Re: [c-nsp] Service agreement warning for EOL hardware

2010-10-01 Thread Seth Mattinen
On 9/30/10 5:07 PM, Łukasz Bromirski wrote:

 Bear in mind that before the IOS license activation, there was no
 way to tie for 100% your hardware to specific set of licenses/
 feature sets you could download, and no way to check if the device
 is still alive. So, the database that is used to display such warning
 may not be 100% in line with the real life.
 

I don't think too many of Cisco's latest ideas on how the website should
function (remember Java-only download cart introduction day) are in line
with real life.

However, I must give credit for keeping extensive documentation and
references available. For the Cisco people listening: please don't ever
take that away or require contracts to view. It's an awesome way to self
research and one of the major reasons I keep buying Cisco. (All the
expertise on this list is another reason.)

~Seth
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

Re: [c-nsp] Service agreement warning for EOL hardware

2010-10-01 Thread Elmar K. Bins
Re Seth,

se...@rollernet.us (Seth Mattinen) wrote:

 I don't think too many of Cisco's latest ideas on how the website should
 function (remember Java-only download cart introduction day) are in line
 with real life.

I have wondered for years now, why Cisco wouldn't enforce service
contracts on software downloads, or rather, when they would start.

Now we can also easily understand why FTP access was discontinued.
Yes - that kind of checking is possible with FTP servers.
No - Cisco only has marketing jocks and web-only programming
garage-boys at their hand. Not a real communications department
(including proper tool development) that would ask the users
about their experience.

I am quite happy that Cisco boxes do not give me as much trouble as
e.g., F5, because I'd be screwed with their idea of support in case
there's a software bug. I have experienced that kind of pain
with a bug in XE (soft-reconfig inbound - ah, just disable the
feature)...

Btw - has the L2 Portchannel bug on ASR1ks been fixed?


 However, I must give credit for keeping extensive documentation and
 references available. For the Cisco people listening: please don't ever
 take that away or require contracts to view. It's an awesome way to self
 research and one of the major reasons I keep buying Cisco. (All the
 expertise on this list is another reason.)

Are you begging for breadcrumbs here? Remember what you shelled out for
those service contracts?

As to this list - invaluable.

Yours,
Elmi.

-- 

Machen Sie sich erst einmal unbeliebt. Dann werden Sie auch ernstgenommen.
 (Konrad Adenauer)

--[ ELMI-RIPE ]---



pgpQcEMIe7oyW.pgp
Description: PGP signature
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

Re: [c-nsp] Service agreement warning for EOL hardware

2010-10-01 Thread Asbjorn Hojmark - Lists
On Fri, 01 Oct 2010 01:42:22 +0200, you wrote:

 End of new service attachment - November 2006. You could buy a
 router in November 2002. Then, four years later you decided it was
 a last call for extending the life of your network.
 By either renewing yearly the service contract during the entire
 lifetime of your 3640, or calling in an inspection from Cisco to check
 if they can register the new service for gear that is currently not
 covered by any service, you could then in November 2006 go into
 5-years contract to support the box just before the 'last date to
 order a new service-and-support' was hit.

Last Date of Support for the 3640 was November 2007. It is correct
that you could extend an existing contract or buy a new one November
2006... but you couldn't do that for 5 years, only 1 because EoL
(LDoS) was November 2007.

Ref:
http://www.cisco.com/en/US/products/hw/routers/ps274/prod_eol_notice09186a008032d840.html

 However, it seems that your problem is not related to the way how Cisco
 treats it's customers, but to downloading the software from CCO with no
 valid contract to cover the specific hardware platform :)

I agree with the OP that there's no way one could have a valid service
contract on a 3640 today.

