0% found this document useful (0 votes)
9 views21 pages

DCS8 DC2

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views21 pages

DCS8 DC2

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 21

===================================================================

DEVICE BEING CERTIFIED


===================================================================

Device Name: DAST6.NJ3 - 10.144.160.6

Case Number: INC000005193279

===================================================================

CERTIFICATION PROGRESS

===================================================================

Item Description Status Engineer Name

01 DNS Done Adrian

02 Accessibility Partially Done

03 Hardware Done Adrian

04 Management Tools Done Prashanth

05 CMDB Done Adrian

06 Trap Validation Done Prashanth

07 TBA

===================================================================

CERTIFICATION EVIDENCE

===================================================================

01 - DNS

===================================================================

Evidence Captured Evidence


#

Evidence -bash-4.2$ dig dcs8.dc2.savvis.net


1
; <<>> DiG 9.11.4-P2-RedHat-9.11.4-26.P2.el7_9.17 <<>> dcs8.dc2.savvis.net
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 25778
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4000
;; QUESTION SECTION:
;dcs8.dc2.savvis.net. IN A

;; ANSWER SECTION:
dcs8.dc2.savvis.net. 3600 IN A 10.144.200.221

;; Query time: 4 msec


;; SERVER: 167.215.232.77#53(167.215.232.77)
;; WHEN: Thu Dec 05 14:23:45 UTC 2024
;; MSG SIZE rcvd: 64

Evidence -bash-4.2$ dig -x 10.144.200.221


2
; <<>> DiG 9.11.4-P2-RedHat-9.11.4-26.P2.el7_9.17 <<>> -x 10.144.200.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 57633
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4000
;; QUESTION SECTION:
;221.200.144.10.in-addr.arpa. IN PTR

;; ANSWER SECTION:
221.200.144.10.in-addr.arpa. 3600 IN PTR dcs8.dc2.savvis.net.

;; Query time: 4 msec


;; SERVER: 167.215.232.77#53(167.215.232.77)
;; WHEN: Thu Dec 05 14:24:43 UTC 2024
;; MSG SIZE rcvd: 89

===================================================================

02 - Accessibility

===================================================================

Eviden Captured Evidence


ce #

Eviden -bash-4.2$ ping dcs8.dc2


ce 1 PING dcs8.dc2.savvis.net (10.144.200.221) 56(84) bytes of data.
64 bytes from dcs8.dc2.savvis.net (10.144.200.221): icmp_seq=1 ttl=251 time=0.974 ms
64 bytes from dcs8.dc2.savvis.net (10.144.200.221): icmp_seq=2 ttl=251 time=0.636 ms
64 bytes from dcs8.dc2.savvis.net (10.144.200.221): icmp_seq=3 ttl=251 time=0.718 ms
64 bytes from dcs8.dc2.savvis.net (10.144.200.221): icmp_seq=4 ttl=251 time=0.762 ms
64 bytes from dcs8.dc2.savvis.net (10.144.200.221): icmp_seq=5 ttl=251 time=0.880 ms
64 bytes from dcs8.dc2.savvis.net (10.144.200.221): icmp_seq=6 ttl=251 time=0.713 ms
64 bytes from dcs8.dc2.savvis.net (10.144.200.221): icmp_seq=7 ttl=251 time=0.792 ms
64 bytes from dcs8.dc2.savvis.net (10.144.200.221): icmp_seq=8 ttl=251 time=0.705 ms
64 bytes from dcs8.dc2.savvis.net (10.144.200.221): icmp_seq=9 ttl=251 time=0.605 ms
64 bytes from dcs8.dc2.savvis.net (10.144.200.221): icmp_seq=10 ttl=251 time=1.00 ms
64 bytes from dcs8.dc2.savvis.net (10.144.200.221): icmp_seq=11 ttl=251 time=0.645 ms
64 bytes from dcs8.dc2.savvis.net (10.144.200.221): icmp_seq=12 ttl=251 time=0.632 ms
64 bytes from dcs8.dc2.savvis.net (10.144.200.221): icmp_seq=13 ttl=251 time=0.633 ms
64 bytes from dcs8.dc2.savvis.net (10.144.200.221): icmp_seq=14 ttl=251 time=0.653 ms
64 bytes from dcs8.dc2.savvis.net (10.144.200.221): icmp_seq=15 ttl=251 time=0.583 ms
64 bytes from dcs8.dc2.savvis.net (10.144.200.221): icmp_seq=16 ttl=251 time=0.646 ms
64 bytes from dcs8.dc2.savvis.net (10.144.200.221): icmp_seq=17 ttl=251 time=0.655 ms
^C
--- dcs8.dc2.savvis.net ping statistics ---
17 packets transmitted, 17 received, 0% packet loss, time 16003ms
rtt min/avg/max/mdev = 0.583/0.719/1.001/0.124 ms

Eviden -bash-4.2$ ssh ad06982@dcs8.dc2


ce 2
Could not create directory '/home/ajarczew/.ssh'.

