1) MD5
To calculate md5 checksum of file
Open cmd & Go to the directory
certutil -hashfile YourImageFileName.iso MD5
2) ELAM
/// N9K-C*-EX- Leaf ----------------------- tah
N9K-C*FX/FXP/FX2 -Leaf ------------ roc
N9K-C*-GX – Leaf ----------------------app//
vsh_lc
deb pla in tah/roc/app elam asic 0
Trigger reset
trigger init in-select 6 out-select 1
set outer ipv4 src_ip 6.6.6.1 dst_ip 9.9.9.1
start
status
ereport
Modul
e-1(DBG-TAH-elam-insel6)# report | grep ovec
Lookup Drop
------------------------------------------------------------------------------------------------------------------------------------------------------
RW drop reason : no drop
LU drop reason : no drop
3) Pervasive Gateway
In ACI (Application Centric Infrastructure), a pervasive gateway refers to a design approach where a single default gateway is provided across multiple bridge domains or VRFs (Virtual Routing and Forwarding). This approach simplifies the network architecture by consolidating the default gateway functionality and reduces the complexity of routing configurations.
With the pervasive gateway design, a single Layer 3 Out (L3Out) connection is used to provide connectivity between the ACI fabric and the external network. This L3Out connection acts as the default gateway for all the bridge domains or VRFs within the ACI fabric. Instead of deploying separate Layer 3 external connections for each bridge domain or VRF, the pervasive gateway allows the consolidation of these connections into a single L3Out.
The pervasive gateway design offers benefits such as reduced configuration complexity, optimized use of external routing resources, and easier management of default gateway settings across multiple bridge domains or VRFs. It simplifies the deployment and operation of the ACI fabric while maintaining efficient and scalable communication between the fabric and external networks.
Komentáře