IT Knowledge Base

Technical Repository

HowTo: Inject Cisco UCS Drivers into Windows 2012 R2 ISO

dism /get-wiminfo /wimfile:”./Workspace\Windows 2012 R2\sources\boot.wim” dism /Mount-Wim /WimFile:”./Workspace\Windows 2012 R2\sources\boot.wim” /Index:2 /MountDir:”./Workspace\Mount” dism /image:”./Workspace\Mount” /Add-Driver /driver:”./Workspace\Drivers” -Recurse dism /unmount-wim /mountdir:”./Workspace\Mount” /commit dism /get-wiminfo /wimfile:”./Workspace\Windows 2012 R2\sources\install.wim” dism /Mount-Wim /WimFile:”./Workspace\Windows 2012 R2\sources\install.wim” /Index:4 /MountDir:”./Workspace\Mount” dism /image:”./Workspace\Mount” /Add-Driver /driver:”./Workspace\Drivers” -Recurse dism /unmount-wim /mountdir:”./Workspace\Mount” /commit

Read More


HowTo: Copy files between Cisco ASA’s in a cluster

Setup a TFTP server and copy the files that you want to copy to the failover device. This will execute the command on the remote failover firewall. failover exec mate copy /noconfirm tftp://192.168.1.10/asdm-731-101.bin disk0:/asdm-731-101.bin

Read More


HowTo: Log into Cisco IOS without a password using SSH/PKI

I needed the ability to automatically log into a Cisco Router and create site to site VPN tunnels through a script running on a web server. In order to do this, I had to setup PKI on the router which would then allow me to log in without having to type in a password. Prerequisites […]

Read More


HowTo: Cisco Switching – How to create an Etherchannel LACP Port Group

Configure the Ether-channel Load Balancing Method. EtherChannel load balancing can use MAC dresses, IP addresses, or Layer 4 port numbers with a Policy Feature Card 2 (PFC2) and either source mode, destination mode, or both. The mode you select applies to all EtherChannels that you configure on the switch. Use the option that provides the […]

Read More


HowTo: Cisco ASA – Troubleshooting Reverse Path Checks Failure (RFP)

Troubleshooting Reverse Path Failures Unicast RPF or Reverse Path is defined in RFC 3704. This RFC stipulates that traffic from known invalid networks should not be accepted on interfaces from which they didn’t originate. The concept idea as seen in RFC 2827 which was to deny traffic on an interface if it is sourced from […]

Read More