Hacker News new | past | comments | ask | show | jobs | submit login

One pulls the key off the network element, plugs that into a website which produces an authorization key which can then be cut and pasted into the network element.



jesus. in the age of cloud computing you copy/paste keys around :( this is just sad and makes me believe that you'd have to be borderline insane to choose cisco for anything that is started from scratch today.


Umm, how else would you propose to authorize air-gapped gear?


how about don’t. take my money and give me freedom for MY devices


It brings to focus exactly how anti-customer they are.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: