[c-nsp] IOS XR MLACP and L3VPN static routes

2022-01-12 Thread Ivan Maksimović
We have a setup where a pair of A99K boxes (IOS XR 7.1.3) are working as PE
routers, and on MLACP (active/standby) Bundle towards Metro Switch are
mixed L2/L3 subinterfaces.

When we try to configure static routes on standby node in customer VRF,
routes are advertised through both active and standby PoAs to the core
MPLS  (it is advertised on both routers).

Is there any way on IOS-XR (7.1.3) that provides blocking of advertising
static routes on standby PoA in L3VPN MC-LAG environment.

Something tells me that this is not normal behavior (BUG maybe, or feature
XD )

I've found that on IOS-XE this works normal, feature is called:

 Multichassis Link Aggregation Group for L3VPN

https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/mp_l3_vpns/configuration/xe-16-9/mp-l3-vpns-xe-16-9-book/mc-lag-for_l3vpn.pdf
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ASR9K XR 6.4.2 and SNMP monitoring

2019-12-19 Thread Ivan Walker
Sorry - I was unclear.  I was referring to the OID(s) for the alarms in the
original post (no issues regarding the systemowner bit).  :-)

On Fri, 20 Dec 2019 at 00:21, Gert Doering  wrote:

> Hi,
>
> On Thu, Dec 19, 2019 at 10:25:45PM +1300, Ivan Walker wrote:
> > If you do work this out please share.  I did search and was unsuccessful
> on
> > older software sometime ago.
>
> There's this thing called "Google".  Third hit on a search for
> "IOS XR SNMP privilege" turns up this link:
>
>
> https://www.cisco.com/c/en/us/td/docs/routers/crs/software/crs_r4-1/system_management/command/reference/b_sysman_cr41crs/b_sysman_cr41crs_chapter_01110.pdf
>
> which suggests the missing bit might be adding "SystemOwner" to the
> "snmp-server community..." commnads.
>
> As in
>
>   snmp-server community MySecret RO SystemOwner
>  
>
> (we do not have this active anywhere right now, but it rings familiar)
>
> gert
> --
> "If was one thing all people took for granted, was conviction that if you
>  feed honest figures into a computer, honest figures come out. Never
> doubted
>  it myself till I met a computer with a sense of humor."
>  Robert A. Heinlein, The Moon is a Harsh
> Mistress
>
> Gert Doering - Munich, Germany
> g...@greenie.muc.de
>
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ASR9K XR 6.4.2 and SNMP monitoring

2019-12-19 Thread Ivan Walker
If you do work this out please share.  I did search and was unsuccessful on
older software sometime ago.

Ivan

On Thu, 19 Dec 2019 at 08:03, Gert Doering  wrote:

> Hi,
>
> On Wed, Dec 18, 2019 at 09:27:46AM -0800, Lee Starnes wrote:
> > I did check out both the alarm and environment MIBs and none of the OIDs
> in
> > them come back as valid. In fact, a walk of those enterprise OIDs results
> > in no such object on this agent.
>
> ISTR that there is a magic "admin" config setting that makes "critical"
> SNMP information visible, which is normally hidden.  Chassis information
> is part of that.
>
> gert
> --
> "If was one thing all people took for granted, was conviction that if you
>  feed honest figures into a computer, honest figures come out. Never
> doubted
>  it myself till I met a computer with a sense of humor."
>  Robert A. Heinlein, The Moon is a Harsh
> Mistress
>
> Gert Doering - Munich, Germany
> g...@greenie.muc.de
> ___
> cisco-nsp mailing list  cisco-nsp@puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/
>
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Cisco 4000 series (4461) as a BGP router?

2019-10-31 Thread Ivan Walker
Lukasz,

> That’s true of course. 9901 would be better entry-level choice with
> years in front of it.

I find that the 9901 being entry level is quite high.  There is the 120Gbps
license but the device itself is quite heavy and large and the power
consumption more than the 9001.  I think the success of the ASR920 shows
that small size and low power usage are highly valued.

I would love to see a smaller option - just a single NPU, maybe 1RU, and
half the power usage.  This would give a much more fitting entry level
model and allow users to push out the ASR99xx 64bit xr model to smaller
sites where the ASR9901 is just too big .

Thanks

Ivan
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] ASR920 and ASR9001 SPAN / Traffic Capture

2019-03-17 Thread Ivan Walker
ASR920:
Running 16.6.3.  Ideal outcome would be to have a SPAN session with a
source from a service instance (EFP) into a a PW (PW-SPAN).  This doesn't
seem to be supported.  Any known work arounds?  I did find
https://lists.gt.net/cisco/nsp/193632?page=last that suggested using a
loopback cable.  Not that elegant, burns up ports and it seems the local
span doesn't support EFPs as a source either - just entire physical ports.
Interestingly enough the command line seems to allow configuring EFP as a
source but doesn't actually work.

monitor session 1 type local
 source service instance 4 GigabitEthernet0/0/0
 destination interface Gi0/0/11

Anyone put in a feature request for mirroring from an EFP or for PW-SPAN on
the ASR920?

ASR9001:
Running 6.2.3.  This platform does support PW-SPAN, but as far as I can
tell it is not possible to use PW-Ether interfaces (PWHE) as a source.  Any
known work around for this or has anyone raised a feature request for this?

Thanks

Ivan
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ASR9K Upgrade

2016-03-13 Thread Ivan Walker
Also beware of
http://www.cisco.com/c/en/us/support/docs/field-notices/639/fn63979.html

"On October 17, 2015, the previously implemented CSS certificates used in
classic Cisco IOS-XR will expire.

*After the October 17, 2015 expiration date*, attempts to install a new
Cisco IOS-XR image, SMU, or PIE *without the mandatory SMU installed first
will fail*."


On 13 March 2016 at 22:24, Tassos Chatzithomaoglou 
wrote:

>
> https://supportforums.cisco.com/document/123576/asr9000xr-understanding-turboboot-and-initial-system-bring
>
> --
> Tassos
>
> Mohammad Khalil wrote on 13/3/16 09:34:
> > Dears
> > I am trying to upgrade my ASR9K router from 4.3.2 to 5.3.2
> > The issue am facing is the space , am running out of space
> > My questions are:
> > Like IOS , if I deleted the existing OS while the system is running ,
> well the system keeps functioning?
> > What the packages do I need to install (minimum) for the system to boot
> up successfully with no problems and then I can remove the old OS packages?
> >
> > Thanks
> >
> > BR,
> > Mohammad
> >
> >
> > ___
> > cisco-nsp mailing list  cisco-nsp@puck.nether.net
> > https://puck.nether.net/mailman/listinfo/cisco-nsp
> > archive at http://puck.nether.net/pipermail/cisco-nsp/
> >
>
> ___
> cisco-nsp mailing list  cisco-nsp@puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/
>
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] PBB-EVPN

2015-08-25 Thread Ivan Walker
Thanks for the response.


> LACP PDUs are layer-2 and can be transported across Ethernet circuits.
> Providing your Ethernet provider will accept & L2PT those frame types,
> it is possible to run LACP across the sort of circuit you're describing.
> Talk to your providers! If you coupled that with some form of LACP-based
> MLAG/MC-LAG/VPC (not all vendor implementations are) then you might be
> able to do PE resilience.
>
>
I am thinking the issue is having to pop out the tunnelled (L2PT) LACP
frames at the core end.  Especially if the service is delivered over a
shared NNI interface.  Imagine if the tagged service at the NNI is taken to
the I-Component via a pseudowire attachment circuit I don't think there is
any LACP function on the core side.  Popping the L2PT LACP out on a
physical port somewhere else doesn't really scale.


> AFAIR, SPB-M goes further to remove the multi-homing issues inherent in
> PBB, but I've not done any good reading into PBB-EVPN to see if you can
> simply multi-home a given C-MAC address and have it work. If it is
> hobbled in the same way that PBB is, then yeah, I can see a world where
> LACP is the only way forward. Still, it seems oddly limiting.


I will have a look into SPB-M - hadn't heard of it.  :-)
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] PBB-EVPN

2015-08-25 Thread Ivan Walker
I have been looking into PBB-EVPN and would be interested in hearing
experience from others.

As far as I have understood there are two real benefits:
1) PBB / MAC in MAC reduces the load on BGP as BGP only needs to worry
about the B-MACs
2) Per-flow redundancy and load balancing

Is it correct that the only way to connect  a CE device to 2 PEs for all
active per-flow redundancy is via LACP?  Given that LACP operates at the
physical port level this seems a little limiting.  I am thinking scenarios
where the PE-CE link(s) may be some kind of l2 service from  third parties
delivered over a shared NNI, or perhaps where pseudowire attachment
circuits are used (into the I-Component).

Thanks

Ivan
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] ASR920 Buffers

2015-08-07 Thread Ivan Walker
I understand the ASR920 has a 12MB shared buffer (compared with 44MB for
for the ME3600X and 352MB for the ME3800X)

Can anyone using the ASR920 provide feedback on how they have found the
buffer size?

Thanks

Ivan
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ME3600X mLDP

2015-07-10 Thread Ivan Walker
A very interesting discussion.  In regards to NG-mVPN when there are
ME3600Xs in the network what are the options?

*Replace
*Don't use the ME3600X to terminate L3VPN/NG-mVPN.  What is the implication
when ME3600X may still be in traffic some paths but there is no mLDP -  RPF
issues?
*Ingress replication - guessing not supported on ME3600X but would be an
option if terminating L3VPN/NG-mVPN on devices that can do NG-mVPN.  And
when ME3600Xs are around in the network and not supporting mLDP.  Is
ingress replication an evil option that will kill the ingress PE?
* Anything else?
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ME3600X mLDP

2015-07-09 Thread Ivan Walker
Thanks Mark for clearing that up.  Not the answer that I wanted in regards
to the ME3600X as I have some already.  Great to see the ASR920 is going
well as I will be getting some.

Cheers

Ivan

On 9 July 2015 at 22:44, Mark Tinka  wrote:

>
>
> On 9/Jul/15 03:36, Ivan wrote:
> > I am hoping someone can confirm if the Cisco ME3600X and ME3800X support
> > mLDP.  Some older emails to this list suggest this feature was expected
> in
> > 2013.  Looking at the Software Research tool some IOS versions show up as
> > having "MLDP-Based MVPN Multicast".  I have tried  few versions but can't
> > get capabilities  P2MP, MP2MP.
>
> mLDP is not supported on the ME3600X, and will never.
>
> It is, however, supported on the ASR920. Tested and works like a charm.
>
> Mark.
>
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] ME3600X mLDP

2015-07-08 Thread Ivan Walker
I am hoping someone can confirm if the Cisco ME3600X and ME3800X support
mLDP.  Some older emails to this list suggest this feature was expected in
2013.  Looking at the Software Research tool some IOS versions show up as
having "MLDP-Based MVPN Multicast".  I have tried  few versions but can't
get capabilities  P2MP, MP2MP.

Thanks
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] ME3600X mLDP

2015-07-08 Thread Ivan
I am hoping someone can confirm if the Cisco ME3600X and ME3800X support
mLDP.  Some older emails to this list suggest this feature was expected in
2013.  Looking at the Software Research tool some IOS versions show up as
having "MLDP-Based MVPN Multicast".  I have tried  few versions but can't
get capabilities  P2MP, MP2MP.

Thanks

Ivan
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Help with an IPSec scenario

2015-03-13 Thread Ivan Ivanov
Hi Tom,

Try with 'general-ikeid' on SRX side under the definition of ike gateway.
You might need to upgrade Junos to have that option.

host@srx# set security ike gateway  general-ikeid


HTH,
Ivan,


On Fri, Mar 13, 2015 at 3:35 PM, Tom Storey  wrote:

> Hi everyone,
>
> Trying to establish an IPSec tunnel (route based) between a Juniper
> SRX and a Cisco IOS router.
>
> The topology is two routers with DSL services, the SRX is on a dynamic
> IP, the Cisco on a static. No NAT is involved in the path between the
> two routers.
>
> Heres the configs Im working on: http://pastebin.com/gUEFVTau
>
> Basically what Im getting is this...
>
> In main mode, phase 1 is OK, and I get probably 99% of the way in
> phase 2, but it doesnt quite complete, with errors like "proxy
> identities not supported".
>
> I can fix this by configuring Tunnel0's destination as the IP of the
> SRX /at the time/ and can then ping across the tunnel. But this
> obviously isnt a long term solution because if the IP of the SRX
> changes (and it does, frequently, because the DSL is notoriously
> unstable) then the VPN stops working.
>
> So I try to go aggressive mode, but this is even worse, with phase 1
> not completing with errors like "IKE packet from x.x.x.x was not
> encrypted and it should've been", and never really making it past
> AG_INIT_EXCH.
>
> This is a debug of aggressive mode: http://pastebin.com/RUAaXDyE
>
> Based on my supplied configs, can anyone help me come up with a
> solution that allows the SRX to initiate a connection from any random
> IP, and the Cisco accepts it but I dont have to configure the IP of
> the SRX on the Cisco in order for it to work? I feel like Im
> tantalisingly close, but after several hours at it so far and copious
> amounts of googling, I just cant see the solution...
>
> Thanks.
> ___
> cisco-nsp mailing list  cisco-nsp@puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/
>



-- 
Best Regards!

Ivan Ivanov
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] ASR1000 IOS Version

2015-02-15 Thread Ivan
I am looking to upgrade a number for ASR1004s. After previous comments 
on the list I was looking to use 3.10.5S / 15.3(3)S5 (a Cisco 
recommended release).


I see 3.13.2S / 15.4(3)S2 is also a Cisco recommended release.

Any thoughts or experiences that can be shared would be great.  I am 
leaning towards 3.10.5S.


No special requirements for new features.

Thanks

Ivan
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] BGP error with optional attribute

2014-12-22 Thread Ivan Ivanov
Hi,

Most probably you have to enable explicitly 'family inet6 unicast' under
Juniper bgp configuration. But to be sure could you share the configuration
on both ends?

HTH
Ivan,

On Fri, Dec 19, 2014 at 7:51 PM, Harold Ritter (hritter) 
wrote:

> Hi Thiyagarajan,
>
> You are apparently running into CSCtf27303.
>
> https://tools.cisco.com/bugsearch/bug/CSCtf27303
>
> Regards,
>
> Harold
>
>
>
> Le 2014-12-19 10:29, « thiyagarajan b »  a
> écrit :
>
> >Hi everyone,
> >
> >I have a problem in iBGP between Cisco 7301 and juniper mx series router
> >where the BGP got flapped throwing the following error in cisco end:
> >
> >%BGP-3-NOTIFICATION: received from neighbor 119.227.0.65 3/9 (unsupported
> >option specified) 0 bytes
> >%BGP-5-ADJCHANGE: neighbor 119.227.0.65 Down BGP Notification received
> >
> >%BGP-3-NOTIFICATION: received from neighbor 119.227.0.65 6/5 (cease) 0
> >bytes
> >
> >and found the following log in juniper
> >
> >rpd[1296]: bgp_read_v4_update:9690: NOTIFICATION sent to 210.18.0.181
> >(Internal AS 9583): code 3 (Update Message Error) subcode 9 (error with
> >optional attribute), Reason: peer 210.18.0.181 (Internal AS 9583) UPDATE -
> >NLRI inet6-unicast not negotiated
> >rpd[1296]: Received BAD update from 210.18.0.181 (Internal AS 9583),
> >family
> >inet6-unicast(16), prefix 2a02:2158::/32
> >
> >So is this problem caused by the prefix 2a02:2158::/32 because of it
> >invalid attribute? or is it because of any mismatch SAFI update between
> >the
> >routers?
> >
> >Please suggest.
> >
> >
> >Warm Regards,
> >Thiyagarajan B.
> >___
> >cisco-nsp mailing list  cisco-nsp@puck.nether.net
> >https://puck.nether.net/mailman/listinfo/cisco-nsp
> >archive at http://puck.nether.net/pipermail/cisco-nsp/
>
>
> ___
> cisco-nsp mailing list  cisco-nsp@puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/
>



-- 
Best Regards!

Ivan Ivanov
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ASR1006 Memory issue

2014-12-18 Thread Ivan

Hi Tim,

Could you elaborate on rommon version comment please.  I will be 
upgrading myself shortly.


Thanks
Ivan

On 16/Dec/2014 2:39 a.m., Tim Warnock wrote:

Watch your rommon version too.


-Original Message-
From: cisco-nsp [mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of
Jordi Magrané Roig
Sent: Monday, 15 December 2014 11:34 PM
To: mark.ti...@seacom.mu; cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] ASR1006 Memory issue

Hello,

Lukas and Mark, thanks for the information. I'm planning to upgrade
  the device but it will take some weeks. My worry is to check now if the
  device has problems.

Somebody knows how I could check if the device is working fine?

Thanks!


From: mark.ti...@seacom.mu
To: cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] ASR1006 Memory issue
Date: Mon, 15 Dec 2014 13:51:32 +0200
CC: luky...@hotmail.com; jordimagr...@hotmail.com

On Monday, December 15, 2014 01:08:32 PM Lukas Tribus wrote:


I suggest you ugprade to the latest rebuild of a
supported long-term support branch (3.10S?).


I'd say go to 3.10(4)S, which is 15.3(3)S4.

We were on 15.4(2)S earlier and that has some serious BGP
bugs that lead to router crashes, as well as other random
crashes.

Suffice it to say, Cisco say 3.10(4)S is their recommended
release for this platform.

Mark.


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] IOS XR as-path-loopcheck and as-override

2014-10-28 Thread Ivan Madolev via cisco-nsp
Hi James,
Just some ideas here:
In MPLS Option B and ASBR peering we exchange bgp vpnv4 labels to
create LSP all the way .So we need to disable the bgp label filtering on ASBRs 
-On
XR : router bgp -->add-family vpnv4 uni--retain route-target all. But i
believe that’s not the case here as you configured the vrf on the XR. Another 
thing
with XR and ASBR peering is that in IOS under the interface connected to the
peer on the other AS mpls bgp forwarding is added automatically as there is /32
entry on CEF .Thats not the case in XR. So for the labels to be exchanged b/n
the ASBR  we need to manually add /32
entry for the interface connected to the ASBR peer from the other AS!!:
router static-->add-family ipv4 uni-->20.0.1.1/32 int gi0/0/0/0.1/for
example/.I came across the issue .Hope this helps.
Ivan 


On Tuesday, October 28, 2014 1:45 PM, Vitkovský Adam  
wrote:
  


Hi James,

> I can't get the ASR9K to send the route from either eBGP neighbour in AS 65001
> to the other. 

May I know your reasoning behind this nonstandard setup please? 
As the 9K1s should know the routes from each other via the intra-AS paths.  

From the top of my head I can't think of a reason why it should not work. 
So the Ak9 in remote AS is advertising the routes over Opt.B to AS65001 but 
ASR9001s are dropping them please? 
Or the Ak9 in remote AS is not even attempting to advertise the routes back to 
AS65001 please? 

The quickest way to figure things out is to use debug. 
debug bgp update vpnv4 u in (rpl)
or
debug bgp update vpnv4 u out (rpl)

adam
> -Original Message-
> From: cisco-nsp [mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of
> James Bensley
> Sent: Tuesday, October 28, 2014 11:32 AM
> To: cisco-nsp@puck.nether.net
> Subject: [c-nsp] IOS XR as-path-loopcheck and as-override
> 
> Hi All,
> 
> I can't seem to get these features to work on my lab ASR9K1 running 4.3.4. I
> have two eBGP neighbours in AS 65001 both advertising a /32 loopback to the
> ASR9K (MPLS Opt B peerings). As per the output below the ASR9K receives the
> /32 route from each eBGP neighbour.
> 
> I can't get the ASR9K to send the route from either eBGP neighbour in AS 65001
> to the other.
> 
> I have added "as-path-loopcheck out disable" under both address-families
> under BGP and under the test VRF "vrf". I have also configured "as-override" 
> on
> one of the neighbours (192.168.1.6) in both address-families.
> 
> I understand how both of those features work, I'm not sure whythough despite
> enabling them everywhere out of desperation I still don't advertise the /32
> route from 192.168.1.2 to 192.168.1.6 in the test VRF.
> 
> RP/0/RSP0/CPU0:ASR9001#show route vrf vrf1
> 
> L10.0.0.1/32 is directly connected, 20:25:10, Loopback1
> B10.0.0.2/32 [20/0] via 192.168.1.6 (nexthop in vrf default), 00:08:53
> B10.0.0.3/32 [20/0] via 192.168.1.2 (nexthop in vrf default), 17:03:24
> 
> RP/0/RSP0/CPU0:ASR9001#show bgp vpnv4 unicast neighbors 192.168.1.6
> advertised-routes
> 
> NetworkNext HopFromAS Path
> Route Distinguisher: 5:1
> 10.0.0.1/32192.168.1.5 Local   ?
> 
> Processed 1 prefixes, 1 paths
> 
> ASR9K:
> 
> router bgp 5
>  address-family ipv4 unicast
>   as-path-loopcheck out disable
>   allocate-label all
>  !
>  address-family vpnv4 unicast
>   as-path-loopcheck out disable
>  !
>  neighbor 192.168.1.2
>   remote-as 65001
>   address-family ipv4 labeled-unicast
>route-policy PASS in
>route-policy PASS out
>send-extended-community-ebgp
>next-hop-self
>   !
>   address-family vpnv4 unicast
>route-policy PASS in
>route-policy PASS out
>next-hop-self
>   !
>  !
>  neighbor 192.168.1.6
>   remote-as 65001
>   address-family ipv4 labeled-unicast
>route-policy PASS in
>route-policy PASS out
>as-override
>send-extended-community-ebgp
>next-hop-self
>   !
>   address-family vpnv4 unicast
>route-policy PASS in
>route-policy PASS out
>as-override
>next-hop-self
>   !
>  !
>  vrf vrf1
>   rd 5:1
>   address-family ipv4 unicast
>as-path-loopcheck out disable
>redistribute connected
>allocate-label all
> 
> 
> Any help would be greatly appreciated as I expected I have overlooked
> something really obvious.
> 
> Cheers,
> James.
> ___
> cisco-nsp mailing list  cisco-nsp@puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

Re: [c-nsp] Fiber Cable Guide

2014-09-06 Thread Ivan

Thanks.  Did see those but they look quite a bit bigger.

On 6/Sep/2014 9:46 p.m., Howard Jones wrote:

On 06/09/2014 03:13, Ivan wrote:

I am looking for some fiber cable guides like the Cisco ones here
http://www.cisco.com/c/dam/en/us/td/i/31-40/360001-37/363001-364000/363563.eps/_jcr_content/renditions/363563.jpg


(These ones are for Cisco ONS.
http://www.cisco.com/c/en/us/td/docs/optical/hardware/15454install/guide/hig15454/hig_15454.html#pgfId-655145)


I have had no luck finding anything similar myself and would
appreciate if anyone can point me to some.

Like this:

http://www.martinenclosures.com/product/fiber-rings/

?
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Connecting PoP's with long distance

2014-09-05 Thread Ivan

Hi Jared,

This is something I have also been looking at. Is there any particular 
brand of XFP you have had success with?


If we take the Cisco "80km" ZR we have TX 0 to 4 dBm and RX -7 to -24 
dBm - worst case 24dB budget excluding splices, patches etc.  Assuming 
0.2dB/km 120km would be right on the limits.  I would like to have some 
buffer.


Thanks

Ivan

On 5/Sep/2014 1:32 a.m., Jared Mauch wrote:

You should be able to do 120km with a ZR XFP @ 10G without anything.

If you later want to add equipment to the sites, you can look at doubling your 
optics and something like this:

http://www.perle.com/products/10-Gigabit-Standalone-Media-Converters.shtml

- Jared



On Sep 4, 2014, at 5:36 AM, Murat Kaipov  wrote:

Hello Guys.

I need connect two PoP's with 10G links. Distance between PoP's nearly
120km.  We have fiber optic  between PoP's with two regeneration points
located nearly in 40 km between each other. We have not DWDM. Can you advise
some equipment (May be like EDFA) for fiber optic regeneration points

Scheme like this

PoP-1 ---40km---[Regeneration point1]---40km[Regeneration
point2]-40km--PoP2

Thank you.

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/



___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] Fiber Cable Guide

2014-09-05 Thread Ivan
I am looking for some fiber cable guides like the Cisco ones here 
http://www.cisco.com/c/dam/en/us/td/i/31-40/360001-37/363001-364000/363563.eps/_jcr_content/renditions/363563.jpg


(These ones are for Cisco ONS. 
http://www.cisco.com/c/en/us/td/docs/optical/hardware/15454install/guide/hig15454/hig_15454.html#pgfId-655145)


I have had no luck finding anything similar myself and would appreciate 
if anyone can point me to some.


Thanks

Ivan
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] L2TP/IPSec

2014-09-02 Thread Ivan
I don't believe it is possible and have not been able to find any examples
or documentation for site-to-site VPNs using L2TP/IPSec on Cisco ISR
routers.  (Actually really looking to do L2TP/IPSec between Cisco and
Microsoft TMG)

I would appreciate if someone  could confirm it is not possible or perhaps
point to some doco, hopefully with examples.  (Note all doco I have found
is for client vpns and ASAs).

Thanks

Ivan



___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] IOS XR - CBAC/ZBF or similar

2014-07-28 Thread Ivan
I have been unable to find CBAC/ZBF or similar on IOS XR.  I suspect 
these featires are not available but would be happy if someone could 
prove me wrong.


Thanks

Ivan
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Cisco 7600 pseudowire ping

2014-07-22 Thread Ivan

Interesting enough regular mpls ping has no issue:

PE1#ping mpls ipv4 172.16.14.1/32 repeat 100
Sending 100, 100-byte MPLS Echos to 172.16.14.1/32,
 timeout is 2 seconds, send interval is 0 msec:

Codes: '!' - success, 'Q' - request not sent, '.' - timeout,
  'L' - labeled output interface, 'B' - unlabeled output interface,
  'D' - DS Map mismatch, 'F' - no FEC mapping, 'f' - FEC mismatch,
  'M' - malformed request, 'm' - unsupported tlvs, 'N' - no label entry,
  'P' - no rx intf label prot, 'p' - premature termination of LSP,
  'R' - transit router, 'I' - unknown upstream index,
  'X' - unknown return code, 'x' - return code 0

Type escape sequence to abort.
!!
!!
Success rate is 100 percent (100/100), round-trip min/avg/max = 1/2/4 ms

PE1#ping mpls pseudowire 172.16.14.1 440 repeat 100
Sending 100, 100-byte MPLS Echos to 172.16.14.1,
 timeout is 2 seconds, send interval is 0 msec:

Codes: '!' - success, 'Q' - request not sent, '.' - timeout,
  'L' - labeled output interface, 'B' - unlabeled output interface,
  'D' - DS Map mismatch, 'F' - no FEC mapping, 'f' - FEC mismatch,
  'M' - malformed request, 'm' - unsupported tlvs, 'N' - no label entry,
  'P' - no rx intf label prot, 'p' - premature termination of LSP,
  'R' - transit router, 'I' - unknown upstream index,
  'X' - unknown return code, 'x' - return code 0

Type escape sequence to abort.
!!.!.!!.!!.!!!
!!!.!.
Success rate is 94 percent (94/100), round-trip min/avg/max = 1/2/4 ms
PE1#

And the rate-limit output on the destination:

PE2#show mls rate-limit | in Rate|On|UCAST
   Rate Limiter Type   Status Packets/s   Burst  Sharing
MCAST DFLT ADJ   On  10 100  Not sharing
  ACL VACL LOG   On2000   1  Not sharing
  MCAST PARTIAL SC   On  10 100  Not sharing
IP RPF FAILURE   On 100  10  Group:0 S
   TTL FAILURE   On  97  10  Not sharing
 ICMP UNREAC. NO-ROUTE   On 100  10  Group:0 S
 ICMP UNREAC. ACL-DROP   On 100  10  Group:0 S
   MTU FAILURE   On 997  10  Not sharing
   UCAST IP OPTION   Off  -   - -
 IP ERRORS   On 100  10  Group:0 S

As mentioned before we are only seeing this on devices where we are 
running 15.2(4)S4a


Thanks

Ivan

On 21/Jul/2014 7:56 p.m., Vitkovský Adam wrote:

And how about the regular mpls ping does that perform right?