The authenticity of host 'dcs8.dc2 (10.144.200.221)' can't be established.

RSA key fingerprint is SHA256:3YII/1E8X+9gbyq5Fi7AQbb1Ww+/mr6k8qRlhUvQoyQ.

RSA key fingerprint is MD5:ac:2e:02:e7:69:fb:e0:65:f5:c7:1d:77:15:13:5a:40.

Are you sure you want to continue connecting (yes/no)? yes

Failed to add the host to the list of known hosts (/home/ajarczew/.ssh/known_hosts).

+---------------------------------------------------------------+

| |

| **** UNAUTHORIZED ACCESS IS PROHIBITED **** |

| |

| This system is owned by Lumen Technologies. If you |

| are not authorized to access this system, exit immediately. |

| Unauthorized access to this system is forbidden by company |

| policies, national and international laws. Unauthorized |

| users are subject to criminal and civil penalties as well as |

| company initiated disciplinary proceedings. |

| |

| By entry into this system you acknowledge that you are |

| authorized to access this system. You further acknowledge |


| that by entry into this system you expect your session to be |

| logged and monitored. |

| |

+---------------------------------------------------------------+

+---------------------------------------------------------------+

| |

| **** ALL ACTIVITIES ARE LOGGED AND MONITORED **** |

| |

| This system is covered by Lumen Technologies Change Management|

| Policy. DO NOT make any changes unless you have an approved |

| ticket and are authorised to do so. For operational problems |

| please contact HNS@centurylink.com or call +1-866-311-5618 |

| |

+---------------------------------------------------------------+

+---------------------------------------------------------------+

| |

| **** PLEASE LOGIN USING YOUR CUID CREDENTIAL **** |

| **** PLEASE LOGIN USING YOUR CUID CREDENTIAL **** |

| |

+---------------------------------------------------------------+

Password:
Cisco Nexus Operating System (NX-OS) Software

TAC support: http://www.cisco.com/tac

Copyright (C) 2002-2023, Cisco and/or its affiliates.

All rights reserved.

The copyrights to certain works contained in this software are

owned by other third parties and used and distributed under their own

licenses, such as open source. This software is provided "as is," and unless

otherwise stated, there is no warranty, express or implied, including but not

limited to warranties of merchantability and fitness for a particular purpose.

Certain components of this software are licensed under

the GNU General Public License (GPL) version 2.0 or

GNU General Public License (GPL) version 3.0 or the GNU

Lesser General Public License (LGPL) Version 2.1 or

Lesser General Public License (LGPL) Version 2.0.

A copy of each such license is available at

http://www.opensource.org/licenses/gpl-2.0.php and

http://opensource.org/licenses/gpl-3.0.html and

http://www.opensource.org/licenses/lgpl-2.1.php and

http://www.gnu.org/licenses/old-licenses/library.txt.

dcs8.dc2#
Eviden
ce 3

Eviden
ce 4

03 - Hardware

===================================================================

Evidence Captured Evidence


#

Evidence dcs8.dc2# show module


1 Mod Ports Module-Type Model Status
--- ----- ------------------------------------- --------------------- ---------
1 54 48x10/25G/32G + 6x40/100G Ethernet/FC N9K-C93180YC-FX active *

Mod Sw Hw Slot
--- ----------------------- ------ ----
1 9.3(11) 2.2 NA

Mod MAC-Address(es) Serial-Num


--- -------------------------------------- ----------
1 bc-8d-1f-d8-a4-a0 to bc-8d-1f-d8-a4-ff FLM2740067D

Mod Online Diag Status


--- ------------------
1 Pass

* this terminal session


dcs8.dc2# sh version
Cisco Nexus Operating System (NX-OS) Software
TAC support: http://www.cisco.com/tac
Copyright (C) 2002-2023, Cisco and/or its affiliates.
All rights reserved.
The copyrights to certain works contained in this software are
owned by other third parties and used and distributed under their own
licenses, such as open source. This software is provided "as is," and unless
otherwise stated, there is no warranty, express or implied, including but not
limited to warranties of merchantability and fitness for a particular purpose.
Certain components of this software are licensed under
the GNU General Public License (GPL) version 2.0 or
GNU General Public License (GPL) version 3.0 or the GNU
Lesser General Public License (LGPL) Version 2.1 or
Lesser General Public License (LGPL) Version 2.0.
A copy of each such license is available at
http://www.opensource.org/licenses/gpl-2.0.php and
http://opensource.org/licenses/gpl-3.0.html and
http://www.opensource.org/licenses/lgpl-2.1.php and
http://www.gnu.org/licenses/old-licenses/library.txt.

