[Day #50 PyATS Series] Automated Configuration Backup (Multi-Vendor) Using pyATS for Cisco [Python for Network Engineer]

[Day #50 PyATS Series] Automated Configuration Backup (Multi-Vendor) Using pyATS for Cisco [Python for Network Engineer]

Introduction — key points Configuration backups are the single most important preventative control in network operations: when a device fails, when a change breaks production, when auditors ask for history. Manual backups are fragile and slow. This masterclass shows you how to automate backups across […]

[Day #61 PyATS Series] Automating ISSU (In-Service Software Upgrade) Validation Using pyATS for Cisco [Python for Network Engineer]

[Day #61 PyATS Series] Automating ISSU (In-Service Software Upgrade) Validation Using pyATS for Cisco [Python for Network Engineer]

Introduction — key points In-Service Software Upgrade (ISSU) is a powerful technique that allows upgrading the software on clustered or redundant network devices with minimal traffic disruption. But ISSU is risky: subtle control-plane events, process crashes, or platform incompatibilities can cause outages that are hard […]

[Day #48 PyATS Series] EIGRP Neighbor Health Check (Cisco IOS-XE / IOS-XR) using pyATS for Cisco [Python for Network Engineer]

[Day #48 PyATS Series] EIGRP Neighbor Health Check (Cisco IOS-XE / IOS-XR) using pyATS for Cisco [Python for Network Engineer]

Introduction — key points (what you’ll learn) EIGRP neighbor stability is critical for routing convergence and network stability. Small changes in SRTT, increasing retransmissions, or flapping adjacencies can lead to route withdrawal and traffic disruption. In this masterclass you will learn how to: This is […]

[Day #34 PyATS Series] DHCP Snooping & Binding Table Verification Using pyATS for Cisco [Python for Network Engineer]

[Day #34 PyATS Series] DHCP Snooping & Binding Table Verification Using pyATS for Cisco [Python for Network Engineer]

Introduction Dynamic Host Configuration Protocol (DHCP) Snooping is an essential security feature in enterprise networks. It acts as a firewall between untrusted hosts and trusted DHCP servers to protect against rogue DHCP attacks. Verifying the DHCP snooping configuration and ensuring the binding table’s integrity across […]

[Day #36 Pyats Series] Port-channel consistency validation across platforms using pyATS for Cisco [Python for Network Engineer]

[Day #36 Pyats Series] Port-channel consistency validation across platforms using pyATS for Cisco [Python for Network Engineer]

Introduction on the Key Points In modern enterprise networks, port-channels (also known as EtherChannels, LAGs, or bundles) are essential for link aggregation, redundancy, and high-throughput architecture between switches, routers, and firewalls. However, one of the most common root causes of inconsistent port-channel states is configuration […]

[Day #37 Pyats Series] Hardware inventory collection & reporting using pyATS for Cisco [Python for Network Engineer]

[Day #37 Pyats Series] Hardware inventory collection & reporting using pyATS for Cisco [Python for Network Engineer]

Introduction on the Key Points Welcome back to the “101 Days of pyATS (Vendor-Agnostic)” series—your go-to hands-on lab journal to automate real-world network tasks. On Day #37, we’re diving into a critical yet often manually performed task—hardware inventory collection. Imagine this: you need to collect […]

[Day #56 PyATS Series] Automating Pre/Post Config Change Checks (Brownfield) Using pyATS for Cisco [Python for Network Engineer]

[Day #56 PyATS Series] Automating Pre/Post Config Change Checks (Brownfield) Using pyATS for Cisco [Python for Network Engineer]

Introduction on the key points When working in a brownfield network, every configuration change carries risk. You must verify what is there now (pre-check), apply a change under controlled conditions, and verify what changed (post-check). Doing this manually is slow and error-prone — especially across […]