Update v1.92 submitted to the App Store

March 11, 2024 - Reading time: 10 minutes

What's new in Version 1.92

fixed the design connections checking issue

fixed password issue with commands:

        set dot1x user WORD password WORD

        set radius user WORD password WORD

added privileged commands:

    show dot1x

     show dot1x all

    show dot1x all summary

Switch global commands:

    dot1x system-auth-control

   aaa authentication dot1x default enable

   aaa authentication dot1x default local

    aaa authentication dot1x default group radius

Switch interface commands:

dot1x port-control force-authorized

dot1x port-control force-unauthorized

dot1x port-control auto

authentication port-control force-authorized

authentication port-control force-unauthorized

authentication port-control auto

no authentication port-control

dot1x pae authenticator

no dot1x pae

Other minor fixes and improvements

Radius Server Setup

September 10, 2023 - Reading time: 3 minutes

In a Cisco environment, a RADIUS (Remote Authentication Dial-In User Service) server is commonly used to authenticate users for various network services, one of which is network access. This lab introduces using a RADIUS server to allows for centralized user authentication. Instead of maintaining separate user accounts and authentication databases on each network device. All authentication requests are sent to the RADIUS server. This centralization simplifies administration and ensures consistent authentication across the network.

Read more

AAA Authentication Using Local Credentials

February 25, 2023 - Reading time: 4 minutes

Cisco AAA (Authentication, Authorization, and Accounting) local authentication is a security feature that allows network administrators to control access to network devices and services by requiring users to provide valid credentials before accessing them. With local authentication, administrators can define user accounts and passwords locally on a network device, rather than relying on external authentication servers.

To configure Cisco AAA local authentication, follow these steps:

Read more

New Update Available - version 1.90

May 22, 2022 - Reading time: ~1 minute

Update 1.90 fixes the design saving issue. We appreciate you patience. 

Switch Errdisable Recovery

February 27, 2021 - Reading time: 4 minutes

In this tutorial we look at errdisable recovery and highlight it on the PocketCLI Network Simulator. Errdisable recovery is a feature on Cisco switches that allows network administrators to automatically activate an err-disabled port after a specified timeout period. 

A common cause for an interface to be placed in err-disable status is a port security violation. Please reference the tutorial Port Security - Configuration for more details. The port in the err-disabled state needs an administrator to manually restore the port back to operation. Activation of the port will be accomplished by issuing the command shutdown followed by the no shutdown command.

The topology below will be used for this tutorial:

Read more

Spanning Tree Protocol

November 23, 2020 - Reading time: 4 minutes

By default, all Cisco switches have Spanning Tree Protocol (STP) enabled. However, you can choose to configure STP on your switches manually. 

STP is used by switches to prevent loops (broadcast storms) from disrupting local area networks. It ensures that there is only one logical path between all destinations on the network, which is achieved by disabling unwanted paths and blocking ports that could cause the loop.

A switch blocks a port when it detects a loop on the network. On the network segment with switches, one switch is elected to be Root Bridge on the network. Other switches on the network then select one of its ports as Root Port. Also, a Designated Port is chosen on each segment and any other ports are put in Blocking state. We shall follow these same procedure in our manual configurations.

The lab below is used in this tutorial:

Read more