NAPALM Documentation. Release 1. David Barroso
|
|
- Violet Newman
- 5 years ago
- Views:
Transcription
1 NAPALM Documentation Release 1 David Barroso February 21, 2016
2
3 Contents 1 Supported Network Operating Systems 3 2 Documentation Tutorials Supported Devices Command Line Tool NetworkDriver i
4 ii
5 NAPALM (Network Automation and Programmability Abstraction Layer with Multivendor support) is a Python library that implements a set of functions to interact with different network device Operating Systems using a unified API. NAPALM supports several methods to connect to the devices, to manipulate configurations or to retrieve data. Contents 1
6 2 Contents
7 CHAPTER 1 Supported Network Operating Systems eos junos iosxr fortios ibm nxos ios You can select the driver you need by doing the following: >>> from napalm import get_network_driver >>> get_network_driver('eos') <class napalm.eos.eosdriver at 0x10ebad6d0> >>> get_network_driver('iosxr') <class napalm.iosxr.iosxrdriver at 0x10ec90050> >>> get_network_driver('junos') <class napalm.junos.junosdriver at 0x10f96f328> >>> get_network_driver('fortios') <class napalm.fortios.fortiosdriver at 0x10f96fc18> >>> get_network_driver('ibm') <class napalm.ibm.ibmdriver at 0x10f8f61f0> >>> get_network_driver('nxos') <class napalm.nxos.nxosdriver at 0x10f9304c8> >>> get_network_driver('ios') <class napalm.ios.iosdriver at 0x10f9b0738> Check the tutorials to see how to use the library in more detail, Suppoerted Devices will provide you with detailed support information and caveats and the NetworkDriver section explains which methods are available for you to use. 3
8 4 Chapter 1. Supported Network Operating Systems
9 CHAPTER 2 Documentation 2.1 Tutorials First Steps Manipulating Config NAPALM tries to provide a common interface and mechanisms to push configuration and retrieve state data from network devices. This method is very useful in combination with tools like Ansible, which in turn allows you to manage a set of devices independent of their network OS. Connecting to the Device Use the appropriate network driver to connect to the device: >>> from napalm import get_network_driver >>> driver = get_network_driver('eos') >>> device = driver(' ', 'dbarroso', 'this_is_not_a_secure_password') >>> device.open() Configurations can be replaced entirely or merged into the existing device config. You can load configuration either from a string or from a file. Replacing the Configuration To replace the configuration do the following: >>> device.load_replace_candidate(filename='test/unit/eos/new_good.conf') Note that the changes have not been applied yet. Before applying the configuration you can check the changes: >>> print device.compare_config() + hostname pyeos-unittest-changed - hostname pyeos-unittest router bgp vrf test + neighbor maximum-routes neighbor remote-as 1 - neighbor remote-as 1 - neighbor maximum-routes vrf test2 + neighbor remote-as 2 5
10 + neighbor maximum-routes neighbor remote-as 2 - neighbor maximum-routes interface Ethernet2 + description ble - description bla If you are happy with the changes you can commit them: >>> device.commit_config() On the contrary, if you don t want the changes you can discard them: >>> device.discard_config() Merging Configuration Merging configuration is similar, but you need to load the configuration with the merge method: >>> device.load_merge_candidate(config='hostname test\ninterface Ethernet2\ndescription bla') >>> print device.compare_config() configure hostname test interface Ethernet2 description bla end If you are happy with the changes you can commit them: >>> device.commit_config() On the contrary, if you don t want the changes you can discard them: >>> device.discard_config() Rollback Changes If for some reason you committed the changes and you want to rollback: >>> device.rollback() Disconnecting To close the session with the device just do: >>> device.close() Context Manager In the previous tutorial we used the methods open() to connect to the device and close() to disconnect. Using those methods are useful if you want to do complex or asynchronous code. However, for most situations you should try to stick with the context manager. It handles opening and closing the session automatically and it s the pythonic way: 6 Chapter 2. Documentation
11 >>> from napalm import get_network_driver >>> driver = get_network_driver('eos') >>> with driver('localhost', 'vagrant', 'vagrant', optional_args='port': 12443) as device:... print device.get_facts()... print device.get_interfaces_counters()... 'os_version': u' f f', 'uptime': 2010, 'interface_list': [u'ethernet1', u'ethern u'ethernet2': 'tx_multicast_packets': 1028, 'tx_discards': 0, 'tx_octets': , 'tx_errors': 0, 2.2 Supported Devices General support matrix _ EOS JunOS IOS- XR FortiOS IBM NXOS IOS Pluribus Driver Name eos junos iosxr fortios ibm nxos ios pluribus Structured data Yes Yes No No Yes Yes No No Minimum version F ??? 6.1??? N/A Backend library pyeapi junoseznc pyiosxr pyfg bnclient pycsco netmiko py- Pluribus Caveats EOS FortiOS IBM Networking Operating System NXOS IOS Warning: Please, make sure you understand the caveats for your particular platforms before using the library Configuration support matrix _ EOS JunOS IOS-XR FortiOS IBM NXOS IOS Pluribus Config. replace Yes Yes Yes Yes Yes 3 Yes Yes No Config. merge Yes Yes Yes Yes Yes Yes Yes No Compare config Yes Yes Yes 1 Yes 1 Yes 1 Yes 4 Yes No Atomic Changes Yes Yes Yes No 2 No 2 Yes/No 5 Yes Yes Rollback Yes 2 Yes Yes Yes Yes 2 Yes/No 5 Yes No Warning: Before building a workflow to deploy configuration it is important you understand what the table above means; what are atomic changes and which devices support it, what does replacing or merging configuration mean, etc. The key to success is to test your workflow and to try to break things on a lab first. 3 Check the caveats, this is a dangerous operation in this device. 1 Hand-crafted by the API as the device doesn t support the feature. 4 For merges, the diff is simply the merge config itself. See caveats. 2 Not supported but emulated. Check caveats. 5 No for merges. See caveats Supported Devices 7
12 2.2.3 Getters support matrix _ EOS JunOS IOS-XR FortiOS IBM NXOS IOS Pluribus cli get_facts get_interfaces get_lldp_neighbors get_lldp_neighbors_detail get_bgp_neighbors get_bgp_neighbors_detail get_bgp_config get_environment get_mac_address_table get_snmp_information get_ntp_peers Caveats EOS Minimum Version To be able to support the compare_config method you will require to run at least EOS version F. Rollback The rollback feature is supported only when committing from the API. In reality, what the API does during the commit operation is as follows: copy startup-config flash:rollback-0 And the rollback does: configure replace flash:rollback-0 This means that the rollback will be fine as long as you only use this library. If you are going to do changes outside this API don t forget to mark your last rollback point manually. FortiOS Rollback To make sure the rollback feature works either use only this API to do changes or remember to save your rollback points on the CLI with the command: execute backup config flash your_message Atomic Changes FortiOS plugin will use the batch feature. All commands will not go at the same time but all of them will be processed. The sad true is that FortiOS doesn t have any proper tool to apply large chunks of configuration. 8 Chapter 2. Documentation
13 IBM Networking Operating System Rollback Rollback is simply implemented by reading current running configuration before any load actions. Rollback function executes load replace and commit. Atomic Changes IBM plugin uses netconf to load configuration on to device. It seems that configuration is executed line by line but we can be sure that all lines will be executed. There are three options for error handling: stop-on-error, continue-on-error and rollback-on-error. Plugin uses rollback-on-error option in case of merge operation. However replace operation uses continue-on-error option. In case of typo in configuration, device will inform plugin about error but execute all the rest lines. Plugin will revert configuration using rollback function from the plugin. I do not use rollback-on-error for replace operation because in case of error device is left without any configuration. It seems like a bug. It will be investigated further. Moreover it seems that replace option wipe out whole configuration on device at the first step, so this option is good for provisioning of new device and it is not recomended for device in production. NXOS Notes on configuration replacement Config files aren t aren t normal config files but special checkpoint files. That s because on NXOS the only way to replace a config without reboot is to rollback to a checkpoint (which could be a file). These files explicitly list a lot of normally implicit config lines, some of them starting with #. The # part isn t necessary for the rollback to work, but leaving these lines out can cause erratic behavior. See the Known gotchas section below. Prerequisites Your device must be running NXOS 6.1. The features nxapi server scp-server must be enabled. On the device and any checkpoint file you push, you must have the lines: feature scp-server feature nxapi Getting a base checkpoint file An example of a checkpoint file can be seen in test/unit/nxos/new_good.conf. You can get a checkpoint file representing your device s current config by running the get_checkpoint_file() function in the napalm.nxos driver. Known gotchas Leaving out a shutdown or no shutdown line will cause the switch to toggle the up/down state of an interface, depending on it s current state. #switchport trunk allowed vlan is required even if the switchport is in switchport mode access. However if #switchport trunk allowed vlan is included with no switchport, the configuration replacement will fail. Vlans are listed vertically. For example vlan 1, 10, 20, 30 will fail. To succeed, you need: vlan 1 vlan 10 vlan 20 vlan Supported Devices 9
14 Diffs Diffs for config replacement are a list of commands that would be needed to take the device from it s current state to the desired config state. See test/unit/nxos/new_good.diff as an example. Notes on configuration merging Merges are currently implemented by simply applying the the merge config line by line. This doesn t use the checkpoint/rollback functionality. As a result, merges are not atomic. Diffs Diffs for merges are simply the lines in the merge candidate config. IOS Prerequisites IOS has no native API to play with, that s the reason why we used the Netmiko library to interact with it. Having Netmiko installed in your working box is a prerequisite. Archive IOSDriver relies on the archive functionality to be able to manipulate configuration, make sure it s enabled: archive path bootflash:archive write-memory Optional arguments NAPALM supports passing certain optional arguments to some drivers. To do that you have to pass a dictionary via the optional_args parameter when creating the object: >>> from napalm import get_network_driver >>> driver = get_network_driver('eos') >>> optional_args = 'my_optional_arg1': 'my_value1', 'my_optional_arg2': 'my_value2' >>> device = driver(' ', 'dbarroso', 'this_is_not_a_secure_password', optional_args=optio >>> device.open() List of supported optional arguments fortios_vdom (fortios) - VDOM to connect to. port (eos, iosxr, junos, ios) - Allows you to specify a port other than the default. config_lock (junos) - Lock the config during open() (default: True). Adding optional arguments to NAPALM drivers If you are a developer and want to add an optional argument to a driver, please, follow this pattern when naming the argument; $driver_name-$usage if the argument applies only to a particular driver. For example, the optional argument fortios_vdom is used only by the FortiOS driver to select a particular vdom. Otherwise, just name it $driver_name-$usage. For example the port optional argument. 10 Chapter 2. Documentation
15 2.3 Command Line Tool NAPALM ships with a simple CLI tool to help you deploying configuration to your devices directly from the shell. It might be convenient for simple bash scripts or provisioning tools that rely on a shell. The usage is very simple. For example, let s do a dry run (changes will not be applied) and check the changes between my current configuration and a new candidate configuration: # cl_napalm_configure --user vagrant --vendor eos --strategy replace --optional_args 'port=12443' --d Enter -2,30 boot system flash:/veos-lab.swi -event-handler dhclient - trigger on-boot - action bash sudo /mnt/flash/initialize_ma1.sh +transceiver qsfp default-mode 4x10G -transceiver qsfp default-mode 4x10G +hostname pyeos-unittest-changed spanning-tree mode mstp aaa authorization exec default local -aaa root secret 5 $1$b4KXboe4$yeTwqHOKscsF07WGoOnZ0. +no aaa root -username admin privilege 15 role network-admin secret 5 $1$nT3t1LkI$1f.SG5YaRo6h4LlhIKgTK. -username vagrant privilege 15 role network-admin secret 5 $1$589CDTZ0$9S4LGAiCpxHCOC17jECxt1 +username admin privilege 15 role network-admin secret 5 $1$RT/92Zg9$J8wD1qPAdQBcOhv4fefyt. +username vagrant privilege 15 role network-admin secret 5 $1$Lw2STh4k$bPEDVVTY2e7lf.vNlnNEO0 interface Ethernet1 interface Ethernet2 + description ble interface Management1 ip address /24 no ip routing +router bgp vrf test + neighbor remote-as 1 + neighbor maximum-routes vrf test2 + neighbor remote-as 2 + neighbor maximum-routes management api http-commands no shutdown # 2.3. Command Line Tool 11