I'd check the rate limiters:

show mls rate-limit
and look for UCAST IP OPTION -is it ON or OFF
though it should be off by default

adam


-Original Message-
From: cisco-nsp [mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of
Ivan
Sent: Sunday, July 20, 2014 12:58 AM
To: Peter Persson
Cc: cisco-nsp
Subject: Re: [c-nsp] Cisco 7600 pseudowire ping

No CoPP. Direct ping is fine.  Just the PW ping having issues.

On 20/Jul/2014 2:13 a.m., Peter Persson wrote:

Do you have any Control-plane policing?
As i understand your email, you are pinging between two 7600's
directly and not anything behind it?




2014-07-19 13:47 GMT+02:00 Ivan mailto:cisco-...@itpro.co.nz>>:

 I have found that mpls pseudowire pings to some 7600s running
 15.2(4)S4a go missing - I see about 95/100 success rate.  On other
 devices with older software I have no loss.  The problem is not seen
 if the ping interval is increased to 100ms.  Also pinging over the
 VC shows no loss.

 Given the above I suspect some rate-limiting may be taking place.  I
 am hoping someone will be able to confirm and ideally share some
 commands that show come counters for the drops as so far I have had
 no success.

 c7600s72033-advipservicesk9-__mz.152-4.S4a.bin
 WS-X6704-10GE
 WS-SUP720-3BXL

 Thanks

 Ivan
 _
 cisco-nsp mailing list cisco-nsp@puck.nether.net
 <mailto:cisco-nsp@puck.nether.net>
 https://puck.nether.net/__mailman/listinfo/cisco-nsp
 <https://puck.nether.net/mailman/listinfo/cisco-nsp>
 archive at http://puck.nether.net/__pipermail/cisco-nsp/
 <http://puck.nether.net/pipermail/cisco-nsp/>



___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Cisco 7600 pseudowire ping

2014-07-19 Thread Ivan

No CoPP. Direct ping is fine.  Just the PW ping having issues.

On 20/Jul/2014 2:13 a.m., Peter Persson wrote:

Do you have any Control-plane policing?
As i understand your email, you are pinging between two 7600's directly
and not anything behind it?




2014-07-19 13:47 GMT+02:00 Ivan mailto:cisco-...@itpro.co.nz>>:

I have found that mpls pseudowire pings to some 7600s running
15.2(4)S4a go missing - I see about 95/100 success rate.  On other
devices with older software I have no loss.  The problem is not seen
if the ping interval is increased to 100ms.  Also pinging over the
VC shows no loss.

Given the above I suspect some rate-limiting may be taking place.  I
am hoping someone will be able to confirm and ideally share some
commands that show come counters for the drops as so far I have had
no success.

c7600s72033-advipservicesk9-__mz.152-4.S4a.bin
WS-X6704-10GE
WS-SUP720-3BXL

Thanks

Ivan
_
cisco-nsp mailing list cisco-nsp@puck.nether.net
<mailto:cisco-nsp@puck.nether.net>
https://puck.nether.net/__mailman/listinfo/cisco-nsp
<https://puck.nether.net/mailman/listinfo/cisco-nsp>
archive at http://puck.nether.net/__pipermail/cisco-nsp/
<http://puck.nether.net/pipermail/cisco-nsp/>



___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] Cisco 7600 pseudowire ping

2014-07-19 Thread Ivan
I have found that mpls pseudowire pings to some 7600s running 15.2(4)S4a 
go missing - I see about 95/100 success rate.  On other devices with 
older software I have no loss.  The problem is not seen if the ping 
interval is increased to 100ms.  Also pinging over the VC shows no loss.


Given the above I suspect some rate-limiting may be taking place.  I am 
hoping someone will be able to confirm and ideally share some commands 
that show come counters for the drops as so far I have had no success.


c7600s72033-advipservicesk9-mz.152-4.S4a.bin
WS-X6704-10GE
WS-SUP720-3BXL

Thanks

Ivan
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] IPv6 duplicate address

2014-07-01 Thread Ivan
So following on from a very old thread 
https://puck.nether.net/pipermail/cisco-nsp/2008-May/051088.html


I have had an event where an interface got stuck in stalled state for 
much longer than is desirable.  I tried to fix it using "ipv6 nd dad 
attempts 5" but no luck.  I also tried disabling and enabling IPv6 on 
the interface that also didn't work.  Manually setting the link-local 
address (and setting back) fixed things, but I have a few questions.


Does DAD just stay in stalled state until some kind of manual 
intervention takes place?  (Perhaps there is a method of have periodic 
retires?)


Does "ipv6 nd dad attempts 5" help?  How often are attempts made by 
default.  I am thinking this could help prevent the stalled state in the 
future.


This for IOS 15.2(4)S1 on an ASR1k.

Thanks

Ivan
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Cisco 4900M and Layer2 Broadcasts

2014-07-01 Thread Ivan
Problem solved with "no ip verify header vlan all".  It seems Cisco 
4500/6500 (including the 4900M) switches do some verification of layer 3 
headers (probably only the IPv4 ones as IPv6 had no issues).  This 
happens even for layer 2 switched traffic.  It is almost certain that 
the "HA" traffic is a little custom - at the very least I found the IP 
header checksum always zero (and it wasn't any fancy NIC offloading).


So a few interesting commands

show platform software drop-port (especially the outout for InpL2AclDrop)

show platform hardware acl input entries static (especially the output 
for Ipv4HeaderException)


And it seems this issue has been seen before, but Juniper has fixed the 
issue.


"In Junos version 10.0 and below, the fabric link probes are using 
Juniper proprietary IP datagrams, where IP Total Length field is set to 
0" http://kb.juniper.net/InfoCenter/index?page=content&id=KB15141


http://juniper-frac.blogspot.co.nz/2009/09/deploy-srx-cluster-across-layer-2.html

Thanks to TAC.  I have had some long cases but this one was sorted nice 
and quick!


Cheers

Ivan

On 1/Jul/2014 1:03 p.m., Chris Marget wrote:

Your case reminds me of something Tim Stevenson said about N7K and IPv4
multicast.

I don't remember the details exactly, but he left me with the impression
that the L2 filtering stuff for multicast frames, which usually doesn't
do *exactly* what you want (subscribe to 239.1.2.3 and you'll get L2
traffic for 239.2.2.3 as well) was "fixed" on N7K: It filters/forwards
at L2 using L3 criteria.

Your problem is almost exactly the other way around. Sorry I don't have
any answers, thanks for filling me in on the application. It makes sense
that these crazy frames are generated by a "magic box" HA setup.

Good luck, and please follow up with the list if TAC gives you anything
helpful..

/chris


On Mon, Jun 30, 2014 at 4:21 PM, Ivan mailto:cisco-...@itpro.co.nz>> wrote:

Hi Chris,

The traffic is some kind of state replication mechanism between to
geographically diverse appliances.  My guess is that the appliances
are sending layer 3 headers inside layer 2 broadcast over the HA vlan.

Someone asked out the config - can't get much more simpler.  Also
remember is working fine for IPv6.

Ingress port:

interface GigabitEthernet2/13
  switchport trunk allowed vlan 327
  switchport mode trunk
  switchport nonegotiate
  mtu 9198
  load-interval 30
  flowcontrol receive off
  flowcontrol send off
  no cdp enable
  spanning-tree portfast trunk
  spanning-tree bpdufilter enable

Egress port (same device for testing):

interface TenGigabitEthernet2/7
  switchport access vlan 327
  switchport trunk allowed vlan none
  switchport mode access
  switchport nonegotiate
  mtu 9198
  load-interval 30
  flowcontrol receive off
  flowcontrol send off
  no cdp enable

Also the counters someone was suggesting looking at;

AKNNR-ISP-SW1#show int counters detail | in 2/13|Port
Port InBytes   InUcastPkts  InMcastPkts
   InBcastPkts
Gi2/13  222183306824 00
2114072064
PortOutBytes  OutUcastPkts OutMcastPkts
  OutBcastPkts
Gi2/13 682063116 061300
   5592900
Port   InPkts 64OutPkts 64InPkts 65-127
OutPkts 65-127
Gi2/13 0 1 2106943835
   5103190
Port  InPkts 128-255   OutPkts 128-255   InPkts 256-511
OutPkts 256-511
Gi2/13   71282265510090
 0
Port InPkts 512-1023  OutPkts 512-1023
Gi2/13 0 0
PortInPkts 1024-1518 OutPkts 1024-1518 InPkts 1519-1548
OutPkts 1519-1548
Gi2/13 0 00
 0
PortInPkts 1549-9216 OutPkts 1549-9216
Gi2/13 0 0
PortTx-Bytes-Queue-1  Tx-Bytes-Queue-2 Tx-Bytes-Queue-3
Tx-Bytes-Queue-4
Gi2/13   4413448 00
 0
PortTx-Bytes-Queue-5  Tx-Bytes-Queue-6 Tx-Bytes-Queue-7
Tx-Bytes-Queue-8
Gi2/13 0 00
 677643104
PortTx-Drops-Queue-1  Tx-Drops-Queue-2 Tx-Drops-Queue-3
Tx-Drops-Queue-4
Gi2/13 0 00
 0
PortTx-Drops-Queue-5  Tx-Drops-Queue-6 Tx-Drops-Queue-7
Tx-Drops-Queue-8
Gi2/13 0 00
  

Re: [c-nsp] Cisco 4900M and Layer2 Broadcasts

2014-06-30 Thread Ivan

Hi Chris,

The traffic is some kind of state replication mechanism between to 
geographically diverse appliances.  My guess is that the appliances are 
sending layer 3 headers inside layer 2 broadcast over the HA vlan.


Someone asked out the config - can't get much more simpler.  Also 
remember is working fine for IPv6.


Ingress port:

interface GigabitEthernet2/13
 switchport trunk allowed vlan 327
 switchport mode trunk
 switchport nonegotiate
 mtu 9198
 load-interval 30
 flowcontrol receive off
 flowcontrol send off
 no cdp enable
 spanning-tree portfast trunk
 spanning-tree bpdufilter enable

Egress port (same device for testing):

interface TenGigabitEthernet2/7
 switchport access vlan 327
 switchport trunk allowed vlan none
 switchport mode access
 switchport nonegotiate
 mtu 9198
 load-interval 30
 flowcontrol receive off
 flowcontrol send off
 no cdp enable

Also the counters someone was suggesting looking at;

AKNNR-ISP-SW1#show int counters detail | in 2/13|Port
Port InBytes   InUcastPkts  InMcastPkts 
  InBcastPkts
Gi2/13  222183306824 00 
   2114072064
PortOutBytes  OutUcastPkts OutMcastPkts 
 OutBcastPkts
Gi2/13 682063116 061300 
  5592900
Port   InPkts 64OutPkts 64InPkts 65-127 
OutPkts 65-127
Gi2/13 0 1   2106943835 
  5103190
Port  InPkts 128-255   OutPkts 128-255   InPkts 256-511 
OutPkts 256-511
Gi2/13   71282265510090 
0

Port InPkts 512-1023  OutPkts 512-1023
Gi2/13 0 0
PortInPkts 1024-1518 OutPkts 1024-1518 InPkts 1519-1548 
OutPkts 1519-1548
Gi2/13 0 00 
0

PortInPkts 1549-9216 OutPkts 1549-9216
Gi2/13 0 0
PortTx-Bytes-Queue-1  Tx-Bytes-Queue-2 Tx-Bytes-Queue-3 
Tx-Bytes-Queue-4
Gi2/13   4413448 00 
0
PortTx-Bytes-Queue-5  Tx-Bytes-Queue-6 Tx-Bytes-Queue-7 
Tx-Bytes-Queue-8
Gi2/13 0 00 
677643104
PortTx-Drops-Queue-1  Tx-Drops-Queue-2 Tx-Drops-Queue-3 
Tx-Drops-Queue-4
Gi2/13 0 00 
0
PortTx-Drops-Queue-5  Tx-Drops-Queue-6 Tx-Drops-Queue-7 
Tx-Drops-Queue-8
Gi2/13 0 00 
0
PortDbl-Drops-Queue-1 Dbl-Drops-Queue-2 Dbl-Drops-Queue-3 
Dbl-Drops-Queue-4
Gi2/13  0 0 0 
  0
PortDbl-Drops-Queue-5 Dbl-Drops-Queue-6 Dbl-Drops-Queue-7 
Dbl-Drops-Queue-8
Gi2/13  0 0 0 
  0
Port  Rx-No-Pkt-Buff RxPauseFramesTxPauseFrames 
PauseFramesDrop
Gi2/13 0 00 
0

PortUnsupOpcodePause
Gi2/13 0

Have logged a support case so hopefully can report back more soon.

Thanks

Ivan

On 1/Jul/2014 1:20 a.m., Chris Marget wrote:

Hi Ivan,

Your L2 broadcast / L3 unicast traffic has piqued my curiosity.

Can you share some details about the use case for this unusual traffic?

I have a project in mind where I'll be doing exactly the opposite: IPv4
multicast in Ethernet unicast.

My use case is a multicast application with an un-graceful startup. If
the application restarts mid-day, there's a long delay while it collects
state information from incoming multicast packets. There is no mechanism
for priming this application - the only option right now is to wait
while the infrequent state messages re-build the state database. I plan
to cache incoming state data in an L2 adjacent server, and blast this
traffic at any instances which have recently restarted. I can't mess
with the traffic at all because it's cryptographically signed by the
sender, and I have to do it with unicast frames because the anti-replay
mechanisms mean it's trouble if I deliver these packets to the wrong box.

Thanks!

/chris

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Cisco 4900M and Layer2 Broadcasts

2014-06-28 Thread Ivan
Thanks for the response.  The layer 3 traffic is unicast.  I have poked 
around further and found the counters from the command "show platform 
software drop-port" for "InpL2AclDrop" are increasing with my missing 
packets.