-A

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] High CPU caused by interupt on 7600 router

2010-10-01 Thread Rin
Hi group, 

I have a 7609 PE router with 2 TenGigabit interfaces uplink to other P
routers and Gigabit interfaces downlink to access switch. Recently, I detect
the CPU of that router is punted approximately every 35mins and result in
below output:
==  
PE-Router#sho proc cpu hist
 

4521313151
100   
 90   
 80   
 70   
 60   
 50   
 40   
 30   
 20   
 10  *  * 
   051122334455
 0505050505
   CPU% per second (last 60 seconds)
  
 88 699   
5664764335455448544554465856444344555656540444344454357766
100   
 90  **  **   
 80  **  **   
 70  ** ***   
 60  ** ***   
 50  ** ***   
 40  #* ***   
 30  #* *#*   
 20  #* *#*   
 10 *## #*   * **  **  **  *  ***##   *  *
   051122334455
 0505050505
   CPU% per minute (last 60 minutes)
  * = maximum CPU%   # = average CPU%
  
9899689899798889898887299889  988989884889
7653706465425842251504506532186452964008644208308676970312489352156780
100 * *   * **  **   * *** *  
 90   * ** *   *** *  ** * ***
 80    *   ***
 70 ** *   ***
 60 ** *   ***
 50 ** *  
 40 ** *  
 30 ** *  
 20   
 10 **
   051122334455667.
 0505050505050 
   CPU% per hour (last 72 hours)
  * = maximum CPU%   # = average CPU%
==

I can confirm this caused by interrupt by configure ERM feature to detect
the interrupt on the router and check CPU right after the interrupt happens.
The following output display the logging: 

===
*Sep 29 13:39:38.830: %SYS-4-CPURESRISING: System is seeing global cpu util
97% at total level more than the configured critical limit 80 %
*Sep 29 13:39:38.830: %SYS-4-CPURESRISING: System is seeing global cpu util
97% at interrupt level more than the configured critical limit 70 %
*Sep 29 13:39:48.830: %SYS-6-CPURESFALLING: System is no longer seeing
global high cpu at total level for the configured critical limit 80%,
current value 44%
*Sep 29 13:39:48.830: %SYS-6-CPURESFALLING: System is no longer seeing
global high cpu at interrupt level for the configured critical limit 70%,
current value 44%
*Sep 29 13:42:13.750: %SYS-5-CONFIG_I: Configured from console by admin on
vty0 (172.16.252.251)
*Sep 29 14:14:11.122: %SYS-5-CONFIG_I: Configured from console by admin on
vty0 (172.16.252.251)
*Sep 29 14:16:58.862: %SYS-4-CPURESRISING: System is seeing global cpu util
90% at total level more than the configured critical limit 80 %
*Sep 29 14:16:58.862: %SYS-4-CPURESRISING: System is seeing global cpu util
90% at interrupt level more than the configured critical limit 70 %
*Sep 29 14:17:08.862: %SYS-6-CPURESFALLING: System is no longer seeing
global high 

Re: [c-nsp] High CPU caused by interupt on 7600 router

2010-10-01 Thread Ozgur Guler
Try ELAM capture...
TAC can help with the ELAM or CPU profiling.
 -Ozgur



- Original Message 
From: Rin rint...@gmail.com
To: cisco-nsp@puck.nether.net
Sent: Fri, 1 October, 2010 10:34:08
Subject: [c-nsp] High CPU caused by interupt on 7600 router

Hi group, 

I have a 7609 PE router with 2 TenGigabit interfaces uplink to other P
routers and Gigabit interfaces downlink to access switch. Recently, I detect
the CPU of that router is punted approximately every 35mins and result in
below output:
==  
PE-Router#sho proc cpu hist


4521313151
100  
90  
80  
70  
60  
50  
40  
30  
20  
10  *  *
   051122334455
 0505050505
   CPU% per second (last 60 seconds)
  
 88 699  
5664764335455448544554465856444344555656540444344454357766
100  
90  **  **  
80  **  **  
70  ** ***  
60  ** ***  
50  ** ***  
40  #* ***  
30  #* *#*  
20  #* *#*  
10 *## #*   * **  **  **  *  ***##   *  *
   051122334455
 0505050505
   CPU% per minute (last 60 minutes)
  * = maximum CPU%   # = average CPU%
  
