Tuesday, December 11, 2018

Growing CISCO Catalyst 9000 | Zorins Technologies


Cisco introduced Catalyst 9000 family of products in June of 2017 which soon became the fastest growing product in the history of the company. Its phenomenal success is a testament to what it brings to the customers. It truly addresses the challenges the customers are facing in this fast-changing world where digitization, security, mobility and cloud are top of mind for most of the CIOs.
Catalyst 9000 family started with a few models of Catalyst 9300, 9400 and 9500 but soon grew to address majority of the deployments and designs. Over the last 12 months, it has added new models of the Catalyst 9300 which gives the maximum density of multi-gigabit to ensure wifi6 readiness. It has introduced new uplinks of 25G for easier transition to higher speeds. Catalyst 9300 is the lead stackable access switch with rich set of technologies and scale.

Catalyst 9400 introduced a couple of new supervisors in the last one year in addition to multiple new Line Cards enabling maximum copper and fiber connectivity. With its UADP 2.0XL engine it gives even higher scale than 9300 and brings maximum High availability that the modular systems offer. The introduction of a 4-slot chassis and different variants of fiber line cards makes 9400 suitable for 1G/10G core and aggregation deployments. It also now supports SD-Access Border and Control plane functionalities.

Catalyst 9500 started with a few models of 40G and 10G. That sure became a popular 1RU aggregation product. But the introduction of 100G and 25G in the 9500 family accelerated the customers to transition to higher speed without worrying about the most cumbersome piece of networking – the wires. The customers can easily go from 10G to 25G and with the new CSR optics, customers can switch with just a software knob as soon as the other side of the wire is ready for the higher speed. This bumps up the bandwidth by 2.5 times which is also ideal since the bandwidth is going up from 1G to 2.5G at the access with multigiabit and 11ac wave 2 APs. This ensures seamless transition but it also ensures that the network architects don’t have to rework oversubscription ratios from access to the upper layers of the network. 1 --> 2.5 G, 10 --> 25G. No changes in the oversubscription ratios.



And now the 4th coming all new Catalyst 9200 is extending what Catalyst 9000 brings to the customers i.e Intent Based networking (IBN) - everywhere. It comes at a more affordable price and brings simplicity without compromise. No compromise on Security, High Availability, and the IBN experience.

For the first time, Catalyst 9200 has introduced new security features that we have not seen in this class of products before. To name a few, MACSEC 128 bit is now supported on Catalyst 9200 on all ports providing transport encryption for end to end security. Catalyst 9200 is also extending the trustworthy system features, ensuring platform and Operating Systems security against infrastructure breaches.

For the first time, Catalyst 9200 is also bringing Stateful Switch Over (SSO) in this class of product. With the help of Stackwise technology, the users can stack up to 8 members with an Active and Standby similar to Catalyst 9300. SSO ensures High Availability and a sub second convergence in case Active fails. This is so fast that if there is a video stream transmitting through the device the users will not even notice a glitch as it switches over.

For the first time, Catalyst 9200 also brings Patching (Cold) to this class of product. That means that the customers don’t have to change the entire image when there is a critical update needed and therefore can avoid long wait to update the software.

For the first time, Catalyst 9200 brings the same level of programmability and automation capabilities in this class of product as Catalyst 9000. For those customers who have other Catalyst 9000 devices, it makes it a seamless operation for the Network Operators to run the same tools across their network. Based on YANG configurational and operational models, customers can also get streaming telemetry on their favorite tools like Kibana and Grafana.



All of this was only possible because Catalyst 9200 shares the strong foundation from hardware and software perspective that the rest of the Catalyst 9000 family has. Its based on the same UADP family of ASIC. Catalyst 9200 is based on an optimized version of the ASIC – UADP 2.0 mini. The operating system that runs on Catalyst 9200 is also the same IOS XE. Due to smaller memory footprint, Catalyst 9200 runs a more optimized version of the binary. This ensures rich set of OS capabilities and it fits  a more affordable box.

Catalyst 9000 family started with a few models of 9300, 9400 and 9500 soon has grown into a nice big family of products. Catalyst 9200 just extends the reach to everyone who is jumping on the IBN journey. As customers move towards digitization, that means now everyone should have a Cat 9000.

Tuesday, November 6, 2018

How to reset Cisco SG300 Switchto factory default | Zorins Technologies LLC

Reset Cisco SG300 Switch to factory default

There are two methods to reset Cisco SG300 switch to factory default.

First Method – Manual Reset

  • Disconnect all the Ethernet cables from the Cisco sg300 switch.
  • Press and hold the Reset button on the switch for at least 20 seconds until all the port LED's light up. The switch will reboot now.
sg300 01 blog
  • Connect your PC directly to the switch using an Ethernet cable.

Second Method

  • Log in to the web console and choose Administration > Reboot.
sg300 02 blog
  • Click the radio button to reboot the switch at the desired time
  • Check the Restore to Factory Defaults check box to reboot the switch to the factory default configuration.
  • Click Reboot to reboot the switch.
Source:- http://www.thetechfactors.com/

Contact us for better & high discount GPL Cisco
marketing@zorinstechnologies.com
+971564038256

Sunday, November 4, 2018

How to recover password or the Cisco 1900 Integrated Services Router | Zorins Technologies

Introduction
This document describes how to recover the enable password and the enable secret passwords. These passwords protect access to privileged EXEC and configuration modes. The enable password password can be recovered, but the enable secret password is encrypted and must be replaced with a new password. Use the procedure described in this document in order to replace the enable secret password.
Prerequisites

 Requirements

There are no specific requirements for this document.
Components Used

The information in this document is based on this hardware version:
·         Cisco 1900 Series Integrated Services Router
The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, make sure that you understand the potential impact of any command.