4900M#show platform software drop-port | in Drop Event 
Reason|InpL2AclDrop|Time

Time source is NTP, 16:35:59.675 NZST Sun Jun 29 2014
Drop Event ReasonPackets Dropped
 InpL2AclDrop1433452028
4900M#show platform software drop-port | in Drop Event 
Reason|InpL2AclDrop|Time

Time source is NTP, 16:36:02.843 NZST Sun Jun 29 2014
Drop Event ReasonPackets Dropped
 InpL2AclDrop1433496091
4900M#show platform software drop-port | in Drop Event 
Reason|InpL2AclDrop|Time

Time source is NTP, 16:36:07.020 NZST Sun Jun 29 2014
Drop Event ReasonPackets Dropped
 InpL2AclDrop1433539406

So far I haven't been able to find any additional details about this.  I 
am guessing it is some kind of inbuilt L2 ACL.


Cheers

Ivan

On 29/Jun/2014 2:33 p.m., Justin Krejci wrote:

Is the layer 3 traffic multicast? Your indication of HA makes me suspect
it is and perhaps you have a multicast snooping/filtering on the Cisco
or some other related limiter setting.

Just a total guess without any configs or other pertinent data.



-Original Message-
*From:* Ivan [cisco-...@itpro.co.nz]
*Received:* Saturday, 28 Jun 2014, 5:10PM
*To:* cisco-nsp [cisco-nsp@puck.nether.net]
*Subject:* Re: [c-nsp] Cisco 4900M and Layer2 Broadcasts

Sorry to respond to my own post but I have some further thoughts that
may be useful.  The traffic ends up being broadcast at layer 2 (dest MAC
address ff:ff:ff:ff:ff:ff) but the IPv4 payload is generally unicast.
So I am thinking perhaps the 4900M could be "getting upset" with these
packets.  Not really expecting the 4900M to look higher than layer 2 of
these packets though as vlan does not have SVI.

Ivan

On 28/Jun/2014 10:17 p.m., Ivan wrote:

I am hoping someone may have come across an issue I am seeing on a Cisco
4900M running 15.1(2)SG3.

I have a device connected to an interface sending traffic from it's own
MAC address to MAC address ff:ff:ff:ff:ff:ff.  When the layer 3 protocol
is IPv6 I see this going out other port in the same vlan as the source -
all good.  When the layer 3 protocol is IPv4 the frames seem to go into
a black hole - very bad.  I have confirmed all this with packet captures.

I have poked around but cam find any indication of the issue.  I will be
logging a TAC case in the next day or two for this but would be
interested to hear if anyone else has seen this.

Thanks

Ivan

PS.  Not really looking to get into the details of the connected devices
etc - just some HA type traffic using layer 2 over a vlan.

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Cisco 4900M and Layer2 Broadcasts

2014-06-28 Thread Ivan
Sorry to respond to my own post but I have some further thoughts that 
may be useful.  The traffic ends up being broadcast at layer 2 (dest MAC 
address ff:ff:ff:ff:ff:ff) but the IPv4 payload is generally unicast. 
So I am thinking perhaps the 4900M could be "getting upset" with these 
packets.  Not really expecting the 4900M to look higher than layer 2 of 
these packets though as vlan does not have SVI.


Ivan

On 28/Jun/2014 10:17 p.m., Ivan wrote:

I am hoping someone may have come across an issue I am seeing on a Cisco
4900M running 15.1(2)SG3.

I have a device connected to an interface sending traffic from it's own
MAC address to MAC address ff:ff:ff:ff:ff:ff.  When the layer 3 protocol
is IPv6 I see this going out other port in the same vlan as the source -
all good.  When the layer 3 protocol is IPv4 the frames seem to go into
a black hole - very bad.  I have confirmed all this with packet captures.

I have poked around but cam find any indication of the issue.  I will be
logging a TAC case in the next day or two for this but would be
interested to hear if anyone else has seen this.

Thanks

Ivan

PS.  Not really looking to get into the details of the connected devices
etc - just some HA type traffic using layer 2 over a vlan.

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] Cisco 4900M and Layer2 Broadcasts

2014-06-28 Thread Ivan
I am hoping someone may have come across an issue I am seeing on a Cisco 
4900M running 15.1(2)SG3.


I have a device connected to an interface sending traffic from it's own 
MAC address to MAC address ff:ff:ff:ff:ff:ff.  When the layer 3 protocol 
is IPv6 I see this going out other port in the same vlan as the source - 
all good.  When the layer 3 protocol is IPv4 the frames seem to go into 
a black hole - very bad.  I have confirmed all this with packet captures.


I have poked around but cam find any indication of the issue.  I will be 
logging a TAC case in the next day or two for this but would be 
interested to hear if anyone else has seen this.


Thanks

Ivan

PS.  Not really looking to get into the details of the connected devices 
etc - just some HA type traffic using layer 2 over a vlan.

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Setting CS0 on ARP traffic

2014-05-30 Thread Ivan
I ran into this same issue.  In my case the carrier only took CS0 and 
CS6.  No issues with ARP (CS6) but it turned out IPv6 neighbour 
discovery is marked CS7.  I am still without a solution...



On 29/May/2014 11:37 p.m., Ryan West wrote:

First thing, that's a bad carrier. Second, they are already remarking, so why 
bother?  If your 7609 was using a routing protocol, that would be CS6 as well.

Personally, I would go the route of terminating services with that carrier, 
sounds like you'll be getting more surprises in the future.

Sent from handheld.


On May 29, 2014, at 7:27 AM, "Tony"  wrote:

Hi all,


A new carrier that we are using requires that all traffic to them is marked as 
CS0. Any traffic that is non-CS0 is dropped on ingress by the carrier.
We have connected the handoff from this carrier to a port on an ES20+ card in 
our 7609 (12.2.33.SRE9a).

The first test service was refusing to work and upon inspection by the carrier 
(packet capture) it was shown that the ARP traffic from our box was marked as 
CS6. I then applied a QoS policy outbound on the sub-int we had terminated the 
service on to try and set all traffic to CS0, but the ARP traffic was still 
CS6. The carrier then applied a policy inbound on their gear (ie. from our 7609 
towards them) to set everything to CS0 and the service started happily working. 
I then put a switch between our 7609 and the carrier so that I could SPAN the 
traffic and capture it via tcpdump. The results look like this:

17:04:53.446268 vlan 30, p 6, vlan 10, p 6, arp who-has 10.1.7.178 tell 
10.1.7.177

So you can see on the outer VLAN 30, it is set to "p 6" and on the inner VLAN 10 it is 
also set to "p 6".

The configuration of the interface on 7609 on our side looks like this (fairly 
standard):

interface GigabitEthernet4/4.300010
  encapsulation dot1Q 30 second-dot1q 10
  ip vrf forwarding xyz
  ip address 10.1.7.177 255.255.255.252


I logged a case with TAC and they responded with:

=
We have tried this in our lab and this seem to be the default behavior.

There is a restriction on ES+ card which states that control plane packets 
generated from the switch are sent to a special TX queue and these packets do 
not match the egress QOS policies configured. Please refer the link:

http://www.cisco.com/en/US/docs/routers/7600/install_config/ES40_config_guide/es40_chap7.html#wp1540799

So this is the reason why you do not see any cos 0  packets on the other side 
even after applying a outbound service policy and see only cos 6 packets. I 
tried few other things but could not find a way around this restriction
=

I've asked them to go back and have another look to see if there is something 
else that can be done.

I'm at a loss at this stage and appealing for any suggestions that people can 
think of, at this point in time it would appear that I have two options:

1. Terminate the services from this carrier on a different device that doesn't 
suffer from this problem.
2. Run the service through a switch (ie. 3750, like it is now) so that the 
switch can set the packets to CS0.

Both of these are sub-optimal solutions, so obviously we'd like to find a way 
to set the outbound traffic from the ES20 card to CS0 so that it can work how 
we expected it to.

Any suggestions appreciated.


Thanks,
Tony.
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Cisco ASR901 and Tunnels

2014-05-12 Thread Ivan
Thanks Pete. Do you know if any of the other tunnelling modes are supported?

  ipipIP over IP encapsulation
  ipsec   IPSec tunnel encapsulation
  ipv6Generic packet tunneling in IPv6
  ipv6ip  IPv6 over IP encapsulation

Thanks

Ivan

> GRE is not supported on the ASR901.
>
>
> On Mon, May 12, 2014 at 5:59 AM, Ivan  wrote:
>
>> I have some Cisco ASR901s and would like to have a layer 2 or layer 3
>> tunnel between them over a layer 3 network.
>>
>> I have configured GRE and tunnel is up and it is possible to ping the
>> remote ends.  All looks good from the control plane side but I am not
>> having success with traffic being forwarded.
>>
>> Although I have been able to configure this as far as I can tell there
>> is
>> nothing in the doco for this.  I am thinking it maybe one of those "you
>> can configure but not supported" things.
>>
>> Can anyone confirm if GRE tunnels or similar are actually supported?
>>
>> Hardware: ASR 901
>> Software: 15.4(1)S1
>> License Level: IPBase
>>
>> Thanks
>>
>> Ivan
>>
>> ___
>> cisco-nsp mailing list  cisco-nsp@puck.nether.net
>> https://puck.nether.net/mailman/listinfo/cisco-nsp
>> archive at http://puck.nether.net/pipermail/cisco-nsp/
>>
>


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] Cisco ASR901 and Tunnels

2014-05-12 Thread Ivan
I have some Cisco ASR901s and would like to have a layer 2 or layer 3
tunnel between them over a layer 3 network.

I have configured GRE and tunnel is up and it is possible to ping the
remote ends.  All looks good from the control plane side but I am not
having success with traffic being forwarded.

Although I have been able to configure this as far as I can tell there is
nothing in the doco for this.  I am thinking it maybe one of those "you
can configure but not supported" things.

Can anyone confirm if GRE tunnels or similar are actually supported?

Hardware: ASR 901
Software: 15.4(1)S1
License Level: IPBase

Thanks

Ivan

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ECMP v Link Aggregation ofr MPLS

2014-03-14 Thread Ivan
Thanks to all have responded so far.  Adam, what features were not
available for you when using LAG and what platform are you using?

Cheers

Ivan

> As mentioned just make sure LAG on your platforms will allow you to use
> all the features you require on your backbone.
> That's why we had to go the ECMP way -the drawback is more IGP routes.
>
> adam
>> -Original Message-
>> From: cisco-nsp [mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of
>> Keegan Holley
>> Sent: Friday, March 14, 2014 12:29 AM
>> To: Ivan
>> Cc: cisco-nsp@puck.nether.net
>> Subject: Re: [c-nsp] ECMP v Link Aggregation ofr MPLS
>>
>> It depends on your platform, traffic and code versions.  Aggregated
>> links and
>> MLAG are the better option since they are simpler.  However they are
>> more
>> susceptible to bugs on certain platforms and traffic spread of course
>> depends
>> what kind of traffic flows will traversing the links.  It's also easier
>> to remove
>> links from service with ECMP.  If you're a transit AS you probably have
>> enough diversity to ensure an even spread.  All things considered I'd
>> choose
>> aggregated links as well.
>>
>> On Mar 13, 2014, at 4:28 PM, Ivan  wrote:
>>
>> > So we are crossing the bridge to >10Gbps for some MPLS core links.  I
>> > am trying to work out if it is better to use aggregated links or ECMP.
>> > If anyone has any experience or recommendation it would be much
>> appreciated.
>> >
>> > Thanks
>> >
>> > Ivan
>> >
>> > ___
>> > cisco-nsp mailing list  cisco-nsp@puck.nether.net
>> > https://puck.nether.net/mailman/listinfo/cisco-nsp
>> > archive at http://puck.nether.net/pipermail/cisco-nsp/
>>
>>
>> ___
>> cisco-nsp mailing list  cisco-nsp@puck.nether.net
>> https://puck.nether.net/mailman/listinfo/cisco-nsp
>> archive at http://puck.nether.net/pipermail/cisco-nsp/
>


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] ECMP v Link Aggregation ofr MPLS

2014-03-13 Thread Ivan
So we are crossing the bridge to >10Gbps for some MPLS core links.  I am
trying to work out if it is better to use aggregated links or ECMP.  If
anyone has any experience or recommendation it would be much appreciated.

Thanks

Ivan

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] DC Powered Switch

2014-02-21 Thread Ivan
I am after a basic switch but it need to be DC powered.  Something like 
a 2960 would be more than good enough.  Would the lowest cost Cisco 
option be the ME-3400E-24TS-M with DC supplies?  Requirements are layer 
2, ~24 ports and dc power.


I did get a quote for one of these and the first DC power supply was 
listed as ME34X-PWR-DC and the second as ME34X-PWR-DC-R, but the second 
one costs 3 x as much - is there something special about the second PS 
in this model?


Thanks

Ivan
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ME3600X - Hairpinning/Local Connect

2014-02-20 Thread Ivan
Just what I was after - "EVC Local Connect".  Looks like i needed a 
newer IOS - 15.3(2)S.  Thanks to those who replied.


http://www.cisco.com/c/en/us/td/docs/switches/metro/me3600x_3800x/software/release/15-3_2_S/configuration/guide/3800x3600xscg/swevc.html#wp1079580


Ivan

On 20/Feb/2014 7:59 p.m., George Giannousopoulos wrote:

Hi,

This feature is supported in 15.3(2)S and newer images.
Check 
http://www.cisco.com/c/en/us/td/docs/ios/15_3s/release/notes/15_3s_rel_notes/15_3s_feats_important_notes_15_3_2s.html


I've tested it successfully in 15.3(3)S1a

Best regards
George


On Thu, Feb 20, 2014 at 4:45 AM, Ivan <mailto:cisco-...@itpro.co.nz>> wrote:


Hi,

I have seen in the config guides at way of send traffic in and out the
same port or even different ports


http://www.cisco.com/c/en/us/td/docs/switches/metro/me3600x_3800x/software/release/15-3_1_S/configuration/guide/3800x3600xscg/swevc.html#wp1051612

I was looking to use the connect statement which seems to be there but
maybe not supported??  Here is what I was trying

interface GigabitEthernet0/5
description Local Connect Test
switchport trunk allowed vlan none
switchport mode trunk
mtu 9216
load-interval 30
no cdp enable
spanning-tree portfast
spanning-tree bpdufilter enable
spanning-tree bpduguard enable
service instance 123 ethernet
 encapsulation dot1q 123
 no rewrite ingress tag pop 1 symmetric
 no shut

interface GigabitEthernet0/6
description Local Connect Test
switchport trunk allowed vlan none
switchport mode trunk
mtu 9216
load-interval 30
no cdp enable
spanning-tree portfast
spanning-tree bpdufilter enable
spanning-tree bpduguard enable
service instance 123 ethernet
 encapsulation dot1q 123
 no rewrite ingress tag pop 1 symmetric
 no shut

ME1(config)#connect test gigabitEthernet 0/5 123 gigabitEthernet
0/6  123
%CONN: invalid segment 1
%CONN: Invalid Command
ME1(config)#

IOS is me360x-universalk9-mz.153-1.S1.bin.  Have I done something
wrong or
is this not supported?

