NAPALM Documentation. Release 1. David Barroso
|
|
- Jocelin Horton
- 6 years ago
- Views:
Transcription
1 NAPALM Documentation Release 1 David Barroso November 03, 2015
2
3 Contents 1 Supported Network Operating Systems 3 2 Documentation Tutorials Supported Devices NetworkDriver i
4 ii
5 NAPALM (Network Automation and Programmability Abstraction Layer with Multivendor support) is a Python library that implements a set of functions to interact with different network device Operating Systems using a unified API. NAPALM supports several methods to connect to the devices, to manipulate configurations or to retrieve data. Contents 1
6 2 Contents
7 CHAPTER 1 Supported Network Operating Systems eos junos iosxr fortios You can select the driver you need by doing the following: >>> from napalm import get_network_driver >>> get_network_driver('eos') <class napalm.eos.eosdriver at 0x106fc1a78> >>> get_network_driver('iosxr') <class napalm.iosxr.iosxrdriver at 0x10706c738> >>> get_network_driver('junos') <class napalm.junos.junosdriver at 0x107861bb0> >>> get_network_driver('fortios') <class napalm.fortios.fortiosdriver at 0x10bf6c1f0> Check the tutorials to see how to use the library in more detail, Suppoerted Devices will provide you with detailed support information and caveats and the NetworkDriver section explains which methods are available for you to use. 3
8 4 Chapter 1. Supported Network Operating Systems
9 CHAPTER 2 Documentation 2.1 Tutorials First Steps Manipulating Config NAPALM tries to provide a common interface and mechanisms to push configuration and retrieve state data from network devices. This method is very useful in combination with tools like Ansible, which in turn allows you to manage a set of devices independent of their network OS. Connecting to the Device Use the appropriate network driver to connect to the device: >>> from napalm import get_network_driver >>> driver = get_network_driver('eos') >>> device = driver(' ', 'dbarroso', 'this_is_not_a_secure_password') >>> device.open() Configurations can be replaced entirely or merged into the existing device config. You can load configuration either from a string or from a file. Replacing the Configuration To replace the configuration do the following: >>> device.load_replace_candidate(filename='test/unit/eos/new_good.conf') Note that the changes have not been applied yet. Before applying the configuration you can check the changes: >>> print device.compare_config() + hostname pyeos-unittest-changed - hostname pyeos-unittest router bgp vrf test + neighbor maximum-routes neighbor remote-as 1 - neighbor remote-as 1 - neighbor maximum-routes vrf test2 + neighbor remote-as 2 5
10 + neighbor maximum-routes neighbor remote-as 2 - neighbor maximum-routes interface Ethernet2 + description ble - description bla If you are happy with the changes you can commit them: >>> device.commit_config() On the contrary, if you don t want the changes you can discard them: >>> device.discard_config() Merging Configuration Merging configuration is similar, but you need to load the configuration with the merge method: >>> device.load_merge_candidate(config='hostname test\ninterface Ethernet2\ndescription bla') >>> print device.compare_config() configure hostname test interface Ethernet2 description bla end If you are happy with the changes you can commit them: >>> device.commit_config() On the contrary, if you don t want the changes you can discard them: >>> device.discard_config() Rollback Changes If for some reason you committed the changes and you want to rollback: >>> device.rollback() 2.2 Supported Devices General support matrix _ EOS JunOS IOS-XR FortiOS IBM Driver Name eos junos iosxr fortios ibm Structured data Yes Yes No No Yes Minimum version F ??? Backend library pyeapi junos-eznc pyiosxr pyfg bnclient Caveats EOS FortiOS IBM Networking Operating System Warning: Please, make sure you understand the caveats for your particular platforms before using the library. 6 Chapter 2. Documentation
11 2.2.2 Configuration support matrix _ EOS JunOSIOS-XR FortiOS IBM Config. Yes Yes Yes Yes Yes 1 replace Config. Yes Yes Yes Yes Yes merge Compare Yes Yes Yes 2 Yes 1 Yes 1 config Atomic Yes Yes Yes No 3 No 2 Changes Rollback Yes 2 Yes Yes Yes Yes 2 Warning: Before building a workflow to deploy configuration it is important you understand what the table above means; what are atomic changes and which devices support it, what does replacing or merging configuration mean, etc. The key to success is to test your workflow and to try to break things on a lab first Getters support matrix _ EOS JunOS IOS-XR FortiOS IBM get_facts get_interfaces get_lldp_neighbors Caveats EOS Minimum Version To be able to support the compare_config method you will require to run at least EOS version F. Rollback The rollback feature is supported only when committing from the API. In reality, what the API does during the commit operation is as follows: copy startup-config flash:rollback-0 And the rollback does: configure replace flash:rollback-0 This means that the rollback will be fine as long as you only use this library. If you are going to do changes outside this API don t forget to mark your last rollback point manually. 1 Check the caveats, this is a dangerous operation in this device. 2 Hand-crafted by the API as the device doesn t support the feature. 3 Not supported but emulated. Check caveats Supported Devices 7