Related Products

Refer to Password Recovery Procedures for information on how to recover passwords for related products.

Conventions

Refer to Cisco Technical Tips Conventions for information on document conventions.



Step-by-Step Procedure

Perform these steps in order to recover your password:
1.       Attach a terminal or PC with terminal emulation to the console port of the router. Use these terminal settings:
·         9600 baud rate
·         No parity
·         8 data bits
·         1 stop bit
·         No flow control
Refer to these documents for information on how to cable and connect a terminal to the console port or the AUX port:
·         Cabling Guide for Console and AUX Ports
·         Connecting a Terminal to the Console Port on Catalyst Switches
·         Connect a Terminal to Catalyst 2948G-L3, 4908G-L3, and 4840G Series Switches
2.       If you can access the router, type show version at the prompt, and record the configuration register setting. See Example of Password Recovery Procedure in order to view the output of a show version command.
Note: The configuration register is typically set to 0x2102 or 0x102. If you can no longer access the router (because of a lost login or TACACS password), you can safely assume that your configuration register is set to 0x2102



3.       Use the power switch in order to turn off the router, and then turn the router back on.
Note: 

·         In order to simulate this step on a Cisco 6400, pull out and then plug in the Node Route Processor (NRP) or Node Switch Processor (NSP) card.
·         In order to simulate this step on a Cisco 6x00 with NI-2, pull out and then plug in the NI-2 card.
4.       Press Break on the terminal keyboard a couple of times after you see the message program load complete, entry point: 0x80008000, size: 0x6fdb4c in order to put the router into ROMMON.
Note: The values of entry point and size are subjected to the routers.
If the break sequence does not work, refer to Standard Break Key Sequence Combinations During Password Recovery for other key combinations.
If unable to break into ROMMON mode, perform these steps:
a.       Remove flash.
b.       Reload the router. Router will end up in ROMMON mode.
c.       Insert flash.
d.       Perform standard procedure for password recovery.
5.       Type confreg 0x2142 at the rommon 1> prompt in order to boot from Flash.
This step bypasses the startup configuration where the passwords are stored.
6.       Type reset at the rommon 2> prompt.
The router reboots, but ignores the saved configuration.
7.       Type no after each setup question, or press Ctrl-C in order to skip the initial setup procedure.
8.       Type enable at the Router> prompt.
You are in enable mode and should see the Router# prompt.
9.       Type configure memory or copy startup-config running-config in order to copy the nonvolatile RAM (NVRAM) into memory. 

           Warning:  Do not enter copy running-config startup-config or write. These commands erase your startup configuration.

10.   Type show running-config.
The show running-config command shows the configuration of the router. In this configuration, the shutdown command appears under all interfaces, which indicates all interfaces are currently shut down. In addition, the passwords (enable password, enable secret, vty, console passwords) are in either an encrypted or unencrypted format. You can reuse unencrypted passwords. You must change encrypted passwords to a new password.

Visit <<<< ZORINS TECHNOLOGIES >>>>


11.   Type configure terminal.
The hostname(config)# prompt appears.
12.  Type enable secret <password> in order to change the enable secret password. For example:
hostname(config)#enable secret cisco
13.   Issue the no shutdown command on every interface that you use.
If you issue a show ip interface brief command, every interface that you want to use should display up up.
14.   Type config-register <configuration_register_setting> . Where configuration_register_setting is either the value you recorded in step 2 or 0x2102 . For example:
hostname(config)#config-register 0x2102
15.   Press Ctrl-z or end in order to leave the configuration mode.
The hostname# prompt appears.
16.   Type write memory or copy running-config startup-config in order to commit the changes.


Thursday, November 1, 2018

Cisco 4000 Series Integrated Services Routers. "ZORINS TECHNOLOGIES"

Cisco® 4000 Series Integrated Services Routers (ISRs) form an intelligent WAN platform that delivers the performance, security, and convergence capabilities that today’s branch offices need.

 

 

Product Overview
The Cisco 4000 Series Integrated Services Routers (ISR) revolutionize WAN communications in the enterprise branch. With new levels of built-in intelligent network capabilities and convergence, the routers specifically address the growing need for application-aware networking in distributed enterprise sites. These locations tend to have lean IT resources. But they often also have a growing need for direct communication with both private data centers and public clouds across diverse links, including Multiprotocol Label Switching (MPLS) VPNs and the Internet.
The Cisco 4000 Series contains six platforms: the 4451, 4431, 4351, 4331, 4321 and 4221 ISRs (Figure 1).

Figure 1.      Cisco 4000 Series Integrated Services Routers
 
Features and Benefits
Cisco 4000 Series ISRs provide you with Cisco Intelligent WAN (IWAN) software features and a converged branch infrastructure. Along with superior throughput, these capabilities form the building blocks of next-generation branch-office WAN solutions.
Cisco Intelligent WAN (IWAN)
Cisco IWAN is a set of intelligent software services that allow you to reliably and securely connect users, devices, and branch office locations across a diverse set of WAN transport links. IWAN-enabled routers like the 4000 Series dynamically route traffic across the “best” link based on up-to-the-minute application and network conditions for great application experiences. You get tight control over application performance, bandwidth usage, data privacy, and availability of your WAN links—control that you need as your branches conduct greater volumes of mission-critical business.
Cisco Converged Branch Infrastructure
The Cisco 4000 Series ISRs consolidate many must-have IT functions, including network, compute, and storage resources. The high-performance, integrated routers run multiple concurrent IWAN services, including encryption, traffic management, and WAN optimization, without slowing your data throughput. And you can activate new services on demand through a simple licensing change.

Contact us >> Marketing@zorinstechnologies.com
                          +971564038256