Re: Problem [7:71890]

2003-07-06 Thread Jens Neelsen
Hi,

first you need to enable ip routing to make it work.

Then your default route should look like this:
ip route 0.0.0.0 0.0.0.0 xxx.xxx.xxx.xxx  where is
xxx.xxx.xxx.xxx is the other router interface. 
Note: after the destination network follows a subnet mask (not a
wildcard mask).

Make sure you have a route in your other back to this router
(Entires in the routing table are oneway only). Try show ip
route to verify.

With kind regards
Jens Neelsen

--- Projet AIM  wrote:
 Hi again
 I am pretty much thanksfull for your explanantion
 I have tried what you have suggested and still it doesn't work
 The thing is I am convainced that I am missing something but
 can't find out 
 what
 Thanx again and any help is appreciated
 Elias
 
 
 From: Jans van Deventer 
 Reply-To: Jans van Deventer 
 To: [EMAIL PROTECTED]
 Subject: Re: Problem [7:71890]
 Date: Fri, 4 Jul 2003 14:25:41 GMT
 
 Hi
 
 What you did when you typed no ip routing was to
 effectively change
 your router into an IP host. You must enable ip routing with
 ip
 routing and then add your static route. Test again and come
 back for
 help if it doensn't work.
 
 One advantage of disabling IP routing and effectively turning
 your
 router into a host is because you can then use all the nice
 debug
 functionalities like debug ip packet, as though your router
 was a host.
 
 Regards,
 Jans
 
 Projet AIM wrote:
 
  Hi all
  I have a cisco 3600 and I am facing an unknown problem
 maybe it is 
 stupuid
  but realy i don't know
  I have a pretty much common configuration 2 valid IP
 addresses on both
  interfaces. one of them are my network the other interface
 is linked to
  another router interface when I trie to ping the outside
 from the 
 router's
  consol I have a response but when I try to ping from a
 machine in my
 network
  and don't have any reply.
  I used static route as in
  ip route 0.0.0.0 255.255.255.255 xxx.xxx.xxx.xxx  where
 is
 xxx.xxx.xxx.xxx
is the other router interface
  I disabled ip routing
  no ip routing
  Can Anyone please help me if a missed anything
  THANX a lot
  Elias
  
 

_
  Trouvez l'bme soeur sur MSN Rencontres !
 http://g.msn.fr/FR1000/9551

_
 Dicouvrez les nouvelles imotictnes animies de 
 http://g.msn.fr/FR1001/866 
 MSN Messenger nouvelle formule
[EMAIL PROTECTED]




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7i=71942t=71890
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]


Re: RE: Multimedia/Voice over VSAT [7:71706]

2003-07-06 Thread garrett allen
interactive voice over satellite is problematic due to the inherent 
latency of the signal travelling 40,000km distance to the satellite 
and another 40,000km back.  this adds 125ms of latency in each 
direction (to/from the bird), give or take.  if you remeber using 
satellite for long distance calls it took some getting used to (a bit 
like talking on a 2 way radio) and the perceived signal quality was 
less than using an under the pond cable.  satellite for 1 way video is 
fine, carriers use it for backhaul on a regular basis, but interactive 
video suffers the same difficulties as interactive voice.

so with the amount of latency already involved i would try to reduce 
any further quality impairments caused by voip or digital video 
processing.  satellite offers a variety of quality impairments of its




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7i=71943t=71706
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]


Policy-Based Routing [7:71944]

2003-07-06 Thread Jason Viera
Just for clarification can someone comment on or confirm the following: If
policy routing is enabled on an interface and the policy states that a
packet received on that particular interface be sent to a next hop IP or an
interface, will the packet be sent to that next hop even if a route exists
via an IGP that points to another next hop?? I guess my real question is
does the packet even get processed in regards to the routing table, or is
its destination set as soon as its matched by the route-map applied to the
ingress interface?? Thanks in advance!!
Jason




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7i=71944t=71944
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]


Re: Policy-Based Routing [7:71944]

2003-07-06 Thread Levent Ogut
policy based routing takes place before the routing process, so yes the 
packet will be sent to the destination that policy routing states.



Jason Viera wrote:
 Just for clarification can someone comment on or confirm the following: If
 policy routing is enabled on an interface and the policy states that a
 packet received on that particular interface be sent to a next hop IP or an
 interface, will the packet be sent to that next hop even if a route exists
 via an IGP that points to another next hop?? I guess my real question is
 does the packet even get processed in regards to the routing table, or is
 its destination set as soon as its matched by the route-map applied to the
 ingress interface?? Thanks in advance!!
 Jason




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7i=71945t=71944
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]


Re: ATM Bandwith [7:71937]

2003-07-06 Thread Levent Ogut
Hi,
  ATM technology is based on 53 byte cells. Also ATM has a 5 byte header 
per cell. So your payloads length can be 48 bytes per ATM cell.

with a basic calculation, for an ip traffic on 34Mb ATM link :

48 (payload includes the ip header) / 53 (total bytes can be trasnfered 
in a cell)

equals to 0.90566.
That means maximum %90.56 of your ATM link can be ip traffic (including 
the ip headers)

so 34Mb * 0.90566 = 30.7925 Mb can be the ip traffic.

and also consider that you have ip headers in that traffic,
if you calculate the actual payload , it is lesser than that.

hope that helps,


Gerard Torin wrote:
 Hi guys,
  
 Anybody know how is built the ATM4S Bandwith?. For example, In ATM`s link
of
 34Mbps, Is true that 4Mbps is just only header?, I ask that, because
 actually my company has it. But we don4t reach the maximun bandwith of
 34Mbps. Yesterday, we did stress test in the link and just only reach
30Mbps.
  
 I thanks any comment.
 
 
 -
 Yahoo! Messenger
 Nueva versioacute;n: Super Webcam, voz, caritas animadas, y maacute;s
 #161;Gratis!




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7i=71946t=71937
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]


chat script ... modem [7:71947]

2003-07-06 Thread H T
Hi all,
Can any one help about Chat script configuring. It will be very nice if we
get some diagrams for the detailed configurations.

how about this topic for the lab?

Is there any one have experienced it?




cheers,
Heiman.