9899689899798889898887299889  988989884889
7653706465425842251504506532186452964008644208308676970312489352156780
100 * *   * **  **   * *** *  
90   * ** *   *** *  ** * ***
80    *   ***
70 ** *   ***
60 ** *   ***
50 ** *  
40 ** *  
30 ** *  
20   
10 **
   051122334455667.
 0505050505050 
   CPU% per hour (last 72 hours)
  * = maximum CPU%   # = average CPU%
==

I can confirm this caused by interrupt by configure ERM feature to detect
the interrupt on the router and check CPU right after the interrupt happens.
The following output display the logging: 

===
*Sep 29 13:39:38.830: %SYS-4-CPURESRISING: System is seeing global cpu util
97% at total level more than the configured critical limit 80 %
*Sep 29 13:39:38.830: %SYS-4-CPURESRISING: System is seeing global cpu util
97% at interrupt level more than the configured critical limit 70 %
*Sep 29 13:39:48.830: %SYS-6-CPURESFALLING: System is no longer seeing
global high cpu at total level for the configured critical limit 80%,
current value 44%
*Sep 29 13:39:48.830: %SYS-6-CPURESFALLING: System is no longer seeing
global high cpu at interrupt level for the configured critical limit 70%,
current value 44%
*Sep 29 13:42:13.750: %SYS-5-CONFIG_I: Configured from console by admin on
vty0 (172.16.252.251)
*Sep 29 14:14:11.122: %SYS-5-CONFIG_I: Configured from console by admin on
vty0 (172.16.252.251)
*Sep 29 14:16:58.862: %SYS-4-CPURESRISING: System is seeing global cpu util
90% at total level more than the configured critical limit 80 %
*Sep 29 

Re: [c-nsp] traffic policing on 7600

2010-10-01 Thread Jiří Procházka

Thomas, Cory,

thats exactly function I was looking for!

Thank you for hint, service-policy with aggregated policer is now set on all 
vlans a traffic is policed as I needed.




Kind regards,


Jiri Prochazka


- Original Message - 
From: Thomas Habets tho...@habets.pp.se

To: Jiří Procházka jiri.procha...@superhosting.cz
Sent: Friday, October 01, 2010 9:53 AM
Subject: Re: [c-nsp] traffic policing on 7600



On Thu, 30 Sep 2010, Jiří Procházka wrote:

What am I trying to accomplish is an option to limit exact source IPs to
certain bandwidth to _all_ transit lines togehter.


I don't know if it requires fancier cards than a 6708, but have you tried
an aggregate policer?

mls qos aggregate-policer FOO 10
policy-map TLINK1
  class class-default
policy aggregate FOO
policy-map TLINK2
  class class-default
policy aggregate FOO

Don't forget mls qos vlan-based if you need it.


class class_shape_funpower
  police cir 500


A class called shape that actually polices? Uh, strange choice.

-
typedef struct me_s {
  char name[]  = { Thomas Habets };
  char email[] = { tho...@habets.pp.se };
  char kernel[]= { Linux };
  char *pgpKey[]   = { http://www.habets.pp.se/pubkey.txt; };
  char pgp[] = { A8A3 D1DD 4AE0 8467 7FDE  0945 286A E90A AD48 E854 };
  char coolcmd[]   = { echo '. ./_. ./_'_;. ./_ };
} me_t; 


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] Is GLC-FE-100LX= really unsupported?

2010-10-01 Thread Sascha Pollok

Hello people,

Cisco lists the GLC-FE-100LX= SFP as unsupported for several
switches like most Catalyst 3560. However, they say it is
supported in small 8PC and 12PC boxes.

Does anyone know for sure that it is not working in e.g.
Cat 3560-24TS switches? I am surprised that Cisco lists
the GLC-FE-100FX (Multimode fiber) as supported but not
the LX (Singlemode) module.

Thanks
Sascha

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] can I use | pipe line such as | inc xxx and regexp such as regexp ^$ both , when I execute show bgp

2010-10-01 Thread Per Carlson
Hi Mark.

 features when using show bgp 

 There's a number of things they don't have, and this is to
 be expected for a box that is still fairly new on the scene.