12 FortiOS Rollback To make sure the rollback feature works either use only this API to do changes or remember to save your rollback points on the CLI with the command: execute backup config flash your_message Atomic Changes FortiOS plugin will use the batch feature. All commands will not go at the same time but all of them will be processed. The sad true is that FortiOS doesn t have any proper tool to apply large chunks of configuration. IBM Networking Operating System Rollback Rollback is simply implemented by reading current running configuration before any load actions. Rollback function executes load replace and commit. Atomic Changes IBM plugin uses netconf to load configuration on to device. It seems that configuration is executed line by line but we can be sure that all lines will be executed. There are three options for error handling: stop-on-error, continue-on-error and rollback-on-error. Plugin uses rollback-on-error option in case of merge operation. However replace operation uses continue-on-error option. In case of typo in configuration, device will inform plugin about error but execute all the rest lines. Plugin will revert configuration using rollback function from the plugin. I do not use rollback-on-error for replace operation because in case of error device is left without any configuration. It seems like a bug. It will be investigated further. Moreover it seems that replace option wipe out whole configuration on device at the first step, so this option is good for provisioning of new device and it is not recomended for device in production. 2.3 NetworkDriver class napalm.base.networkdriver(hostname, username, password, timeout) This is the base class you have to inherit from when writing your own Network Driver to manage any device. You will, in addition, have to override all the methods specified on this class. Make sure you follow the guidelines for every method and that you return the correct data. Parameters Returns hostname (str) IP or FQDN of the device you want to connect to. username (str) Username you want to use password (str) Password timeout (int) Time in seconds to wait for the device to respond. close() Closes the connection to the device. 8 Chapter 2. Documentation
13 commit_config() Commits the changes requested by the method load_replace_candidate or load_merge_candidate. compare_config() Returns A string showing the difference between the running configuration and the candidate configuration. The running_config is loaded automatically just before doing the comparison so there is no need for you to do it. discard_config() Discards the configuration loaded into the candidate. get_facts() Returns a dictionary containing the following information: For example: uptime - Uptime of the device in seconds. vendor - Manufacturer of the device. model - Device model. hostname - Hostname of the device fqdn - Fqdn of the device os_version - String with the OS version running on the device. serial_number - Serial number of the device interface_list - List of the interfaces of the device 'uptime': , 'vendor': u'arista', 'os_version': u' gaatlantarel', 'serial_number': u'sn0123a34as', 'model': u'veos', 'hostname': u'eos-router', 'fqdn': u'eos-router', 'interface_list': [u'ethernet2', u'management1', u'ethernet1', u'ethernet3'] } get_interfaces() Returns a dictionary of dictionaries. The keys for the first dictionary will be the interfaces in the devices. The inner d is_up (True/False) is_enabled (True/False) description (string) last_flapped (int in seconds) speed (int in Mbit) mac_address (string) For example: 2.3. NetworkDriver 9
14 u'management1': 'is_up': False, 'is_enabled': False, 'description': u'', 'last_flapped': -1, 'speed': 1000, 'mac_address': u'dead:beef:dead', }, u'ethernet1': 'is_up': True, 'is_enabled': True, 'description': u'foo', 'last_flapped': , 'speed': 1000, 'mac_address': u'beef:dead:beef', }, u'ethernet2': 'is_up': True, 'is_enabled': True, 'description': u'bla', 'last_flapped': , 'speed': 1000, 'mac_address': u'beef:beef:beef', }, u'ethernet3': 'is_up': False, 'is_enabled': True, 'description': u'bar', 'last_flapped': -1, 'speed': 1000, 'mac_address': u'dead:dead:dead', } } get_lldp_neighbors() Returns a dictionary where the keys are local ports and the value is a list of dictionaries with the following informatio hostname port For example: u'ethernet2': [ 'hostname': u'junos-unittest', 'port': u'520', } ], u'ethernet3': [ 10 Chapter 2. Documentation
15 'hostname': u'junos-unittest', 'port': u'522', } ], u'ethernet1': [ 'hostname': u'junos-unittest', 'port': u'519', }, 'hostname': u'ios-xrv-unittest', 'port': u'gi0/0/0/0', } ], u'management1': [ 'hostname': u'junos-unittest', 'port': u'508', } ] } load_merge_candidate(filename=none, config=none) Populates the candidate configuration. You can populate it from a file or from a string. If you send both a filename and a string containing the configuration, the file takes precedence. If you use this method the existing configuration will be merged with the candidate configuration once you commit the changes. This method will not change the configuration by itself. Parameters filename Path to the file containing the desired configuration. By default is None. config String containing the desired configuration. Raises MergeConfigException If there is an error on the configuration sent. load_replace_candidate(filename=none, config=none) Populates the candidate configuration. You can populate it from a file or from a string. If you send both a filename and a string containing the configuration, the file takes precedence. If you use this method the existing configuration will be replaced entirely by the candidate configuration once you commit the changes. This method will not change the configuration by itself. Parameters filename Path to the file containing the desired configuration. By default is None. config String containing the desired configuration. Raises ReplaceConfigException If there is an error on the configuration sent. open() Opens a connection to the device. rollback() If changes were made, revert changes to the original state NetworkDriver 11
16 12 Chapter 2. Documentation
17 Index C close() (napalm.base.networkdriver method), 8 commit_config() (napalm.base.networkdriver method), 8 compare_config() (napalm.base.networkdriver method), 9 D discard_config() (napalm.base.networkdriver method), 9 G get_facts() (napalm.base.networkdriver method), 9 get_interfaces() (napalm.base.networkdriver method), 9 get_lldp_neighbors() (napalm.base.networkdriver method), 10 L load_merge_candidate() method), 11 load_replace_candidate() method), 11 N NetworkDriver (class in napalm.base), 8 (napalm.base.networkdriver (napalm.base.networkdriver O open() (napalm.base.networkdriver method), 11 R rollback() (napalm.base.networkdriver method), 11 13
NAPALM Documentation. Release 1. David Barroso
NAPALM Documentation Release 1 David Barroso February 21, 2016 Contents 1 Supported Network Operating Systems 3 2 Documentation 5 2.1 Tutorials................................................. 5 2.2 Supported
More informationNETWORK AUTOMATION TUTORIAL. David Barroso
NETWORK AUTOMATION TUTORIAL David Barroso HOW TO NAVIGATE THIS TUTORIAL? Press left and right to change sections. Press up and down to move within sections. Press? anytime for
More informationNAPALM Documentation. Release 1. David Barroso
NAPALM Documentation Release 1 David Barroso Aug 26, 2017 Contents 1 Supported Network Operating Systems: 3 2 Documentation 5 2.1 Installation................................................ 5 2.2 Tutorials.................................................
More informationDell EMC Networking Napalm Integration Documentation
Dell EMC Networking Napalm Integration Documentation Release 1.0 Dell EMC Networking Team Sep 07, 2018 Table of Contents 1 Introduction 1 1.1 NAPALM................................................. 1
More informationNEW TOOLS. ngage vaping. MATT GRISWOLD
NEW TOOLS ngage vaping MATT GRISWOLD grizz@20c.com WHAT IS NGAGE? Command line tool to interface with network devices, evolved from internal tools. https://github.com/20c/ngage http://ngage.readthedocs.io/en/latest/
More informationEvent Driven network automation
Event Driven network automation Openlab Technical Workshop 2018 Salvador Ferrer sferrer@extremenetworks.com January 2018 1 Agenda StackStorm event driven automation What can be automated? 2 3 StackStorm
More informationntc-docs Documentation
ntc-docs Documentation Release 1.0 ntc Oct 25, 2017 Contents 1 Introduction 3 2 Module Index 5 3 About Page 51 4 Frequently Asked Questions 53 i ii Contents: Hello and welcome to the docs!!!!! Contents
More informationIXP Automation. Amsterdam, September Nick Hilliard. Chief Technical Officer Internet Neutral Exchange Association Company Limited by Guarantee
1 IXP Automation Amsterdam, September 2017 Nick Hilliard Chief Technical Officer Internet Neutral Exchange Association Company Limited by Guarantee Background Original purpose of IXP Manager was to support
More informationConfiguring TACACS+ Finding Feature Information. Prerequisites for TACACS+
Finding Feature Information, page 1 Prerequisites for TACACS+, page 1 Information About TACACS+, page 3 How to Configure TACACS+, page 7 Monitoring TACACS+, page 16 Finding Feature Information Your software
More informationNetwork Automation. Past, present and future. NANOG 71, San Jose, CA October 2017
Network Automation Past, present and future NANOG 71, San Jose, CA October 2017 1 Agenda Kirk Byers: first steps David Barroso: vendor-agnostic automation Jeremy Stretch: NetBox IPAM Jathan McCollum: NSoT
More informationConfiguration Management Commands
Configuration Management Commands This module describes the Cisco IOS XR commands used to manage your basic configuration. For detailed information about configuration management concepts, tasks, and examples,
More informationJunos Ansible Modules Documentation
Junos Ansible Modules Documentation Release 2.1.1.dev0 Juniper Networks, Inc. Jun 08, 2018 Contents 1 juniper_junos_system 3 2 juniper_junos_srx_cluster 7 3 juniper_junos_pmtud 11 4 juniper_junos_ping
More informationConfiguring TACACS+ About TACACS+
This chapter describes how to configure the Terminal Access Controller Access Control System Plus (TACACS+) protocol on Cisco NX-OS devices. This chapter includes the following sections: About TACACS+,
More informationConfiguration Management Commands on the Cisco IOS XR Software
Configuration Management Commands on the Cisco IOS XR Software This module describes the Cisco IOS XR commands used to manage your basic configuration. For detailed information about configuration management
More informationLab 7 Configuring Basic Router Settings with IOS CLI
Lab 7 Configuring Basic Router Settings with IOS CLI Objectives Part 1: Set Up the Topology and Initialize Devices Cable equipment to match the network topology. Initialize and restart the router and switch.