Thanks

Ivan

___
cisco-nsp mailing list cisco-nsp@puck.nether.net
<mailto:cisco-nsp@puck.nether.net>
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/




___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] ME3600X - Hairpinning/Local Connect

2014-02-19 Thread Ivan
Hi,

I have seen in the config guides at way of send traffic in and out the
same port or even different ports

http://www.cisco.com/c/en/us/td/docs/switches/metro/me3600x_3800x/software/release/15-3_1_S/configuration/guide/3800x3600xscg/swevc.html#wp1051612

I was looking to use the connect statement which seems to be there but
maybe not supported??  Here is what I was trying

interface GigabitEthernet0/5
description Local Connect Test
switchport trunk allowed vlan none
switchport mode trunk
mtu 9216
load-interval 30
no cdp enable
spanning-tree portfast
spanning-tree bpdufilter enable
spanning-tree bpduguard enable
service instance 123 ethernet
 encapsulation dot1q 123
 no rewrite ingress tag pop 1 symmetric
 no shut

interface GigabitEthernet0/6
description Local Connect Test
switchport trunk allowed vlan none
switchport mode trunk
mtu 9216
load-interval 30
no cdp enable
spanning-tree portfast
spanning-tree bpdufilter enable
spanning-tree bpduguard enable
service instance 123 ethernet
 encapsulation dot1q 123
 no rewrite ingress tag pop 1 symmetric
 no shut

ME1(config)#connect test gigabitEthernet 0/5 123 gigabitEthernet 0/6  123
%CONN: invalid segment 1
%CONN: Invalid Command
ME1(config)#

IOS is me360x-universalk9-mz.153-1.S1.bin.  Have I done something wrong or
is this not supported?

Thanks

Ivan

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] IOS XR BGP Filters

2013-12-31 Thread Ivan

Hi,

I am adding some routers running ISO XR to my network.  For the most 
part things are straight forward and I quite like RPL.


In IOS BGP I would apply per neighbor BGP as-path and prefix filters and 
a global route-map, something like


neighbor x.x.x.x filter-list x in
neighbor x.x.x.x prefix-list cust-a in
neighbor x.x.x.x route-map all-custs in

Now with IOS XR it seems the only filtering that can be applied is a 
single route-policy.  So I am thinking that I will be needing a parent 
rpl policy per neighbour for the as-path and prefix filtering (as these 
differ per neighbor) and a common child policy for everything else... am 
I on the right track?


Cheers

Ivan
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] SFP-10G-ZR and C3KX-NM-10G

2013-01-28 Thread Ivan
Hi,

Can anyone confirm if SFP-10G-ZR works in C3KX-NM-10G for 3560X or 3750X. 
Doesn't seem to be on the list

Thanks

Ivan

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Advanced Metro license, ME-3600

2012-09-28 Thread Ivan

could be...

Switch(config)#license boot level ?
  AdvancedMetroIPAccess  AdvancedMetroIPAccess level
  MetroIPAccess  MetroIPAccess level

Ivan

On 28/Sep/2012 11:30 a.m., Eric A Louie wrote:

Thanks for the help.  That didn't work.  I opened a case with TAC to get the
secret formula, because all my searches for "activate evaluation
license advanced metro" gave me no configuration hints.
  Much appreciated,
Eric Louie
619-743-5375





From: Reuben Farrelly 
To: Eric A Louie 
Cc: Aaron ; Mattias Gyllenvarg
; cisco-nsp@puck.nether.net
Sent: Thu, September 27, 2012 3:34:47 PM
Subject: Re: [c-nsp] Advanced Metro license, ME-3600

The Eval license does not require a license be obtained from CCO.  Only
permanent non-expiring licenses require the special file/key.

sw6.nsw(config)#license boot level advancedMetroIPAccess

Pretty sure this is all you need to activate the 60 day eval.

Unfortunately I don't have any ME3600s around that don't have the ADV
license to test with.

This is the exact same process as other newer Catalyst switches, FWIW.
It's not unique to this platform.

Reuben


On 28/09/2012 8:23 AM, Eric A Louie wrote:

I don't see an eval license for "ME 3600X Advanced Metro" under Routers
& Switches
Much appreciated,
Eric Louie
619-743-5375



*From:* Reuben Farrelly 
*To:* Aaron 
*Cc:* Mattias Gyllenvarg ; Eric A Louie
; cisco-nsp@puck.nether.net
*Sent:* Thu, September 27, 2012 2:56:05 PM
*Subject:* Re: [c-nsp] Advanced Metro license, ME-3600

If you get an E-License Delivery instead of the license coming
preinstalled on the switch, the process is still actually very
straightforward.

All you have to do is fill in a short form online and enter a key from
the E-License PDF, the actual license file itself then gets emailed back
to you straight away, and it's just then a case of uploading the file to
the switch.

http://www.cisco.com/go/license/

I'm not a big fan of complexity, but this process really is as easy (or
complex) as downloading an IOS image from CCO.

If the E-license doesn't turn up with the hardware there's always the 60
day Eval License which you can activate without any keys to buy more time.

Reuben


On 28/09/2012 5:22 AM, Aaron wrote:
   > I get some with and some without... the ones without I send system serial
   > number to my cisco account se and she sends me a license file
   >
   > Aaron
   >
   >
   > -Original Message-
   > From: cisco-nsp-boun...@puck.nether.net
<mailto:cisco-nsp-boun...@puck.nether.net>
   > [mailto:cisco-nsp-boun...@puck.nether.net
<mailto:cisco-nsp-boun...@puck.nether.net>] On Behalf Of Mattias Gyllenvarg
   > Sent: Thursday, September 27, 2012 1:40 AM
   > To: Eric A Louie
   > Cc: cisco-nsp@puck.nether.net <mailto:cisco-nsp@puck.nether.net>
   > Subject: Re: [c-nsp] Advanced Metro license, ME-3600
   >
   > Have had both ways. Always get them preinstalled now.
   >
   > Licencing process is a pain.
   >
   > On 27 September 2012 00:35, Eric A Louie mailto:elo...@yahoo.com>> wrote:
   >
   >> Hey folks, I'm trying to get the straight scoop on the licensing issue
   >>
   >> I received an ME 3600x from my reseller, without the Advanced Metro
   >> license.  I did order the license from them.  Is there a normal wait
   >> for getting it, or is the reseller trying to smokescreen me?  Or,
   >> should I have received the license on shipment of the switch?
   >>
   >>  Much appreciated,
   >> Eric Louie


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

Re: [c-nsp] ME3600X Local Connect

2012-09-27 Thread Ivan

I am running

Switch#show license
Index 1 Feature: AdvancedMetroIPAccess
Period left: Life time
License Type: Permanent
License State: Active, In Use
License Count: Non-Counted
License Priority: Medium
Index 2 Feature: MetroIPAccess
Index 3 Feature: 10GEUpgrade
Period left: Life time
License Type: Permanent
License State: Active, In Use
License Count: Non-Counted
License Priority: Medium

What do you get after putting in a name for the connect - all I get is 
Dialer as an option.


Switch(config)#connect FOO ?
  Dialer  Dialer interface

On 28/Sep/2012 12:22 a.m., Andrew K. wrote:

Are you running the advanced services license?

me360x-universalk9-mz.152-2.S1.bin

switch#sh license
Index 1 Feature: AdvancedMetroIPAccess
 Period left: Life time
switch(config)#connect ?
   WORD  Name for this connection



On 9/27/2012 6:38 AM, Nick Hilliard wrote:

On 27/09/2012 03:38, Ivan wrote:

Just connecting 2 service instances is all I would like to do.

There is a difference between an ESI and an xconnect.  In the case of an
ESI, the switch will learn all the mac addresses passing over the link.
This doesn't happen for an xconnect.

If you're dealing with a small number of mac addresses, this probably
isn't
a problem.  If you're dealing with a lot, then it may be...

Nick




___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ME3600X Local Connect

2012-09-27 Thread Ivan

Hi

Not sure what ESI stands for, but the main reason I don't want to do 
bridge mode is to avoid the MAC learning.  Also better not to use up the 
bridges which are a global resource.


Ivan

On 27/Sep/2012 10:38 p.m., Nick Hilliard wrote:

On 27/09/2012 03:38, Ivan wrote:

Just connecting 2 service instances is all I would like to do.

There is a difference between an ESI and an xconnect.  In the case of an
ESI, the switch will learn all the mac addresses passing over the link.
This doesn't happen for an xconnect.

If you're dealing with a small number of mac addresses, this probably isn't
a problem.  If you're dealing with a lot, then it may be...

Nick



___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ME3600X Local Connect

2012-09-26 Thread Ivan
Just connecting 2 service instances is all I would like to do.  What IOS
are you running.  I am unable to you the connect command.  I am using
me360x-universalk9-mz.152-4.S

interface GigabitEthernet0/11
 switchport trunk allowed vlan none
 switchport mode trunk
 service instance 1 ethernet
  encapsulation dot1q 10
  rewrite ingress tag pop 1 symmetric

interface GigabitEthernet0/12
 switchport trunk allowed vlan none
 switchport mode trunk
 service instance 1 ethernet
  encapsulation dot1q 20
  rewrite ingress tag pop 1 symmetric

Switch(config)#connect FOO ?
  Dialer  Dialer interface

> Connect does exist but you can't use it with a bridge domain.
>
> The connect command is only used for two service instances.  If you need
> to link three or more that traffic must be switched, so then just use a
> bridge-group.
>
> Connect example
>
> Switch (config)# interface gigabitethernet0/2
> Switch (config-if)# service instance 1 Ethernet
> Switch (config-if-srv)# encapsulation dot1q 10,20,30-50
> Switch (config-if-srv)# exit
>
> Switch (config)# interface gigabitethernet0/3
> Switch (config-if)# service instance 1 Ethernet
> Switch (config-if-srv)# encapsulation dot1q 10,20,30-50
>
>
> Switch (config)#connect NAMEHERE GigabitEthernet0/2 1 GigabitEthernet0/3 1
>
>
>
> On 9/26/2012 8:38 PM, Ivan wrote:
>> Hi,
>>
>> Does anyone know if it is possible to configure local connect on the
>> ME3600X?  The closest I have found is "hairpinning"
>> http://www.cisco.com/en/US/docs/switches/metro/me3600x_3800x/software/release/15.2_4_S/configuration/guide/swevc.html#wp1051612
>>
>> This uses bridge domains and seems to have some limitations...
>>
>> Switch(config-if-srv)#bridge-domain ?
>><1-8000>   Bridge-domain number
>>
>> Switch(config-if-srv)#bridge-domain 8000
>> QOS: Bridge-Domain greater than 4095 is not supported for output
>> policies
>> QoS: Detaching output service-policy TEST from efp 60
>>
>> Something like on the 7600 ( " connect  GigabitEthernet3/3 55
>> GigabitEthernet3/3 66" would be nice.
>>
>> Ivan
>>
>>
>>
>> ___
>> cisco-nsp mailing list  cisco-nsp@puck.nether.net
>> https://puck.nether.net/mailman/listinfo/cisco-nsp
>> archive at http://puck.nether.net/pipermail/cisco-nsp/
>>
>>
> ___
> cisco-nsp mailing list  cisco-nsp@puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/
>


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Advanced Metro license, ME-3600

2012-09-26 Thread Ivan
Hi,

My experience is that any ME3600Xs ordered with licences have come with
the license pre installed.

Ivan

> Hey folks, I'm trying to get the straight scoop on the licensing issue
>
> I received an ME 3600x from my reseller, without the Advanced Metro
> license.  I
> did order the license from them.  Is there a normal wait for getting it,
> or is
> the reseller trying to smokescreen me?  Or, should I have received the
> license
> on shipment of the switch?
>
>  Much appreciated,
> Eric Louie
> ___
> cisco-nsp mailing list  cisco-nsp@puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/
>


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] ME3600X Local Connect

2012-09-26 Thread Ivan
Hi,

Does anyone know if it is possible to configure local connect on the
ME3600X?  The closest I have found is "hairpinning"
http://www.cisco.com/en/US/docs/switches/metro/me3600x_3800x/software/release/15.2_4_S/configuration/guide/swevc.html#wp1051612

This uses bride domains and seems to have some limitations...

Switch(config-if-srv)#bridge-domain ?
  <1-8000>  Bridge-domain number

Switch(config-if-srv)#bridge-domain 8000
QOS: Bridge-Domain greater than 4095 is not supported for output policies
QoS: Detaching output service-policy TEST from efp 60

Something like on the 7600 ( " connect  GigabitEthernet3/3 55
GigabitEthernet3/3 66" would be nice.

Ivan



___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] QoS and Router Originated Traffic

2012-09-26 Thread Ivan
Hi,

I have had a lot of similar feedback. I have found

* Changing the IP precedence via ""ip local policy route-map" doesn't
directly set the COS - the locally generated traffic doesn't have a 802.1q
header to contain the 802.1p bits.  Depending on the platform (and
probably other stuff) the IP precedence value may or may not end copied
into the 802.1p field when the exiting interface has 802.1q tagged
packets.

*Testing on ASR1K and 800 Series ISRs I have found that they don't copy
the IP precedence into the 802.1p field.  A 7600 with ES+ does.

*IPv6 NS and ND packets are marked with IP precedence 7.  On the 7600 the
"ip local policy route-map" doesn't work for these packets - it does work
for other IPv6 packets .

*The "ip local policy route-map" solution impacts RP traffic going out all
interfaces.  I only require a specific interface to have traffic marked in
a certain way.

*I would prefer to only modify the 802.1p bits while leaving the IP
precedence.

At this stage I am thinking the only way to achieve what I am looking for
is to set only the 802.1p bits using an additional device...