The CRS-1 isn't *that* new any more.

 And someone else already mentioned, 3.8 brought with it some
 BGP switches that can do the stuff you're looking for. Later
 releases will simply make it more elegant.

In this case it weren't about switches, but a plain and dirty bug. It
just didn't work with quotes.

 Haven't used 3.6.anything, but it sounds a little dated
 unless TAC are recommending it (which I'd find curious,
 but...).

We did an upgrade from 3.5 to 3.6 on our CRS-1's last winter (northern
hemisphere). At that time Cisco Advanced Services didn't recommend
using any newer than 3.6. Neither 3.8 nor 3.9 didn't add any must
have features, and 3.6 had significantly more exposures in the wild
(read: used in production).

 All-in-all, not a bad box. Definitely worth considering if
 you're looking to beef up your core, particularly for the
 interesting deals Cisco can offer when compared to the
 competition, including in-house, i.e., XR 12000.

It became a lot better when Cisco pulled the plug on ASR14k, and
instead ships the LC's to the CRS.

-- 
Pelle

RFC1925, truth 11:
 Every old idea will be proposed again with a different name and
 a different presentation, regardless of whether it works.

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Service agreement warning for EOL hardware

2010-10-01 Thread Lukasz Bromirski

On 2010-10-01 11:06, Asbjorn Hojmark - Lists wrote:


Last Date of Support for the 3640 was November 2007. It is correct
that you could extend an existing contract or buy a new one November
2006... but you couldn't do that for 5 years, only 1 because EoL
(LDoS) was November 2007.


I can't go into details, but yes, in this particular case it seems
that nobody required a extended service contract terms for the 3640,
so the EoL date was set to November 2007. In case when EoS notes
are published and then extended in terms of service contract renewal
above typical terms, it's because there are customers with multiyear
contracts on the boxes.

--
Everything will be okay in the end. |  Łukasz Bromirski
 If it's not okay, it's not the end. |   http://lukasz.bromirski.net
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] High CPU caused by interupt on 7600 router

2010-10-01 Thread Rin
Hi Phil, 
Thanks for your email. Below is my answer: 

 Do you have any CoPP or MLS limiters enabled? I am thinking particularly
the TTL and MTU ones.
The CPU only spikes in less than a minute show I cannot catch it when it
high. I had CoPP applied as below
== 
ip access-list standard CoreIP
 permit 172.16.x.x 0.0.0.255
 permit 172.16.x.x 0.0.0.255
!
class-map match-all CoreIP
  match access-group name CoreIP
!
policy-map CoPP
  class CoreIP
   police 2000 conform-action transmit exceed-action drop
  class class-default
   police 600 conform-action transmit exceed-action drop
!
control-plane
 service-policy input CoPP
==

The output shows more than 12Mbps of traffic (matched by class-default) is
sending to CPU. I believe this is value is high but I could not determine
what type of traffic is sending to CPU

===
PE-Router#sho policy-map control-plane 
 Control Plane 

  Service-policy input: CoPP

  Hardware Counters: 

class-map: CoreIP (match-all)
  Match: access-group name CoreIP
  police :
2000 bps 625000 limit 625000 extended limit
  Earl in slot 1 :
1684255 bytes
5 minute offered rate 2808 bps
aggregate-forwarded 1684255 bytes action: transmit
exceeded 0 bytes action: drop
aggregate-forward 3760 bps exceed 0 bps 
  Earl in slot 4 :
0 bytes
5 minute offered rate 0 bps
aggregate-forwarded 0 bytes action: transmit
exceeded 0 bytes action: drop
aggregate-forward 0 bps exceed 0 bps 
  Earl in slot 6 :
0 bytes
5 minute offered rate 0 bps
aggregate-forwarded 0 bytes action: transmit
exceeded 0 bytes action: drop
aggregate-forward 0 bps exceed 0 bps 
  Earl in slot 7 :
0 bytes
5 minute offered rate 0 bps
aggregate-forwarded 0 bytes action: transmit
exceeded 0 bytes action: drop
aggregate-forward 0 bps exceed 0 bps 
  Earl in slot 9 :
0 bytes
5 minute offered rate 0 bps
aggregate-forwarded 0 bytes action: transmit
exceeded 0 bytes action: drop
aggregate-forward 0 bps exceed 0 bps 