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7i=71947t=71947
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]


Re: Policy-Based Routing [7:71944]

2003-07-06 Thread AK
It actually depends on which command u use:
if u use the
  set ip next-hop OR set interface THEN packets will be sent to the
destinations defined in these commands
if u use the
  set ip default next-hop OR set default interface THEN packets will be sent
to the defined destinations if there is no explicit route.
here is a link:
http://www.cisco.com/en/US/products/sw/iosswrel/ps1828/products_configuration_guide_chapter09186a00800ca590.html



Jason Viera  a icrit dans le message de
news:[EMAIL PROTECTED]
 Just for clarification can someone comment on or confirm the following: If
 policy routing is enabled on an interface and the policy states that a
 packet received on that particular interface be sent to a next hop IP or
an
 interface, will the packet be sent to that next hop even if a route exists
 via an IGP that points to another next hop?? I guess my real question is
 does the packet even get processed in regards to the routing table, or is
 its destination set as soon as its matched by the route-map applied to the
 ingress interface?? Thanks in advance!!
 Jason




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7i=71949t=71944
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]


Re: chat script ... modem [7:71947]

2003-07-06 Thread AK
Here is a link:

http://www.cisco.com/en/US/products/sw/iosswrel/ps1835/products_configuration_guide_chapter09186a00800ca6f5.html

AK


H T  a icrit dans le message de
news:[EMAIL PROTECTED]
 Hi all,
 Can any one help about Chat script configuring. It will be very nice if we
 get some diagrams for the detailed configurations.

 how about this topic for the lab?

 Is there any one have experienced it?




 cheers,
 Heiman.




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7i=71948t=71947
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]


Configuring TCP intercept question; need help [7:71950]

2003-07-06 Thread d tran
Hi,
Has anyone actually been playing with Cisco TCP intercept lately?  Does this
piece of
crap work at all?  I am running  both IOS version 12.1.5(T9) and 12.2.15(T)
and TCP
intercept is not working in intercept mode.  TCP intercept does work in
watch mode.
 
when it is running in intercept mode, I can not get to the web page at
all.  It works in
watch mode.  Any ideas why?
 
In intercept mode, it has to handle the connection for the server.  In
watch mode, it
just watchs the connection.  Here is what I am testing with:
 
1) Apache web server in linux,
2) hping2 utility to generate 10,000 concurrent http connections
 
I also use NAT to make the apache web server available to the external so
that hping2
can DOS it.  Here is my config:
 
C2610#sh run
Building configuration...
Current configuration : 4222 bytes
!
version 12.1
no service single-slot-reload-enable
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname C2610
!
logging buffered 8192 notifications
logging rate-limit 1
no logging console
aaa new-model
aaa authentication login default group tacacs+ local
aaa authentication login NONE none
aaa authentication login TACACS group tacacs+ local enable
aaa authentication login LOCAL local enable
aaa authorization auth-proxy default group tacacs+
enable secret 5 $1$Bj2H$ad4Dn5rkgKvwPZzJDKAgZ1
!
memory-size iomem 10
ip subnet-zero
no ip source-route
!
!
no ip finger
ip tcp intercept list 100
ip tcp intercept connection-timeout 3600
ip tcp intercept watch-timeout 5
ip tcp intercept max-incomplete low 300
ip tcp intercept max-incomplete high 1000
ip tcp intercept one-minute low 100
ip tcp intercept one-minute high 500
ip domain-name micronetsolution.com
ip host tac 2065 10.10.10.10
ip name-server 172.17.1.2
ip name-server 129.174.1.8
ip dhcp excluded-address 10.100.0.71
ip dhcp excluded-address 10.100.0.72
ip dhcp excluded-address 10.100.0.254
ip dhcp ping packets 5
!
ip dhcp pool DHCP
   network 10.100.0.0 255.255.255.0
   netbios-name-server 172.17.1.2 129.174.1.8
   dns-server 172.17.1.2 129.174.1.8
   default-router 10.100.0.254
   domain-name micronetsolution.com
   lease 3
!
ip inspect audit-trail
ip inspect dns-timeout 15
ip inspect name CBAC tcp timeout 3600
ip inspect name CBAC udp timeout 3600
ip auth-proxy auth-proxy-banner
ip auth-proxy auth-proxy-audit
ip auth-proxy auth-cache-time 1
ip auth-proxy name AUTH-PROXY http
ip audit info action alarm drop reset
ip audit attack action alarm drop reset
ip audit notify log
ip audit po max-events 100
ip audit name ATTACK attack action alarm 
ip audit name INFO info action alarm
!
!
call rsvp-sync
cns event-service server
!
!
!
!
!
!
!
!
interface Loopback0
 ip address 10.10.10.10 255.255.255.255
!
interface Ethernet0/0
 ip address 172.18.1.1 255.255.0.0
 ip nat outside
 half-duplex
!
interface FastEthernet1/0
 ip address 10.100.0.254 255.255.255.0
 ip nat inside
 speed 100
 full-duplex
!
ip kerberos source-interface any
ip nat pool natpool 172.18.1.1 172.18.1.1 netmask 255.255.0.0
ip nat inside source list 130 interface Ethernet0/0 overload
ip nat inside source static 10.100.0.71 172.18.0.71
ip classless
ip route 0.0.0.0 0.0.0.0 172.18.1.254
ip http server
ip http authentication aaa
!
!
ip access-list extended NAMEDACL
 permit tcp any any
 permit udp any any
 permit ip any any
ip access-list extended in2out
 permit udp 10.100.0.0 0.0.0.255 any eq domain reflect traffic
 permit tcp 10.100.0.0 0.0.0.255 any eq www reflect traffic
 permit tcp 10.100.0.0 0.0.0.255 any eq telnet reflect traffic
 deny   ip any any
ip access-list extended out2in
 permit icmp any any
 evaluate traffic
 deny   ip any any
logging trap notifications
logging facility local5
logging source-interface Ethernet0/0
logging 172.17.1.2
access-list 100 permit tcp any host 10.100.0.71 eq www
access-list 100 permit tcp any host 10.100.0.71 eq 443
access-list 100 permit tcp any host 10.100.0.71 eq 22
access-list 100 permit tcp any host 10.100.0.71 eq telnet
access-list 100 permit tcp any host 10.100.0.71 eq ftp
access-list 100 permit tcp any host 10.100.0.71 eq ftp-data
access-list 110 permit tcp 10.100.0.0 0.0.0.255 host 10.100.0.254 eq telnet
access-list 110 dynamic lock-and-key permit ip 10.100.0.0 0.0.0.255 any
access-list 110 deny   ip any any
access-list 120 permit udp 10.100.0.0 0.0.0.255 any eq domain
access-list 120 permit tcp 10.100.0.0 0.0.0.255 host 10.100.0.254 eq www
access-list 120 deny   ip any any
access-list 130 permit ip 10.100.0.0 0.0.0.255 any
access-list 140 permit ip host 172.18.1.2 host 172.18.1.1
access-list 140 permit icmp any 10.100.0.0 0.0.0.255
access-list 140 permit icmp any host 172.18.0.71
access-list 140 deny   ip any any
!
tacacs-server host 172.18.1.2
tacacs-server attempts 2
!
dial-peer cor custom
!
!
!
!
!
line con 0
 exec-timeout 0 0
 logging synchronous
 login authentication NONE
 transport input none
line aux 0
 login authentication NONE
 transport input all
line vty 0 4
 login authentication LOCAL
!