Ivan

> Hi,
>
> We use "ip local policy route-map xyz" to apply a route-map to traffic
> that is originated locally on the router. The route-map is like any normal
> one with a match statement (using ACL), then a set statement.
>
>
> regards,
> Tony.
>
>
>
>>
>> From: Anton Kapela 
>>To: Ivan 
>>Cc: cisco-nsp 
>>Sent: Tuesday, 25 September 2012 10:07 PM
>>Subject: Re: [c-nsp] QoS and Router Originated Traffic
>>
>>Kind of out-dated, but useful reading:
>>
>>http://www.cisco.com/en/US/tech/tk543/tk544/technologies_tech_note09186a0080094612.shtml
>>
>>-Tk
>>
>>On Sep 17, 2012, at 5:21 AM, Ivan  wrote:
>>
>>> Hi,
>>>
>>> I have a requirement to ensure all traffic across certain links have
>>> particular CoS markings.  Applying QoS polices on the links works but
>>> doesn't capture router originated traffic - BGP, ARP, IPv6 ND etc.
>>>
>>> As a potential solution I have tested using IPv4 and IPv6 PBR to force
>>> router traffic via lo0
>>>
>>> route-map LP permit 10
>>> set interface Loopback0
>>>
>>> ip local policy route-map LP
>>> ipv6 local policy route-map LP
>>>
>>> and have set a QoS policy on lo0
>>>
>>> interface Loopback0
>>> service-policy input LOOP0-IN
>>>
>>> this sets a qos-group which is matched the outgoing non-loopback
>>> interface and sets CoS as required.
>>>
>>> As far as I can tell it works pretty well but I have a few questions
>>>
>>> 1) I don't think this works for ARP.  I tried to match protocol arp
>>> using the loopback0 policy but
>>>
>>> router(config-if)#service-policy input LOOP0-IN
>>> 'match protocol arp' is not supported on input service-policy
>>>
>>> is there anyway to set the CoS value for ARP traffic from the router,
>>> ideally only on some interfaces?
>>>
>>> 2) Is this configuration going to kill my router - maybe I am forcing
>>> some process switching?
>>>
>>> Thanks
>>>
>>> Ivan
>>


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ME3600 switch interface showing Packet drops on Trunk Port.

2012-09-21 Thread Ivan

Hi Muthu,

As per that thread the default buffer size for the Gi interfaces is very 
small and can be increased with a QoS policy as Warris described.


I was seeing "Total output drops" increasing in the output of "show int 
gi0/x"  AT a quick glance I can't see this information in the output you 
provided below, so you may have a different issue.


Ivan

On 21/Sep/2012 8:32 p.m., Muthukumar Rajagopalan wrote:

Thanks Ivan for sharing the Thread, I just glanced the thread quickly, in
our setup, there is no QOS applied as of now.

The interface is a 1 Gig interface only and here is the show controller
output.

show controllers ethernet-controller gigabitEthernet 0/1

  Transmit GigabitEthernet0/1 Receive
3746715079 Bytes 684001607 Bytes
1601240611 Unicast frames 1423901907 Unicast frames
   3956660 Multicast frames 57515 Multicast frames
 33950 Broadcast frames 111825 Broadcast frames
1603960779 Dot1Q frames 1424071247 Dot1Q frames
 0 Too old frames 668768496 Unicast bytes
*3690121444 Deferred frames 5900758 Multicast bytes*
 0 MTU exceeded frames 9332353 Broadcast bytes
 0 FCS errors 0 FCS errors
 0 1 collision frames 0 Alignment errors
 0 2 collision frames
 0 3 collision frames 0 Oversize frames
 0 4 collision frames 0 Undersize frames
 0 5 collision frames 0 Collision fragments
 0 6 collision frames
* 0 7 collision frames 2134412 Minimum size frames
 0 8 collision frames 33319889 65 to 127 byte frames
 0 9 collision frames 13344585 128 to 255 byte frames
 0 10 collision frames 4930119 256 to 511 byte frames
 0 11 collision frames 2813946 512 to 1023 byte frames
 0 12 collision frames 803808161 1024 to 1518 byte frames*
 0 13 collision frames 0 Overrun frames
 0 14 collision frames
 0 15 collision frames
 0 Pause frames 0 Pause frames
 0 Excessive collisions 0 Symbol error frames
 0 Late collisions 0 Invalid frames, too large
 0 VLAN discard frames 563720136 Valid frames, too large
 0 Excess defer frames 0 Invalid frames, too small
   2310138 64 byte frames 0 Valid frames, too small
  39205786 127 byte frames
  14671469 255 byte frames 0 Too old frames
   6687328 511 byte frames 0 Valid oversize frames
  69655856 1023 byte frames 0 System FCS error frames
 951464626 1518 byte frames
 521236018 Too large frames
 0 Good (1 coll) frames
 0 Good (>1 coll) frames

Thanks,
Muthu.
On Fri, Sep 21, 2012 at 12:07 PM, Muthukumar Rajagopalan
wrote:


Hi..

We have implemented ME3600 switch recently and observing random packet
drops on the trunk link. On the access side, we have multi-services
running, Normal Server Data traffic, Video + Voice. Below is the config on
the trunk port and Q-in-Q enabled on the access. Different Pattern of
traffic has been sent and observing outbound drops max up to 3%.

*Present Version:* me360x-universalk9-mz.122-52.EY4.bin

port-type nni
  switchport mode trunk
  mtu 1512
  load-interval 30
  speed nonegotiate
  spanning-tree bpdufilter enable
  spanning-tree bpduguard enable
  spanning-tree guard root
  ethernet cfm mip level 7 vlan 1-4094
  ethernet oam remote-loopback supported
  ethernet oam
  hold-queue 4096 in
  hold-queue 4096 out

Please provide your view if you folks came across this kind of issue
before.

Thanks,
Muthu..



___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] QoS and Router Originated Traffic

2012-09-17 Thread Ivan

Hi,

I have a requirement to ensure all traffic across certain links have 
particular CoS markings.  Applying QoS polices on the links works but 
doesn't capture router originated traffic - BGP, ARP, IPv6 ND etc.


As a potential solution I have tested using IPv4 and IPv6 PBR to force 
router traffic via lo0


route-map LP permit 10
 set interface Loopback0

ip local policy route-map LP
ipv6 local policy route-map LP

and have set a QoS policy on lo0

interface Loopback0
 service-policy input LOOP0-IN

this sets a qos-group which is matched the outgoing non-loopback 
interface and sets CoS as required.


As far as I can tell it works pretty well but I have a few questions

1) I don't think this works for ARP.  I tried to match protocol arp 
using the loopback0 policy but


router(config-if)#service-policy input LOOP0-IN
 'match protocol arp' is not supported on input service-policy

is there anyway to set the CoS value for ARP traffic from the router, 
ideally only on some interfaces?


2) Is this configuration going to kill my router - maybe I am forcing 
some process switching?


Thanks

Ivan
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ME3600X Output Drops

2012-09-15 Thread Ivan

Hi Warris,

Running me360x-universalk9-mz.152-2.S1.bin


Thanks

Ivan

On 16/Sep/2012 12:20 a.m., Waris Sagheer (waris) wrote:

Hi Ivan,
The policy should work on EFP regardless of bridge or xconnect.
Which image are you using?

Regards,
Waris


-Original Message-
From: Ivan [mailto:cisco-...@itpro.co.nz]
Sent: Wednesday, September 12, 2012 7:30 PM
To: Waris Sagheer (waris)
Cc: Ivan; cisco-nsp
Subject: RE: [c-nsp] ME3600X Output Drops

Hi Warris,

Thanks again for your answers.  The requirement to match at vlan level is because I understood from your 
examples to apply a policy at the EVC level this was required "<<<<< Using vlan 
level confirms it is the second level and the child policy is the third level"

I have found that a policy such as the following seems to work and handle both 
tagged and untagged traffic and can be applied to a EVC.  (I wish to apply the 
same policy to all EVCs regardless of whether the traffic is tagged or not 
unless customisation is required)

class-map match-any vlan
  match vlan  1-4094

policy-map EVC-LEAF
  class class-default
   queue-limit 491520 bytes

policy-map EVC-VLAN
  class vlan
service-policy EVC-LEAF
  class class-default
service-policy EVC-LEAF



Separate to this, and partly why I was confused, is that I have found the 
polices applied to the EVC seem to work when bridging but not for a xconnect.  
Can you confirm this is expected behavior?  I would prefer to avoid having to 
bridge and xconnect on the vlan interface.

interface GigabitEthernet0/5
  switchport trunk allowed vlan none
  switchport mode trunk
  service instance 60 ethernet
   encapsulation dot1q 60
   service-policy output EVC-VLAN
   bridge-domain 60   <--- bridged
  service instance 70 ethernet
   encapsulation dot1q 70
   service-policy output EVC-VLAN
   xconnect 1.2.3.4 70 encapsulation mpls <--- xconnect

Switch#show policy-map interface gi0/5 service instance 60
   GigabitEthernet0/5: EFP 60

   Service-policy output: EVC-VLAN

 Class-map: vlan (match-any)
   0 packets, 0 bytes
   5 minute offered rate  bps
   Match: vlan  1-4094

   Service-policy : EVC-LEAF

 Class-map: class-default (match-any)
   0 packets, 0 bytes
   5 minute offered rate  bps, drop rate  bps
   Match: any
   Queue-limit 491520 bytes
   Queue-limit current-queue-depth 0 bytes
   Output Queue:
 Tail Packets Drop: 0
 Tail Bytes Drop: 0

 Class-map: class-default (match-any)
   0 packets, 0 bytes
   5 minute offered rate  bps, drop rate  bps
   Match: any

   Service-policy : EVC-LEAF

 Class-map: class-default (match-any)
   0 packets, 0 bytes
   5 minute offered rate  bps, drop rate  bps
   Match: any
   Queue-limit 491520 bytes <queue-limit
   Queue-limit current-queue-depth 0 bytes
   Output Queue:
 Tail Packets Drop: 0
 Tail Bytes Drop: 0

Switch#show policy-map interface gi0/5 service instance 70
   GigabitEthernet0/5: EFP 70

   Service-policy output: EVC-VLAN

 Class-map: vlan (match-any)
   0 packets, 0 bytes
   5 minute offered rate  bps
   Match: vlan  1-4094

   Service-policy : EVC-LEAF

 Class-map: class-default (match-any)
   0 packets, 0 bytes
   5 minute offered rate  bps, drop rate  bps
   Match: any

 Class-map: class-default (match-any)
   0 packets, 0 bytes
   5 minute offered rate  bps, drop rate  bps
   Match: any

   Service-policy : EVC-LEAF

 Class-map: class-default (match-any)
   0 packets, 0 bytes
   5 minute offered rate  bps, drop rate 0000 bps
   Match: any



Hi Ivan,
There is no difference in terms of queue depth in case of policy at
the port level vs policy at the EVC from hardware programming perspective..
Port level policy would consume less queues as compare to queues per EVC.
Policy at EVC has separate queues per service instance. However policy
at the port level, queues are shared by the all the service instances
under that port.
Selection of the policy depends on the requirement. If there are
separate customers on the EVC then per EVC policy should be used.
For you last question, shouldn't untagged means no tag then why is
there a requirement to match on the VLAN level? What kind of traffic
is there in case of "default"? Is it tagged or untagged?
If tagged, is there a range?

Regards,
Waris






___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ME3600X Output Drops

2012-09-12 Thread Ivan
Hi Warris,

Thanks again for your answers.  The requirement to match at vlan level is
because I understood from your examples to apply a policy at the EVC level
this was required "<<<<< Using vlan level confirms it is the
second level and the child policy is the third level"

I have found that a policy such as the following seems to work and handle
both tagged and untagged traffic and can be applied to a EVC.  (I wish to
apply the same policy to all EVCs regardless of whether the traffic is
tagged or not unless customisation is required)

class-map match-any vlan
 match vlan  1-4094

policy-map EVC-LEAF
 class class-default
  queue-limit 491520 bytes

policy-map EVC-VLAN
 class vlan
   service-policy EVC-LEAF
 class class-default
   service-policy EVC-LEAF



Separate to this, and partly why I was confused, is that I have found the
polices applied to the EVC seem to work when bridging but not for a
xconnect.  Can you confirm this is expected behavior?  I would prefer to
avoid having to bridge and xconnect on the vlan interface.

interface GigabitEthernet0/5
 switchport trunk allowed vlan none
 switchport mode trunk
 service instance 60 ethernet
  encapsulation dot1q 60
  service-policy output EVC-VLAN
  bridge-domain 60   <--- bridged
 service instance 70 ethernet
  encapsulation dot1q 70
  service-policy output EVC-VLAN
  xconnect 1.2.3.4 70 encapsulation mpls <--- xconnect

Switch#show policy-map interface gi0/5 service instance 60
  GigabitEthernet0/5: EFP 60

  Service-policy output: EVC-VLAN

Class-map: vlan (match-any)
  0 packets, 0 bytes
  5 minute offered rate  bps
  Match: vlan  1-4094

  Service-policy : EVC-LEAF

Class-map: class-default (match-any)
  0 packets, 0 bytes
  5 minute offered rate  bps, drop rate  bps
  Match: any
  Queue-limit 491520 bytes
  Queue-limit current-queue-depth 0 bytes
  Output Queue:
Tail Packets Drop: 0
Tail Bytes Drop: 0

Class-map: class-default (match-any)
  0 packets, 0 bytes
  5 minute offered rate  bps, drop rate  bps
  Match: any

  Service-policy : EVC-LEAF

Class-map: class-default (match-any)
  0 packets, 0 bytes
  5 minute offered rate  bps, drop rate  bps
  Match: any
  Queue-limit 491520 bytes <queue-limit
  Queue-limit current-queue-depth 0 bytes
  Output Queue:
Tail Packets Drop: 0
Tail Bytes Drop: 0

Switch#show policy-map interface gi0/5 service instance 70
  GigabitEthernet0/5: EFP 70

  Service-policy output: EVC-VLAN

Class-map: vlan (match-any)
  0 packets, 0 bytes
  5 minute offered rate  bps
  Match: vlan  1-4094

  Service-policy : EVC-LEAF

Class-map: class-default (match-any)
  0 packets, 0 bytes
  5 minute offered rate  bps, drop rate  bps
  Match: any

Class-map: class-default (match-any)
  0 packets, 0 bytes
  5 minute offered rate  bps, drop rate  bps
  Match: any

  Service-policy : EVC-LEAF

Class-map: class-default (match-any)
  0 packets, 0 bytes
  5 minute offered rate  bps, drop rate 0000 bps
  Match: any


> Hi Ivan,
> There is no difference in terms of queue depth in case of policy at the
> port level vs policy at the EVC from hardware programming perspective.
> Port level policy would consume less queues as compare to queues per EVC.
> Policy at EVC has separate queues per service instance. However policy at
> the port level, queues are shared by the all the service instances under
> that port.
> Selection of the policy depends on the requirement. If there are separate
> customers on the EVC then per EVC policy should be used.
> For you last question, shouldn't untagged means no tag then why is there a
> requirement to match on the VLAN level? What kind of traffic is there in
> case of "default"? Is it tagged or untagged?
> If tagged, is there a range?
>
> Regards,
> Waris
>
>


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ME3600X Output Drops

2012-08-27 Thread Ivan

Hi Waris,

Thanks very much for the detailed email.  It really helps to get 
information on default queue-sizes and improvements on the road-map.


