Re: [c-nsp] OT: Wireless 2.4ghz

2015-02-03 Thread Alan Buxey
;)

I guess the answer quotidian be 'when you want to' . There will always be 
legacy devices out there that people want to keep and won't do 5GHz  It 
will be down to you when you turn of 2.4GHz support.a decision bases in 
support costs/overhead. I guess you already disable 802.11b?  Are there any 
5GHz only APs ? Perhaps time to talk to the wifi vendors about that.  :)

alan
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] OT: Wireless 2.4ghz

2015-02-03 Thread Matt Zagrabelny
On Tue, Feb 3, 2015 at 3:53 PM, Scott Voll  wrote:
> Not talking pie in the sky but reality. when do you think we will be
> able to turn off 2.4ghz wifi radios?  we currently have about 50/50 5ghz vs
> 2.4ghz.
>
> What do you think?  18 months?

When are manufacturers going to stop making 2.4 GHz equipment?

I just got this:

http://www.amazon.com/Panda-300Mbps-Wireless-N-Adapter-button/dp/B00JDVRCI0/ref=sr_1_2?ie=UTF8&qid=1421788003&sr=8-2&keywords=usb+wifi

I guess I didn't pay attention to the frequency range that it used
when I searched, but received it and it is 2.4 only.

-m
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] OT: Wireless 2.4ghz

2015-02-03 Thread Scott Voll
Not talking pie in the sky but reality. when do you think we will be
able to turn off 2.4ghz wifi radios?  we currently have about 50/50 5ghz vs
2.4ghz.

What do you think?  18 months?

TIA

Scott
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] PBR Limits for Nexus 7k

2015-02-03 Thread Tim Stevenson

At 10:17 AM 2/3/2015  Tuesday, Tim Stevenson quipped:

Hi Brian, please see inline below:

At 09:06 AM 2/3/2015  Tuesday, Brian Christopher Raaen quipped:

I was doing some research and found the Nexus listed a limit of 23 entries
for PBR.



This is a limit on number of PBR route-map sequences. Each sequence 
can have a match statement pointing to an ACL of arbitrary size.




 I have some situations that require source based routing for more
than that many pairings(more like 200-300).



This limitation would essentially restrict you to 23 unique sets of 
next-hops (ie, each sequence can set 1 or more next-hops) for each 
set of match criteria (ACL).



Let me clarify/reword that:

This limitation would essentially restrict you to 23 unique sets of 
next-hops (ie, each sequence can set 1 or more next-hops), each with 
its own set of match criteria (ACL).



Thanks,
Tim






Let me know if you have any questions.

Thanks,
Tim



  Does this mean I will need to
look for a solution other than a Nexus 7k or am I misunderstanding what
this limit means?

The datasheet I found it here
http://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/verified_scalability/b_Cisco_Nexus_7000_Series_NX-OS_Verified_Scalability_Guide.html#reference_DF4FD746AB1145838991CE0BDE9DE621

--
Brian Christopher Raaen
Network Architect
Zcorum
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/






Tim Stevenson, tstev...@cisco.com
Routing & Switching CCIE #5561
Distinguished Engineer, Technical Marketing
Data Center Switching
Cisco - http://www.cisco.com
+1(408)526-6759







Tim Stevenson, tstev...@cisco.com
Routing & Switching CCIE #5561
Distinguished Engineer, Technical Marketing
Data Center Switching
Cisco - http://www.cisco.com
+1(408)526-6759


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] PBR Limits for Nexus 7k

2015-02-03 Thread Tim Stevenson

Hi Brian, please see inline below:

At 09:06 AM 2/3/2015  Tuesday, Brian Christopher Raaen quipped:

I was doing some research and found the Nexus listed a limit of 23 entries
for PBR.



This is a limit on number of PBR route-map sequences. Each sequence 
can have a match statement pointing to an ACL of arbitrary size.




 I have some situations that require source based routing for more
than that many pairings(more like 200-300).



This limitation would essentially restrict you to 23 unique sets of 
next-hops (ie, each sequence can set 1 or more next-hops) for each 
set of match criteria (ACL).


Let me know if you have any questions.

Thanks,
Tim



  Does this mean I will need to
look for a solution other than a Nexus 7k or am I misunderstanding what
this limit means?

