Guys,
Appreciate if you anyone can lead to where I can find L2-tunnelling of
CDP configuration, for example as below:
Dot1Q Trunk
R1====SW1============Sw3
In this case, we want R1 seems to be connected Sw3 and do this via dot1Q
tunneling.
Thanks and Regards,
Kumar Ramalingam
-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of
[EMAIL PROTECTED]
Sent: Tuesday, June 03, 2008 8:13 AM
To: [email protected]
Subject: CCIE_RS Digest, Vol 29, Issue 5
Send CCIE_RS mailing list submissions to
[email protected]
To subscribe or unsubscribe via the World Wide Web, visit
http://onlinestudylist.com/mailman/listinfo/ccie_rs
or, via email, send a message with subject or body 'help' to
[EMAIL PROTECTED]
You can reach the person managing the list at
[EMAIL PROTECTED]
When replying, please edit your Subject line so it is more specific
than "Re: Contents of CCIE_RS digest..."
Today's Topics:
1. HSRP reload timers (Suresh Mishra)
2. Re: HSRP reload timers (Scott Morris)
3. NTP authentication (Roger RPF)
4. Re: NTP authentication (Marvin Greenlee)
5. Re: NTP authentication (Roger RPF)
6. Re: NTP authentication (Roger RPF)
7. Re: NTP authentication (Scott Morris)
8. Re: NTP authentication ([EMAIL PROTECTED])
----------------------------------------------------------------------
Message: 1
Date: Mon, 2 Jun 2008 13:34:29 -0400
From: "Suresh Mishra" <[EMAIL PROTECTED]>
Subject: [OSL | CCIE_RS] HSRP reload timers
To: "Scott Morris" <[EMAIL PROTECTED]>, "OSL CCIE Routing and
Switching Lab Exam" <[email protected]>
Message-ID:
<[EMAIL PROTECTED]>
Content-Type: text/plain; charset=ISO-8859-1
Hello all,
This might be a simple question but I have trouble understanding the
command. there are two commands that allow us to specify the delay
timer for router reload.
Both of these timers become active after the router is reloaded.
First one
standby [group-number] preempt [delay {minimum delay | reload delay |
sync delay}]
Second command.
standby delay minimum min-delay reload reload-seconds
I was wondering if I specify both the commands with different values
which one will take precedence
Thanks
Suresh
------------------------------
Message: 2
Date: Mon, 2 Jun 2008 13:40:35 -0400
From: "Scott Morris" <[EMAIL PROTECTED]>
Subject: Re: [OSL | CCIE_RS] HSRP reload timers
To: "'Suresh Mishra'" <[EMAIL PROTECTED]>, "'OSL CCIE
Routing
and Switching Lab Exam'" <[email protected]>
Message-ID: <[EMAIL PROTECTED]>
Content-Type: text/plain; charset="us-ascii"
While I've never tried, I would presume that the first command (group
specific) would override the second (more generic) timer.
Give it a whirl with both and run "show standby" and see which one wins!
:)
Scott
-----Original Message-----
From: Suresh Mishra [mailto:[EMAIL PROTECTED]
Sent: Monday, June 02, 2008 1:34 PM
To: Scott Morris; OSL CCIE Routing and Switching Lab Exam
Subject: HSRP reload timers
Hello all,
This might be a simple question but I have trouble understanding the
command. there are two commands that allow us to specify the delay timer
for
router reload.
Both of these timers become active after the router is reloaded.
First one
standby [group-number] preempt [delay {minimum delay | reload delay |
sync
delay}]
Second command.
standby delay minimum min-delay reload reload-seconds
I was wondering if I specify both the commands with different values
which
one will take precedence
Thanks
Suresh
------------------------------
Message: 3
Date: Mon, 2 Jun 2008 22:26:39 +0200
From: "Roger RPF" <[EMAIL PROTECTED]>
Subject: [OSL | CCIE_RS] NTP authentication
To: "'OSL CCIE Routing and Switching Lab Exam'"
<[email protected]>
Message-ID: <[EMAIL PROTECTED]>
Content-Type: text/plain; charset="iso-8859-1"
Hi Group,
If I have a NTP master and want to use authentication with all my
clients,
is it not necessary to use the command ntp authenticate on the master?
Master:
ntp master 3
ntp source loopback 0
ntp authentication key 1 md5 test
ntp authenticate --> necessary??