IOS AUTH-PROXY problem [7:71952]

2003-07-06 Thread d tran
All,
Below is the configuration I have with AUTH-PROXY.  I don't understand why 
the configuration works with IOS version 12.2.15(T) but doesn't work with
IOS version
12.1.5T(9).  With version 12.1.5T(9), I am not getting a authentication
failed.  Instead
I am getting bad request.  
 
Any ideas?
 
C2610#sh run
Building configuration...
Current configuration : 4248 bytes
!
version 12.1
no service single-slot-reload-enable
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname C2610
!
logging buffered 8192 notifications
logging rate-limit 1
no logging console
aaa new-model
aaa authentication login default group tacacs+ local
aaa authentication login NONE none
aaa authentication login TACACS group tacacs+ local enable
aaa authentication login LOCAL local enable
aaa authorization auth-proxy default group tacacs+
enable secret 5 $1$Bj2H$ad4Dn5rkgKvwPZzJDKAgZ1
!
memory-size iomem 10
ip subnet-zero
no ip source-route
!
!
no ip finger
ip tcp intercept list 100
ip tcp intercept connection-timeout 3600
ip tcp intercept watch-timeout 5
ip tcp intercept max-incomplete low 300
ip tcp intercept max-incomplete high 1000
ip tcp intercept one-minute low 100
ip tcp intercept one-minute high 500
ip domain-name micronetsolution.com
ip host tac 2065 10.10.10.10
ip name-server 172.17.1.2
ip name-server 129.174.1.8
ip dhcp excluded-address 10.100.0.71
ip dhcp excluded-address 10.100.0.72
ip dhcp excluded-address 10.100.0.254
ip dhcp ping packets 5
!
ip dhcp pool DHCP
   network 10.100.0.0 255.255.255.0
   netbios-name-server 172.17.1.2 129.174.1.8
   dns-server 172.17.1.2 129.174.1.8
   default-router 10.100.0.254
   domain-name micronetsolution.com
   lease 3
!
ip inspect audit-trail
ip inspect dns-timeout 15
ip inspect name CBAC tcp timeout 3600
ip inspect name CBAC udp timeout 3600
ip auth-proxy auth-proxy-banner
ip auth-proxy auth-proxy-audit
ip auth-proxy auth-cache-time 1
ip auth-proxy name AUTH-PROXY http
ip audit info action alarm drop reset
ip audit attack action alarm drop reset
ip audit notify log
ip audit po max-events 100
ip audit name ATTACK attack action alarm drop reset
ip audit name INFO info action alarm
!
!
call rsvp-sync
cns event-service server
!
!
!
!
!
!
!
!
interface Loopback0
 ip address 10.10.10.10 255.255.255.255
!
interface Ethernet0/0
 ip address 172.18.1.1 255.255.0.0
 ip nat outside
 half-duplex
!
interface FastEthernet1/0
 ip address 10.100.0.254 255.255.255.0
 ip nat inside
 ip auth-proxy AUTH-PROXY
 speed 100
 full-duplex
!
ip kerberos source-interface any
ip nat pool natpool 172.18.1.1 172.18.1.1 netmask 255.255.0.0
ip nat inside source list 130 interface Ethernet0/0 overload
ip nat inside source static 10.100.0.71 172.18.0.71
ip classless
ip route 0.0.0.0 0.0.0.0 172.18.1.254
ip http server
ip http authentication aaa
!
!
ip access-list extended NAMEDACL
 permit tcp any any
 permit udp any any
 permit ip any any
ip access-list extended in2out
 permit udp 10.100.0.0 0.0.0.255 any eq domain reflect traffic
 permit tcp 10.100.0.0 0.0.0.255 any eq www reflect traffic
 permit tcp 10.100.0.0 0.0.0.255 any eq telnet reflect traffic
 deny   ip any any
ip access-list extended out2in
 permit icmp any any
 evaluate traffic
 deny   ip any any
logging trap notifications
logging facility local5
logging source-interface Ethernet0/0
logging 172.17.1.2
access-list 100 permit tcp any host 10.100.0.71 eq www
access-list 100 permit tcp any host 10.100.0.71 eq 443
access-list 100 permit tcp any host 10.100.0.71 eq 22
access-list 100 permit tcp any host 10.100.0.71 eq telnet
access-list 100 permit tcp any host 10.100.0.71 eq ftp
access-list 100 permit tcp any host 10.100.0.71 eq ftp-data
access-list 110 permit tcp 10.100.0.0 0.0.0.255 host 10.100.0.254 eq telnet
access-list 110 dynamic lock-and-key permit ip 10.100.0.0 0.0.0.255 any
access-list 110 deny   ip any any
access-list 120 permit udp 10.100.0.0 0.0.0.255 any eq domain
access-list 120 permit tcp 10.100.0.0 0.0.0.255 host 10.100.0.254 eq www
access-list 120 deny   ip any any
access-list 130 permit ip 10.100.0.0 0.0.0.255 any
access-list 140 permit ip host 172.18.1.2 host 172.18.1.1
access-list 140 permit icmp any 10.100.0.0 0.0.0.255
access-list 140 permit icmp any host 172.18.0.71
access-list 140 deny   ip any any
!
tacacs-server host 172.18.1.2
tacacs-server attempts 2
!
dial-peer cor custom
!
!
!
!
!
line con 0
 exec-timeout 0 0
 logging synchronous
 login authentication NONE
 transport input none
line aux 0
 login authentication NONE
 transport input all
line vty 0 4
 login authentication LOCAL
!
ntp clock-period 17208324
end
C2610#


-
Do you Yahoo!?
The New Yahoo! Search - Faster. Easier. Bingo.