The datasheet I found it here
http://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/verified_scalability/b_Cisco_Nexus_7000_Series_NX-OS_Verified_Scalability_Guide.html#reference_DF4FD746AB1145838991CE0BDE9DE621

--
Brian Christopher Raaen
Network Architect
Zcorum
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/






Tim Stevenson, tstev...@cisco.com
Routing & Switching CCIE #5561
Distinguished Engineer, Technical Marketing
Data Center Switching
Cisco - http://www.cisco.com
+1(408)526-6759


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] PBR Limits for Nexus 7k

2015-02-03 Thread Brian Christopher Raaen
I was doing some research and found the Nexus listed a limit of 23 entries
for PBR.  I have some situations that require source based routing for more
than that many pairings(more like 200-300).  Does this mean I will need to
look for a solution other than a Nexus 7k or am I misunderstanding what
this limit means?

The datasheet I found it here
http://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/verified_scalability/b_Cisco_Nexus_7000_Series_NX-OS_Verified_Scalability_Guide.html#reference_DF4FD746AB1145838991CE0BDE9DE621

-- 
Brian Christopher Raaen
Network Architect
Zcorum
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] Cisco IOS XR CGN

2015-02-03 Thread M K
Hi allI have ASR9k running CGN NAT44 and I need to graph some outputsFirst , 
how to pull a specific output if it has no OID ? and Does Cisco has OIDs for 
ASR9k ISM ?
Thanks
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ME3400 high cpu

2015-02-03 Thread PlaWanSai RMUTT CPE IX
> Its most certainly not. If you neither know the exact configuration of the
box, nor if the box is layer 2 or layer 3 switching, then you better not
partition the tcam for a specific purpose.

> Check logging, check your routing table. If you have a routing-table (aka
"ip routing" in the config), then you cannot use the layer 2 template.

I'm not use the routing. It is l2 switch. Why does it have the high percent
of interrupt process?

3400#sho ip rou
Default gateway is 10.1.7.1

Host   Gateway   Last UseTotal Uses  Interface
ICMP redirect cache is empty
3400#   

Thank you very much.  

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] BGP/route-map/acl question/logic...

2015-02-03 Thread Lukas Tribus
> I can see "easier to use", but more flexibility - actually, no :-)
>
> It's hard to come up with a really useful example, but given that extended
> ACLs match both on prefix base and netmask with wildcards bits, this is
> more flexibility than you'll ever use without your brain blowing up.
>
> access-list 100 permit 10.0.5.0 0.255.0.0 255.255.255.0 0.0.0.255
>
> "for every /24 out of 10/0 that is 10.x.5.0/24, permit /24../32"
>
> do that with a prefix list :-)

Yes, extended ACLs are more flexible, but not very easy on the eyes.

We are supposed to read, understand and find issues in those configurations
at 03 o'clock in the morning and I don't see this happening with extended ACLs.

Unless you have such a specific requirement like the one above, prefix-lists
are the better tool to do this job.




  
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] BGP/route-map/acl question/logic...

2015-02-03 Thread Gert Doering
Hi,

On Tue, Feb 03, 2015 at 09:48:35AM +0100, Peter Rathlev wrote:
> On Tue, 2015-02-03 at 09:30 +0100, Gert Doering wrote:
> > It's hard to come up with a really useful example, but given that extended
> > ACLs match both on prefix base and netmask with wildcards bits, this is
> > more flexibility than you'll ever use without your brain blowing up.
> > 
> > access-list 100 permit 10.0.5.0 0.255.0.0 255.255.255.0 0.0.0.255
> > 
> > "for every /24 out of 10/0 that is 10.x.5.0/24, permit /24../32"
> > 
> > do that with a prefix list :-)
> 
> On the other hand, almost all people doing this are doing something
> wrong. ;-)

I do have to agree on that - I just wanted to challenge the "more 
flexible" statement from Lukas.

And I'm not doing anything like that today ;-)

(OTOH, it depends on your addressing plans...  "in every site out there,
.x.5.0/24 is the XX-LAN, while .x.6.0/23 is the YY-LAN, and to ensure
that no more-specifics are learned, take /24 only for .x.5.0/24, and 
/23 for .x.6.0/23...")

