Configure a Data Policy to Overwrite a Control Policy
In this video, we step through how to configure a data policy to complete the task: Users from Sites in Region 1 must access AWS networks through DC in Region 2. Everything else must flow via DC on Region 1. Tags: SDWAN, data-policy, control-policy
In Technical Assistance Center (TAC)
Create Configuration Snapshots in ACI and Rollback Procedure
Contributed by: Alejandro Cardoso How to create a configuration snapshot in a Cisco ACI fabric and how to rollback from it using the Cisco APIC GUI Tags: aci,apic,rollback,snapshot,backup
Determine Policy Drops on cEdge with FIA Trace
Contributed by: Rossana del Castillo Fascinetto This video shows how to determine policy traffic drops on cEdge with FIA Trace. Tags: sdwan,cedge,drops
iBGP split horizon rules
Contributed by: Sergio Gomez This video describes the BGP internal update process and how it distributes routing information to other BGP neighbors located on the same autonomous system than the local speaker. Tags:BGP,IBGP,RouteReflector,rfc177
Secure Endpoint Automated Actions - Forensic Snapshot
Contributed by : Roman Valenta This video describes how Automated Action - Forensic Snapshot functionality works in Secure Endpoint Console. Tags: automated,action,forensic,snapshot,console
How To Collect On-Demand Techsupport in ACI
This video provides steps to generate and upload on-demand Techsupport files in Cisco ACI Tags: ondemand,techsupport,ciscoaci,logs
Enabling ESA Domain Assigment Feature.
Contributed By: Julio Sandoval This Video describes the steps to enable a domain assignment in the ESA. TAGS:Email security,LDAP.