  Software Counters: 

Class-map: CoreIP (match-all)
  27872 packets, 2226445 bytes
  5 minute offered rate 4000 bps, drop rate  bps
  Match: access-group name CoreIP
  police:
  cir 2000 bps, bc 625000 bytes
conformed 27915 packets, 2229727 bytes; actions:
  transmit
exceeded 0 packets, 0 bytes; actions:
  drop
conformed 4000 bps, exceed  bps

  Hardware Counters: 

class-map: class-default (match-any)
  Match: any 
  police :
600 bps 187000 limit 187000 extended limit
  Earl in slot 1 :
7697842499 bytes
5 minute offered rate 12430840 bps
aggregate-forwarded 3726798935 bytes action: transmit
exceeded 3971043564 bytes action: drop
aggregate-forward 6016104 bps exceed 6414120 bps 
  Earl in slot 4 :
0 bytes
5 minute offered rate 0 bps
aggregate-forwarded 0 bytes action: transmit
exceeded 0 bytes action: drop
aggregate-forward 0 bps exceed 0 bps 
  Earl in slot 6 :
0 bytes
5 minute offered rate 0 bps
aggregate-forwarded 0 bytes action: transmit
exceeded 0 bytes action: drop
aggregate-forward 0 bps exceed 0 bps 
  Earl in slot 7 :
908447 bytes
5 minute offered rate 880 bps
aggregate-forwarded 908447 bytes action: transmit
exceeded 0 bytes action: drop
aggregate-forward 624 bps exceed 0 bps 
  Earl in slot 9 :
304 bytes
5 minute offered rate 0 bps
aggregate-forwarded 304 bytes action: transmit
exceeded 0 bytes action: drop
aggregate-forward 0 bps exceed 0 bps 

  Software Counters: 

Class-map: class-default (match-any)
  7093 packets, 1164410 bytes
  5 minute offered rate 2000 bps, drop rate  bps
  Match: any 
7093 packets, 1164410 bytes
5 minute rate 2000 bps
  police:
  cir 600 bps, bc 187500 bytes
conformed 7101 packets, 1165380 bytes; actions:
  transmit
exceeded 0 packets, 0 bytes; actions:
  drop
conformed 3000 bps, exceed  bps

===

 You could ERSPAN the RP/SP CPU to a remote machine, then correlate CPU 
spikes with the captured traffic.
How can I do this? Do you have any guideline? 

 How many BGP routes and peers do you have? What is the churn rate on the 
BGP table? Is there any IGP stability? Is there any possibility of a loop?
We only run MP-BGP for MPLS VPN on this router. The BGP table contains 

Re: [c-nsp] High CPU caused by interupt on 7600 router

2010-10-01 Thread Rin
Hi Ozgur, 

I saw TAC engineer do ELAM capture once but not understand much. Is there any 
documentation about ELAM capture?
For CPU Profiling, do you mean this documentation?
http://www.cisco.com/en/US/products/hw/routers/ps359/products_tech_note09186a00801c2af0.shtml#cd

It seems that CPU Profiling is not supported on 7609 with 12.2(33)SRD. 

Thanks, 

-Original Message-
From: Ozgur Guler [mailto:guleroz...@yahoo.co.uk] 
Sent: Friday, October 01, 2010 6:36 PM
To: Rin; cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] High CPU caused by interupt on 7600 router

Try ELAM capture...
TAC can help with the ELAM or CPU profiling.
 -Ozgur




___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] can I use | pipe line such as | inc xxx and regexp such as regexp ^$ both , when I execute show bgp

2010-10-01 Thread Mark Tinka
On Friday, October 01, 2010 10:48:57 pm Per Carlson wrote:

 The CRS-1 isn't *that* new any more.

