Just because network automation and orchestration are the newest, hottest things on the market doesn’t mean you can forget how to make something happen. Often times we find ourselves dealing with an older device or a setup that doesn’t allow us to automate in a short amount of time. Maybe we just need something that’s quick and dirty and ready to go at the drop of a hat.
Jeff Fry takes us down to the most basic level in this series on Junos configs with Juniper hardware. He walks us through how to load a config file on a device properly and merge the contents so that we have a clean config running on the device without disruption. Lots of config snippets and examples in the post help us all understand the process and how to make it happen without causing a disaster. Here’s a great example of how he walks you through the process:
Now we can check our configuration to make sure that this appears in our security policies. We will do this by issuing the command show security policieswhile still in configuration mode. What you should notice is that the new configuration was added at the end of the existing policies. This is because, with security policies, new policies appear in the order they are added.
Read more at Junos – Loading Configs – 1 of 5 – Merge
- Does SPB Mean “Secure Path Bridging”? - February 12, 2020
- Cloud Isn’t Your Key To Compliance - February 10, 2020
- Breaking IoT Security - February 7, 2020
- Answers at Your Fingertips with Forward Networks - February 4, 2020
- Priming Your Application Performance with Intel Application Device Queues - January 29, 2020
- Is Cisco SD Access Intent Based Networking? - January 28, 2020
- Captivating Wireless Connectivity with Cisco OpenRoaming - January 22, 2020
- Does the Apple Airport Extreme Use VLANs? - January 21, 2020
- Predicting Data Patterns with Cradlepoint - January 16, 2020
- How Do RFC3161 Timestamps Work? - January 15, 2020