16 We got the diff back. Now let s try a partial configuration instead. However, this time we will directly apply the configuration and we will also be passing the password directly as an argument: # cl_napalm_configure --user vagrant --password vagrant --vendor eos --strategy merge -7,6 action bash sudo /mnt/flash/initialize_ma1.sh transceiver qsfp default-mode 4x10G + +hostname NEWHOSTNAME spanning-tree mode -20,6 interface Ethernet1 interface Ethernet2 + description BLALALAL interface Management1 ip address /24 # We got the diff back in the stdout. If we try to run the command we should get an empty string: # cl_napalm_configure --user vagrant --password vagrant --vendor eos --strategy merge --optional_args # Errors are detected as well: # cl_napalm_configure --user vagrant --password vagrant --vendor eos --strategy merge --optional_args Traceback (most recent call last): File "/Users/dbarroso/.virtualenvs/test/bin/cl_napalm_configure", line 9, in <module> load_entry_point('napalm==0.50.3', 'console_scripts', 'cl_napalm_configure')() File "/Users/dbarroso/.virtualenvs/test/lib/python2.7/site-packages/napalm py2.7.egg/napalm/ args.optional_args, args.config_file, args.dry_run)) File "/Users/dbarroso/.virtualenvs/test/lib/python2.7/site-packages/napalm py2.7.egg/napalm/ return diff File "/Users/dbarroso/.virtualenvs/test/lib/python2.7/site-packages/napalm py2.7.egg/napalm/ self. raise_clean_exception(exc_type, exc_value, exc_traceback) File "/Users/dbarroso/.virtualenvs/test/lib/python2.7/site-packages/napalm py2.7.egg/napalm/ strategy_method(filename=config_file) File "/Users/dbarroso/.virtualenvs/test/lib/python2.7/site-packages/napalm py2.7.egg/napalm/ self._load_config(filename, config, False) File "/Users/dbarroso/.virtualenvs/test/lib/python2.7/site-packages/napalm py2.7.egg/napalm/ raise MergeConfigException(e.message) napalm.exceptions.mergeconfigexception: Error [1002]: CLI command 5 of 5 'descriptin BLALALAL' failed For more information, run cl_napalm_configure --help. 2.4 NetworkDriver class napalm.base.networkdriver(hostname, username, password, timeout, optional_args) This is the base class you have to inherit from when writing your own Network Driver to manage any device. You will, in addition, have to override all the methods specified on this class. Make sure you follow the guidelines for every method and that you return the correct data. Parameters 12 Chapter 2. Documentation
17 Returns hostname (str) IP or FQDN of the device you want to connect to. username (str) Username you want to use password (str) Password timeout (int) Time in seconds to wait for the device to respond. optional_args (dict) Pass additional arguments to underlying driver cli(*commands) Will execute a list of commands and return the output in a dictionary format. For example: u'show version and haiku': u'''hostname: re0.edge01.arn01 Model: mx480 Junos: 13.3R6.5 Help me, Obi-Wan I just saw Episode Two You're my only hope ''', u'show chassis fan' : u'''item Status RPM Measurement Top Rear Fan OK 3840 Spinning at i Bottom Rear Fan OK 3840 Spinning at i Top Middle Fan OK 3900 Spinning at i Bottom Middle Fan OK 3840 Spinning at i Top Front Fan OK 3810 Spinning at i Bottom Front Fan OK 3840 Spinning at i ''' close() Closes the connection to the device. commit_config() Commits the changes requested by the method load_replace_candidate or load_merge_candidate. compare_config() Returns A string showing the difference between the running configuration and the candidate configuration. The running_config is loaded automatically just before doing the comparison so there is no need for you to do it. discard_config() Discards the configuration loaded into the candidate. get_arp_table() Returns a list of dictionaries having the following set of keys: interface (string) mac (string) ip (string) age (float) For example: 2.4. NetworkDriver 13
18 [ ], 'interface' : 'MgmtEth0/RSP0/CPU0/0', 'mac' : '5c:5e:ab:da:3c:f0', 'ip' : ' ', 'age' : 'interface': 'MgmtEth0/RSP0/CPU0/0', 'mac' : '66:0e:94:96:e0:ff', 'ip' : ' ', 'age' : get_bgp_config(group=, neighbor= ) Returns a dictionary containing the BGP configuration. Can return either the whole config, either the config only for a group or neighbor. Main dictionary keys represent the group name and the values represent a dictionary having the following keys: type (str) description (str) apply_groups (str list) multihop_ttl (int) multipath (boolean) local_address (str) local_as (int) peer_as (int) import_policy (str) export_policy (str) remove_private (boolean) prefix_limit (dict) neighbors (dict) Neighbors is a dictionary of dictionaries with the following keys: description (str) import_policy (str) export_policy (str) local_address (str) local_as (int) peer_as (int) authentication_key (str) prefix_limit (dict) route_reflector (bool) 14 Chapter 2. Documentation
19 nhs (bool) The inner dictionary prefix_limit has the same structure for both layers: [FAMILY_NAME]: [FAMILY_TYPE]: limit : [LIMIT],... other options For example: 'PEERS-GROUP-NAME': 'type' : u'external', 'description' : u'here we should have a nice description', 'apply_groups' : [u'bgp-prefix-limit'], 'import_policy' : u'public-peer-in', 'export_policy' : u'public-peer-out', 'remove_private': True, 'multipath' : True, 'multihop_ttl' : 30, 'neighbors' : ' ': 'description' : 'Facebook [CDN]', 'prefix_limit' : 'inet': 'unicast': 'limit': 100, 'teardown': 'threshold' : 95, 'timeout' : 5 'peer-as' : 32934, 'route_reflector': False, 'nhs' : True, ' ': 'description' : 'Twitter [CDN]', 'prefix_limit' : 'inet': 'unicast': 'limit': 500, 'no-validate': 'IMPORT-FLOW-ROUTES' 'peer_as' : 'route_reflector': False, 'nhs' : False 2.4. NetworkDriver 15