I was wondering if when using many EVCs on a physical interface, is 
there any difference between applying a policy on the physical port vs 
individual policies on each EVC (in terms of queue-limit and buffers).  
That is if you apply the policy per EVC will each EVC have separate QoS 
resources (such as buffer space)?  I am trying to work out if it is 
better to apply polices to the port or the service instance.


Lastly is there any way to match at the "vlan level" when the EVC is 
matching untagged or default traffic?  I have tried but haven't been 
able to get a successful config for this.


Thanks

Ivan


On 27/Aug/2012 4:34 p.m., Waris Sagheer (waris) wrote:

Problem Statement:
When there is a speed mismatch that is 10 Gig ingress interface/1Gig egress 
interface or 1 Gig ingress interface/100M egress interface, microbursts can 
happen.
For example, 10 Gig Ingress interface->1 Gig Egress Interface
Traffic rate 500 M, traffic direction 10 Gig to 1 Gig interface. Instantaneous 
burst is possible which can cause the default queue buffers to run out at 
egress interface resulting in packet drops at the 1 Gig egress interface..

ME3800X/ME3600X/ME3600X-24CX default queue-limit values in time and bytes for 
10/100/1000/1 Mbps Interfaces:
In Bytes:
10/100/1000/1 Mbps --> 12/12/12/120 Kbytes respectively
In Time:
10/100/1000/1 Mbps --> 1/1000/100/100 usec respectively

How to fix this problem?
Current Solution:
Increase the queue-limit by using the "queue-limit xx" command.

Queue-Limit Ranges:
200 to 491520 bytes
1 to 3932 us
1 to 2457 packets (Assuming 1 packet = 200 bytes) [Packet unit is supported in 
15.1(2)EY]

How to pick the right value?
Currently there is no other way except for trial and error. It is best to start 
from 200K Bytes and monitor the drops. Increase the queue-limit if the drops 
are still seen.

Roadmap Queue-limit Feature Enhancements to fix this issue:
Step 1:We are planning to increase the default queue-limit to 40KB increase of 
12 KB in case of 1Gig interface.
Step 2:We are planning to introduce a feature called flexible queue-limit in 
Release 15.3(1)S, Q4CY12 which would allow the queue-limit to be increases as 
percentages of buffer.
Similar feature is supported on ME3400E.
http://www.cisco.com/en/US/docs/switches/metro/me3400e/software/release/12.2_58_ex/command/reference/cli1.html#wp5095786
Step 3:To pick the right value, watermark counter will be introduced in 2HCY13 
which will record the maximum tail drop value. This will enable the customers 
to tweak their queue-limit value accordingly. The feature is currently 
available in IOS XR.
  
Queue-limit Value Configuration:

12.xx Release Output
Example of user configurable queue limit value,

Switch(config-pmap-c)#queue-limit ?
   <1-491520> <200-491520> in bytes, <1-3932> in us, maximum threshold (in 
us by default)

15.xx Outputs
There is an issue with the command help which shows higher value than supported 
by the platform, it will be fixed in the future release.
ME3800X-H-1(config-pmap-c)#queue-limit ?
   <1-8192000>in bytes, <1-3400> in ms, <1-8192000> in packets by default 
<< Range is shown higher than the platform can support
   


ME3800X-H-1(config-pmap-c)#queue-limit 8192000 bytes
QOS: Qlimit threshold value is out of range
Min and Max bytes qlimit are 200 & 491520 <<< Valid supported range
queue-limit: platform params check fail


ME3800X-H-1(config-pmap-c)#queue-limit 2500 packets
QOS: Qlimit threshold value is out of range
Min and Max packets qlimit are 1 & 2457 << Valid supported range
queue-limit: platform params check fail


Queue-Limit Policy Configuration Example:
In many cases QoS policy will only be required to help with the issue of packet 
drops. ME platforms support three level hiearchy [Port, Vlan & Class] and 
Queue-limit is only supported at the class or third level.

Valid supported Queue-limit Policy Example:
class-map match-all vlan60
  match vlan  60
!
policy-map EFP-qlimit
  class vlan60 <<<<< Using vlan level confirms it is the 
second level and the child policy is the third level
   shape average 1
   service-policy COS-OUT-L3-NSP
!
policy-map COS-OUT-L3-NSP
  class class-default
   queue-limit 256 packets

   
interface GigabitEthernet0/5

  switchport trunk allowed vlan none
  switchport mode trunk
  service instance 2 ethernet
   encapsulation dot1q 60
   rewrite ingress tag pop 1 symmetric
   service-policy output EFP-qlimit
   bridge-domain 60


Three Level Class-default Policy Example:
policy-map leaf
class class-default
queue-limit x bytes

policy-map logical
class class-default
service-policy leaf

policy-map root
class class-default
service-policy logic

Re: [c-nsp] ME3600X Output Drops

2012-08-23 Thread Ivan
Thanks George.  I am raising a SR to get some more information too. Are 
you able to explain how the queue-limit of 2457 was selected? Also were 
you given a version for the increase in the default queue size?  I am 
running me360x-universalk9-mz.152-2.S1.bin


Cheers

Ivan


On 23/Aug/2012 5:48 p.m., George Giannousopoulos wrote:

Hi Ivan,

In fact the default queue limit in 3800x/3600x is quite small
We also had issues with drops in all interfaces, even without congestion

After some research and an SR with Cisco, we have started applying qos 
on all interfaces


policy-map INTERFACE-OUTPUT-POLICY
  class dummy
  class class-default
   shape average X
   queue-limit 2457 packets


The dummy class does nothing.
It is just there because IOS wouldn't allow changing queue limit otherwise

Also there were issues with the policy counters which should be resolved 
after15.1(2)EY2
Cisco said they would increase the default queue sizes in the second half of 
2012..
So, I suggest you try the latest IOS version and check again

10G interfaces had no drops in our setup too.

Regards
George


On Thu, Aug 23, 2012 at 1:34 AM, Ivan <mailto:cisco-...@itpro.co.nz>> wrote:


Replying to my own message

* Adjusting the hold queue didn't help.

* Applying QOS and per referenced email stopped the drops
immediately - I
used something like the below:

policy-map leaf
class class-default
queue-limit 491520 bytes

policy-map logical
class class-default
service-policy leaf

policy-map root
class class-default
service-policy logical

* I would be interested to hear if others have ended up applying a
similar
policy to all interfaces.  Any gotchas?  I expect any 10Gbps
interfaces
would be okay without the QoS - haven't seen any issue on these
myself.

*Apart from this list I have found very little information around this
whole issue.  Any pointers to other documentation would be
appreciated.

    Thanks

Ivan

Ivan

> Hi,
>
> I am seeing output drops on a ME3600X interface as shown below
>
> GigabitEthernet0/2 is up, line protocol is up (connected)
>   MTU 9216 bytes, BW 100 Kbit/sec, DLY 10 usec,
>  reliability 255/255, txload 29/255, rxload 2/255
>   Encapsulation ARPA, loopback not set
>   Keepalive set (10 sec)
>   Full-duplex, 1000Mb/s, media type is RJ45
>   input flow-control is off, output flow-control is unsupported
>   ARP type: ARPA, ARP Timeout 04:00:00
>   Last input 6w1d, output never, output hang never
>   Last clearing of "show interface" counters 00:12:56
>   Input queue: 0/75/0/0 (size/max/drops/flushes); Total output
drops: 231
>   Queueing strategy: fifo
>   Output queue: 0/40 (size/max)
>   30 second input rate 10299000 bits/sec, 5463 packets/sec
>   30 second output rate 114235000 bits/sec, 12461 packets/sec
>  3812300 packets input, 705758638 bytes, 0 no buffer
>  Received 776 broadcasts (776 multicasts)
>  0 runts, 0 giants, 0 throttles
>  0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored
>  0 watchdog, 776 multicast, 0 pause input
>  0 input packets with dribble condition detected
>  9103882 packets output, 10291542297 bytes, 0 underruns
>  0 output errors, 0 collisions, 0 interface resets
>  0 unknown protocol drops
>  0 babbles, 0 late collision, 0 deferred
>  0 lost carrier, 0 no carrier, 0 pause output
>  0 output buffer failures, 0 output buffers swapped out
>
> I have read about similar issues on the list:
> http://www.gossamer-threads.com/lists/cisco/nsp/157217
> https://puck.nether.net/pipermail/cisco-nsp/2012-July/085889.html
>
> 1. I have no QoS policies applied to the physical interface or EVCs.
> Would increasing the hold queue help?  Is there a recommended
value - the
> maximum configurable is 24.  What is the impact on the 44MB
of packet
> buffer.
>
> 2. If the hold queue isn't an option is configuring QoS required to
> increase the queue-limit from the default 100us.  Again are
there any
> recommended values and what impact is there on the available 44MB of
> packet buffer.
>
> 3. I have found that when applying policies to the EVCs the
"show policy
> map" output does not have information for the queue-limit as I
have seen
> when applying polices to the physical interface.  Does this mean
that EVCs
> will still suffer from output drops?
>
> Thanks
>
> Ivan



___
cisco-nsp mailing list cisco-nsp@puck.nether.net
<mai

Re: [c-nsp] ME3600X Output Drops

2012-08-22 Thread Ivan
Replying to my own message

* Adjusting the hold queue didn't help.

* Applying QOS and per referenced email stopped the drops immediately - I
used something like the below:

policy-map leaf
class class-default
queue-limit 491520 bytes

policy-map logical
class class-default
service-policy leaf

policy-map root
class class-default
service-policy logical

* I would be interested to hear if others have ended up applying a similar
policy to all interfaces.  Any gotchas?  I expect any 10Gbps interfaces
would be okay without the QoS - haven't seen any issue on these myself.

*Apart from this list I have found very little information around this
whole issue.  Any pointers to other documentation would be appreciated.

Thanks

Ivan

Ivan

> Hi,
>
> I am seeing output drops on a ME3600X interface as shown below
>
> GigabitEthernet0/2 is up, line protocol is up (connected)
>   MTU 9216 bytes, BW 100 Kbit/sec, DLY 10 usec,
>  reliability 255/255, txload 29/255, rxload 2/255
>   Encapsulation ARPA, loopback not set
>   Keepalive set (10 sec)
>   Full-duplex, 1000Mb/s, media type is RJ45
>   input flow-control is off, output flow-control is unsupported
>   ARP type: ARPA, ARP Timeout 04:00:00
>   Last input 6w1d, output never, output hang never
>   Last clearing of "show interface" counters 00:12:56
>   Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 231
>   Queueing strategy: fifo
>   Output queue: 0/40 (size/max)
>   30 second input rate 10299000 bits/sec, 5463 packets/sec
>   30 second output rate 114235000 bits/sec, 12461 packets/sec
>  3812300 packets input, 705758638 bytes, 0 no buffer
>  Received 776 broadcasts (776 multicasts)
>  0 runts, 0 giants, 0 throttles
>  0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored
>  0 watchdog, 776 multicast, 0 pause input
>  0 input packets with dribble condition detected
>  9103882 packets output, 10291542297 bytes, 0 underruns
>  0 output errors, 0 collisions, 0 interface resets
>  0 unknown protocol drops
>  0 babbles, 0 late collision, 0 deferred
>  0 lost carrier, 0 no carrier, 0 pause output
>  0 output buffer failures, 0 output buffers swapped out
>
> I have read about similar issues on the list:
> http://www.gossamer-threads.com/lists/cisco/nsp/157217
> https://puck.nether.net/pipermail/cisco-nsp/2012-July/085889.html
>
> 1. I have no QoS policies applied to the physical interface or EVCs.
> Would increasing the hold queue help?  Is there a recommended value - the
> maximum configurable is 24.  What is the impact on the 44MB of packet
> buffer.
>
> 2. If the hold queue isn't an option is configuring QoS required to
> increase the queue-limit from the default 100us.  Again are there any
> recommended values and what impact is there on the available 44MB of
> packet buffer.
>
> 3. I have found that when applying policies to the EVCs the "show policy
> map" output does not have information for the queue-limit as I have seen
> when applying polices to the physical interface.  Does this mean that EVCs
> will still suffer from output drops?
>
> Thanks
>
> Ivan



___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] ME3600X Output Drops

2012-08-20 Thread Ivan
Hi,

I am seeing output drops on a ME3600X interface as shown below

GigabitEthernet0/2 is up, line protocol is up (connected)
  MTU 9216 bytes, BW 100 Kbit/sec, DLY 10 usec,
 reliability 255/255, txload 29/255, rxload 2/255
  Encapsulation ARPA, loopback not set
  Keepalive set (10 sec)
  Full-duplex, 1000Mb/s, media type is RJ45
  input flow-control is off, output flow-control is unsupported
  ARP type: ARPA, ARP Timeout 04:00:00
  Last input 6w1d, output never, output hang never
  Last clearing of "show interface" counters 00:12:56
  Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 231
  Queueing strategy: fifo
  Output queue: 0/40 (size/max)
  30 second input rate 10299000 bits/sec, 5463 packets/sec
  30 second output rate 114235000 bits/sec, 12461 packets/sec
 3812300 packets input, 705758638 bytes, 0 no buffer
 Received 776 broadcasts (776 multicasts)
 0 runts, 0 giants, 0 throttles
 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored
 0 watchdog, 776 multicast, 0 pause input
 0 input packets with dribble condition detected
 9103882 packets output, 10291542297 bytes, 0 underruns
 0 output errors, 0 collisions, 0 interface resets
 0 unknown protocol drops
 0 babbles, 0 late collision, 0 deferred
 0 lost carrier, 0 no carrier, 0 pause output
 0 output buffer failures, 0 output buffers swapped out

I have read about similar issues on the list:
http://www.gossamer-threads.com/lists/cisco/nsp/157217
https://puck.nether.net/pipermail/cisco-nsp/2012-July/085889.html

1. I have no QoS policies applied to the physical interface or EVCs. 
Would increasing the hold queue help?  Is there a recommended value - the
maximum configurable is 24.  What is the impact on the 44MB of packet
buffer.