Client:
ntp server x.x.x.x key 1
ntp authenticae
ntp trusted-key 1
ntp authentication key 1 md5 test
regards
Roger
------------------------------
Message: 4
Date: Mon, 2 Jun 2008 16:33:27 -0400
From: "Marvin Greenlee" <[EMAIL PROTECTED]>
Subject: Re: [OSL | CCIE_RS] NTP authentication
To: "OSL CCIE Routing and Switching Lab Exam"
<[email protected]>
Message-ID:
<[EMAIL PROTECTED]>
Content-Type: text/plain; charset="iso-8859-1"
For a minimal config, the master just needs the command "ntp master" and
the
authentication key. With NTP the master just hands out the key, it is
up to
the client to decide whether they determine that it is valid.
Other devices just need the key, and the command 'ntp server x.x.x.x key
yy'.
Verify with show ntp associations detail, and make sure that your
clients
show as "authenticated"
On 6/2/08, Roger RPF <[EMAIL PROTECTED]> wrote:
>
> Hi Group,
>
> If I have a NTP master and want to use authentication with all my
clients,
> is it not necessary to use the command ntp authenticate on the master?
>
> Master:
> ntp master 3
> ntp source loopback 0
> ntp authentication key 1 md5 test
> ntp authenticate --> necessary??
>
> Client:
> ntp server x.x.x.x key 1
> ntp authenticae
> ntp trusted-key 1
> ntp authentication key 1 md5 test
>
> regards
>
> Roger
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
http://onlinestudylist.com/pipermail/ccie_rs/attachments/20080602/887d97
a7/attachment-0001.html
------------------------------
Message: 5
Date: Mon, 2 Jun 2008 23:32:20 +0200
From: "Roger RPF" <[EMAIL PROTECTED]>
Subject: Re: [OSL | CCIE_RS] NTP authentication
To: "'OSL CCIE Routing and Switching Lab Exam'"
<[email protected]>
Message-ID: <[EMAIL PROTECTED]>
Content-Type: text/plain; charset="iso-8859-1"
Ok, that works but for which reason is there the
ntp authenticate
ntp trusted-key 1
In some examples in the PG it is used and in some not...hmmm
Von: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Im Auftrag von Marvin
Greenlee
Gesendet: Montag, 2. Juni 2008 22:33
An: OSL CCIE Routing and Switching Lab Exam
Betreff: Re: [OSL | CCIE_RS] NTP authentication
For a minimal config, the master just needs the command "ntp master" and
the
authentication key.? With NTP the master just hands out the key, it is
up to
the client to decide whether they determine that it is valid.
?
?
Other devices just need the key, and the command 'ntp server x.x.x.x key
yy'.
?
Verify with show ntp associations detail, and?make sure?that your
clients
show as "authenticated"
?
On 6/2/08, Roger RPF <[EMAIL PROTECTED]> wrote:
Hi Group,
If I have a NTP master and want to use authentication with all my
clients,
is it not necessary to use the command ntp authenticate on the master?
Master:
ntp master 3
ntp source loopback 0
ntp authentication key 1 md5 test
ntp authenticate --> necessary??
Client:
ntp server x.x.x.x key 1
ntp authenticae
ntp trusted-key 1
ntp authentication key 1 md5 test
regards
Roger
------------------------------
Message: 6
Date: Tue, 3 Jun 2008 00:21:12 +0200
From: "Roger RPF" <[EMAIL PROTECTED]>
Subject: Re: [OSL | CCIE_RS] NTP authentication
To: "'OSL CCIE Routing and Switching Lab Exam'"
<[email protected]>, <[EMAIL PROTECTED]>
Message-ID: <[EMAIL PROTECTED]>
Content-Type: text/plain; charset="iso-8859-1"
Hi Marvin
Well, somehow something is not correct. If I configure only the
following as
you told:
Master:
ntp authentication-key 1 md5 cisco
ntp master 4
Client:
ntp server x.x.x.x key 1
ntp authentication-key 1 md5 test
Even if the password are not the same, I get the ntp on the client
synchronised. So then I configure the client:
ntp server x.x.x.x key 1
ntp authentication-key 1 md5 cisco
ntp authenticate
Still does not work. So I continue on the client:
ntp server x.x.x.x key 1
ntp authentication-key 1 md5 cisco
ntp authenticate
ntp trusted key 1
Now everything is fine. So to me the client needs the 4 statements
mentioned
above, isn't it or am I missing something??