I know, I meant in terms of its evolution from a core to a 
peering to an edge platform. Not just the CRS, but also IOS 
XR.

It's been around a while, but still making in-roads and 
still developing.

I've always had concerns about earlier versions of IOS XR 
being appropriate (or not) for edge applications. I will say 
3.9 is much better than earlier versions, but we still think 
this is overkill for a CRS. Perhaps an ASR9000.

But hey, YMMV :-).

 We did an upgrade from 3.5 to 3.6 on our CRS-1's last
 winter (northern hemisphere). At that time Cisco
 Advanced Services didn't recommend using any newer than
 3.6. Neither 3.8 nor 3.9 didn't add any must have
 features, and 3.6 had significantly more exposures in
 the wild (read: used in production).

There's a bunch of features we've been accustomed to in 
JUNOS and IOS that we needed in IOS XR. It's probably a good 
thing we boarded the CRS bandwagon late, which made 
transitioning that much less difficult, e.g., the ability to 
ignore an IS-IS ATT bit, e.t.c.

 It became a lot better when Cisco pulled the plug on
 ASR14k, and instead ships the LC's to the CRS.

Yes, those FP40 forwarding boards offer great value.

Mark.


signature.asc
Description: This is a digitally signed message part.
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

Re: [c-nsp] High CPU caused by interupt on 7600 router

2010-10-01 Thread Phil Mayers

On 01/10/10 16:24, Rin wrote:

Hi Phil,
Thanks for your email. Below is my answer:


Do you have any CoPP or MLS limiters enabled? I am thinking particularly

the TTL and MTU ones.



The CPU only spikes in less than a minute show I cannot catch it when it
high. I had CoPP applied as below


Since the system logs, you could use an EEM applet to trigger a sh proc 
cpu and direct output to a file?




The output shows more than 12Mbps of traffic (matched by class-default) is
sending to CPU. I believe this is value is high but I could not determine
what type of traffic is sending to CPU


In which case I would SPAN the CPU.


You could ERSPAN the RP/SP CPU to a remote machine, then correlate CPU

spikes with the captured traffic.



How can I do this? Do you have any guideline?


conf t
mon sess 1 type erspan-source
source cpu rp
source cpu sp
destination
ip address your monitoring box
# various other options
exit
no shut

...then on your monitoring box, run gulp | tcpdump or wireshark
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] High CPU caused by interupt on 7600 router

2010-10-01 Thread Benjamin Lovell
ELAM captures only one packet at a time so it's not as useful for figuring out 
what packets are causing high CPU. An RP-inand SPAN will be much better. Once 
you find out which packets are going to the CPU and you think that maybe those 
packets should not have hit the CPU then ELAM could be useful. 

BTW - there is no customer facing docs about ELAM as they are engineering level 
commands. That said it's pretty easy to capture an IP packet in ELAM. Reading 
all the fields in the DBUS and RBUS headers is another matter. 


-Ben


On Oct 1, 2010, at 11:31 AM, Rin wrote:

 Hi Ozgur, 
 
 I saw TAC engineer do ELAM capture once but not understand much. Is there any 
 documentation about ELAM capture?
 For CPU Profiling, do you mean this documentation?
 http://www.cisco.com/en/US/products/hw/routers/ps359/products_tech_note09186a00801c2af0.shtml#cd
 
 It seems that CPU Profiling is not supported on 7609 with 12.2(33)SRD. 
 
 Thanks, 
 
 -Original Message-
 From: Ozgur Guler [mailto:guleroz...@yahoo.co.uk] 
 Sent: Friday, October 01, 2010 6:36 PM
 To: Rin; cisco-nsp@puck.nether.net
 Subject: Re: [c-nsp] High CPU caused by interupt on 7600 router
 
 Try ELAM capture...
 TAC can help with the ELAM or CPU profiling.
 -Ozgur
 
 
 
 
 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/