top of page

Cisco Nexus NX-OS tips and tricks

The Cisco Nexus series switches are modular and fixed port network switches designed for the data center. Cisco Systems introduced the Nexus Series of switches on January 28, 2008. The first chassis in the Nexus 7000 family is a 10-slot chassis with two supervisor engine slots and eight I/O module slots at the front, as well as five crossbar switch fabric modules at the rear. Beside the Nexus 7000 there are also other models in the Nexus range.


All switches in the Nexus range run the modular NX-OS firmware/operating system on the fabric. NX-OS has some high-availability features compared to the well-known Cisco IOS. This platform is optimized for high-density 10 Gigabit Ethernet.


I'll be sharing with you a little bit about tricks I learned:


Hexadecimal / Decimal conversion:


Executing multiple CLI commands in one command:


Sleep:


Configuration Snapshots and rollback:

Then, I do a small configuration change on the hostname. Now, you can run a “diff” between the current config and the snapshot, using the command: show diff rollback-patch checkpoint name running-config

At this point, you can restore the checkpoint config with the rollback command: Rollback running-config checkpoint name atomic


CLI variables:


Command Aliases:

Command "where" | "where detail":


Account log:


Terminal color:


Bash-Shell:

We can also be root without problem:


Attach to a module:


Backup:


" | include ... "


158 views0 comments

Recent Posts

See All

Securing IOS-XE Routing Protocols

Securing the routing information prevents an attacker from introducing false routing information into the network, which could be used as part of a Denial of Service (DoS) or Man-in-the-Middle (MiTM)

Cisco Duo Log Sync (DLS)

Duologsync (DLS) is a utility written by Duo Security that supports fetching logs from Duo endpoints and ingesting them to different SIEMs. Logging: A logging filepath can be specified in config.yml.

Umbrella VA logging to Remote Syslog Server

Syslog is a protocol that computer systems use to send event data logs to a central location for storage. Logs can then be accessed by analysis and reporting software to perform audits, monitoring, tr

Comments


bottom of page