Roger
-----Urspr?ngliche Nachricht-----
Von: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Im Auftrag von Roger RPF
Gesendet: Montag, 2. Juni 2008 23:32
An: 'OSL CCIE Routing and Switching Lab Exam'
Betreff: Re: [OSL | CCIE_RS] NTP authentication
Ok, that works but for which reason is there the
ntp authenticate
ntp trusted-key 1
In some examples in the PG it is used and in some not...hmmm
Von: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Im Auftrag von Marvin
Greenlee
Gesendet: Montag, 2. Juni 2008 22:33
An: OSL CCIE Routing and Switching Lab Exam
Betreff: Re: [OSL | CCIE_RS] NTP authentication
For a minimal config, the master just needs the command "ntp master" and
the
authentication key.? With NTP the master just hands out the key, it is
up to
the client to decide whether they determine that it is valid.
?
?
Other devices just need the key, and the command 'ntp server x.x.x.x key
yy'.
?
Verify with show ntp associations detail, and?make sure?that your
clients
show as "authenticated"
?
On 6/2/08, Roger RPF <[EMAIL PROTECTED]> wrote:
Hi Group,
If I have a NTP master and want to use authentication with all my
clients,
is it not necessary to use the command ntp authenticate on the master?
Master:
ntp master 3
ntp source loopback 0
ntp authentication key 1 md5 test
ntp authenticate --> necessary??
Client:
ntp server x.x.x.x key 1
ntp authenticae
ntp trusted-key 1
ntp authentication key 1 md5 test
regards
Roger
------------------------------
Message: 7
Date: Mon, 2 Jun 2008 18:47:29 -0400
From: "Scott Morris" <[EMAIL PROTECTED]>
Subject: Re: [OSL | CCIE_RS] NTP authentication
To: "'OSL CCIE Routing and Switching Lab Exam'"
<[email protected]>, <[EMAIL PROTECTED]>
Message-ID: <[EMAIL PROTECTED]>
Content-Type: text/plain; charset="iso-8859-1"
Without "ntp authenticate" you are still passing the key but not really
caring one way or the other (plain text, not md5 as I recall).
Once you turn on "ntp authenticate" you basically tell the routers to
care.
:) At that point, you also MUST put in the "ntp trusted-key" command on
the
client side in order to really believe it (strange as it is).
Bottom line though, as Marvin said... Look at the show commands!
HTH,
Scott
-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Roger RPF
Sent: Monday, June 02, 2008 6:21 PM
To: 'OSL CCIE Routing and Switching Lab Exam'; [EMAIL PROTECTED]
Subject: Re: [OSL | CCIE_RS] NTP authentication
Hi Marvin
Well, somehow something is not correct. If I configure only the
following as
you told:
Master:
ntp authentication-key 1 md5 cisco
ntp master 4
Client:
ntp server x.x.x.x key 1
ntp authentication-key 1 md5 test
Even if the password are not the same, I get the ntp on the client
synchronised. So then I configure the client:
ntp server x.x.x.x key 1
ntp authentication-key 1 md5 cisco
ntp authenticate
Still does not work. So I continue on the client:
ntp server x.x.x.x key 1
ntp authentication-key 1 md5 cisco
ntp authenticate
ntp trusted key 1
Now everything is fine. So to me the client needs the 4 statements
mentioned
above, isn't it or am I missing something??
Roger
-----Urspr?ngliche Nachricht-----
Von: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Im Auftrag von Roger RPF
Gesendet: Montag, 2. Juni 2008 23:32
An: 'OSL CCIE Routing and Switching Lab Exam'
Betreff: Re: [OSL | CCIE_RS] NTP authentication
Ok, that works but for which reason is there the
ntp authenticate
ntp trusted-key 1
In some examples in the PG it is used and in some not...hmmm
Von: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Im Auftrag von Marvin
Greenlee
Gesendet: Montag, 2. Juni 2008 22:33
An: OSL CCIE Routing and Switching Lab Exam
Betreff: Re: [OSL | CCIE_RS] NTP authentication
For a minimal config, the master just needs the command "ntp master" and
the
authentication key.? With NTP the master just hands out the key, it is
up to
the client to decide whether they determine that it is valid.
?
?
Other devices just need the key, and the command 'ntp server x.x.x.x key
yy'.
?
Verify with show ntp associations detail, and?make sure?that your
clients
show as "authenticated"
?
On 6/2/08, Roger RPF <[EMAIL PROTECTED]> wrote:
Hi Group,
If I have a NTP master and want to use authentication with all my
clients,
is it not necessary to use the command ntp authenticate on the master?
Master:
ntp master 3
ntp source loopback 0
ntp authentication key 1 md5 test
ntp authenticate --> necessary??
Client:
ntp server x.x.x.x key 1
ntp authenticae
ntp trusted-key 1
ntp authentication key 1 md5 test
regards
Roger
------------------------------
Message: 8
Date: Mon, 2 Jun 2008 19:12:14 -0400
From: <[EMAIL PROTECTED]>
Subject: Re: [OSL | CCIE_RS] NTP authentication
To: "'Roger RPF'" <[EMAIL PROTECTED]>, "'OSL CCIE Routing and Switching
Lab Exam'" <[email protected]>
Message-ID: <[EMAIL PROTECTED]>
Content-Type: text/plain; charset="iso-8859-1"
In the minimal example I mentioned, if passwords not correct, the time
will
still sync, however the output of 'show ntp associations detail" will
NOT
show as "authenticated".
Marvin Greenlee, CCIE #12237 (R&S, SP, Sec)
Senior Technical Instructor - IPexpert, Inc.
Telephone: +1.810.326.1444
Fax: +1.810.454.0130
Mailto: [EMAIL PROTECTED]
Join our free online support and peer group communities:
http://www.IPexpert.com/communities
IPexpert - The Global Leader in Self-Study, Classroom-Based, Video On
Demand
and Audio Certification Training Tools for the Cisco CCIE R&S Lab, CCIE
Security Lab, CCIE Service Provider Lab, CCIE Voice Lab and CCIE Storage
Lab
Certifications.
-----Original Message-----
From: Roger RPF [mailto:[EMAIL PROTECTED]
Sent: Monday, June 02, 2008 6:21 PM
To: 'OSL CCIE Routing and Switching Lab Exam'; [EMAIL PROTECTED]
Subject: AW: [OSL | CCIE_RS] NTP authentication
Hi Marvin
Well, somehow something is not correct. If I configure only the
following as
you told:
Master:
ntp authentication-key 1 md5 cisco
ntp master 4
Client:
ntp server x.x.x.x key 1
ntp authentication-key 1 md5 test
Even if the password are not the same, I get the ntp on the client
synchronised. So then I configure the client:
ntp server x.x.x.x key 1
ntp authentication-key 1 md5 cisco
ntp authenticate
Still does not work. So I continue on the client:
ntp server x.x.x.x key 1
ntp authentication-key 1 md5 cisco
ntp authenticate
ntp trusted key 1
Now everything is fine. So to me the client needs the 4 statements
mentioned
above, isn't it or am I missing something??
Roger
-----Urspr?ngliche Nachricht-----
Von: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Im Auftrag von Roger RPF
Gesendet: Montag, 2. Juni 2008 23:32
An: 'OSL CCIE Routing and Switching Lab Exam'
Betreff: Re: [OSL | CCIE_RS] NTP authentication
Ok, that works but for which reason is there the
ntp authenticate
ntp trusted-key 1
In some examples in the PG it is used and in some not...hmmm
Von: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Im Auftrag von Marvin
Greenlee
Gesendet: Montag, 2. Juni 2008 22:33
An: OSL CCIE Routing and Switching Lab Exam
Betreff: Re: [OSL | CCIE_RS] NTP authentication
For a minimal config, the master just needs the command "ntp master" and
the
authentication key.? With NTP the master just hands out the key, it is
up to
the client to decide whether they determine that it is valid.
?
?
Other devices just need the key, and the command 'ntp server x.x.x.x key
yy'.
?
Verify with show ntp associations detail, and?make sure?that your
clients
show as "authenticated"
?
On 6/2/08, Roger RPF <[EMAIL PROTECTED]> wrote:
Hi Group,
If I have a NTP master and want to use authentication with all my
clients,
is it not necessary to use the command ntp authenticate on the master?
Master:
ntp master 3
ntp source loopback 0
ntp authentication key 1 md5 test
ntp authenticate --> necessary??
Client:
ntp server x.x.x.x key 1
ntp authenticae
ntp trusted-key 1
ntp authentication key 1 md5 test
regards
Roger
End of CCIE_RS Digest, Vol 29, Issue 5
**************************************