Ansible Orchestration Concept

glitchlist Uncategorized Leave a Comment

The concept of orchestrate network devices is more important when you have to manage more and more devices. Now we spoke rapidly how is possible with ansible to do that. There are already several modules in Ansible ready to use for network devices provisioning. Concept The first idea is to keep either the playbook or the variables in the Git. …

HUAWEI AR Series – Password Recovery

glitchlist Uncategorized Leave a Comment

Turn on the AR router then: PRESS Ctrl+B to enter in Recovery MODE at Enter Password: prompt type huawei for pre-R007 versions or Admin@huawei on R007 or later versions Enter in 7. Password Manager Menu Choose 2. Clear the console login password option Wait for Clear the console login password Succeed! Reboot the router Change the password in [aaa] configuration! …

Arista – Cli access without password

glitchlist Uncategorized Leave a Comment

A good practise for manage a switch is to use certificate instead a password STEP 1.Add a local user : username admin privilege 15 secret kdfhsdfk_adfksbfjksbdpppp 2.Associate a public key username admin sshkey ssh-rsa AAAAAAAAAAAAAAAAAAAAAAAAetc admin@mydomain 3. Associate a role to user username admin role network-admin Well Done!

802.3ad between Huawei AR2240 and Cisco 3750X

glitchlist Uncategorized Leave a Comment

IEEE 802.3ad is used to aggregate multiple link ethernet for increase the network speed and availability.You can configure Layer3 to Layer3 LACP or Layer2 to Layer2 Etherchannel, but sometimes you have to do more: Some routers like Huawei 2240 are only configurable in LACP Layer 3 mode but, for design requirements, the Core Switch (ex.: Cisco) have to be set …

SSH login without Password

glitchlist Uncategorized Leave a Comment

Sometimes to automate management operations, you need to manage the authentication process. To avoid inserting the login information of Linux systems into DevOps or NetOps scripts you can generate a pair of authentication keys. Generate a new pair of authentication keys: 2. Copy the public key on the remote system: 3. Test Login password-less: Bye .glitchlist crew

BGPv4 – Public peering requests

glitchlist Uncategorized Leave a Comment

as Internet Service Provider you must ensure that packets are passing your network reach the destination as quickly as possible and with the least number of hops. To do this you should exchange your networks with others: Peering. Mosts internet peerings in the world is maded by Handshake Agreement. Here you can find a draft with all important information to …