20 get_bgp_neighbors() Returns a dictionary of dictionaries. The keys for the first dictionary will be the vrf (global if no vrf). The inner dictionary will contain the following data for each vrf: router_id peers - another dictionary of dictionaries. Outer keys are the IPs of the neighbors. The inner keys are: local_as (int) remote_as (int) remote_id - peer router id is_up (True/False) is_enabled (True/False) description (string) uptime (int in seconds) address_family (dictionary) - A dictionary of address families available for the neighbor. So far it can be i * received_prefixes (int) * accepted_prefixes (int) * sent_prefixes (int) get_bgp_neighbors_detail(neighbor_address= ) Returns a detailed view of the BGP neighbors as a dictionary of lists. The keys of the dictionary represent the AS number of the neighbors. Inner dictionaries contain the following fields: up (boolean) local_as (int) remote_as (int) local_address (unicode) local_address_configured (boolean) local_port (int) remote_address (unicode) remote_port (int) multihop (boolean) import_policy (unicode) export_policy (unicode) input_messages (int) output_messages (int) input_updates (int) output_updates (int) messages_queued_out (int) connection_state (unicode) 16 Chapter 2. Documentation
21 previous_connection_state (unicode) last_event (unicode) suppress_4byte_as (boolean) local_as_prepend (boolean) holdtime (int) configured_holdtime (int) keepalive (int) configured_keepalive (int) active_prefix_count (int) received-prefix-count (int) accepted-prefix-count (int) suppressed-prefix-count (int) advertised-prefix-count (int) flap_count (int) For example: 8121: [ 'up' : True, 'local_as' : 13335, 'remote_as' : 8121, 'local_address' : u' ', 'local_address_configured' : True, 'local_port' : 179, 'remote_address' : u' ', 'remote_port' : 58380, 'multihop' : False, 'import_policy' : u'4-ntt-transit-in', 'export_policy' : u'4-ntt-transit-out', 'input_messages' : 123, 'output_messages' : 13, 'input_updates' : 123, 'output_updates' : 5, 'messages_queued_out' : 23, 'connection_state' : u'established', 'previous_connection_state' : u'estabsync', 'last_event' : u'recvkeepalive', 'suppress_4byte_as' : False, 'local_as_prepend' : False, 'holdtime' : 90, 'configured_holdtime' : 90, 'keepalive' : 30, 'configured_keepalive' : 30, 'active_prefix_count' : , 'received_prefix_count' : , 'accepted_prefix_count' : , 'suppressed_prefix_count' : 0, 'advertise_prefix_count' : 0, 'flap_count' : NetworkDriver 17
22 ] get_environment() Returns a dictionary where: get_facts() fans is a dictionary of dictionaries where the key is the location and the values: status (boolean) - True if it s ok, false if it s broken temperature is a dictionary of dictionaries where the key is the location and the values: temperature (float) - Temperature in celsius the sensor is reporting. is_alert (boolean) - True if the temperature is above the alert threshold is_critical (boolean) - True if the temperature is above the critical threshold power is a dictionary of dictionaries where the key is the PSU id and the values: status (boolean) - True if it s ok, false if it s broken capacity (float) - Capacity in W that the power supply can support output (float) - Watts drawn by the system cpu is a dictionary of dictionaries where the key is the ID and the values %usage memory is a dictionary with: available_ram (int) - Total amount of RAM installed in the device used_ram (int) - RAM in use in the device Returns a dictionary containing the following information: For example: uptime - Uptime of the device in seconds. vendor - Manufacturer of the device. model - Device model. hostname - Hostname of the device fqdn - Fqdn of the device os_version - String with the OS version running on the device. serial_number - Serial number of the device interface_list - List of the interfaces of the device 'uptime': , 'vendor': u'arista', 'os_version': u' gaatlantarel', 'serial_number': u'sn0123a34as', 'model': u'veos', 'hostname': u'eos-router', 'fqdn': u'eos-router', 18 Chapter 2. Documentation
23 'interface_list': [u'ethernet2', u'management1', u'ethernet1', u'ethernet3'] get_interfaces() Returns a dictionary of dictionaries. The keys for the first dictionary will be the interfaces in the devices. The inner For example: is_up (True/False) is_enabled (True/False) description (string) last_flapped (int in seconds) speed (int in Mbit) mac_address (string) u'management1': 'is_up': False, 'is_enabled': False, 'description': u'', 'last_flapped': -1, 'speed': 1000, 'mac_address': u'dead:beef:dead',, u'ethernet1': 'is_up': True, 'is_enabled': True, 'description': u'foo', 'last_flapped': , 'speed': 1000, 'mac_address': u'beef:dead:beef',, u'ethernet2': 'is_up': True, 'is_enabled': True, 'description': u'bla', 'last_flapped': , 'speed': 1000, 'mac_address': u'beef:beef:beef',, u'ethernet3': 'is_up': False, 'is_enabled': True, 'description': u'bar', 'last_flapped': -1, 'speed': 1000, 'mac_address': u'dead:dead:dead', 2.4. NetworkDriver 19
24 get_interfaces_counters() Returns a dictionary of dictionaries where the first key is an interface name and the inner dictionary contains the following keys: tx_errors (int) rx_errors (int) tx_discards (int) rx_discards (int) tx_octets (int) rx_octets (int) tx_unicast_packets (int) rx_unicast_packets (int) tx_multicast_packets (int) rx_multicast_packets (int) tx_broadcast_packets (int) rx_broadcast_packets (int) Example: u'ethernet2': 'tx_multicast_packets': 699, 'tx_discards': 0, 'tx_octets': 88577, 'tx_errors': 0, 'rx_octets': 0, 'tx_unicast_packets': 0, 'rx_errors': 0, 'tx_broadcast_packets': 0, 'rx_multicast_packets': 0, 'rx_broadcast_packets': 0, 'rx_discards': 0, 'rx_unicast_packets': 0, u'management1': 'tx_multicast_packets': 0, 'tx_discards': 0, 'tx_octets': , 'tx_errors': 0, 'rx_octets': , 'tx_unicast_packets': 1241, 'rx_errors': 0, 'tx_broadcast_packets': 0, 'rx_multicast_packets': 0, 'rx_broadcast_packets': 80, 'rx_discards': 0, 'rx_unicast_packets': 0, u'ethernet1': 'tx_multicast_packets': 293, 'tx_discards': 0, 'tx_octets': 38639, 20 Chapter 2. Documentation
25 'tx_errors': 0, 'rx_octets': 0, 'tx_unicast_packets': 0, 'rx_errors': 0, 'tx_broadcast_packets': 0, 'rx_multicast_packets': 0, 'rx_broadcast_packets': 0, 'rx_discards': 0, 'rx_unicast_packets': 0 get_lldp_neighbors() Returns a dictionary where the keys are local ports and the value is a list of dictionaries with the following informati hostname port For example: u'ethernet2': [ 'hostname': u'junos-unittest', 'port': u'520', ], u'ethernet3': [ 'hostname': u'junos-unittest', 'port': u'522', ], u'ethernet1': [ 'hostname': u'junos-unittest', 'port': u'519',, 'hostname': u'ios-xrv-unittest', 'port': u'gi0/0/0/0', ], u'management1': [ 'hostname': u'junos-unittest', 'port': u'508', ] get_lldp_neighbors_detail(interface= ) Returns a detailed view of the LLDP neighbors as a dictionary containing lists of dictionaries for each 2.4. NetworkDriver 21
26 interface. Inner dictionaries contain fields: parent_interface (string) interface_description (string) remote_port (string) remote_port_description (string) remote_chassis_id (string) remote_system_name (string) remote_system_description (string) remote_system_capab (string) remote_system_enabled_capab (string) For example: 'TenGigE0/0/0/8': [ 'parent_interface': u'bundle-ether8', 'interface_description': u'tengige0/0/0/8', 'remote_chassis_id': u'8c60.4f69.e96c', 'remote_system_name': u'switch', 'remote_port': u'eth2/2/1', 'remote_port_description': u'ethernet2/2/1', 'remote_system_description': u'''cisco Nexus Operating System (NX-OS) Software 7 TAC support: Copyright (c) , Cisco Systems, Inc. All rights reserved.''', 'remote_system_capab': u'b, R', 'remote_system_enable_capab': u'b' ] load_merge_candidate(filename=none, config=none) Populates the candidate configuration. You can populate it from a file or from a string. If you send both a filename and a string containing the configuration, the file takes precedence. If you use this method the existing configuration will be merged with the candidate configuration once you commit the changes. This method will not change the configuration by itself. Parameters filename Path to the file containing the desired configuration. By default is None. config String containing the desired configuration. Raises MergeConfigException If there is an error on the configuration sent. load_replace_candidate(filename=none, config=none) Populates the candidate configuration. You can populate it from a file or from a string. If you send both a filename and a string containing the configuration, the file takes precedence. If you use this method the existing configuration will be replaced entirely by the candidate configuration once you commit the changes. This method will not change the configuration by itself. Parameters 22 Chapter 2. Documentation
27 filename Path to the file containing the desired configuration. By default is None. config String containing the desired configuration. Raises ReplaceConfigException If there is an error on the configuration sent. open() Opens a connection to the device. rollback() If changes were made, revert changes to the original state NetworkDriver 23
28 24 Chapter 2. Documentation
29 Index C cli() (napalm.base.networkdriver method), 13 close() (napalm.base.networkdriver method), 13 commit_config() (napalm.base.networkdriver method), 13 compare_config() (napalm.base.networkdriver method), 13 D discard_config() (napalm.base.networkdriver method), 13 G get_arp_table() (napalm.base.networkdriver method), 13 get_bgp_config() (napalm.base.networkdriver method), 14 get_bgp_neighbors() (napalm.base.networkdriver method), 15 get_bgp_neighbors_detail() (napalm.base.networkdriver method), 16 get_environment() (napalm.base.networkdriver method), 18 get_facts() (napalm.base.networkdriver method), 18 get_interfaces() (napalm.base.networkdriver method), 19 get_interfaces_counters() (napalm.base.networkdriver method), 19 get_lldp_neighbors() (napalm.base.networkdriver method), 21 get_lldp_neighbors_detail() (napalm.base.networkdriver method), 21 L load_merge_candidate() method), 22 load_replace_candidate() method), 22 N NetworkDriver (class in napalm.base), 12 (napalm.base.networkdriver (napalm.base.networkdriver O open() (napalm.base.networkdriver method), 23 R rollback() (napalm.base.networkdriver method), 23 25
NAPALM Documentation. Release 1. David Barroso
NAPALM Documentation Release 1 David Barroso November 03, 2015 Contents 1 Supported Network Operating Systems 3 2 Documentation 5 2.1 Tutorials................................................. 5 2.2 Supported
More informationNAPALM Documentation. Release 1. David Barroso
NAPALM Documentation Release 1 David Barroso Aug 26, 2017 Contents 1 Supported Network Operating Systems: 3 2 Documentation 5 2.1 Installation................................................ 5 2.2 Tutorials.................................................
More informationNETWORK AUTOMATION TUTORIAL. David Barroso
NETWORK AUTOMATION TUTORIAL David Barroso HOW TO NAVIGATE THIS TUTORIAL? Press left and right to change sections. Press up and down to move within sections. Press? anytime for
More informationDell EMC Networking Napalm Integration Documentation
Dell EMC Networking Napalm Integration Documentation Release 1.0 Dell EMC Networking Team Sep 07, 2018 Table of Contents 1 Introduction 1 1.1 NAPALM................................................. 1
More informationConfiguring User Accounts and RBAC
This chapter describes how to configure user accounts and role-based access control (RBAC) on Cisco NX-OS devices. This chapter includes the following sections: Finding Feature Information, page 1 Information
More informationThis chapter describes how to configure the Configure Replace feature.
This chapter describes how to configure the feature. Finding Feature Information, page 1 Information About, page 1 Configuring the, page 2 Workflow for operation, page 3 Verifying the Operation, page 4
More informationConfiguring the MAC Address Table
CHAPTER 2 For information about creating interfaces, see the document, Cisco Nexus 1000V Interface Configuration Guide, Release 4.0(4)SV1(3). This chapter includes the following topics: Information About
More informationntc-docs Documentation
ntc-docs Documentation Release 1.0 ntc Oct 25, 2017 Contents 1 Introduction 3 2 Module Index 5 3 About Page 51 4 Frequently Asked Questions 53 i ii Contents: Hello and welcome to the docs!!!!! Contents
More informationNEW TOOLS. ngage vaping. MATT GRISWOLD
NEW TOOLS ngage vaping MATT GRISWOLD grizz@20c.com WHAT IS NGAGE? Command line tool to interface with network devices, evolved from internal tools. https://github.com/20c/ngage http://ngage.readthedocs.io/en/latest/
More informationConfiguring TACACS+ Information About TACACS+ Send document comments to CHAPTER
4 CHAPTER This chapter describes how to configure the Terminal Access Controller Access Control System Plus (TACACS+) protocol on NX-OS devices. This chapter includes the following sections: Information
More informationJunos Reference Guide. JUNOsReference. 1 P a g e
JUNOs 1 P a g e Contents Help commands... 4 Rescue Configuration... 4... 4 Show commands... 4 Rollback... 4 Default Behavior... 4... 4... 4 Password Recovery... 5 Procedure... 5 Initial Configuration...