More informationDell EMC Networking Saltstack Integration Documentation
Dell EMC Networking Saltstack Integration Documentation Release 1.0 Dell EMC Networking Team Sep 07, 2018 Table of Contents 1 Introduction 1 1.1 Salt....................................................
More informationTransferring Files Using HTTP or HTTPS
Cisco IOS Release 12.4 provides the ability to transfer files between your Cisco IOS software-based device and a remote HTTP server using the HTTP or HTTP Secure (HTTPS) protocol. HTTP and HTTPS can now
More informationConfiguring TACACS+ Information About TACACS+ Send document comments to CHAPTER
4 CHAPTER This chapter describes how to configure the Terminal Access Controller Access Control System Plus (TACACS+) protocol on NX-OS devices. This chapter includes the following sections: Information
More informationConfiguring Web-Based Authentication
This chapter describes how to configure web-based authentication on the switch. It contains these sections: Finding Feature Information, page 1 Web-Based Authentication Overview, page 1 How to Configure
More informationConfiguring the JUNOS Software the First Time on a Router with a Single Routing Engine
Configuring the JUNOS Software the First Time on a Router with a Single Routing Engine When you turn on a router the first time, the JUNOS Software automatically boots and starts. You must enter basic
More informationConfiguring DNS. Finding Feature Information. Information About DNS Clients. DNS Client Overview
This chapter contains the following sections: Finding Feature Information, on page 1 Information About DNS Clients, on page 1 Licensing Requirements for DNS Clients, on page 3 Prerequisites for DNS Clients,
More informationMy network deploys. How about yours? EOS APIs. Andrei Dvornic
My network deploys itself How about yours? EOS APIs Andrei Dvornic andrei@arista.com 1 EOS fundamentals Standard Linux kernel Unique multi-process state sharing architecture that separates networking state
More informationCisco Nexus 1000V for KVM Security Configuration Guide, Release 5.x
Cisco Nexus 1000V for KVM Security Configuration Guide, Release 5.x First Published: August 01, 2014 Last Modified: November 13, 2015 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San
More informationNAPALM Documentation. Release 1. David Barroso
NAPALM Documentation Release 1 David Barroso Aug 13, 2017 Contents 1 Installation 3 2 Documentation 5 Python Module Index 35 i ii YANG (RFC6020) is a data modelling language, it s a way of defining how
More informationConfiguring User Accounts and RBAC
This chapter describes how to configure user accounts and role-based access control (RBAC) on Cisco NX-OS devices. This chapter includes the following sections: Finding Feature Information, page 1 Information
More informationManagement Tools. Management Tools. About the Management GUI. About the CLI. This chapter contains the following sections:
This chapter contains the following sections:, page 1 About the Management GUI, page 1 About the CLI, page 1 User Login Menu Options, page 2 Customizing the GUI and CLI Banners, page 3 REST API, page 3
More informationLDAP Directory Integration
LDAP Server Name, Address, and Profile Configuration, page 1 with Cisco Unified Communications Manager Task List, page 1 for Contact Searches on XMPP Clients, page 6 LDAP Server Name, Address, and Profile
More informationSend document comments to
CHAPTER 8 This chapter describes how to configure Telnet and includes the following topics: Information About the Telnet Server, page 8-1 Prerequisites for Telnet, page 8-1 Guidelines and Limitations,
More informationConfiguring Dynamic ARP Inspection
Finding Feature Information, page 1 Restrictions for Dynamic ARP Inspection, page 1 Understanding Dynamic ARP Inspection, page 3 Default Dynamic ARP Inspection Configuration, page 6 Relative Priority of
More informationUCI Command Line Interface Reference
UCI Command Line Interface Reference Unified Configuration Interface (UCI ) is an API of OpenWrt which is also a utility to intend and to centralize the whole configuration of a device running on OpenWrt.
More informationPrerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+)
Finding Feature Information, page 1 Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+), page 1 Information About TACACS+, page 3 How to Configure
More informationNetwork Automation at Oracle+Dyn NANOG on the Road Boston, 14 Sept 2017
Network Automation at Oracle+Dyn NANOG on the Road Boston, 14 Sept 2017 Carlos Vicente We ve come a long way January 2014: 18 sites and a few hundred devices with configurations manually crafted for years
More informationOpen SDN Controller Applications
The following topics describe the five applications that Open SDN Controller provides to facilitate the day-to-day administration of your network: BGPLS Manager, page 1 Inventory Manager, page 3 Model
More informationHigh Availability Synchronization PAN-OS 5.0.3
High Availability Synchronization PAN-OS 5.0.3 Revision B 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Device Configuration... 4 Network Configuration... 9 Objects Configuration...
More informationMyGeotab Python SDK Documentation
MyGeotab Python SDK Documentation Release 0.8.0 Aaron Toth Dec 13, 2018 Contents 1 Features 3 2 Usage 5 3 Installation 7 4 Documentation 9 5 Changes 11 5.1 0.8.0 (2018-06-18)............................................
More informationConfiguring Web-Based Authentication
This chapter describes how to configure web-based authentication on the switch. It contains these sections: Finding Feature Information, page 1 Web-Based Authentication Overview, page 1 How to Configure
More informationWorking with Configuration Files
This chapter contains the following sections: Finding Feature Information, page 1 Information About Configuration Files, page 1 Licensing Requirements for Configuration Files, page 2 Managing Configuration
More informationcalyptos Documentation
calyptos Documentation Release 1.0.0 Eucalyptus Quality Team Nov 08, 2017 Contents 1 Contents 3 1.1 Quick Start................................................ 3 1.1.1 Pre-requisites..........................................
More informationNetconf for Peering Automation. NANOG 64 San Francisco Tom Paseka
Netconf for Peering Automation NANOG 64 San Francisco Tom Paseka Old Ways Old Ways Manual input Very time consuming / manpower heavy Prone to human error: Typo Invalid and inconsistent input Route leaks
More informationThis chapter describes how to configure the Configure Replace feature.
This chapter describes how to configure the feature. Finding Feature Information, page 1 Information About, page 1 Configuring the, page 2 Workflow for operation, page 3 Verifying the Operation, page 4
More informationConfiguring Switch-Based Authentication
CHAPTER 7 This chapter describes how to configure switch-based authentication on the switch. Unless otherwise noted, the term switch refers to a standalone switch and to a switch stack. This chapter consists
More informationETSF Routing Project WILLIAM TÄRNEBERG
ETSF10 2015 Routing Project WILLIAM TÄRNEBERG The project 19 tasks Explore two different routing protocols and observe how they deal with failures and changes in the network. First phase Getting familiar
More informationExporting and Importing a Virtual Service Blade
This chapter contains the following sections: Information About, page 1 Guidelines and Limitations for, page 1 Exporting a Virtual Service Blade, page 2 Importing a Virtual Service Blade, page 5 Verifying
More informationGetting Started. Getting Started with Your Platform Model. Factory Default Configurations CHAPTER
CHAPTER 2 This chapter describes how to access the command-line interface, configure the firewall mode, and work with the configuration. This chapter includes the following sections: with Your Platform
More informationConfiguring Call Home for Cisco Integrated Services Routers
Configuring Call Home for Cisco Integrated Services Routers First Published: November 18, 2011 Revised: April 11, 2012, The Call Home feature provides e-mail-based and web-based notification of critical
More informationConfiguring RIP with CLI
RIP Configuring RIP with CLI This section provides information to configure Routing Information Protocol (RIP) using the command line interface. Topics in this section include: RIP & RIPng Configuration
More informationConfiguring LDAP. Finding Feature Information
This chapter describes how to configure the Lightweight Directory Access Protocol (LDAP) on Cisco NX-OS devices. This chapter includes the following sections: Finding Feature Information, page 1 Information
More informationKuyruk Documentation. Release 0. Cenk Altı
Kuyruk Documentation Release 0 Cenk Altı Mar 07, 2018 Contents 1 About Kuyruk 3 2 User s Guide 5 3 API Reference 17 4 Indices and tables 21 Python Module Index 23 i ii Welcome to Kuyruk s documentation.
