Hi
I found in documentation that StackWise Plus is providing up to 64
Gbps of throughput.
But is it full-duplex (then 128 Gbps half-duplex) or half-duplex (then
32Gbps full-duplex) ?
Is it per one port ? Or both stack ports ?
Rob
___
cisco-nsp mailing
On 25/04/2012 13:18, Robert Hass wrote:
I found in documentation that StackWise Plus is providing up to 64
Gbps of throughput.
But is it full-duplex (then 128 Gbps half-duplex) or half-duplex (then
32Gbps full-duplex) ?
Is it per one port ? Or both stack ports ?
64 gigs half duplex, and that
Hi,
I found in documentation that StackWise Plus is providing up to 64
Gbps of throughput.
But is it full-duplex (then 128 Gbps half-duplex) or half-duplex (then
32Gbps full-duplex) ?
Is it per one port ? Or both stack ports ?
just wondering why your company blocks access to google? ;-)
Is there something similar in IOS to lsd (label switch db) found in IOS XR ?
does this function of lsd exist in ios? (lsd seems like what I used to
understand as lib/tib but unsure at this point). if there is an lsd-type
thing in IOS, is there a way to see client apps (l2vpn, bgp, etc) bound to
On Wed, 2012-04-25 at 09:44 -0500, Aaron wrote:
Is there something similar in IOS to lsd (label switch db) found in
IOS XR ? does this function of lsd exist in ios? (lsd seems like what
I used to understand as lib/tib but unsure at this point). if there
is an lsd-type thing in IOS, is there
We have tried the following on our test FWSM setup and it appears to break our
original ACL used for blocking hosts.
Nothing in the docs I have read states one ACL overrides the other.
I have FWSM with OUTSIDE interface that has ACL-1 that is applied to both
inbound and outbound traffic to
what access-list commit mode are you using?
my preferred practice is manual commit mode, but make changes on tftp
server to acl and then upload entire acl with copy tftp running. at the
start of the script is access-list mode manual and clear configure
access-list blah. at the end of the script
I am using MANUAL, so I then run the access-list commit config command.
On Apr 25, 2012, at 11:24 , Jeffrey G. Fitzwater wrote:
We have tried the following on our test FWSM setup and it appears to break
our original ACL used for blocking hosts.
Nothing in the docs I have read states one
Gee and I thought LSD was for the operator and not a feature. Nice, no reason
the gear shouldn't share in the fun.
:)
On Apr 25, 2012, at 11:10 AM, Peter Rathlev wrote:
On Wed, 2012-04-25 at 09:44 -0500, Aaron wrote:
Is there something similar in IOS to lsd (label switch db) found in
IOS
Here's what I'm working with. I'm filtering all ethertype 0x86DD which
matches IPv6. I'm sniffing traffic leaving this VLAN and I can see that
there's IPv6 traffic coming out and it does indeed have this ethertype.
mac access-list extended macl-ipv6
deny any any 0x86DD 0x0
permit any any
Hi,
On Wed, Apr 25, 2012 at 09:58:34AM -0700, Paul Wozney wrote:
Here's what I'm working with. I'm filtering all ethertype 0x86DD which
matches IPv6. I'm sniffing traffic leaving this VLAN and I can see that
there's IPv6 traffic coming out and it does indeed have this ethertype.
mac
While MPLS hides the underlying topology from you, LSD is good for
exposing the metaphysical layer.
;-)
Scott Granados sc...@granados-llc.net writes:
Gee and I thought LSD was for the operator and not a feature. Nice, no
reason the gear shouldn't share in the fun.
:)
On Apr 25, 2012,
I know every time I'm at a laser light show and listening to Pink Floyd, I'm
wondering how I could make this even better. Now I know - MPLS!
Chuck
-Original Message-
From: cisco-nsp-boun...@puck.nether.net
[mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of Robert E. Seastrom
Sent:
Now all we need is a feature called weed and another called mushrooms and you'd
have my college years wrapped up in a single network element.
On Apr 25, 2012, at 1:53 PM, Chuck Church wrote:
I know every time I'm at a laser light show and listening to Pink Floyd, I'm
wondering how I could
hi all
i see on cisco 867va router interface and 'cd' lights blinking too much
always; never this see in idle; the router is just used as vpn server;
using another one as pppoe client elsewhere also behave the same way;
i'm just curious about it; is there anybody out there with similar
experience
I'm testing 15.2(2)S on a couple of 7600/SUP720 combos and I've experienced
some odd behaviour and I'm curious about whether or not anyone else has seen
this. It's been really hard to reproduce, but it does happen once in a while,
so I'm hoping similar experiences might give me some TAC
Aaron wrote:
Is there something similar in IOS to lsd (label switch db) found in IOS XR ?
does this function of lsd exist in ios? (lsd seems like what I used to
understand as lib/tib but unsure at this point). if there is an lsd-type
thing in IOS, is there a way to see client apps (l2vpn, bgp,
I've seen this on stacked 3750s when doing anything related to
configurations, it
would hang up hard enough to timeout EIGRP hellos from neighbors (and vice
versa)
causing general havoc everywhere.
The workaround was to include parser config cache interface.
During the hangs if you could get
On Mon, Apr 16, 2012 at 23:14, Scott Voll svoll.v...@gmail.com wrote:
What is the best practice around routing iSCSI?
We have been asked about routing iSCSI traffic over our WAN. What are the
pit falls that we need to be looking at?
Hi,
you should make sure you have guaranteed bandwidth and
I'm having an issue which I've been scratching my head about.
I have a ME-3400G-12CS with a 5x gig-E Portchannel using Gi0/12 - 16
classifying and adding CoS markings for downstream devices connected via
two 4x GigE Portchannels. I'm seeing output queue drops on both
downstream portchannels.
Good 1 ;-)
Sent from my iPad
On 25 Apr 2012, at 17:15, Scott Granados sc...@granados-llc.net wrote:
Gee and I thought LSD was for the operator and not a feature. Nice, no
reason the gear shouldn't share in the fun.
:)
On Apr 25, 2012, at 11:10 AM, Peter Rathlev wrote:
On Wed,
Have a single layer 2 connection between 7609, version 12.2(33)SRD4, 6708, with
a 10G connection to Brocade. Using simplest form of MSTP, it works fine to a
Brocade TI24X switch, running version 4 something.
Move the same cable to a 10G port on a MLXe, version 5.2.0T165, the Cisco
blocks the
Hi Paul,
mac access-list extended macl-ipv6
deny any any 0x86DD 0x0
permit any any
IRC MAC ACLs on CAT2K/3K (12.2SE) only match non-IP traffic.
IPv4 packets match only in the IP ACL,
IPv6 packets match only in the IPv6 ACL.
So even with a deny any any in the MAC ACL IPv4 and IPv6
--- On Wed, 4/25/12, Steven Raymond sraym...@acedatacenter.com wrote:
From: Steven Raymond sraym...@acedatacenter.com
Subject: [c-nsp] MSTP between Cisco / Brocade
To: cisco-nsp Service Providers cisco-nsp@puck.nether.net
Date: Wednesday, April 25, 2012, 1:52 PM
Have a single layer 2
On Apr 25, 2012, at 3:55 PM, Randy wrote:
I am not clear if you have 802.1s OR 802-1w enabled on the Brocade(care to
post the stp output from Brocade?)
sh run | i mstp
mstp name acedc
mstp revision 1
mstp instance 0 vlan 1 to 4090
mstp start
--- On Wed, 4/25/12, Steven Raymond sraym...@acedatacenter.com wrote:
From: Steven Raymond sraym...@acedatacenter.com
Subject: Re: [c-nsp] MSTP between Cisco / Brocade
To: Randy randy_94...@yahoo.com
Cc: cisco-nsp Service Providers cisco-nsp@puck.nether.net
Date: Wednesday, April 25, 2012, 3:03
After the problem do you see spikes in the CPU history? I believe most show
commands run as a low priority process that can yield frequently, so it's
possible something else is going on and the symptom is the slow terminal
response time.
On Wed, Apr 25, 2012 at 2:58 PM, Jason Lixfeld
Configuring some ASR9ks, and I noticed:
http://www.cisco.com/en/US/docs/routers/asr9000/software/asr9k_r4.2/routing/configuration/guide/b_routing_cg42asr9k_chapter_00.html#con_1088375
To prevent a peer from flooding BGP with advertisements, a limit is placed
on the number of prefixes that are
Hi,
I would like to know is there any functional difference between PRC and
iSPF as far as both OSPF and IS-IS is concerned. I know IS-IS had PRC
feature inherent to its protocol as it has separate TLV for NLRI and
topology information and OSPF was not. Introduction of iSPF made OSPF the
same
After playing with a lab switch (3560X) today looking at some IPv6
features, we discovered you can't really do IPv6 VRFs on it.
The vrf definition configuration option doesn't like address-family
at all, so no IPv4/IPv6 bits there.
Is this an under consideration software function, or a
On Wed, Apr 25, 2012 at 22:03, henrry huaman henry.hua...@yahoo.es wrote:
Hi guys,
Please could help us, we need to send defaul route in IPv6 (IOS-XR).
Hi Henry,
I am guessing that you want to send a default route to a BGP peer. In
this case, your syntax below will not work out. You are
Hi guys,
Please could help us, we need to send defaul route in IPv6 (IOS-XR).
And we have only this command in bgp proccess default-information originate.
+
r1-PE#sh run router bgp
router bgp 65404
bgp router-id 1.1.1.1
default-information originate
32 matches
Mail list logo