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7i=71952t=71952
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL 

Re: VLAN Tagging on Cat 3550 Another question [7:71703]

2003-07-06 Thread Hemingway
simon watson  wrote in message
news:[EMAIL PROTECTED]
 Hi

 Some how I was thinking VLAN tagging was something more than just
Trunking
 in Cisco talk,as you can guess I'm pretty rusty when it comes to
switching.I
 have another question.Look at the example below.


   REMOTE SITE
 MAIN SITE

 PC's-CISCO 3550CISCO 2600~~CISCO 3600ALCATEL
L3
 SWITCH..PIX...INTERNET ROUTER---INTERNET.
(VLAN3)   (802.1q TRUNK)   (256K LINK)
(802.1q
 TRUNK)(VLAN3)


 A client wants to allow a group of PC's on a remote site, access to the
 internet via the main site's ISP.But wants these group of Pc's on their
own
 VLAN so they have no connection to the rest of the network (except for the
 internet router which the whole network uses to access the internet) they
 have been advised by a third party to do it  as above.They have a Cisco
 3550EMI switch at the remote site  a Alcatel Omnicore L3 switch at the
Main
 site.The WAN link is a 256k lease line.They want to configure the PC's on
 the remote site with the same VLAN as a dedicated PIX on the Main site
(also
 on the same subnet).

 The Cat 3550 is not using it's L3 capabilities and is trunked to the
remote
 site's router

 Can this  be done ?


sure. not sure you need to worry about switching. use the inbound ( from the
branch office ) router to route to the default gateway for internet access.
put in policy routing and access lists denying access from the branch net to
anything on the host site net.

where is all this vlan trunking coming from? looks to me like a red herring.




 I'm sure thinking of the basic laws of routing it won't be possible to
have
 devices being on the same subnet but across different WAN links, as
routing
 loops can occur.Also would it be best to enable the layer 3 capabilities
of
 the switches, or to let the routers do the work.

 I'm looking forward to your answers


 Thanks in advance

 Simon.











 - Original Message -
 From: Henrique Issamu Terada
 To: simon watson
 Cc:
 Sent: Tuesday, July 01, 2003 2:09 PM
 Subject: RES: VLAN Tagging on Cat 3550 [7:71703]


 Vlan tagging is commonly called by Cisco as trunks.
 Have you ever configured trunks as ISL ou 802.1q ?
 Actually the name vlan tagging makes more sense on non Cisco equipment,
 where only exists 802.1q .
 ISL doesn't do tag as 802.1q , but reencapsulates the packet with a new
 header .

 My 0,02

  _
  Henrique Issamu Terada, CCIE # 7460
  IT Support - Open Network
  CPM S.A. - Tecnologia criando valor
  Tel.: 55 11 4196-0710
  Fax: 55 11 4196-0900
  [EMAIL PROTECTED]
  www.cpm.com.br

 --
  ---
  Esta mensagem pode conter informagco confidencial e/ou privilegiada.  Se
  vocj nco for o destinatario ou a pessoa autorizada a receber esta
  mensagem, nco pode usar, copiar ou divulgar as informagues nela contidas
  ou tomar qualquer agco baseada nessas informagues.  Se vocj recebeu esta
  mensagem por engano, por favor avise imediatamente o remetente,
  respondendo o e-mail e em seguida apague-o. Agradecemos sua cooperagco.
 
  This message may contain confidential and/or privileged information. If
  you are not the addressee or authorized to receive this for the
addressee,
  you must not use, copy,  disclose or take any action based on this
message
  or any information herein. If you have received this message in error,
  please advise the sender immediately by reply e-mail and delete this
  message. Thank you for your cooperation.
 
 
  -Mensagem original-
  De: simon watson [SMTP:[EMAIL PROTECTED]
  Enviada em: terga-feira, 1 de julho de 2003 05:02
  Para: [EMAIL PROTECTED]
  Assunto: VLAN Tagging on Cat 3550 [7:71703]
 
  Hi Guys
 
  A client wants a Cat 3550 configured for VLAN tagging, I have not done
one
  of these before so how do I configure the switch, also there is a Cisco
  2600
  router also connected to the switch.Do I need to configure the router to
  accomodate VLAN tagging (and any router that packets of the VLAN goes
  through ?)
 
  Thanks
 
  Simon.
  Incoming mail is certified Virus Free.
  Checked by AVG anti-virus system (http://www.grisoft.com).
  Version: 6.0.495 / Virus Database: 294 - Release Date: 30/06/2003
 
 
 ---
 Outgoing mail is certified Virus Free.
 Checked by AVG anti-virus system (http://www.grisoft.com).
 Version: 6.0.495 / Virus Database: 294 - Release Date: 30/06/2003




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7i=71951t=71703
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]


Re: ATM Bandwith [7:71937]

2003-07-06 Thread Gerard Torin
Hi Levent, 
 
I thanks your explanation. It was very good.
 
Best Regards.

Levent Ogut  wrote:
Hi,
ATM technology is based on 53 byte cells. Also ATM has a 5 byte header 
per cell. So your payloads length can be 48 bytes per ATM cell.

with a basic calculation, for an ip traffic on 34Mb ATM link :

48 (payload includes the ip header) / 53 (total bytes can be trasnfered 
in a cell)

equals to 0.90566.
That means maximum %90.56 of your ATM link can be ip traffic (including 
the ip headers)

so 34Mb * 0.90566 = 30.7925 Mb can be the ip traffic.

and also consider that you have ip headers in that traffic,
if you calculate the actual payload , it is lesser than that.

hope that helps,


Gerard Torin wrote:
 Hi guys,
 
 Anybody know how is built the ATM4S Bandwith?. For example, In ATM`s link
of
 34Mbps, Is true that 4Mbps is just only header?, I ask that, because
 actually my company has it. But we don4t reach the maximun bandwith of
 34Mbps. Yesterday, we did stress test in the link and just only reach
30Mbps.
 
 I thanks any comment.
 
 
 -
 Yahoo! Messenger
 Nueva versisn: Super Webcam, voz, caritas animadas, y mas
 #161;Gratis!
Yahoo! Messenger
Nueva versioacute;n: Super Webcam, voz, caritas animadas, y maacute;s
#161;Gratis!




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7i=71954t=71937
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]


RE: ATM Bandwith [7:71937]

2003-07-06 Thread Gerard Torin
Hi Dom, we did test with TFY aplication, generating a burst traffic of 3000
bytes UDP. This aplication stressed the link, but I don`t undestard why not
reach the maximun bandwith permited: 34Mbps. What do you think about this
test? Is right?

Dom  wrote:
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
Gerard Torin
Sent: 05 July 2003 19:06
To: [EMAIL PROTECTED]
Subject: ATM Bandwith [7:71937]


Hi guys,

Anybody know how is built the ATM4S Bandwith?. For example, In ATM`s
link of 34Mbps, Is true that 4Mbps is just only
header?, I ask that, because actually my company has it. But we don4t
reach the maximun bandwith of 34Mbps. Yesterday, we 
did stress test in the link and just only reach 30Mbps.

I thanks any comment.


Please supply more details. How did you test and with what size packets?
Cell tax (the overhead of breaking your data down in 53byte chunks)
might account for hat you are observing. 


Best regards,

Dom Stocqueler
SysDom Technologies
Visit our website - www.sysdom.org
Yahoo! Messenger
Nueva versioacute;n: Super Webcam, voz, caritas animadas, y maacute;s
#161;Gratis!




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7i=71953t=71937
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]


RE: Policy-Based Routing [7:71944]

2003-07-06 Thread Junoguy
Hi Jason,

PBR is used to override the routing table.  So if you have a Policy on
an interface to set the nex-hop explicitly then any traffic that matches
your route-map that the policy is calling will have a next-hop set to
what YOU specified not what the routing table states.


Mario

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
Jason Viera
Sent: Sunday, July 06, 2003 1:55 AM
To: [EMAIL PROTECTED]
Subject: Policy-Based Routing [7:71944]


Just for clarification can someone comment on or confirm the following:
If policy routing is enabled on an interface and the policy states that
a packet received on that particular interface be sent to a next hop IP
or an interface, will the packet be sent to that next hop even if a
route exists via an IGP that points to another next hop?? I guess my
real question is does the packet even get processed in regards to the
routing table, or is its destination set as soon as its matched by the
route-map applied to the ingress interface?? Thanks in advance!! Jason




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7i=71957t=71944
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]


RE: ATM Bandwith [7:71937]

2003-07-06 Thread Dom
Somebody (I'm sorry I deleted the post), posted after me, and it does
look like you are hitting the cell  tax problem. With other (including
layer 3 overheads) you are not doing to badly

Sorry if this is not what you want to hear ;)

Best regards,

Dom Stocqueler
SysDom Technologies
Visit our website - www.sysdom.org



-Original Message-
From: Gerard Torin [mailto:[EMAIL PROTECTED]
Sent: 06 July 2003 18:29
To: Dom; [EMAIL PROTECTED]
Subject: RE: ATM Bandwith [7:71937]


Hi Dom, we did test with TFY aplication, generating a burst traffic of
3000 bytes UDP. This aplication stressed the link, but I don`t undestard
why not reach the maximun bandwith permited: 34Mbps. What do you think
about this test? Is right?

Dom  wrote:

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
Gerard Torin
Sent: 05 July 2003 19:06
To: [EMAIL PROTECTED]
Subject: ATM Bandwith [7:71937]


Hi guys,

Anybody know how is built the ATM4S Bandwith?. For example, In ATM`s
link of 34Mbps, Is true that 4Mbps is just only
header?, I ask that, because actually my company has it. But we don4t
reach the maximun bandwith of 34Mbps. Yesterday, we
did stress test in the link and just only reach 30Mbps.

I thanks any comment.


Please supply more details. How did you test and with what size packets?
Cell tax (the overhead of breaking your data down in 53byte chunks)
might account for hat you are observing.


Best regards,

Dom Stocqueler
SysDom Technologies
Visit our website - www.sysdom.org
  _

Yahoo! Messenger

 Nueva versisn: Super Webcam, voz, caritas animadas, y mas
!Gratis!




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7i=71955t=71937
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]


Re: IOS AUTH-PROXY problem [7:71956]

2003-07-06 Thread Joe Deleonardo
It could just be that in version of 12.2.15(T) it is finally fully
implemented.  12.1.5T(9) is just an earlier version.  I ran into this last
night while working on blocking Nimda and Code Red.  The feature required to
do the blocking was released in 12.1E (not exactly sure which version, I
can't find my notes).  I couldn't find the feature anywhere in the
documentation for 12.1, but as soon as I looked in 12.2, it was there. Hope
that helps.

Cheers,

Joe

- Original Message - 
From: d tran 
To: ; 
Sent: Sunday, July 06, 2003 10:18 AM
Subject: IOS AUTH-PROXY problem


 All,
 Below is the configuration I have with AUTH-PROXY.  I don't understand why
 the configuration works with IOS version 12.2.15(T) but doesn't work with
IOS version
 12.1.5T(9).  With version 12.1.5T(9), I am not getting a authentication
failed.  Instead
 I am getting bad request.

 Any ideas?

 C2610#sh run
 Building configuration...
 Current configuration : 4248 bytes
 !
 version 12.1
 no service single-slot-reload-enable
 service timestamps debug uptime
 service timestamps log uptime
 no service password-encryption
 !
 hostname C2610
 !
 logging buffered 8192 notifications
 logging rate-limit 1
 no logging console
 aaa new-model
 aaa authentication login default group tacacs+ local
 aaa authentication login NONE none
 aaa authentication login TACACS group tacacs+ local enable
 aaa authentication login LOCAL local enable
 aaa authorization auth-proxy default group tacacs+
 enable secret 5 $1$Bj2H$ad4Dn5rkgKvwPZzJDKAgZ1
 !
 memory-size iomem 10
 ip subnet-zero
 no ip source-route
 !
 !
 no ip finger
 ip tcp intercept list 100
 ip tcp intercept connection-timeout 3600
 ip tcp intercept watch-timeout 5
 ip tcp intercept max-incomplete low 300
 ip tcp intercept max-incomplete high 1000
 ip tcp intercept one-minute low 100
 ip tcp intercept one-minute high 500
 ip domain-name micronetsolution.com
 ip host tac 2065 10.10.10.10
 ip name-server 172.17.1.2
 ip name-server 129.174.1.8
 ip dhcp excluded-address 10.100.0.71
 ip dhcp excluded-address 10.100.0.72
 ip dhcp excluded-address 10.100.0.254
 ip dhcp ping packets 5
 !
 ip dhcp pool DHCP
network 10.100.0.0 255.255.255.0
netbios-name-server 172.17.1.2 129.174.1.8
dns-server 172.17.1.2 129.174.1.8
default-router 10.100.0.254
domain-name micronetsolution.com
lease 3
 !
 ip inspect audit-trail
 ip inspect dns-timeout 15
 ip inspect name CBAC tcp timeout 3600
 ip inspect name CBAC udp timeout 3600
 ip auth-proxy auth-proxy-banner
 ip auth-proxy auth-proxy-audit
 ip auth-proxy auth-cache-time 1
 ip auth-proxy name AUTH-PROXY http
 ip audit info action alarm drop reset
 ip audit attack action alarm drop reset
 ip audit notify log
 ip audit po max-events 100
 ip audit name ATTACK attack action alarm drop reset
 ip audit name INFO info action alarm
 !
 !
 call rsvp-sync
 cns event-service server
 !
 !
 !
 !
 !
 !
 !
 !
 interface Loopback0
  ip address 10.10.10.10 255.255.255.255
 !
 interface Ethernet0/0
  ip address 172.18.1.1 255.255.0.0
  ip nat outside
  half-duplex
 !
 interface FastEthernet1/0
  ip address 10.100.0.254 255.255.255.0
  ip nat inside
  ip auth-proxy AUTH-PROXY
  speed 100
  full-duplex
 !
 ip kerberos source-interface any
 ip nat pool natpool 172.18.1.1 172.18.1.1 netmask 255.255.0.0
 ip nat inside source list 130 interface Ethernet0/0 overload
 ip nat inside source static 10.100.0.71 172.18.0.71
 ip classless
 ip route 0.0.0.0 0.0.0.0 172.18.1.254
 ip http server
 ip http authentication aaa
 !
 !
 ip access-list extended NAMEDACL
  permit tcp any any
  permit udp any any
  permit ip any any
 ip access-list extended in2out
  permit udp 10.100.0.0 0.0.0.255 any eq domain reflect traffic
  permit tcp 10.100.0.0 0.0.0.255 any eq www reflect traffic
  permit tcp 10.100.0.0 0.0.0.255 any eq telnet reflect traffic
  deny   ip any any
 ip access-list extended out2in
  permit icmp any any
  evaluate traffic
  deny   ip any any
 logging trap notifications
 logging facility local5
 logging source-interface Ethernet0/0
 logging 172.17.1.2
 access-list 100 permit tcp any host 10.100.0.71 eq www
 access-list 100 permit tcp any host 10.100.0.71 eq 443
 access-list 100 permit tcp any host 10.100.0.71 eq 22
 access-list 100 permit tcp any host 10.100.0.71 eq telnet
 access-list 100 permit tcp any host 10.100.0.71 eq ftp
 access-list 100 permit tcp any host 10.100.0.71 eq ftp-data
 access-list 110 permit tcp 10.100.0.0 0.0.0.255 host 10.100.0.254 eq
telnet
 access-list 110 dynamic lock-and-key permit ip 10.100.0.0 0.0.0.255 any
 access-list 110 deny   ip any any
 access-list 120 permit udp 10.100.0.0 0.0.0.255 any eq domain
 access-list 120 permit tcp 10.100.0.0 0.0.0.255 host 10.100.0.254 eq www
 access-list 120 deny   ip any any
 access-list 130 permit ip 10.100.0.0 0.0.0.255 any
 access-list 140 permit ip host 172.18.1.2 host 172.18.1.1
 access-list 140 permit icmp any 10.100.0.0 0.0.0.255
 access-list 140 permit icmp any host 172.18.0.71
 access-list 140 

Re: BSMSN 1.1 Vs 2.0 [7:71932]

2003-07-06 Thread David Vital
That figures.  Well I noticed it too late.  Class stoarts tomorrow.  Such is
life.  I will just get an updated cisco press book whenthey come out and
bring myself up to speed.  Thanks for the heads up  it gives me something to
look for.

David


Message Posted at:
http://www.groupstudy.com/form/read.php?f=7i=71958t=71932
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]


OSI routing in CCIE RS exam? [7:71960]

2003-07-06 Thread wj chou
Hi, 

I am preparing for the R  S written exam and wondering do we have to master
in everything mentioned in the blueprint? I find myself hard to decide how
deep I should dip into some of the subjects. For example, OSI model is
listed in the blue print but do I have to know CNLP, CONP those stuff? Also
how much do we need to know about IPX?

thanks!

Ellie


Message Posted at:
http://www.groupstudy.com/form/read.php?f=7i=71960t=71960
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]


GRE with IPsec [7:71959]

2003-07-06 Thread Michael Jia
Hi,

Anyone has good reference doc about GRE with Ipsec .

I am a little confused about 2 flavors of crypto ACL used:
A) permit ip  
B) permit gre any any

It seems option A is encry first then GRE encap, while option B is encap
first then encrypt.

Is there a good ref about these setups?


Thanks
Michael




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7i=71959t=71959
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]


RE: OSI routing in CCIE RS exam? [7:71960]

2003-07-06 Thread Joel Satterley
IPX is no longer in the LAB.

-Original Message-
From: wj chou [mailto:[EMAIL PROTECTED] 
Sent: 06 July 2003 23:26
To: [EMAIL PROTECTED]
Subject: OSI routing in CCIE RS exam? [7:71960]

Hi, 

I am preparing for the R  S written exam and wondering do we have to master
in everything mentioned in the blueprint? I find myself hard to decide how
deep I should dip into some of the subjects. For example, OSI model is
listed in the blue print but do I have to know CNLP, CONP those stuff? Also
how much do we need to know about IPX?

thanks!

Ellie
===
  This message has been checked for all known viruses by the 
Sirocom Virus Scanning Service   
===

===
   This message has been checked for all known viruses by the
 Sirocom Virus Scanning Service

  WWW.SIROCOM.COM  
===




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7i=71962t=71960
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]


RE: CCIE Lab !!! [7:71919]

2003-07-06 Thread Joel Satterley
You need to know EVERYTHING.

I took  failed last week.

RIPv2, OSPF, EIGRP, IS-IS, BGP - all redistributing into each other..

-Original Message-
From: alaerte Vidali [mailto:[EMAIL PROTECTED] 
Sent: 04 July 2003 22:38
To: [EMAIL PROTECTED]
Subject: RE: CCIE Lab !!! [7:71919]

For sure you should know a lot about redistribution.

A statement I heard from a Cisco guy responsable for the test in my country:


-Certainly it will be asked one topic that you never have heard about; this
is to test your capacity to look the CD documentation and find an answer.

Certainly you should know all you can, because there is no time to search on
the CD.

The IOS on the lab is about to change. 12.2.
===
  This message has been checked for all known viruses by the 
Sirocom Virus Scanning Service   
===

===
   This message has been checked for all known viruses by the
 Sirocom Virus Scanning Service

  WWW.SIROCOM.COM  
===




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7i=71961t=71919
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]


Re: GRE with IPsec [7:71959]

2003-07-06 Thread annlee
Try this
http://www.cisco.com/en/US/tech/tk583/tk372/tech_configuration_examples_list.html

Lots of examples here.

Annlee

Michael Jia  wrote in message
news:[EMAIL PROTECTED]
 Hi,

 Anyone has good reference doc about GRE with Ipsec .

 I am a little confused about 2 flavors of crypto ACL used:
 A) permit ip
 B) permit gre any any

 It seems option A is encry first then GRE encap, while option B is encap
 first then encrypt.

 Is there a good ref about these setups?


 Thanks
 Michael




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7i=71963t=71959
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]


RE: GRE with IPsec [7:71965]

2003-07-06 Thread Michael Jia
Hi, Joe

There is a sligt difference between A and B.
Could you share some insights as well?

Thanks
Michael

-Original Message-
From: Joe Deleonardo [mailto:[EMAIL PROTECTED] 
Sent: Sunday, July 06, 2003 5:17 PM
To: Michael Jia; [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: Re: GRE with IPsec


I don't have a source.  But, it's really very simple all you do is apply
the crypto map to the tunnel interface AND the physical interface
between the two devices.

Then add an ACL:

access-l 100 permit gre host  host 

You do that on each device of course.

And then the rest of it is just a standard VPN config.

Cheers,

Joseph


- Original Message - 
From: Michael Jia 
To: ; 
Sent: Sunday, July 06, 2003 2:56 PM
Subject: GRE with IPsec


 Hi,

 Anyone has good reference doc about GRE with Ipsec .

 I am a little confused about 2 flavors of crypto ACL used:
 A) permit ip  
 B) permit gre any any

 It seems option A is encry first then GRE encap, while option B is 
 encap first then encrypt.

 Is there a good ref about these setups?


 Thanks
 Michael




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7i=71965t=71965
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]


Re: GRE with IPsec [7:71964]

2003-07-06 Thread Joe Deleonardo
I don't have a source.  But, it's really very simple all you do is apply the
crypto map to the tunnel interface AND the physical interface between the
two devices.

Then add an ACL:

access-l 100 permit gre host  host 

You do that on each device of course.

And then the rest of it is just a standard VPN config.

Cheers,

Joseph


- Original Message - 
From: Michael Jia 
To: ; 
Sent: Sunday, July 06, 2003 2:56 PM
Subject: GRE with IPsec


 Hi,

 Anyone has good reference doc about GRE with Ipsec .

 I am a little confused about 2 flavors of crypto ACL used:
 A) permit ip  
 B) permit gre any any

 It seems option A is encry first then GRE encap, while option B is encap
 first then encrypt.

 Is there a good ref about these setups?


 Thanks
 Michael




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7i=71964t=71964
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]


Re: GRE with IPsec [7:71966]

2003-07-06 Thread Joe Deleonardo
Hmm, not sure what you mean but.

Really all you do is create your regular VPN.

Then you create your GRE tunnel.  then the ACL here is an abbreviated
example.

R1#
Int Lo0
ip address 1.1.1.1 255.255.255.0

Int Tu0
ip address 10.1.1.1 255.255.255.0
tun source loop0
tun dest 2.2.2.2
crypto map VPN

Int s0
ip address 101.101.101.101 255.255.255.0
crypto map VPN

access-l 100 permit gre host 1.1.1.1 host 2.2.2.2

That's it, then just take the same actions the other side.

It really is just the regular VPN, then extra crypto map on the GRE tunnel
and acl.

Better?


- Original Message - 
From: Michael Jia 
To: 'Joe Deleonardo' ; ;

Sent: Sunday, July 06, 2003 5:23 PM
Subject: RE: GRE with IPsec


 Hi, Joe

 There is a sligt difference between A and B.
 Could you share some insights as well?

 Thanks
 Michael

 -Original Message-
 From: Joe Deleonardo [mailto:[EMAIL PROTECTED]
 Sent: Sunday, July 06, 2003 5:17 PM
 To: Michael Jia; [EMAIL PROTECTED]; [EMAIL PROTECTED]
 Subject: Re: GRE with IPsec


 I don't have a source.  But, it's really very simple all you do is apply
 the crypto map to the tunnel interface AND the physical interface
 between the two devices.

 Then add an ACL:

 access-l 100 permit gre host  host  destination

 You do that on each device of course.

 And then the rest of it is just a standard VPN config.

 Cheers,

 Joseph


 - Original Message - 
 From: Michael Jia 
 To: ; 
 Sent: Sunday, July 06, 2003 2:56 PM
 Subject: GRE with IPsec


  Hi,
 
  Anyone has good reference doc about GRE with Ipsec .
 
  I am a little confused about 2 flavors of crypto ACL used:
  A) permit ip  
  B) permit gre any any
 
  It seems option A is encry first then GRE encap, while option B is
  encap first then encrypt.
 
  Is there a good ref about these setups?
 
 
  Thanks
  Michael




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7i=71966t=71966
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]


RE: OSI routing in CCIE RS exam? [7:71960]

2003-07-06 Thread Ma ZhiQiang
I think you have to prepare everything that is in the blueprint.
 but like CLNP, you have to know, because it's related with ISIS, is it
right?
 everything in the blueprint will be in the written exam.


Message Posted at:
http://www.groupstudy.com/form/read.php?f=7i=71968t=71960
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]


Re: GRE with IPsec [7:71967]

2003-07-06 Thread Joe Deleonardo
From your original email.

by permitting ip you're allowing everything over the IPSec tunnel.  If you
just permit gre you're just allowing the gre tunnel over the ipsec tunnel.
You might want to do this to transport something that ipsec can't handle by
itself, like AppleTalk or IPX.

You're thinking of it as a flavor.  That's the wrong mind set for this
concept.  Just think of it as a regular ipsec tunnel and all your acl does,
is just what any other acl does... controls granularity.

- Original Message - 
From: Michael Jia 
To: ; 
Sent: Sunday, July 06, 2003 2:56 PM
Subject: GRE with IPsec


 Hi,

 Anyone has good reference doc about GRE with Ipsec .

 I am a little confused about 2 flavors of crypto ACL used:
 A) permit ip  
 B) permit gre any any

 It seems option A is encry first then GRE encap, while option B is encap
 first then encrypt.

 Is there a good ref about these setups?


 Thanks
 Michael




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7i=71967t=71967
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]


Re: Policy-Based Routing [7:71944]

2003-07-06 Thread Jason Viera
Thanks ALL, for the clarification!!
Jason
Junoguy  wrote in message
news:[EMAIL PROTECTED]
 Hi Jason,

 PBR is used to override the routing table.  So if you have a Policy on
 an interface to set the nex-hop explicitly then any traffic that matches
 your route-map that the policy is calling will have a next-hop set to
 what YOU specified not what the routing table states.


 Mario

 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
 Jason Viera
 Sent: Sunday, July 06, 2003 1:55 AM
 To: [EMAIL PROTECTED]
 Subject: Policy-Based Routing [7:71944]


 Just for clarification can someone comment on or confirm the following:
 If policy routing is enabled on an interface and the policy states that
 a packet received on that particular interface be sent to a next hop IP
 or an interface, will the packet be sent to that next hop even if a
 route exists via an IGP that points to another next hop?? I guess my
 real question is does the packet even get processed in regards to the
 routing table, or is its destination set as soon as its matched by the
 route-map applied to the ingress interface?? Thanks in advance!! Jason




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7i=71970t=71944
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]


RE: ATM Bandwith [7:71937]

2003-07-06 Thread Vikram JeetSingh
Hi Gerard, 

ATM as a technology per se, is a high overhead technology. As the basic fact
the fixed size cell is of 53 bytes and out of it the Cell Header consumes 5
bytes. So the net payload per cell is actually 48 bytes only, so effectively
you are having a close to 10% overhead, and it is not the end, you have to
leave some bandwidth on the error detection etc things also, because of
which you are never able to use more than a tentative 90% bandwidth on any
kind of technology. 

So if you are getting a burst of 30 Mbps on a E3 link, (I would like to know
about the bandwidth consumption tool or parameters used by you) you are not
doing bad; for sure.

HTH

Vikram

-Original Message-
From: Dom [mailto:[EMAIL PROTECTED]
Sent: Sunday, July 06, 2003 11:30 PM
To: [EMAIL PROTECTED]
Subject: RE: ATM Bandwith [7:71937]

Somebody (I'm sorry I deleted the post), posted after me, and it does
look like you are hitting the cell  tax problem. With other (including
layer 3 overheads) you are not doing to badly

Sorry if this is not what you want to hear ;)

Best regards,

Dom Stocqueler
SysDom Technologies
Visit our website - www.sysdom.org



-Original Message-
From: Gerard Torin [mailto:[EMAIL PROTECTED]
Sent: 06 July 2003 18:29
To: Dom; [EMAIL PROTECTED]
Subject: RE: ATM Bandwith [7:71937]


Hi Dom, we did test with TFY aplication, generating a burst traffic of
3000 bytes UDP. This aplication stressed the link, but I don`t undestard
why not reach the maximun bandwith permited: 34Mbps. What do you think
about this test? Is right?

Dom  wrote:

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
Gerard Torin
Sent: 05 July 2003 19:06
To: [EMAIL PROTECTED]
Subject: ATM Bandwith [7:71937]


Hi guys,

Anybody know how is built the ATM4S Bandwith?. For example, In ATM`s
link of 34Mbps, Is true that 4Mbps is just only
header?, I ask that, because actually my company has it. But we don4t
reach the maximun bandwith of 34Mbps. Yesterday, we
did stress test in the link and just only reach 30Mbps.

I thanks any comment.


Please supply more details. How did you test and with what size packets?
Cell tax (the overhead of breaking your data down in 53byte chunks)
might account for hat you are observing.


Best regards,

Dom Stocqueler
SysDom Technologies
Visit our website - www.sysdom.org
  _

Yahoo! Messenger

 Nueva versisn: Super Webcam, voz, caritas animadas, y mas
!Gratis!




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7i=71969t=71937
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]