> And that's _almost_ all of course. Someone very skilled might have a
> legitimate purpose for doing exactly this, but OP (and people like me)
> are not among those.
> 
> I'd say stick to prefix-lists and then when you can write route-maps in
> your sleep from arbitrary policy wishes, but still can't solve a given
> problem with prefix-lists _then_ look at using access-lists. :-)

Amen :-)

gert

-- 
USENET is *not* the non-clickable part of WWW!
   //www.muc.de/~gert/
Gert Doering - Munich, Germany g...@greenie.muc.de
fax: +49-89-35655025g...@net.informatik.tu-muenchen.de


pgploMtntd7MQ.pgp
Description: PGP signature
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

Re: [c-nsp] BGP/route-map/acl question/logic...

2015-02-03 Thread Peter Rathlev
On Tue, 2015-02-03 at 09:30 +0100, Gert Doering wrote:
> It's hard to come up with a really useful example, but given that extended
> ACLs match both on prefix base and netmask with wildcards bits, this is
> more flexibility than you'll ever use without your brain blowing up.
> 
> access-list 100 permit 10.0.5.0 0.255.0.0 255.255.255.0 0.0.0.255
> 
> "for every /24 out of 10/0 that is 10.x.5.0/24, permit /24../32"
> 
> do that with a prefix list :-)

On the other hand, almost all people doing this are doing something
wrong. ;-)

And that's _almost_ all of course. Someone very skilled might have a
legitimate purpose for doing exactly this, but OP (and people like me)
are not among those.

I'd say stick to prefix-lists and then when you can write route-maps in
your sleep from arbitrary policy wishes, but still can't solve a given
problem with prefix-lists _then_ look at using access-lists. :-)

-- 
Peter


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] BGP/route-map/acl question/logic...

2015-02-03 Thread CiscoNSP List
Thanks Gert...really appreciate the explanation.

> Date: Tue, 3 Feb 2015 09:35:37 +0100
> From: g...@greenie.muc.de
> To: cisconsp_l...@hotmail.com
> CC: g...@greenie.muc.de; cisco-nsp@puck.nether.net
> Subject: Re: [c-nsp] BGP/route-map/acl question/logic...
> 
> Hi,
> 
> On Tue, Feb 03, 2015 at 07:32:43PM +1100, CiscoNSP List wrote:
> > Cheers Gert - Understand it now :)
> > 
> > The "continue" part (When to use/when not to use), I definitely need to 
> > read up on!
> 
> Basically, when you want to match+set something, and then continue processing
> the route-map - while normally it would end at the first clause that matches
> something.
> 
> IOW, if a route-map has 10 clauses and half of them have the same "set xxx"
> thing in them, it might make sense.  But it does complicate understanding
> the actual flow through the route-map, so use with care.
> 
> Of course we all want route-policy (and "vi") for IOS :-)
> 
> gert
> -- 
> USENET is *not* the non-clickable part of WWW!
>//www.muc.de/~gert/
> Gert Doering - Munich, Germany g...@greenie.muc.de
> fax: +49-89-35655025g...@net.informatik.tu-muenchen.de
  
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] BGP/route-map/acl question/logic...

2015-02-03 Thread CiscoNSP List
> On Tue, Feb 03, 2015 at 08:39:09AM +0100, Lukas Tribus wrote:
> > > route-map UPSTREAM_A_IN permit 10
> > > match ip address 98
> > 
> > I would strongly suggest to use prefix-lists instead of access-lists, they 
> > are
> > made on purpose to match prefixes, are a lot easier to use and provide
> > much more flexibility.
> 
> I can see "easier to use", but more flexibility - actually, no :-)
> 
> It's hard to come up with a really useful example, but given that extended
> ACLs match both on prefix base and netmask with wildcards bits, this is
> more flexibility than you'll ever use without your brain blowing up.
> 
> access-list 100 permit 10.0.5.0 0.255.0.0 255.255.255.0 0.0.0.255
> 
> "for every /24 out of 10/0 that is 10.x.5.0/24, permit /24../32"
> 
> do that with a prefix list :-)


lol...after that acl example, I think my brain is about to explodehehe, I 
can sense some regex examples coming :)


  
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] BGP/route-map/acl question/logic...

2015-02-03 Thread CiscoNSP List
> 
> > Thanks Lukas - Under what circumstances would you use an access-list 
> > over a prefix-list? 
> 
> I would use an ACL when I need to match specific traffic (e.g. in an 
> interface acl,
> firewall or nat context), as opposed to match specific routes (e.g. when 
> configuring
> routing protocols).
> 

Cheers Lukas. 
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] BGP/route-map/acl question/logic...