Software
BIOS: version 05.47
NXOS: version 9.3(11)
BIOS compile time: 04/28/2022
NXOS image file is: bootflash:///nxos.9.3.11.bin
NXOS compile time: 1/15/2023 12:00:00 [01/24/2023 09:38:35]

Hardware
cisco Nexus9000 C93180YC-FX Chassis
Intel(R) Xeon(R) CPU D-1528 @ 1.90GHz with 32826864 kB of memory.
Processor Board ID FLM2740067D

Device name: dcs8.dc2


bootflash: 115805708 kB
Kernel uptime is 10 day(s), 3 hour(s), 13 minute(s), 35 second(s)

Last reset at 19540 usecs after Mon Nov 25 12:10:17 2024


Reason: Reset Requested by CLI command reload
System version: 9.3(11)
Service:

plugin
Core Plugin, Ethernet Plugin

Active Package(s):
dcs8.dc2# sh hardware
Cisco Nexus Operating System (NX-OS) Software
TAC support: http://www.cisco.com/tac
Copyright (C) 2002-2023, Cisco and/or its affiliates.
All rights reserved.
The copyrights to certain works contained in this software are
owned by other third parties and used and distributed under their own
licenses, such as open source. This software is provided "as is," and unless
otherwise stated, there is no warranty, express or implied, including but not
limited to warranties of merchantability and fitness for a particular purpose.
Certain components of this software are licensed under
the GNU General Public License (GPL) version 2.0 or
GNU General Public License (GPL) version 3.0 or the GNU
Lesser General Public License (LGPL) Version 2.1 or
Lesser General Public License (LGPL) Version 2.0.
A copy of each such license is available at
http://www.opensource.org/licenses/gpl-2.0.php and
http://opensource.org/licenses/gpl-3.0.html and
http://www.opensource.org/licenses/lgpl-2.1.php and
http://www.gnu.org/licenses/old-licenses/library.txt.

Software
BIOS: version 05.47
NXOS: version 9.3(11)
BIOS compile time: 04/28/2022
NXOS image file is: bootflash:///nxos.9.3.11.bin
NXOS compile time: 1/15/2023 12:00:00 [01/24/2023 09:38:35]

Hardware
cisco Nexus9000 C93180YC-FX Chassis
Intel(R) Xeon(R) CPU D-1528 @ 1.90GHz with 32826864 kB of memory.
Processor Board ID FLM2740067D

Device name: dcs8.dc2


bootflash: 115805708 kB
Kernel uptime is 10 day(s), 3 hour(s), 15 minute(s), 16 second(s)

Last reset at 19540 usecs after 1732536617


Reason: Reset Requested by CLI command reload
System version: 9.3(11)
Service:

plugin
Core Plugin, Ethernet Plugin
--------------------------------
Switch hardware ID information
--------------------------------

Switch is booted up
Switch type is : Nexus9000 C93180YC-FX Chassis
Model number is N9K-C93180YC-FX
H/W version is 2.2
Part Number is 73-102928-02
Part Revision is B0
Manufacture Date is Year 2023 Week 40
Serial number is FLM2740067D
CLEI code is INM2B00ARK

-------------------------------------
Chassis has 0 Module slots
-------------------------------------
Module1 ok
Module type is : "48x10/25G/32G + 6x40/100G Ethernet/FC Module"
0 submodules are present
Model number is N9K-C93180YC-FX
H/W version is 2.2
Part Number is 73-102928-02
Part Revision is B0
Manufacture Date is Year 2023 Week 40
Serial number is FLM2740067D
CLEI code is INM2B00ARK

---------------------------------------
Chassis has 2 PowerSupply Slots
---------------------------------------

PS1 ok
Power supply type is: 500.00W 220v AC
Model number is NXA-PAC-500W-PI
H/W version is 1
Part Number is 341-0733-01
Part Revision is A0
Manufacture Date is Year 2019 Week 14
Serial number is LIT23143FD9
CLEI code is CMUPAESCAA

PS2 ok
Power supply type is: 500.00W 220v AC
Model number is NXA-PAC-500W-PI
H/W version is 1
Part Number is 341-0733-01
Part Revision is A0
Manufacture Date is Year 2017 Week 7
Serial number is LIT21073HLG
CLEI code is CMUPAESCAA

----------------------------------
Chassis has 4 Fan slots
----------------------------------

