Automation itself is a milestone when it comes to efficiency. Tasks can be executed simultaneously on many devices even during nights/holidays. Sometimes, however, it has its limits. As the task execution time grows more and more, it’s a good idea
Category: Vendor
Flow control with pexpect
Using pexpect is pretty straightforward, but what about the situations, when we don’t know in what state the device, that we’re interacting with is? In such a scenario, we have to implement logic in our script that could handle different
Basic Cisco router automation workflow with pexpect
Network automation can take many forms depending on the technologies and environments. Sometimes though, we have to dive deep into low-level automation, where we can’t use REST API or other more-convenient technologies. In this article, we will take a brief
Cisco SD-WAN REST API calls with Python’s requests library
In the previous article on Cisco SD-WAN, I’ve shown you how to interact with the vManage using Postman software. Now it’s time to do some coding. We will interact with the SD-WAN using the Python requests library. For this article,
Cisco SD-WAN REST API calls with Postman
This article starts a series covering the depths of Cisco SD-WAN. This time, however, we will just scratch the surface with some basic requests. For that, we will use the Postman software and Cisco SD-WAN 20.4 Always On sandbox Authentication
TCN impact on the MST topology
Topology changes in a spanning-tree domain are inevitable. But what actually happens, and what impact does it have on the environment? We will find it out in this article! Topology We will examine today’s scenarios on the 3-tier topology. We’ve
PVST and MST (in)compatibility
Spanning-tree protocol configurations can cause headaches among network engineers. Especially if we have mixed topology, with more than one STP implementation. In this article, we will look closer at the interoperability between the Cisco PVST and MST. Based on two
How to add and configure Nokia VSR VM in the GNS3
GNS3 is a powerful tool to simulate computer networks. Many images are ready to use right after the basic setup. However, sometimes we have to put in some more work to make everything work as expected. In this article, we
OSPF with BFD case study
While administrating the network, it’s important to think about high availability. If one network element goes down, the network can still operate properly after it’s converged. But how about the convergence time? It differs from one protocol to another, and
IPv6 tunneling over IPv4 GRE
As network engineers, sometimes we have to deal with unusual problems. One of them is when we have two isolated IPv6 network parts, but we want them to be able to communicate with each other. In this article, we’re gonna