More informationConfiguring Advanced BGP
CHAPTER 6 This chapter describes how to configure advanced features of the Border Gateway Protocol (BGP) on the Cisco NX-OS switch. This chapter includes the following sections: Information About Advanced
More informationUpgrading or Downgrading the Cisco Nexus 3500 Series NX-OS Software
Upgrading or Downgrading the Cisco Nexus 3500 Series NX-OS Software This chapter describes how to upgrade or downgrade the Cisco NX-OS software. It contains the following sections: About the Software Image,
More informationIXP Automation. Amsterdam, September Nick Hilliard. Chief Technical Officer Internet Neutral Exchange Association Company Limited by Guarantee
1 IXP Automation Amsterdam, September 2017 Nick Hilliard Chief Technical Officer Internet Neutral Exchange Association Company Limited by Guarantee Background Original purpose of IXP Manager was to support
More informationInitial Configuration and Recovery
Chapter 2 Initial Configuration and Recovery This chapter describes initial configuration and recovery tasks. Subsequent chapters provide details about features introduced in this chapter. This chapter
More informationBGP Dynamic Neighbors
BGP dynamic neighbor support allows BGP peering to a group of remote neighbors that are defined by a range of IP addresses. Each range can be configured as a subnet IP address. BGP dynamic neighbors are
More informationUsing the Cisco NX-OS Setup Utility
This chapter contains the following sections: Configuring the Switch, page 1 Configuring the Switch Image Files on the Switch The Cisco Nexus devices have the following images: BIOS and loader images combined
More informationConfiguring TACACS+ Finding Feature Information. Prerequisites for TACACS+
Finding Feature Information, page 1 Prerequisites for TACACS+, page 1 Information About TACACS+, page 3 How to Configure TACACS+, page 7 Monitoring TACACS+, page 16 Finding Feature Information Your software
More informationConfiguring Port Channels
CHAPTER 5 This chapter describes how to configure port channels and to apply and configure the Link Aggregation Control Protocol (LACP) for more efficient use of port channels in Cisco DCNM. For more information
More informationUsing the Cisco NX-OS Setup Utility
This chapter contains the following sections: Configuring the Switch, page 1 Configuring the Switch Image Files on the Switch The Cisco Nexus devices have the following images: BIOS and loader images combined
More informationCisco HWIC-4ESW and HWIC-D-9ESW EtherSwitch Interface Cards
Cisco HWIC-4ESW and HWIC-D-9ESW EtherSwitch Interface Cards This document provides configuration tasks for the 4-port Cisco HWIC-4ESW and the 9-port Cisco HWIC-D-9ESW EtherSwitch high-speed WAN interface
More informationConfiguring TACACS+ About TACACS+
This chapter describes how to configure the Terminal Access Controller Access Control System Plus (TACACS+) protocol on Cisco NX-OS devices. This chapter includes the following sections: About TACACS+,
More informationPayload Types At Different OSI Layers: Layer 2 - Frame Layer 3 - Packet Layer 4 - Datagram
Payload Types At Different OSI Layers: Layer 2 - Frame Layer 3 - Packet Layer 4 - Datagram Default Cisco Terminal Options: 9600 bits/second No hardware flow control 8-bit ASCII No parity 1 stop bit Setting
More informationTransferring Files Using HTTP or HTTPS
Cisco IOS Release 12.4 provides the ability to transfer files between your Cisco IOS software-based device and a remote HTTP server using the HTTP or HTTP Secure (HTTPS) protocol. HTTP and HTTPS can now
More informationWorking with Configuration Files
This chapter contains the following sections: Finding Feature Information, page 1 Information About Configuration Files, page 1 Licensing Requirements for Configuration Files, page 2 Managing Configuration
More informationConfiguring Web-Based Authentication
This chapter describes how to configure web-based authentication on the switch. It contains these sections: Finding Feature Information, page 1 Web-Based Authentication Overview, page 1 How to Configure
More informationConfiguring Port Channels
This chapter contains the following sections: Information About Port Channels, page 1, page 11 Verifying Port Channel Configuration, page 19 Triggering the Port Channel Membership Consistency Checker,
More informationConfiguring User Accounts and RBAC
7 CHAPTER This chapter describes how to configure user accounts and role-based access control (RBAC) on NX-OS devices. This chapter includes the following sections: Information About User Accounts and
More informationExporting and Importing a Virtual Service Blade
This chapter contains the following sections: Information About, page 1 Guidelines and Limitations for, page 1 Exporting a Virtual Service Blade, page 2 Importing a Virtual Service Blade, page 5 Verifying
More informationNetconf for Peering Automation. NANOG 64 San Francisco Tom Paseka
Netconf for Peering Automation NANOG 64 San Francisco Tom Paseka Old Ways Old Ways Manual input Very time consuming / manpower heavy Prone to human error: Typo Invalid and inconsistent input Route leaks
More informationConfiguring Layer 3 Interfaces
This chapter contains the following sections: Information About Layer 3 Interfaces, page 1 Licensing Requirements for Layer 3 Interfaces, page 4 Guidelines and Limitations for Layer 3 Interfaces, page
More informationConfiguration Management Commands
Configuration Management Commands This module describes the Cisco IOS XR commands used to manage your basic configuration. For detailed information about configuration management concepts, tasks, and examples,
More informationMiPDF.COM. 3. Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment?
CCNA1 v6.0 Chapter 2 Exam Answers 2017 (100%) MiPDF.COM 1. What is the function of the kernel of an operating software? It provides a user interface that allows users to request a specific task. The kernel
More informationConfiguring Authentication, Authorization, and Accounting
Configuring Authentication, Authorization, and Accounting This chapter contains the following sections: Information About AAA, page 1 Prerequisites for Remote AAA, page 5 Guidelines and Limitations for
More informationConfiguring Web-Based Authentication
This chapter describes how to configure web-based authentication on the switch. It contains these sections: Finding Feature Information, page 1 Web-Based Authentication Overview, page 1 How to Configure
More informationOverview of the Cisco NCS Command-Line Interface
CHAPTER 1 Overview of the Cisco NCS -Line Interface This chapter provides an overview of how to access the Cisco Prime Network Control System (NCS) command-line interface (CLI), the different command modes,
More informationDell EMC Networking Saltstack Integration Documentation
Dell EMC Networking Saltstack Integration Documentation Release 1.0 Dell EMC Networking Team Sep 07, 2018 Table of Contents 1 Introduction 1 1.1 Salt....................................................
More informationConfiguration Replace and Configuration Rollback
Configuration Replace and Configuration Rollback Prerequisites for Configuration Replace and Configuration Rollback, page 1 Restrictions for Configuration Replace and Configuration Rollback, page 2 Information
More informationConfiguring MAC Address Tables
This chapter contains the following sections: Information About MAC Addresses, page 1 Guidelines for Configuring the MAC Address Tables, page 2 MAC Address Movement, page 2 Configuring MAC Addresses, page
More informationwhen interoperating with a Cisco Layer 3 Switch Situation: VLAN 1 shutdown, no IP on default VLAN on Cisco switch
CONFIGURING VLANS ON MNS-6K AND MNS-6K-SECURE when interoperating with a Cisco Layer 3 Switch Situation: VLAN 1 shutdown, no IP on default VLAN on Cisco switch A Technical Brief from GarrettCom, Inc.,
More informationMy network deploys. How about yours? EOS APIs. Andrei Dvornic
My network deploys itself How about yours? EOS APIs Andrei Dvornic andrei@arista.com 1 EOS fundamentals Standard Linux kernel Unique multi-process state sharing architecture that separates networking state