2015-02-03 Thread CiscoNSP List
Cheers Gert - Understand it now :)

The "continue" part (When to use/when not to use), I definitely need to read up 
on!

Thanks again for all the replies.

> Date: Tue, 3 Feb 2015 09:26:56 +0100
> From: g...@greenie.muc.de
> To: cisconsp_l...@hotmail.com
> CC: cisco-nsp@puck.nether.net
> Subject: Re: [c-nsp] BGP/route-map/acl question/logic...
> 
> Hi,
> 
> On Tue, Feb 03, 2015 at 04:21:42PM +1100, CiscoNSP List wrote:
> > route-map UPSTREAM_A_IN permit 10
> > match ip address 98
> > continue 20
> > route-map UPSTREAM_A_IN permit 20
> > set community 12345:1
> > 
> > access-list 98 deny   10.0.0.0 0.255.255.255
> > access-list 98 permit any
> 
> Why fiddle with continue?  "Continue to next block" will effectively turn
> this into a no-operation
> 
>  - if it matches, go to 20
>  - if it does not match, go to next block, which happens to be 20
> 
> read up on route-maps :-)
> 
> I'd do:
> 
> route-map UPSTREAM_A_IN deny 10
> match ip address 98
> 
> route-map UPSTREAM_A_IN permit 20
> set community 12345:1
>  
> access-list 98 permit   10.0.0.0 0.255.255.255
> access-list 98 deny any
> 
> (-> positive match on what you want to drop, then drop.   If no match,
> fall through to 20, tag)
> 
> gert
> 
> 
> -- 
> USENET is *not* the non-clickable part of WWW!
>//www.muc.de/~gert/
> Gert Doering - Munich, Germany g...@greenie.muc.de
> fax: +49-89-35655025g...@net.informatik.tu-muenchen.de
  
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] MPLS LDP Sync w/ ISIS over point to point Link

2015-02-03 Thread Spyros Kakaroukas
I've been in a similar situation before and my understanding is as follows.

If you use loopbacks for your LDP peering and have a default route in your 
global table you will end up in a catch 22. Assume R1 and R2 . R1 is up and 
connected to the rest of your domain and has a default route installed. R2 is 
connected to R1 and is just coming up. They both send LDP hellos. R2 sees the 
LDP hellos sourced from R1's loopback. It does not have a route to that so it 
tries to bring up the IGP. R1 sees R2's hellos, sourced from R2's loopback. It 
does have a matching route for that ( the default ) so it will not bring up the 
IGP ( until the holddown expires, which is never by default ).

Holddown should fix this, as suggested. You may want to reevaluate whether you 
want ldp-igp sync in such a design though. Depending on your design goals, 
there might be other knobs or procedures more suited to them.

On 3 Feb 2015 01:09, dip  wrote:
Without going too deep right now as I am outside I think "mpls ldp igp sync
holddown sec" should fix the problem .

On Monday, February 2, 2015, Troy Boutso  wrote:

> Hey
>
> I've been rolling out new routers to various sites throughout our
> organisation. And in doing so, I've been applying the "mpls ldp sync"
> command under the "router isis" subsection.
> This has been fine up until now. Because all other sites are running OSPF
> and ISIS together (as we are in the process of migrating away from an OSPF
> network to an ISIS based MPLS core network, etc).
>
> With this new site, I only planed on only bringing up the isis adjacency as
> it is a new site and no OSPF is required (because I don't need to migrate
> anything off). However the ISIS adjacency won't come up because it doesn't
> have an LDP session up yet. And the LDP session wont come up without the
> IGP coming up.
>
> This is some real chicken and egg stuff right here.
>
> It has become quiet clear that all my other routers in production which
> have LDP sessions are essentially relying on that OSPF adjacency to help
> form the initial LDP session.
> One day I plan to shut those down. Which could cause me big issues further
> down the road.
> I do have ldp session protection enabled ... but if a router was to reboot
> and have no ospf to help form the initial LDP, then it seems my isis
> adjecencie may never form. That is the worst case scenario
>
>
> Getting back to my point ... If I remove the mpls ldp sync on both routers
> the ISIS adjacency forms immediately. So this is definitely the culprit.
> How on earth is this feature supposed to work in a production environment?
> Am I missing something here?
>
> Am I supposed to manually form ldp sessions (targeted) or something?
> If anyone has experience with this, I'm all ears.
>
> Kind Regards
> Troy
> ___
> cisco-nsp mailing list  cisco-nsp@puck.nether.net 
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/
>


--
Sent from iPhone
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


This e-mail and any attachment(s) contained within are confidential and are 
intended only for the use of the individual to whom they are addressed. The 
information contained in this communication may be privileged, or exempt from 
disclosure. If the reader of this message is not the intended recipient, you 
are hereby notified that any dissemination, distribution, or copying of this 
communication is strictly prohibited. If you have received this communication 
in error, please notify the sender and delete the communication without 
retaining any copies. Rolaware Hellas SA is not responsible for, nor endorses, 
any opinion, recommendation, conclusion, solicitation, offer or agreement or 
any information contained in this communication.
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/



Re: [c-nsp] BGP/route-map/acl question/logic...

2015-02-03 Thread Gert Doering
Hi,

On Tue, Feb 03, 2015 at 07:32:43PM +1100, CiscoNSP List wrote:
> Cheers Gert - Understand it now :)
> 
> The "continue" part (When to use/when not to use), I definitely need to read 
> up on!

Basically, when you want to match+set something, and then continue processing
the route-map - while normally it would end at the first clause that matches
something.

IOW, if a route-map has 10 clauses and half of them have the same "set xxx"
thing in them, it might make sense.  But it does complicate understanding
the actual flow through the route-map, so use with care.

Of course we all want route-policy (and "vi") for IOS :-)

gert
-- 
USENET is *not* the non-clickable part of WWW!
   //www.muc.de/~gert/
Gert Doering - Munich, Germany g...@greenie.muc.de
fax: +49-89-35655025g...@net.informatik.tu-muenchen.de


pgpaJZeSjVuAe.pgp
Description: PGP signature
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

Re: [c-nsp] BGP/route-map/acl question/logic...

2015-02-03 Thread Lukas Tribus

> Thanks Lukas - Under what circumstances would you use an access-list 
> over a prefix-list? 

I would use an ACL when I need to match specific traffic (e.g. in an interface 
acl,
firewall or nat context), as opposed to match specific routes (e.g. when 
configuring
routing protocols).


  
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] BGP/route-map/acl question/logic...

2015-02-03 Thread Gert Doering
Hi,

On Tue, Feb 03, 2015 at 08:39:09AM +0100, Lukas Tribus wrote:
> > route-map UPSTREAM_A_IN permit 10
> > match ip address 98
> 
> I would strongly suggest to use prefix-lists instead of access-lists, they are
> made on purpose to match prefixes, are a lot easier to use and provide
> much more flexibility.

I can see "easier to use", but more flexibility - actually, no :-)

It's hard to come up with a really useful example, but given that extended
ACLs match both on prefix base and netmask with wildcards bits, this is
more flexibility than you'll ever use without your brain blowing up.

access-list 100 permit 10.0.5.0 0.255.0.0 255.255.255.0 0.0.0.255

"for every /24 out of 10/0 that is 10.x.5.0/24, permit /24../32"

do that with a prefix list :-)

gert

-- 
USENET is *not* the non-clickable part of WWW!
   //www.muc.de/~gert/
Gert Doering - Munich, Germany g...@greenie.muc.de
fax: +49-89-35655025g...@net.informatik.tu-muenchen.de


pgpJK5TTI2K1b.pgp
Description: PGP signature
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

Re: [c-nsp] ME3400 high cpu

2015-02-03 Thread Lukas Tribus
> Yes, I used layer-2 template. I think it appropriated with the traffic. How
> could I know?

Its most certainly not. If you neither know the exact configuration of the
box, nor if the box is layer 2 or layer 3 switching, then you better not
partition the tcam for a specific purpose.

Check logging, check your routing table. If you have a routing-table
(aka "ip routing" in the config), then you cannot use the layer 2 template.

  
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] BGP/route-map/acl question/logic...

