A community value is more than the sum of its members. Cisco Champion members make it special, I’m honored to be again part of it this year.

This week I’ve attended a training about Cisco ACI DCAC9K .
Based on my personal experience no training can cover all the topics or all the use cases but I think this training with a cover-to-cover read of Deploying ACI can help to build the basis to start the ACI journey with strong fundamentals.
My new post about Cisco Network Assurance Engine: From Download to Value in 60 Minutes (or less) has been published, read it on GestaltIT Tech Talks .
My new post about Configuration and Hardware Assurance in the Datacenter with Cisco Network Assurance Engine has been published, read it on GestaltIT Tech Talks .
I had the honor and pleasure of being invited again to attend Tech Field Day , this time for an Extra event at Cisco Live Europe in Barcelona.
Cisco Live is a week full of product announcements, technical session, (social) networking with fellow network engineers, meetings with colleagues and customers, discussions with Cisco engineers about products and roadmap. This is exhausting and exciting at the same time but it definitely worth the effort.

Three years in a row, this is great! I’m again a Cisco Champion!
When a customer calls with a problem or request I often see a chance to investigate a technology, learn something new or apply random skills to find a creative solution.
This time is about an ASA, customer noticed too much traffic on the Internet facing interface. Syslog, Netflow, bandwidth monitoring and any other useful tools are totally missing, only the old good CLI to help.
The MVP We can get a list of all active connections from ASA with
Day two of NFD16 with Cisco. The presentation was split in two parts. First part for Intersight , second part for Tetration .
I’ll post here just a few thoughts about Intersight .
Merakify all the servers! What’s Cisco Intersight? If you’re familiar with cloud-managed devices like Meraki the concept is quite similar.
A Cisco server runs the Device Connector client that links to a central management portal that runs on Cisco DC SaaS.
This week I attended and event organized by Cisco TAC in Krakow.
I’ve been in may Cisco events (Live, PVT, Pint etc.) but It was the first time for me at a TAC workshop and I was curious about it.
The Agenda Agenda was clear: tree days with TAC engineers presenting best practices for installation and configuration with a clear focus on troubleshooting methods and tools.
I was not disappointed by the contents: marketing was reduced to minimum, all the presenters were skilled TAC engineers and all the sessions were very detailed.
It’s time for CLEUR again, for the second year in Berlin, that’s 5 years in a row and I still get excited when the date arrives.
#CLEUR #CCIE #netvet #ciscochampion #merakimaster pic.twitter.com/IyF883JeYk
— Gian Paolo (@gp_ifconfig) February 21, 2017
For the second year I’m honored to be part of the Cisco Champion crew.
ASA doesn’t boot:
Launching BootLoader... Default configuration file contains 1 entry. Searching / for images to boot. Loading /asa825-k8.bin... Booting... Press ESC to interrupt boot: Use BREAK or ESC to interrupt boot. Use SPACE to begin boot immediately. We’re now in rommon:
rommon #0> Check variables:
rommon #3> set ROMMON Variable Settings: ADDRESS=0.0.0.0 SERVER=0.0.0.0 GATEWAY=0.0.0.0 PORT=Ethernet0/0 VLAN=untagged IMAGE= CONFIG= LINKTIMEOUT=20 PKTTIMEOUT=4 RETRY=20 Config network parameters.
rommon #8>ADDRESS=10.0.10.77 rommon #9>ADDRESS=10.0.10.77 rommon #10>SERVER=10.
The Cyberspace a.k.a. the Internet is full of bad guys wanting to mess with our computers right?
Of course everyone of us have a firewall configured with proper access and inspection rules, don’t ya?
Spamhaus and Team Cymru can help providing list of known bad IPs and subnets that should be filtered in our networks.
Spamhaus DROP list “DROP (Don’t Route Or Peer) and EDROP are advisory “drop all traffic” lists, consisting of netblocks that are “hijacked” or leased by professional spam or cyber-crime operations (used for dissemination of malware, trojan downloaders, botnet controllers).
Hi CLEUR! This year, for the fourth year in a row, I’ve attended Cisco Live Europe .
I’ve earned the “Netvet” status, that means my name was on the wall before the keynote, ain’t that great? ;-)
Aesthetics apart, this year’s event was the biggest I’ve attended so far, twelve thousands people in a huge venue (for European standards) and a lot of sessions available.
Here’s my recap of the event.