More informationConfiguration Management Commands on the Cisco IOS XR Software
Configuration Management Commands on the Cisco IOS XR Software This module describes the Cisco IOS XR commands used to manage your basic configuration. For detailed information about configuration management
More informationFCoE Configuration Between VIC Adapter on UCS Rack Server and Nexus 5500 Switch
FCoE Configuration Between VIC Adapter on UCS Rack Server and Nexus 5500 Switch Document ID: 117280 Contributed by Padmanabhan, Cisco TAC Engineer. Mar 25, 2014 Contents Introduction Prerequisites Requirements
More informationConfiguring LDAP. Finding Feature Information
This chapter describes how to configure the Lightweight Directory Access Protocol (LDAP) on Cisco NX-OS devices. This chapter includes the following sections: Finding Feature Information, page 1 Information
More informationChapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM
Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM Topology Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet Interfaces. 2016 Cisco and/or its affiliates. All
More informationCisco HWIC-4ESW and HWIC-D-9ESW EtherSwitch Interface Cards
Cisco HWIC-4ESW and HWIC-D-9ESW EtherSwitch Interface Cards First Published: May 17, 2005 Last Updated: July 28, 2010 This document provides configuration tasks for the 4-port Cisco HWIC-4ESW and the 9-port
More informationConfiguring Static Routing
This chapter contains the following sections: Finding Feature Information, page 1 Information About Static Routing, page 1 Licensing Requirements for Static Routing, page 4 Prerequisites for Static Routing,
More informationConfiguring IGMP Snooping
This chapter describes how to configure Internet Group Management Protocol (IGMP) snooping on a Cisco NX-OS device. About IGMP Snooping, page 1 Licensing Requirements for IGMP Snooping, page 4 Prerequisites
More informationConfiguring Policy-Based Routing
This chapter contains the following sections: Finding Feature Information, page 1 Information About Policy Based Routing, page 1 Licensing Requirements for Policy-Based Routing, page 5 Prerequisites for
More informationInitial Setup. Cisco APIC Documentation Roadmap. This chapter contains the following sections:
This chapter contains the following sections: Cisco APIC Documentation Roadmap, page 1 Simplified Approach to Configuring in Cisco APIC, page 2 Changing the BIOS Default Password, page 2 About the APIC,
More informationipxe Finding Feature Information Information About ipxe
is an enhanced version of the Pre-boot execution Environment (PXE), which is an open standard for network booting. This module describes the feature and how to configure it. Finding Feature Information,
More informationCCNA 1 Chapter 2 v5.0 Exam Answers %
CCNA 1 Chapter 2 v5.0 Exam Answers 2015 100% 1. Which two features are characteristics of flash memory? (Choose two.) Flash provides nonvolatile storage. Flash receives a copy of the IOS from RAM when
More informationConfiguring VLANs. Finding Feature Information. Prerequisites for VLANs
Finding Feature Information, page 1 Prerequisites for VLANs, page 1 Restrictions for VLANs, page 2 Information About VLANs, page 2 How to Configure VLANs, page 7 Monitoring VLANs, page 19 Where to Go Next,
More informationConfiguring Layer 3 Interfaces
This chapter contains the following sections: Information About Layer 3 Interfaces, page 1 Licensing Requirements for Layer 3 Interfaces, page 4 Guidelines and Limitations for Layer 3 Interfaces, page
More informationConfiguring PTP. Information About PTP. This chapter contains the following sections:
This chapter contains the following sections: Information About PTP Information About PTP, on page 1 PTP Device Types, on page 2 PTP Process, on page 3 High Availability for PTP, on page 3 Licensing Requirements
More informationCisco Nexus 1000V for KVM Security Configuration Guide, Release 5.x
Cisco Nexus 1000V for KVM Security Configuration Guide, Release 5.x First Published: August 01, 2014 Last Modified: November 13, 2015 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San
More informationConfiguring VLANs. Finding Feature Information. Prerequisites for VLANs
Finding Feature Information, page 1 Prerequisites for VLANs, page 1 Restrictions for VLANs, page 2 Information About VLANs, page 2 How to Configure VLANs, page 8 Monitoring VLANs, page 22 Where to Go Next,
More informationConfiguring Port Channels
CHAPTER 5 This chapter describes how to configure port channels and to apply and configure the Link Aggregation Control Protocol (LACP) for more efficient use of port channels using Cisco Data Center Network
More informationLab 1. CLI Navigation. Scenario. Initial Configuration for R1
Lab 1 CLI Navigation This lab covers the most basic skills for accessing and using the command-line interface (CLI) on a Cisco router or switch. Many of the small, picky details of how the CLI works cannot
More informationConfiguring Switch-Based Authentication
CHAPTER 7 This chapter describes how to configure switch-based authentication on the switch. Unless otherwise noted, the term switch refers to a standalone switch and to a switch stack. This chapter consists
More informationWith 802.1X port-based authentication, the devices in the network have specific roles.
This chapter contains the following sections: Information About 802.1X, page 1 Licensing Requirements for 802.1X, page 8 Prerequisites for 802.1X, page 8 802.1X Guidelines and Limitations, page 9 Default
More informationConfiguring Virtual Port Channels
This chapter contains the following sections: Information About vpcs vpc Overview Information About vpcs, on page 1 Guidelines and Limitations for vpcs, on page 11 Verifying the vpc Configuration, on page
More informationGetting Started. Getting Started with Your Platform Model. Factory Default Configurations CHAPTER
CHAPTER 2 This chapter describes how to access the command-line interface, configure the firewall mode, and work with the configuration. This chapter includes the following sections: with Your Platform
More informationNo Service Password-Recovery
No Service Password-Recovery Last Updated: January 18, 2012 The No Service Password-Recovery feature is a security enhancement that prevents anyone with console access from accessing the router configuration
More informationVSB Backup and Recovery
CHAPTER 6 This chapter describes how to backup and recover a VSB, and includes the following sections: Information About, page 6-1 Guidelines and Limitations, page 6-1 Configuring VSB Backup and Restoration,
More informationConfiguring 802.1X. Finding Feature Information. Information About 802.1X
This chapter describes how to configure IEEE 802.1X port-based authentication on Cisco NX-OS devices. This chapter includes the following sections: Finding Feature Information, on page 1 Information About
More informationWith 802.1X port-based authentication, the devices in the network have specific roles.
This chapter contains the following sections: Information About 802.1X, page 1 Licensing Requirements for 802.1X, page 9 Prerequisites for 802.1X, page 9 802.1X Guidelines and Limitations, page 9 Default
More informationLab 7 Configuring Basic Router Settings with IOS CLI
Lab 7 Configuring Basic Router Settings with IOS CLI Objectives Part 1: Set Up the Topology and Initialize Devices Cable equipment to match the network topology. Initialize and restart the router and switch.
More informationManaging the Unicast RIB and FIB, on page 5
This chapter describes how to manage routes in the unicast Routing Information Base (RIB) and the Forwarding Information Base (FIB) on the Cisco NX-OS device. Finding Feature Information, on page 1 Information
More informationSend document comments to
CHAPTER 8 This chapter describes how to configure Telnet and includes the following topics: Information About the Telnet Server, page 8-1 Prerequisites for Telnet, page 8-1 Guidelines and Limitations,
More informationSwitches running the LAN Base feature set support only static routing on SVIs.