More informationManaging Workflows. Starting Prime Network Administration CHAPTER
CHAPTER 10 Prime Network Administration can be used to manage deployed workflow templates. Topics include: Starting Prime Network Administration, page 10-1 Viewing the List of Templates and Template Properties,
More informationJunos Platform Automation (JAUT)
Junos Platform Automation (JAUT) Course No: EDU-JUN-JAUT Length: 5 Days Schedule and Registration Course Overview This five-day course provides students with Junos platform automation knowledge through
More informationIntroduction to OpenConfig
DEVNET-1775 Introduction to OpenConfig Santiago Álvarez, TME Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile App
More informationConfiguring Call Home
The Call Home feature provides e-mail-based and web-based notification of critical system events. A versatile range of message formats are available for optimal compatibility with pager services, standard
More informationpyhpncw7 Documentation
pyhpncw7 Documentation Release Author November 18, 2015 Contents 1 Introduction 1 1.1 Step 1 - Create HPCOM7 object for each HP switch being managed.................. 1 1.2 Step 2 - Open a Connection
More informationEXTENDING FULL STACK AUTOMATION TO THE NETWORK
1 EXTENDING FULL STACK AUTOMATION TO THE NETWORK Peter Sprygada Sr. Principal Engineer June 30, 2016 2 LETS GET ORIENTED YOU ARE HERE 3 WHAT IS THE NETWORK? THE NETWORK IS A PLATFORM THAT RUNS APPLICATIONS
More informationNETCONF Interoperability Testing
NETCONF Interoperability Testing Ha Manh Tran Iyad Tumar Jürgen Schönwälder Jacobs University Bremen July 1, 2009 Ha Manh Tran, Iyad Tumar, Jürgen Schönwälder NETCONF Interoperability Testing 1 NETCONF
More informationManage Device Firmware
Device Firmware Updates Overview, page 1 Install a Device Pack or Individual Device Firmware, page 2 Remove Unused Firmware from the System, page 3 Set up Default Firmware for a Phone Model, page 3 Set
More informationLDAP Directory Integration
LDAP Server Name, Address, and Profile Configuration, on page 1 with Cisco Unified Communications Manager Task List, on page 1 for Contact Searches on XMPP Clients, on page 6 LDAP Server Name, Address,
More informationLab Using the CLI to Gather Network Device Information Topology
Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.1.1 255.255.255.0 N/A Lo0 209.165.200.225 255.255.255.224 N/A S1 VLAN 1 192.168.1.11 255.255.255.0
More informationSQLite vs. MongoDB for Big Data
SQLite vs. MongoDB for Big Data In my latest tutorial I walked readers through a Python script designed to download tweets by a set of Twitter users and insert them into an SQLite database. In this post
More informationFlexible NetFlow - MPLS Support
The feature supports the monitoring of the following MPLS-related fields: MPLS Labels 1-6 (3 bytes -- 20 bits of label, 3 bits of EXP, 1 bit of EOS). Top Label EXP i.e. the EXP field for label 1. Top Label
More informationConfiguring FlexVPN Spoke to Spoke
Last Published Date: March 28, 2014 The FlexVPN Spoke to Spoke feature enables a FlexVPN client to establish a direct crypto tunnel with another FlexVPN client leveraging virtual tunnel interfaces (VTI),
More informationMaking a Virtualized Storage System Into Storage for Virtual Platforms One Company s Journey
Making a Virtualized Storage System Into Storage for Virtual Platforms One Company s Journey Laz Vekiarides Executive Director, EqualLogic Software Engineering, Dell Storage virtualization: How we got
More informationConfiguring DHCP. Finding Feature Information. Information About DHCP. DHCP Server. DHCP Relay Agent
Finding Feature Information, on page 1 Information About DHCP, on page 1 How to Configure DHCP Features, on page 8 Server Port-Based Address Allocation, on page 17 Finding Feature Information Your software
More informationConfiguring DHCP. Finding Feature Information. Information About DHCP. DHCP Server. DHCP Relay Agent
Finding Feature Information, page 1 Information About DHCP, page 1 How to Configure DHCP Features, page 8 Server Port-Based Address Allocation, page 18 Finding Feature Information Your software release
More informationConfiguring the DHCP Server On-Demand Address Pool Manager
Configuring the DHCP Server On-Demand Address Pool Manager The Cisco IOS XE DHCP server on-demand address pool (ODAP) manager is used to centralize the management of large pools of addresses and simplify
More informationConfiguring Authentication, Authorization, and Accounting
Configuring Authentication, Authorization, and Accounting This chapter contains the following sections: Information About AAA, page 1 Prerequisites for Remote AAA, page 5 Guidelines and Limitations for
More informationConfiguring DHCP. Finding Feature Information. Information About DHCP. DHCP Server. DHCP Relay Agent
Finding Feature Information, page 1 Information About DHCP, page 1 How to Configure DHCP Features, page 8 Server Port-Based Address Allocation, page 18 Finding Feature Information Your software release
More informationI2RS RIB Route Example. Sue Hares
I2RS RIB Route Example Sue Hares I2RS RIB Example First Case 128.2/16 with nexthop 1 added by netconf config 128.2/16 with nexthop 2 added by I2RS RIB DDOS attack causes you to overwrite NETCONF config
More informationCommits and Commit Messages
Commits and Commit Messages What is a commit? Small set of modifications to a code base Each commit should contain one (atomic) change Commits should be standalone (independent of other commits) Open Source
More informationChange and Configuration Management Administration
CHAPTER 7 Change and Configuration Management Administration These topics provide administrative information on Change and Configuration Management: Configuring Global Settings for Configuration Management,
More informationNETWORK STORAGE ADAPTER USER MANUAL
NETWORK STORAGE ADAPTER USER MANUAL MODEL 522496 INT-522496-UM-0606-02 522496_man.dlrevL4C.indd 1 6/28/06 9:11:50 AM CONTENTS section page 1. Introduction... 3 2. Understanding the Network Storage Adapter...
More informationNetwork Automation: Ansible 101
Network Automation: Ansible 101 APRICOT - Feb 28th, 2017 Bronwyn Lewis and Matt Peterson Our assumptions New to the world of DevOps No prior Ansible knowledge Want to stop hand-crafting your network configs
More informationStatic routing lab KTH/CSC. Juniper version. Group Nr. Name 1. Name 2. Name 3. Name 4. Date. Grade. Instructor s Signature
KTH/CSC Static routing lab Juniper version Group Nr Name 1 Name 2 Name 3 Name 4 Date Grade Instructor s Signature Table of Contents 1 Goals...3 2 Preparation questions...3 3 Host configuration...4 4 Static
More informationUsing Cisco Unified SIP Proxy Software
Using Cisco Unified SIP Proxy Software First Published: February 6, 2009 Last Updated: June 1, 2010 This chapter provides helpful tips for understanding and configuring Cisco Unified SIP Proxy software
More informationConfiguring DHCP Features
This chapter describes how to configure DHCP snooping and option-82 data insertion on the Cisco ASR 920 Series Router. Finding Feature Information, page 1 Limitations and Restrictions, page 1 DHCP Features,
More informationCreating a Unifi Lab Network on your existing network
Creating a Unifi Lab Network on your existing network This tutorial will outline how to add a Unifi USG-3 and Unifi Switch 8 to your existing network to create a separate subnet. This tutorial assumes
More informationSoftware Revision Control for MASS. Git Installation / Configuration / Use
Software Revision Control for MASS Git Installation / Configuration / Use Matthew Sell, CSSE Student MASS Research Participant, February 2014 Overview Download / execute installer Initial configuration
More informationConfiguring User Accounts and RBAC
7 CHAPTER This chapter describes how to configure user accounts and role-based access control (RBAC) on NX-OS devices. This chapter includes the following sections: Information About User Accounts and
More informationSecure Shell Commands
This module describes the Cisco IOS XR software commands used to configure Secure Shell (SSH). For detailed information about SSH concepts, configuration tasks, and examples, see the Implementing Secure
More informationArea Command in Interface Mode for OSPFv2
This document describes how to enable Open Shortest Path First version 2 (OSPFv2) on a per-interface basis to simplify the configuration of unnumbered interfaces. The ip ospf area command allows you to
More informationCisco WAN Automation Engine (WAE) Network Programmability with Segment Routing
LTRMPL-2104 Cisco WAN Automation Engine (WAE) Network Programmability with Segment Routing Josh Peters Technical Marketing Engineer Derek Tay Technical Marketing Engineer Cisco Spark How Questions? Use
More informationLARGE SCALE IP ROUTING
Building ISP Networks Xantaro Page 1 / 18 TABLE OF CONTENTS 1. LAB ACCESS 4 1.1 Accessing the Jumphost... 4 1.2 Access to your routers... 4 1.3 Local Network Topology... 5 1.4 Global Network Topology...
