Re: [c-nsp] Cisco 6503 Sup2T Engine block outbound TCP or UDP Port traffic

2014-02-02 Thread Octavio Alvarez
On 02/01/2014 08:28 PM, Joseph Hardeman wrote: Hi Everyone, I have a SUP2t engine running IOS s2t54-ADVIPSERVICESK9-M version and I am wondering if there is a way to filter or block TCP or UDP port traffic. I know how to NULL route IP 's but I don't know if there is a way to block or deny

[c-nsp] PPPoE Session

2014-02-02 Thread M K
Hi allCan I control the session timeout via CLI ? i.e. I want each PPPoE session to be disconnected automatically after for example 24 hours? ___ cisco-nsp mailing list cisco-nsp@puck.nether.net

Re: [c-nsp] PPPoE Session

2014-02-02 Thread cnsp
Hi all Can I control the session timeout via CLI ? i.e. I want each PPPoE session to be disconnected automatically after for example 24 hours? Yes We Can: ! int dialer 3 ! ... encapsulation ppp dialer pool 2 dialer-group 1 dialer idle-timeout 0 dialer persistent no cdp enable

Re: [c-nsp] PPPoE Session

2014-02-02 Thread M K
Thanks for the replyU mean the timeout absolute 1400 0 , for example for 24 hours it should be 1440 ? BR, From: c...@marenda.net To: gunner_...@live.com; cisco-nsp@puck.nether.net Subject: AW: [c-nsp] PPPoE Session Date: Sun, 2 Feb 2014 12:43:50 +0100 Hi all Can I control the session

Re: [c-nsp] Transparent WAN Encryption

2014-02-02 Thread Eugeniu Patrascu
On Sun, Feb 2, 2014 at 4:16 AM, Antonio Soares amsoa...@netcabo.pt wrote: Hello group, Service Provider WAN links are not secure anymore and I have more and more enterprise customer asking transparent WAN encryption solutions. I came across these two products: EncryptTight:

Re: [c-nsp] TAC hits a new record level of aggravation...

2014-02-02 Thread Justin M. Streiner
On Sat, 1 Feb 2014, Mike Hale wrote: I was having weird issues but realized that it was because the file was too big. Not that there was an error message to that effect or anything. Along the file too big line, is it really necessary for a show tech from a Nexus 7000 to be ~40 MB

Re: [c-nsp] Packet-level iSCSI debugging

2014-02-02 Thread Nick Hilliard
On 02/02/2014 01:41, Mike Hale wrote: the utilization is well below 10gigs what you mean here is that the utilization is well below 10gigs averaged over the sampling period. Iscsi is sensitive to dropped packets, and it could be that you're dropping packets due to traffic bursts which are too

[c-nsp] You have a new encrypted message from j...@parknationalbank.com

2014-02-02 Thread jorr
You have received an encrypted message from j...@parknationalbank.com. To view the email message, paste the following URL into your browser to access the Barracuda Message Center. Once at the Message Center you’ll be prompted to either create a password or enter the one you’ve already set up.

Re: [c-nsp] Transparent WAN Encryption

2014-02-02 Thread Jeff Orr
If you are using a private MPLS (I.e. Not over Internet) have Cisco CE routers consider GETVPN. For the reasons you mentioned, we as a customer went this direction. We needed to ensure our WAN (150 sites/multiple data centers)traveling across a variety of links/providers including

Re: [c-nsp] Transparent WAN Encryption

2014-02-02 Thread Tarko Tikan
hey, If you are using a private MPLS (I.e. Not over Internet) have Cisco CE routers consider GETVPN. There is no reason why you can't use GETVPN inside L3VPN. This is exactly one use case for GETVPN and many people are using it successfully. If you don't trust your provider at all,

Re: [c-nsp] PPPoE Session

2014-02-02 Thread cnsp
Thanks for the reply U mean the timeout absolute 1400 0 , for example for 24 hours it should be 1440 ? Yes, you got it J ! It is timeout absolute minutes seconds , 1day = 24 hours = 24*60 = 1440 minutes plus 0 seconds. ___ cisco-nsp

Re: [c-nsp] Transparent WAN Encryption

2014-02-02 Thread Antonio Soares
I'm looking for the simplest way to do it. Most customers have L2 connections between Data Centers. The edge device controlled by the customer is a Layer 2 Switch. The mechanisms like IPSec, GETVPN, FlexVPN, an so on, need a router in the edge. This implies modification of the customer's

Re: [c-nsp] Transparent WAN Encryption

2014-02-02 Thread Antonio Soares
Great ! Here are the links for those interested on this subject: Thales: http://www.thales-esecurity.com/products-and-services/products-and-services/ network-encryption-appliances/datacryptor-link-and-layer-2-encryption SafeNet:

[c-nsp] Debug Radius auth and passwords

2014-02-02 Thread Robert Hass
Hi I'm just troubleshooting Radius authentications for VPN and PPPoE access. I enabled Radius auth debug by : debug radius authentication But I see * as password in debug log. Is any way to change this behavior ? I would like what user enters as need to check is correct. I know that I can check

Re: [c-nsp] Transparent WAN Encryption

2014-02-02 Thread cnsp
Many of those devices do think that the WAN Ethernet is Bit-transparent, not paket-oriented, unlimited MTU... In Reality, those EthernetLinks are MTU-Limited, often with an EthernetMTU of just 1500 or sometimes plus 1 or 2 VLAN Tags. Full-Stop. No Space for Additional information,encryption

Re: [c-nsp] Debug Radius auth and passwords

2014-02-02 Thread David White (dwhitejr)
Hi Rob, No. Passwords are obscured for security reasons. Sincerely, David. On Feb 2, 2014, at 4:50 PM, Robert Hass robh...@gmail.com wrote: Hi I'm just troubleshooting Radius authentications for VPN and PPPoE access. I enabled Radius auth debug by : debug radius authentication But

Re: [c-nsp] Twinax trivia check (was Re: Is there such a thing as a 10GBase-T SFP+ transciever)

2014-02-02 Thread Jeff Kell
On 2/2/2014 5:49 PM, Murphy-Olson, Daniel E. wrote: Most of the switch vendors have an official compatibility list, but I've found that generally the most common compatibility issue is active vs passive twinax. Brocade edge switches and nics are normally active only, which seems to come

Re: [c-nsp] Transparent WAN Encryption

2014-02-02 Thread Ian Henderson
On 3 Feb 2014, at 8:10 am, Antonio Soares amsoa...@netcabo.pt wrote: I'm looking for the simplest way to do it. Most customers have L2 connections between Data Centers. The edge device controlled by the customer is a Layer 2 Switch. The mechanisms like IPSec, GETVPN, FlexVPN, an so on, need a