Category: Cisco

0

Cisco DNA Center: Wireless Assurance

Wireless Assurance gives you the visibility and insights to solve for network challenges in the past, present, and future. Steps:1. Network discovery CLI and SNMP are required credentials global or task specific Global settings: Design > Network Settings > Site > Device Credentials Once discovery is done all Devices appear in Inventory. Make sure status is ok for each column: Reachability...

5

Cisco DNA Center: Install/Setup/Prerequisites

A better way to control your network:Cisco DNA Center is the network management and command center for Cisco DNA, intent-based network for the enterprise. Intent-based networking is a big push for the future of network management. Prerequisites notes:1. VM or customer UCS server is NOT supported2. IP addresses: DNS server (2+ recommended)     NTP server (2+ recommended)     Proxy Server IP address and...

0

Cisco Tetration Policy Analysis

The Policy Analysis feature analyses the effectiveness of policies by analysing all the traffic flow into, out of, and within the application, to compare published policies to actual traffic. This policy analysis relates to Policy 4 (p4): Detailed info for Misdropped, Escaped, Rejected and Permitted flows. Click any line in the detailed flow to show the information that is available –...

0

Cisco Tetration Application Insight

Application Insight is one of the primary use cases for Tetration. Go to Application > Scope and search for the server: Provides – displays the list of open ports to which the host is providing traffic, along with the local process responsible for the open port. Ports listed in bold represent flows which Tetration has observed a workflow while light grey...

2

Cisco Tetration Overview

The Cisco Tetration solution addresses data center operational and security challenges by providing pervasive visibility, unprecedented insights and comprehensive workload-protection capability across a multicloud infrastructure. Overall, the Cisco Tetration Analytics application segmentation approach reduces the attack surface within the data center and increases the efficiency of data center operations. Use Cases With true pervasive visibility comprising of every packet, every flow,...

0

Cisco Stealthwatch Alarming Hosts Investigation

How to get additional information about a host present on the Top Alarming Hosts dashboard. Select Top Reports and another pop-up menu appears with options such as Top Applications, Top Ports, Top Protocols etc. By default, the query looks at the past 5 minutes. The number of Flows for each application category is a live link. Click on the Flows number...

5

Cisco Stealthwatch Management Console (SMC) Overview

Cisco Stealthwatch collects and analyzes network data to deliver comprehensive visibility and protection for even the largest and most dynamic networks. Stealthwatch analyzes industry-standard NetFlow data from Cisco and other vendors’ routers, switches, firewalls, and other network devices to detect advanced and persistent security threats such as internally spreading malware, data leakage, botnet command and control traffic, and network reconnaissance Stealthwatch...

2

Cisco SD-WAN Zero Touch Site Bring Up

Viptela provides an automatic provisioning software as a service (SaaS) called zero-touch provisioning (ZTP) The default configuration that is shipped on non-wireless hardware vEdge routers includes the following commands that allow the ZTP process to occur automatically: system vbond ztp.viptela.com—Configures the initial vBond orchestrator to be the Viptela ZTP SaaS server. vpn 0 interface ip dhcp-client—Enables DHCP on one of the...