Fan1 ok

Fan2 ok
Fan3 ok

Fan4 ok

dcs8.dc2# sh logging | last 10


2024 Dec 5 07:13:42 dcs8.dc2 %ETH_PORT_CHANNEL-5-PORT_UP: port-channel99: Ethernet1/49
is up
2024 Dec 5 07:13:42 dcs8.dc2 %ETHPORT-5-IF_BANDWIDTH_CHANGE: Interface port-
channel99,bandwidth changed to 20000000 Kbit
2024 Dec 5 07:13:42 dcs8.dc2 %ETHPORT-5-IF_UP: Interface Ethernet1/49 is up in mode trunk
2024 Dec 5 07:23:15 dcs8.dc2 %TACACS-3-TACACS_ERROR_MESSAGE: All servers failed to
respond
2024 Dec 5 07:23:29 dcs8.dc2 %TACACS-3-TACACS_ERROR_MESSAGE: All servers failed to
respond (message repeated 3 times)
2024 Dec 5 07:23:29 dcs8.dc2 %VSHD-5-VSHD_SYSLOG_CONFIG_I: Configured from vty by admin
on console0
2024 Dec 5 07:24:26 dcs8.dc2 %VSHD-5-VSHD_SYSLOG_CONFIG_I: Configured from vty by admin
on console0 (message repeated 1 time)
2024 Dec 5 07:32:17 dcs8.dc2 %AUTHPRIV-3-SYSTEM_MSG: pam_aaa:Authentication failed from
167.215.232.44 - dcos_sshd[14355]
2024 Dec 5 07:32:17 dcs8.dc2 %DAEMON-3-SYSTEM_MSG: error: PAM: Authentication failure for
illegal user ab99768 from 167.215.232.44 - dcos_sshd[14348]
2024 Dec 5 13:38:04 dcs8.dc2 %DAEMON-3-SYSTEM_MSG: error: kex_exchange_identification:
Connection closed by remote host - dcos_sshd[6267]
===================================================================

04 – Management Tools

===================================================================

Evidenc Captured Evidence


e#

Evidenc
e1

Evidenc
e2
Evidenc
e3

Evidenc [svadmin@uk6log1 ~]$ sudo su -


e4 Last login: Wed Dec 4 22:29:48 UTC 2024 on pts/0
[root@uk6log1 ~]# cd /data01/syslog-ng/clients/2022/04
[root@uk6log1 04]# ls -l 10.144.200.221
ls: cannot access 10.144.200.221: No such file or directory
[root@uk6log1 04]#
[root@uk6log1 04]#

Evidenc [root@lo6logserv1 ~]# cd /data02/log/


e5 [root@lo6logserv1 log]#
[root@lo6logserv1 log]# ls -l 10.144.200.221
total 0
[root@lo6logserv1 log]#
[root@lo6logserv1 log]#
Evidenc
e6

===================================================================

05 – CMDB

===================================================================

Evidence Captured Evidence


#
Evidence
1
Evidence
2
Evidence
3
Evidence
4
Evidence
5

06 - Trap Validation

===================================================================

Evidence Captured Evidence


#

Evidence
1
Hosting Network Operations
Process Document
SUBJECT: Infrastructure Device Operations Acceptance and Certification

Version #: 5.0
Topic: Informational
Filename: Infrastructure_Device_Operations_Acceptance_and_Certification.doc
Brief Description: Operations Acceptance Checklist for New Infrastructure HAN Devices
Initiator: Vasile Balan
Author: Jonathan Griffiths
Issue Date: 15/01/2014
Contributions: HNDE, HIE Network and HNS

I. Purpose
This document details the checklist for accepting new devices into the production network to
ensure proper support readiness within Hosting Network Operations. Please refer to the
Infrastructure Device Operations Acceptance & Certification process located here when
compleing the checklist.
https://confluence.savvis.net/pages/viewpage.action?pageId=70432461

II. Checklist

DNS
Verify that DNS has been configured correctly for the host

Accessibility
Verify that the device is accessible via in and out of band management

Hardware
Verify that all cards in the router/switch are the latest type, configuration, and hardware
version. Router logs should show no errors. All code on the router/switch should be the
current standard version.

Configuration
The configuration on the router/switch should be compared with standard templates.

Management Tools
Verify that the device can access the various management tools to able the collection of
trap, log and authentication messages, the backup of the device configuration and the
ability to perform extended monitoring.

CMDB
Verify that the information in the CMDB has been set up correctly.

Trap Verification

Ensure that traps are being generated by the device and can be viewed in the browser.

Acceptance
Send formal communication detail the operational acceptance steps have been
completed and the device is considered live.

HNS Certification Engineer:

Certification Date:

Certificate Case Reference INC000005190328

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy