After spending a small fortune on sticks I found one that works from romon
and IOS for the whole ISR G2 range
Corsair Flash Survivor Stealth - USB flash drive - 16 GB - USB 3.0
Its also waterproof, sturdy and comes in matt gangsta black.
On 2 December 2013 22:42, Richard Clayton
I saw some (--) low alarms (current mA) on my optics in intfs ten3/2, 4/2, 4/7,
4/8, 7/1, 7/2, 7/12, 7/13, 7/16.
I'm wondering if these alarms can cause any kind of problems.
Has anyone experience ?
Tks
#sh inter transceiver
Transceiver monitoring is disabled for all interfaces.
If device is
Hi,
what kind of optics is that ?
The readings rely on the optics used.
Here an output of a system with some OEM LR optics and China DWDM:
Optical Optical
Temperature Voltage Current Tx Power Rx Power
Port (Celsius)(Volts)
On 07/01/14 12:08, R S wrote:
I saw some (--) low alarms (current mA) on my optics in intfs ten3/2, 4/2, 4/7,
4/8, 7/1, 7/2, 7/12, 7/13, 7/16.
I'm wondering if these alarms can cause any kind of problems.
Has anyone experience ?
You can ignore these in my experience. We see them with both
I have X2-10GB-SR on the c6500, on the opposite side of the fiber there are
some firewalls.
But can these alarms trigger issues in traffic passing through ?
I'm asking since I'm experiencing some problems time to time.
Tks
Date: Tue, 7 Jan 2014 14:02:32 +0100
Subject: Re: [c-nsp] c6500 Low
On (2014-01-07 14:02 +0100), Rolf Hanßen wrote:
Hi,
what kind of optics is that ?
The readings rely on the optics used.
Here an output of a system with some OEM LR optics and China DWDM:
I am quite sure the Xenpaks neither have -63 nor 104 degree Celsius. ;)
Are those statics? Do you
I'm curious to hear experience stories from anyone who's explored the
hardware inspection and relicensing program:
http://www.cisco.com/en/US/prod/hw_sw_relicensing_program.html
Specifically, I'm curious about:
- the inspection process/logistics
- the costs associated with the inspection
- the
On Tuesday, January 07, 2014 04:50:46 PM Chris Marget wrote:
I'm curious to hear experience stories from anyone who's
explored the hardware inspection and relicensing
program:
http://www.cisco.com/en/US/prod/hw_sw_relicensing_program
.html
Specifically, I'm curious about:
- the
I have a 4948 running 12.2(53)SG2 connected via trunk to an upstream
router. I need to do some testing (long, unrelated story) because
we're having some IPv6-related issues with devices in a certain VLAN
on that switch. I can't test to a production server, so I was thinking
about adding an IPv6
On 07/01/14 16:47, John Neiberger wrote:
The documentation for 12.2(53)SG2 doesn't even mention IPv6 but the
commands are there. What would be the best (safest) way to do this?
Should I configure ipv6 nd ra suppress and then configure an IPv6
address on the SVI?
I think you really need:
ipv6
Hi,
as long as you don't enable ipv6 unicast-routing it shouldn't send out any
RAs anyway.
this is at least what I've seen on all Cisco devices so far.
best
Enno
On Tue, Jan 07, 2014 at 09:47:20AM -0700, John Neiberger wrote:
I have a 4948 running 12.2(53)SG2 connected via trunk to an
We bought a bunch of 6500s a few years back, saved a bundle ...
however now the E chassis are the only ones supported for
Sup720s/VSS/Sup32-10s so any of the gear we bought that was non-E .. has to
be replaced.
Still cheaper.
We can get a Sup32-10G for $2K. Cisco wants 20+K.
I can put a few
What about support with Cisco (eg TAC) and software updates, security patches,
bug fixes etc?
alan
--
Sent from my Android device with K-9 Mail. Please excuse my brevity.
___
cisco-nsp mailing list cisco-nsp@puck.nether.net
My primary interest with this query is to do everything above-board from a
software licensing perspective.
Hardware support (warranty) and TAC support is a secondary concern.
Software updates, on the other hand, do kind of matter.
Is there a right way to handle software updates without a
List,
I have two Cisco 7604s (sup720 Base) and I have installed SPA-IPSEC-2Gs in
them. Currently I am running s72033-advipservicesk9_wan-mz.122-33 and I have
yet to find success in protecting tunnel traffic. The second I configure the
tunnel mode to ipsec, the tunnel goes up/down proto.
On Tuesday, January 07, 2014 07:33:24 PM scott owens wrote:
It really depends I think on the level of technology you
are looking for - Nexus 7K, 6800 ... gotta go with
Cisco.
6500, 2960s, 3850/ ... you can pick up in alternate
market.
Agree, the grey market won't help you for modern
On Tue, Jan 7, 2014 at 1:37 PM, Mark Tinka mark.ti...@seacom.mu wrote:
They call this Cisco Remarket. It's like selling a car to
someone else two minutes after it leaves the showroom. As a
buyer you get a discount, but you're better off buying a new
unit yourself.
Mark.
But you're legally
If you can't afford new Cisco hardware for production, then find another
platform.
You NEED to be able to update the software on the boxes. These devices
become a danger to the Internet if you don't keep up to date with the
security fixes.
Running them for a home lab is another story.
Regards
On Tue, Jan 7, 2014 at 5:23 PM, Andrew Miehs and...@2sheds.de wrote:
If you can't afford new Cisco hardware for production, then find another
platform.
According to this thread, even those who can afford new Cisco hardware are
going to have a problem unless they can *also* afford a support
On 07/01/2014 22:54, Chris Marget wrote:
FWIW, it seems that the security fixes might be available for free, so long
as Cisco PSIRT recognizes a vulnerability in a particular bit of software.
...But the document describing that process suggests calling TAC, which
doesn't usually go well if the
I can confirm getting software from TAC due to a PSIRT vulnerability as well,
it's not usually too much trouble (although more hassle than just being able to
download it).
We had the strange situation where an EOL piece of kit was out of maintenance
and past the date for adding maintenance to
For some hardware, especially the fixed-chassis Catalysts, there is a
limited lifetime warranty that is supposed to include software
updates, particularly those related to security defects and known
release defects.
However, the current TAC downloads will show releases, but requests a
login to
Running them for a home lab is another story.
It's another story from the vulnerability perspective, but the same
story
from the am I entitled to run this software? perspective, which is
the
one I'd like to better understand.
Good luck with that.
I've been trying to clarify something
Hi All,
I have upgraded my existing tails to ADSL2+ and noted that I am not getting
gigawords for my radius.
My IOS is 12.2(33)SRD4, and it is supporting only 32 bit counters. I need
to know which IOS supports 64 bit counters which can fix the problem.
Regards,
*Ali Sumsam *
On Tuesday, January 07, 2014 09:55:39 PM Blake Dunlap wrote:
But you're legally allowed to run the software that came
on the car.
Agree - I'm talking about what happens in real life.
Mark.
signature.asc
Description: This is a digitally signed message part.
25 matches
Mail list logo