More informationConfiguring DHCP Features and IP Source Guard
CHAPTER 21 This chapter describes how to configure DHCP snooping and the option-82 data insertion features on the switch. It also describes how to configure the IP source guard feature.unless otherwise
More informationConfiguring for the First Time
CHAPTER 2 This section describes the initial steps of configuring the Catalyst 4224 and outlines the features of the Cisco IOS command line interface (CLI). Use this tool when you configure Catalyst 4224
More informationFlexible NetFlow IPFIX Export Format
The feature enables sending export packets using the IPFIX export protocol. The export of extracted fields from NBAR is only supported over IPFIX. Finding Feature Information, page 1 Information About,
More informationCisco Plug and Play Feature Guide Cisco Services. Cisco Plug and Play Feature Guide Cisco and/or its affiliates.
Cisco Services TABLE OF CONTENTS Configuring Cisco Plug and Play... 14 Contents Introduction... 3 Cisco Plug and Play Components... 3 Plug-n-Play Agent... 3 Key Benefits... 4 Plug and Play Server... 4
More informationNAPALM Documentation. Release 1. David Barroso
NAPALM Documentation Release 1 David Barroso Nov 17, 2017 Contents 1 Documentation 3 Python Module Index 33 i ii YANG (RFC6020) is a data modelling language, it s a way of defining how data is supposed
More informationPython Unit Testing and CI Workflow. Tim Scott, Python Meetup 11/07/17
Python Unit Testing and CI Workflow Tim Scott, Python Meetup 11/07/17 A Little About Me Started as a CoOp Engineer (2007-2008) and Design Engineer at Adtran (2010-2014) Currently work at Abaco Systems
More informationcwmon-mysql Release 0.5.0
cwmon-mysql Release 0.5.0 October 18, 2016 Contents 1 Overview 1 1.1 Installation................................................ 1 1.2 Documentation.............................................. 1 1.3
More informationNETCONF Protocol. Restrictions for the NETCONF Protocol. Information About the NETCONF Protocol
Restrictions for the, on page 1 Information About the, on page 1 How to Configure the, on page 4 Verifying the Configuration, on page 7 Additional References for, on page 9 Feature Information for, on
More informationConfiguring FlexConnect Groups
Information About FlexConnect Groups, page 1, page 5 Configuring VLAN-ACL Mapping on FlexConnect Groups, page 10 Configuring WLAN-VLAN Mappings on FlexConnect Groups, page 11 Information About FlexConnect
More informationManage Your Device Inventory
About Device Inventory, page 1 Device Inventory and Cisco ISE Authentication, page 7 Device Inventory Tasks, page 7 Add a Device Manually, page 8 Filter Devices, page 12 Change Devices Layout View, page
More informationTest your way to a better Deployment!
Test your way to a better Deployment! Akshat Sharma, TME, Web Solutions, Cisco. October, 2016 Deployment Network and Deployment Operations: is Current pretty Methodology Straightforward. Automated NetOps:
More informationConfiguring DHCP Features and IP Source Guard
CHAPTER 23 This chapter describes how to configure DHCP snooping and option-82 data insertion, and the DHCP server port-based address allocation features on the IE 3000 switch. It also describes how to
More informationNetDevOps for the Network Dude How to get started with API's, Ansible and Python
DEVNET-1002 NetDevOps for the Network Dude How to get started with API's, Ansible and Python François Caen, Systems Engineer - @f_caen Cisco Spark How Questions? Use Cisco Spark to communicate with the
More informationJSON Support for Junos OS
JSON Support for Junos OS 1 Introduction: Java Script Object Notation alias JSON a light weight data exchange format is being extensively used for data exchange between web application and servers. With
More informationMulti-domain Service Orchestration with Cisco Network Service Orchestrator. Gabor Szabo Version 1.2
Multi-domain Service Orchestration with Cisco Network Service Orchestrator Gabor Szabo gabszabo@cisco.com Version 1.2 Agenda Theory & Concepts Cisco NSO inroduction Demonstration: simple service Use-Cases
More informationCisco Network Plug and Play Agent Configuration Guide, Cisco IOS XE Everest b
Cisco Network Plug and Play Agent Configuration Guide, Cisco IOS XE Everest 16.5.1b Feature Information for Cisco Network Plug and Play Agent 2 Finding Feature Information 3 Prerequisites for Cisco Network
More informationWhat is NetDevOps? Why? Leslie Carr RIPE71
What is NetDevOps? Why? Leslie Carr RIPE71 Who Is Leslie? Operations Engineer @lesliegeek Google Craigslist Twitter Wikimedia Foundation (Wikipedia) Cumulus Networks Who Are You? Are you a network engineer?
More informationIPv6 Module 6x ibgp and Basic ebgp
IPv6 Module 6x ibgp and Basic ebgp Objective: Using IPv6, simulate four different interconnected ISP backbones using a combination of IS-IS, internal BGP, and external BGP. Topology : Figure 1 BGP AS Numbers
More information