2015-02-03 Thread Gert Doering
Hi,

On Tue, Feb 03, 2015 at 04:21:42PM +1100, CiscoNSP List wrote:
> route-map UPSTREAM_A_IN permit 10
> match ip address 98
> continue 20
> route-map UPSTREAM_A_IN permit 20
> set community 12345:1
> 
> access-list 98 deny   10.0.0.0 0.255.255.255
> access-list 98 permit any

Why fiddle with continue?  "Continue to next block" will effectively turn
this into a no-operation

 - if it matches, go to 20
 - if it does not match, go to next block, which happens to be 20

read up on route-maps :-)

I'd do:

route-map UPSTREAM_A_IN deny 10
match ip address 98

route-map UPSTREAM_A_IN permit 20
set community 12345:1
 
access-list 98 permit   10.0.0.0 0.255.255.255
access-list 98 deny any

(-> positive match on what you want to drop, then drop.   If no match,
fall through to 20, tag)

gert


-- 
USENET is *not* the non-clickable part of WWW!
   //www.muc.de/~gert/
Gert Doering - Munich, Germany g...@greenie.muc.de
fax: +49-89-35655025g...@net.informatik.tu-muenchen.de


pgp5bczArl4si.pgp
Description: PGP signature
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

Re: [c-nsp] BGP/route-map/acl question/logic...

2015-02-03 Thread CiscoNSP List
Thanks very much for the explanation(And examples), and yes, I agree it is a 
tad counter-intuitive, hence my confusion why my first attempt was not working 
as I expected it to (Or what I thought it logically should be doing!)

Cheers.


> Date: Tue, 3 Feb 2015 10:08:23 +0200
> From: cisco-...@lnx.ro
> To: cisco-nsp@puck.nether.net
> Subject: Re: [c-nsp] BGP/route-map/acl question/logic...
> 
> 
> Hi,
> 
> route-maps are "first rule match" based.
> 
> The "permit any" in the acl will "match" the announcement and skip the 
> rest of the rules.
> 
> you need to do something like:
> 
> access-list 98 permit 10.0.0.0 0.255.255.255
> (or better:
> prefix-list PL-NAME permit 10.0.0.0/8
> )
> route-map UPSTREAM_A_IN *deny* 10
> match ip address 98
> (or better:
> match ip address prefix-list PL-NAME
> )
> route-map UPSTREAM_A_IN permit 20
> set community 12345:1
> 
> You "permit" the prefix to be denied. A bit counter-intuitive, yes :)
> 
> Dumitru
> 
> 
> On 02/03/2015 07:21 AM, CiscoNSP List wrote:
> > Hi Everyone,
> >
> > If I want to block certain prefixes from an upstream, and accept the rest 
> > and then tag the accepted prefixes, which is the correct method..I 
> > *thought* the first one was correct, but it doesnt do what I 
> > expected...i.e. the ACL gets a hit on deny 10.0.0.0/24, but it is still 
> > allowed(i.e We still receive the prefix)?:
> >
> > route-map UPSTREAM_A_IN permit 10
> > match ip address 98
> > continue 20
> > route-map UPSTREAM_A_IN permit 20
> > set community 12345:1
> >
> > access-list 98 deny   10.0.0.0 0.255.255.255
> > access-list 98 permit any
> >
> > or...(I havent tested this one yet):
> >
> > route-map UPSTREAM_A_IN deny 10
> > match ip address 98
> > continue 20
> > route-map UPSTREAM_A_IN permit 20
> > set community 12345:1
> >
> > access-list 98 permit   10.0.0.0 0.255.255.255
> >
> > Cheers.
> > 
> > ___
> > cisco-nsp mailing list  cisco-nsp@puck.nether.net
> > https://puck.nether.net/mailman/listinfo/cisco-nsp
> > archive at http://puck.nether.net/pipermail/cisco-nsp/
> 
> ___
> cisco-nsp mailing list  cisco-nsp@puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/
  
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] BGP/route-map/acl question/logic...

2015-02-03 Thread CiscoNSP List

Thanks Lukas - Under what circumstances would you use an access-list over a 
prefix-list? 

Cheers.

> From: luky...@hotmail.com
> To: cisconsp_l...@hotmail.com; cisco-nsp@puck.nether.net
> Subject: RE: [c-nsp] BGP/route-map/acl question/logic...
> Date: Tue, 3 Feb 2015 08:39:09 +0100
> 
> > route-map UPSTREAM_A_IN permit 10
> > match ip address 98
> 
> I would strongly suggest to use prefix-lists instead of access-lists, they are
> made on purpose to match prefixes, are a lot easier to use and provide
> much more flexibility.
> 
> 
  
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] BGP/route-map/acl question/logic...