Finding Feature Information, on page 1 Prerequisites for VLANs, on page 1 Restrictions for VLANs, on page 2 Information About VLANs, on page 2 How to Configure VLANs, on page 6 Monitoring VLANs, on page
More informationManaging the Unicast RIB and FIB, page 5
This chapter describes how to manage routes in the unicast Routing Information Base (RIB) and the Forwarding Information Base (FIB) on the Cisco NX-OS device. Finding Feature Information, page 1 Information
More informationOpen Agent Container (OAC)
, page 1 This chapter explains the (OAC) environment and its installation in the following Cisco Nexus Switches: Cisco Nexus 5600 Switches Cisco Nexus 6000 Switches OAC is a 32-bit CentOS 6.7-based container
More informationC H A P T E R Commands Cisco SFS Product Family Command Reference OL
CHAPTER 3 This chapter documents the following commands: aaa accounting, page 3-8 aaa authorization, page 3-9 action, page 3-11 addr-option, page 3-12 authentication, page 3-14 auto-negotiate (Ethernet
More informationBGP Origin AS Validation
The feature helps prevent network administrators from inadvertently advertising routes to networks they do not control. This feature uses a Resource Public Key Infrastructure (RPKI) server to authenticate
More informationChapter 4. Network Security. Part II
Chapter 4 Network Security Part II CCNA4-1 Chapter 4-2 Introducing Network Security Securing Cisco Routers CCNA4-2 Chapter 4-2 Router Security Issues The Role of Routers in Network Security: Router security
More informationLab Using the CLI to Gather Network Device Information Topology
Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.1.1 255.255.255.0 N/A Lo0 209.165.200.225 255.255.255.224 N/A S1 VLAN 1 192.168.1.11 255.255.255.0
More informationConfiguring Call Home
The Call Home feature provides e-mail-based and web-based notification of critical system events. A versatile range of message formats are available for optimal compatibility with pager services, standard
More informationDHCP Server RADIUS Proxy
The Dynamic Host Configuration Protocol (DHCP) Server RADIUS Proxy is a RADIUS-based address assignment mechanism in which a DHCP server authorizes remote clients and allocates addresses based on replies
More informationManaging GSS User Accounts Through a TACACS+ Server
CHAPTER 4 Managing GSS User Accounts Through a TACACS+ Server This chapter describes how to configure the GSS, primary GSSM, or standby GSSM as a client of a Terminal Access Controller Access Control System
More informationConfiguring Virtual Port Channels
This chapter contains the following sections: Information About vpcs, page 1 Guidelines and Limitations for vpcs, page 10 Verifying the vpc Configuration, page 11 vpc Default Settings, page 16 Configuring
More informationConfiguring VM-FEX. Information About VM-FEX. VM-FEX Overview. VM-FEX Components. This chapter contains the following sections:
This chapter contains the following sections: Information About VM-FEX, page 1 Licensing Requirements for VM-FEX, page 3 Default Settings for VM-FEX, page 3, page 4 Verifying the VM-FEX Configuration,
More informationPrerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+)
Finding Feature Information, page 1 Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+), page 1 Information About TACACS+, page 3 How to Configure
More informationChapter 3 Command List
Chapter 3 Command List This chapter lists all the commands in the CLI. The commands are listed in two ways: All commands are listed together in a single alphabetic list. See Complete Command List on page
More informationConfiguring Hybrid REAP
13 CHAPTER This chapter describes hybrid REAP and explains how to configure this feature on controllers and access points. It contains the following sections: Information About Hybrid REAP, page 13-1,
More informationLenovo NE1032 and NE1032T Switch
Lenovo NE1032 and NE1032T Switch Quickstart Guide Document Version 1.0: 10/2018 Scale Computing 2018 1 Table of Contents Introduction 3 Requirements 3 Connect to the Switch 4 Over the Network 4 Console
More informationCCNA 1 Chapter 2 v5.0 Exam Answers 2013
CCNA 1 Chapter 2 v5.0 Exam Answers 2013 1. Refer to the exhibit. A switch was configured as shown. A ping to the default gateway was issued, but the ping was not successful. Other switches in the same
More informationVXLAN EVPN Fabric and automation using Ansible
VXLAN EVPN Fabric and automation using Ansible Faisal Chaudhry, Principal Architect Umair Arshad, Sr Network Consulting Engineer Lei Tian, Solution Architecture Cisco Spark How Questions? Use Cisco Spark
More informationDell EMC Networking Puppet Integration Documentation
Dell EMC Networking Puppet Integration Documentation Release 0.1 Dell EMC Networking Jul 07, 2018 Contents: 1 Introduction 1 1.1 Puppet.................................................. 1 1.2 Dell EMC
More informationConfiguring Interface Characteristics
Finding Feature Information, page 1 Information About, page 1 How to Configure Interface Characteristics, page 11 Monitoring Interface Characteristics, page 28 Configuration Examples for Interface Characteristics,
More informationAdvanced IPv6 Training Course. Lab Manual. v1.3 Page 1
Advanced IPv6 Training Course Lab Manual v1.3 Page 1 Network Diagram AS66 AS99 10.X.0.1/30 2001:ffXX:0:01::a/127 E0/0 R 1 E1/0 172.X.255.1 2001:ffXX::1/128 172.16.0.X/24 2001:ff69::X/64 E0/1 10.X.0.5/30
More informationChapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM
Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM Topology Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet interfaces. 2015 Cisco and/or its affiliates. All rights
More informationDHCPv6Relay LightweightDHCPv6RelayAgent
DHCPv6Relay LightweightDHCPv6RelayAgent The DHCPv6 Relay Lightweight DHCPv6 Relay Agent feature allows relay agent information to be inserted by an access node that performs a link-layer bridging (non-routing)
More informationConfigure Multipoint Layer 2 Services
This module provides the conceptual and configuration information for Multipoint Layer 2 Bridging Services, also called Virtual Private LAN Services (VPLS). Note VPLS supports Layer 2 VPN technology and
More informationPerforming Software Maintenance Upgrades
This chapter describes how to perform software maintenance upgrades (SMUs) on Cisco NX-OS devices. This chapter includes the following sections: About SMUs, page 1 Prerequisites for SMUs, page 3 Guidelines
More informationConfiguring Virtual Port Channels
This chapter contains the following sections: Information About vpcs, page 1 Guidelines and Limitations for vpcs, page 10 Configuring vpcs, page 11 Verifying the vpc Configuration, page 25 vpc Default
More informationConfiguring the DHCP Server On-Demand Address Pool Manager
Configuring the DHCP Server On-Demand Address Pool Manager The Cisco IOS XE DHCP server on-demand address pool (ODAP) manager is used to centralize the management of large pools of addresses and simplify
More informationThe NX-API CLI also supports JSON/CLI Execution in Cisco Nexus 3500 Series devices.
About, page 1 Using, page 2 XML and JSON Supported Commands, page 9 About On Cisco Nexus devices, command-line interfaces (CLIs) are run only on the device. improves the accessibility of these CLIs by
More informationpyhpncw7 Documentation
pyhpncw7 Documentation Release Author November 18, 2015 Contents 1 Introduction 1 1.1 Step 1 - Create HPCOM7 object for each HP switch being managed.................. 1 1.2 Step 2 - Open a Connection
More informationBGP AS-Override Split-Horizon
The feature enables a Provider Edge (PE) device using split-horizon to avoid advertisement of routes propagated by a Customer Edge (CE) device to the same CE device. The BGP AS-Override Split-Horizon feature
More information