog pattern "Interface Ethernet0/0, changed state to down" action 1.0 cli command "enable" action 2.0 cli command "configure terminal" action 3.0 cli command "interface e0/0" action 4.0 cli command "no shut" int e0/0 shut no shut 9 -DHCP - EIGRP R19 no ip dhcp excluded-address 172.16.10.16 172.16.10.23 ip dhcp excluded-address 172.16.10.19 ip dhcp excluded-address 172.16.10.16 ip dhcp pool EIGRP no network 172.16.10.0 255.255.255.240 network 172.16.10.16 255.255.255.248 domain-name EIGRP default-router 172.16.10.19 interface Ethernet0/0 ip hold-time eigrp 200 90 policy-map CCP class UDP police rate 8000 no conform-action drop conform-action transmit exceed-action drop R19#show key chain Key-chain ccie: key 1 -- text "cisco" accept lifetime (always valid) - (always valid) [valid now] send lifetime (always valid) - (always valid) [valid now] Copy paste the following key chain configuration from R19 to R17 and R18. (R16 already has a key-string of "cisco") key chain ccie key 1 key-string 7 104D000A0618 router eigrp 200 network 10.1.1.0 0.0.0.255 network 172.16.10.16 0.0.0.7 ip access-list ext 104 no 20 permit ospf any any 20 permit eigrp any any show run | sec access-list access-list 101 permit icmp any any access-list 102 permit eigrp any any access-list 103 permit tcp any any access-list 104 permit udp any any access-list 104 permit eigrp any any access-list 104 permit tcp any any eq telnet R17 conf t int e0/1 ip authentication mode eigrp 200 md5 ip authentication key-chain eigrp 200 ccie R18 conf t int e0/1 ip authentication mode eigrp 200 md5 ip authentication key-chain eigrp 200 ccie R16# do telnet 10.1.1.19 /source-interface loopback 0 10-NAT R22 no ip access-list extended NAT_IN_HTTP ip access-list extended NAT_IN_HTTP permit tcp 172.16.0.0 0.0.255.255 any eq www no ip NAT source route-map NAT_IN interface Ethernet0/1 overload no ip NAT source route-map NAT_IN_HTTP interface Loopback0 overload ip NAT inside source route-map NAT_IN interface Ethernet0/1 overload ip NAT inside source route-map NAT_IN_HTTP interface Loopback0 overload int e0/0 no ip NAT out ip NAT in int e0/1 no ip NAT in ip NAT out R20 do telnet 172.16.11.10 do telnet 172.16.11.10 80 R22 do show ip nat translations - Edited Q7 QOS Question - Edited Q7 DHCP Question
×
×
  • Create New...