2015-02-03 Thread CiscoNSP List
Thanks very much Karsten - So, matches from route-map section 10, are not 
carried through to route-map section 20 (Section 20, basically allows all, and 
just tags)?


> Date: Tue, 3 Feb 2015 08:14:13 +0100
> From: karsten_thom...@linfre.de
> To: cisconsp_l...@hotmail.com
> CC: cisco-nsp@puck.nether.net
> Subject: Re: [c-nsp] BGP/route-map/acl question/logic...
> 
> Hi,
> 
> if you want to deny the prefix you have to use deny ;)
> The untested version of your route-map should do the expected, but you 
> don't need the continue 20 as the continue doesn't work with a deny.
> 
> Karsten
> 
> Am 03.02.2015 06:21, schrieb CiscoNSP List:
> > Hi Everyone,
> >
> > If I want to block certain prefixes from an upstream, and accept the rest 
> > and then tag the accepted prefixes, which is the correct method..I 
> > *thought* the first one was correct, but it doesnt do what I 
> > expected...i.e. the ACL gets a hit on deny 10.0.0.0/24, but it is still 
> > allowed(i.e We still receive the prefix)?:
> >
> > route-map UPSTREAM_A_IN permit 10
> > match ip address 98
> > continue 20
> > route-map UPSTREAM_A_IN permit 20
> > set community 12345:1
> >
> > access-list 98 deny   10.0.0.0 0.255.255.255
> > access-list 98 permit any
> >
> > or...(I havent tested this one yet):
> >
> > route-map UPSTREAM_A_IN deny 10
> > match ip address 98
> > continue 20
> > route-map UPSTREAM_A_IN permit 20
> > set community 12345:1
> >
> > access-list 98 permit   10.0.0.0 0.255.255.255
> >
> > Cheers.
> > 
> > ___
> > cisco-nsp mailing list  cisco-nsp@puck.nether.net
> > https://puck.nether.net/mailman/listinfo/cisco-nsp
> > archive at http://puck.nether.net/pipermail/cisco-nsp/
> 
  
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] BGP/route-map/acl question/logic...

2015-02-03 Thread Dumitru Ciobarcianu


Hi,

route-maps are "first rule match" based.

The "permit any" in the acl will "match" the announcement and skip the 
rest of the rules.


you need to do something like:

access-list 98 permit 10.0.0.0 0.255.255.255
(or better:
prefix-list PL-NAME permit 10.0.0.0/8
)
route-map UPSTREAM_A_IN *deny* 10
match ip address 98
(or better:
match ip address prefix-list PL-NAME
)
route-map UPSTREAM_A_IN permit 20
set community 12345:1

You "permit" the prefix to be denied. A bit counter-intuitive, yes :)

Dumitru


On 02/03/2015 07:21 AM, CiscoNSP List wrote:

Hi Everyone,

If I want to block certain prefixes from an upstream, and accept the rest and 
then tag the accepted prefixes, which is the correct method..I *thought* the 
first one was correct, but it doesnt do what I expected...i.e. the ACL gets a 
hit on deny 10.0.0.0/24, but it is still allowed(i.e We still receive the 
prefix)?:

route-map UPSTREAM_A_IN permit 10
match ip address 98
continue 20
route-map UPSTREAM_A_IN permit 20
set community 12345:1

access-list 98 deny   10.0.0.0 0.255.255.255
access-list 98 permit any

or...(I havent tested this one yet):

route-map UPSTREAM_A_IN deny 10
match ip address 98
continue 20
route-map UPSTREAM_A_IN permit 20
set community 12345:1

access-list 98 permit   10.0.0.0 0.255.255.255

Cheers.

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ME3400 high cpu

2015-02-03 Thread PlaWanSai RMUTT CPE IX
Hi,

 

Can you describe the traffic going through the switch?

I think l2 and l3 mpls VPN. I'm not sure. How could I know?

 

It looks like the CPU is getting pushed up due to IGMP snooping.

But the IGMPSN process is just about 10%.

 

Is there any possibility that you have the 'layer-2' SDM template applied?

Yes, I used layer-2 template. I think it appropriated with the traffic. How
could I know?

 

Thank you very much.

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/