2. If the hold queue isn't an option is configuring QoS required to
increase the queue-limit from the default 100us.  Again are there any
recommended values and what impact is there on the available 44MB of
packet buffer.

3. I have found that when applying policies to the EVCs the "show policy
map" output does not have information for the queue-limit as I have seen
when applying polices to the physical interface.  Does this mean that EVCs
will still suffer from output drops?

Thanks

Ivan

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ME3600X Embedded Packet Capture

2012-08-13 Thread Ivan

Hi Waris,

Thanks, I hadn't tested the bridging mode yet on this platform but have 
used on the ES+ linecards.  Wouldn't be looking to use all the time as I 
like the per port vlan scope when doing the xconnect on the evc.  
Reconfiguring to bridging method for troubleshooting purposes seems to 
be the only option for checking mac address.


Cheers

Ivan

On 13/Aug/2012 7:47 p.m., Waris Sagheer (waris) wrote:

Hi Ivan,
You can use the following EVPL configuration which would allow you to see the 
mac addresses e.g. in the following example you can see the mac addresses under 
bridge-domain 10.

interface GigabitEthernet0/1
  switchport trunk allowed vlan none
  switchport mode trunk
  service instance 10 ethernet
   encapsulation dot1q 100
   rewrite ingress tag pop 1 symmetric
   bridge-domain 10
   
interface Vlan10

  no ip address
  xconnect 2.2.2.2 10 encapsulation mpls


Regards,
Waris


-Original Message-----
From: Ivan [mailto:cisco-...@itpro.co.nz]
Sent: Sunday, August 12, 2012 7:17 PM
To: Pshem Kowalczyk
Cc: Ivan; Waris Sagheer (waris); cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] ME3600X Embedded Packet Capture

Hi,

Yes, as far as I understand there is no mac learning which is great for resource 
utilisation and scalability.  No requirement other than "it is helpful for 
troubleshooting" to see any macs.

Cheers

Ivan


Hi,


On 11 August 2012 10:32, Ivan  wrote:

{cut}


  xconnect 1.2.3.4 666 encapsulation mpls

Speaking from general experience - this is the culprit. In
point-to-point L2VPNs there is (usually, I admit I'm not sure if
that's the case on 3600x) no MAC address learning (which nicely
conserves the resources on the switch). If you really need to see that
address - you should turn that into a point-to-point VPLS.

kind regards
Pshem





___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ME3600X Embedded Packet Capture

2012-08-12 Thread Ivan
Hi,

Yes, as far as I understand there is no mac learning which is great for
resource utilisation and scalability.  No requirement other than "it is
helpful for troubleshooting" to see any macs.

Cheers

Ivan

> Hi,
>
>
> On 11 August 2012 10:32, Ivan  wrote:
>
> {cut}
>
>>  xconnect 1.2.3.4 666 encapsulation mpls
>
> Speaking from general experience - this is the culprit. In
> point-to-point L2VPNs there is (usually, I admit I'm not sure if
> that's the case on 3600x) no MAC address learning (which nicely
> conserves the resources on the switch). If you really need to see that
> address - you should turn that into a point-to-point VPLS.
>
> kind regards
> Pshem
>


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ME3600X Embedded Packet Capture

2012-08-10 Thread Ivan

Hi Waris,

When troubleshooting a layer 2 service checking what mac addresses can 
seen seen from the customer has been very useful.  Previously with a 
switched access we could look at the mac addresses on the access 
switch.  With MPLS to the edge I haven't found anyway to be able to 
verify customer mac addresses.  I was hopeful EPC may have been an 
option after looking at the release notes I previously referenced.


Using a ME3600X for MPLS to the edge a layer 2 handoff may look 
something like the following


interface GigabitEthernet0/1
 description Customer A
 switchport mode trunk
 mtu 9216
 load-interval 30
 no cdp enable
 service instance 666 ethernet
  encapsulation dot1q 666
  rewrite ingress tag pop 1 symmetric
  xconnect 1.2.3.4 666 encapsulation mpls

With a switched access there would be similar config as the above on the 
PE but a switch (ACCESS) with vlan 666 between the PE and the customer.  
Checking what mac addresses are seen from the customer is as easy as 
"show mac address-table dynamic vlan 666" or "show mac address-table 
dynamic interface GigabitEthernet 0/1"


With MPLS to the edge it is great the provider doesn't have to worry 
about keeping mac address tables etc - much more scalable, but it would 
be handy if there was an easy way to "peek" to help with 
troubleshooting, as it generally indicates if the problem lies with the 
customer or provider.


Thanks

Ivan

On 11/Aug/2012 3:53 a.m., Waris Sagheer (waris) wrote:

Hi Ivan,
How do you want to verify the mac address? Can you send me configuration 
example on access layer switch?
Also, what is the current configuration on ME3600X?

Regards,
Waris


-Original Message-
From: Ivan [mailto:cisco-...@itpro.co.nz]
Sent: Friday, August 10, 2012 3:27 AM
To: Waris Sagheer (waris)
Cc: cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] ME3600X Embedded Packet Capture

Hi Waris,

I had come across that bug referring to EPC in "Release Notes for the Cisco ME 3800X 
and ME 3600X Switch" - 
http://www.cisco.com/en/US/docs/switches/metro/me3600x_3800x/software/release/15.1_2_ey/release/notes/ol25360.html
and had hoped that the feature was available.  I wasn't able to find any other 
documentation thus my question to the list.

What I am really looking for is a possible way to verify any seen mac addresses 
on a customer EVC xconnect when running MPLS to the edge for troubleshooting.  
This was quite easy and useful with a switched access layer.  I don't really 
want to xconnect on vlans and bridge to EVCs (not sure that is possible on the 
ME3600X platform)

Thanks

Ivan

On 10/Aug/2012 8:09 p.m., Waris Sagheer (waris) wrote:

Ivan,
Which packet capture you are referring to on ME3600X?
There is no support of embedded packet capture on ME3600X.

Regards,
Waris


-Original Message-
From: cisco-nsp-boun...@puck.nether.net
[mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of Ivan
Sent: Thursday, August 09, 2012 10:35 PM
To: cisco-nsp@puck.nether.net
Subject: [c-nsp] ME3600X Embedded Packet Capture

Hi,

Has anyone used Embedded Packet Capture on the ME3600X successfully?  If so are 
their any gotchas to be weary of?

The only things that come up when I search for this is CSCtq11526 Embedded 
Packet Capture stops BFD neighbor adjacency, but have been unable to find 
details of what packets can be captured  - hardware v cpu etc.  Any 
documentation pointers would be appreciated.

Thanks

Ivan

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ME3600X Embedded Packet Capture

2012-08-10 Thread Ivan

Hi Waris,

I had come across that bug referring to EPC in "Release Notes for the 
Cisco ME 3800X and ME 3600X Switch" - 
http://www.cisco.com/en/US/docs/switches/metro/me3600x_3800x/software/release/15.1_2_ey/release/notes/ol25360.html 
and had hoped that the feature was available.  I wasn't able to find any 
other documentation thus my question to the list.


What I am really looking for is a possible way to verify any seen mac 
addresses on a customer EVC xconnect when running MPLS to the edge for 
troubleshooting.  This was quite easy and useful with a switched access 
layer.  I don't really want to xconnect on vlans and bridge to EVCs (not 
sure that is possible on the ME3600X platform)


Thanks

Ivan

On 10/Aug/2012 8:09 p.m., Waris Sagheer (waris) wrote:

Ivan,
Which packet capture you are referring to on ME3600X?
There is no support of embedded packet capture on ME3600X.

Regards,
Waris


-Original Message-
From: cisco-nsp-boun...@puck.nether.net 
[mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of Ivan
Sent: Thursday, August 09, 2012 10:35 PM
To: cisco-nsp@puck.nether.net
Subject: [c-nsp] ME3600X Embedded Packet Capture

Hi,

Has anyone used Embedded Packet Capture on the ME3600X successfully?  If so are 
their any gotchas to be weary of?

The only things that come up when I search for this is CSCtq11526 Embedded 
Packet Capture stops BFD neighbor adjacency, but have been unable to find 
details of what packets can be captured  - hardware v cpu etc.  Any 
documentation pointers would be appreciated.

Thanks

Ivan

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net 
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] ME3600X Embedded Packet Capture

2012-08-09 Thread Ivan
Hi,

Has anyone used Embedded Packet Capture on the ME3600X successfully?  If
so are their any gotchas to be weary of?

The only things that come up when I search for this is CSCtq11526 Embedded
Packet Capture stops BFD neighbor adjacency, but have been unable to find
details of what packets can be captured  - hardware v cpu etc.  Any
documentation pointers would be appreciated.

Thanks

Ivan

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] ME3600X IOS Version

2012-06-25 Thread Ivan

Hi,

I know the ME3600X has come up quite a lot recently on this list, but as 
far as I recall and can find, it has been a while since there have been 
any comments regarding the "best/most stable" version.


I am currently running 151-2.EY but will deploying some more hardware 
shortly and would be interested  what versions others are successfully 
using, especially 15.2S or 15.2S1.  151-2.EY has been good so far but I 
am aware of the rapid development on software for this platform and also 
that there are quite a few issues around.


Thanks

Ivan
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ip access list rfc1918 help please

2012-06-24 Thread Ivan

Hi

It is probably also worth looking at RFC5735 for other IP addresses that 
could be filtered.


Ivan

On 24/Jun/2012 10:37 a.m., Randy wrote:

--- On Sat, 6/23/12, Mike  wrote:


From: Mike 
Subject: [c-nsp] ip access list rfc1918 help please
To: "'Cisco-nsp'" 
Date: Saturday, June 23, 2012, 2:42 PM

Howdy,

 I am trying to filter out rfc1918
addresses as either source or destination addresses for my
pppoe connected subscribers. Each subscriber has a radius
item 'Filter-Id' with the name of a filter, with the
majority being 'customer_filter1', and it seems that
although this is in fact being applied to the virtual-access
interfaces per customer, it doesn't work as I expect since I
can clearly see traffic from customer -> rfc1918 address
space still being forwarded.

Here's a sample 'sh ip interface" showing the filter being
applied:


c7201-bras#sh ip interface virtual-access 190
Virtual-Access190 is up, line protocol is up
   Interface is unnumbered. Using address of Loopback0
(x.x.x.x)
   Broadcast address is 255.255.255.255
   Peer address is y.y.y.y
   MTU is 1492 bytes
   Helper address is not set
   Directed broadcast forwarding is disabled
   Outgoing access list is customer_filter1
   Inbound  access list is not set

etc, etc

Here is the filter itself:

ip access-list extended customer_filter1
  deny   ip host 0.0.0.0 any
  deny   ip 127.0.0.0 0.255.255.255 any
  deny   ip 192.0.2.0 0.0.0.255 any
  deny   ip 224.0.0.0 31.255.255.255 any
  deny   ip 10.0.0.0 0.255.255.255 any
  deny   ip 172.16.0.0 0.15.255.255 any
  deny   ip 192.168.0.0 0.0.255.255 any
  deny   ip any host 0.0.0.0
  deny   ip any 127.0.0.0 0.255.255.255
  deny   ip any 192.0.2.0 0.0.0.255
  deny   ip any 224.0.0.0 31.255.255.255
  deny   ip any 10.0.0.0 0.255.255.255
  deny   ip any 172.16.0.0 0.15.255.255
  deny   ip any 192.168.0.0 0.0.255.255
  permit ip any any

Any ideas?

Mike-



customer-TO-rfc1918 is INBOUND on virtual-access 190
You have an outbound acl applied. In that regard, I would say it is "working as 
expected".
./Randy

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/



___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Filtering Routes with Private AS Numbers in the AS Path

2012-03-23 Thread Ivan

Hi Nick,

Thanks very much for your thorough response and the time your put into 
testing things out.  I was contemplating taking this to my lab but was 
hoping there was some documentation or experiences from others that may 
have helped answer things first.


Your results are interesting - I did suspect option 2 would be better 
but didn't really have any idea of the numbers.  Saving time and 
processing cycles on BGP routes is always good.


Interesting to see just how may routes with private AS number in their 
paths are out there in the DFZ too.


Thanks

Ivan
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] Filtering Routes with Private AS Numbers in the AS Path

2012-03-20 Thread Ivan
Hi,

For filtering private as numbers (64512-65535) using an as-path
access-list there are a few options I have seen:

1). All in one line
ip as-path access-list 66 permit
_(6451[2-9]|645[2-9][0-9]|64[6-9][0-9][0-9]|65[0-4][0-9][0-9]|655[0-2][0-9]|6553[0-5])_

2). The above modified hopefully to be "better" in terms or regexp
processing but perhaps not readability
ip as-path access-list 66 permit
_6(4(5(1[2-9]|[2-9][0-9])|[6-9][0-9][0-9])|5([0-4][0-9][0-9]|5([0-2][0-9]|3[0-5])))_

3). Separate lines
ip as-path access-list 66 permit _6451[2-9]_
ip as-path access-list 66 permit _645[2-9][0-9]_
ip as-path access-list 66 permit _64[6-9][0-9][0-9]_
ip as-path access-list 66 permit _65[0-4][0-9][0-9]_
ip as-path access-list 66 permit _655[0-2][0-9]_
ip as-path access-list 66 permit _6553[0-5]_

I would appreciate any feedback as to which is the least CPU intensive and
if there is a better way to optimise 2 above.

Thanks

Ivan


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] QinQ Cisco 3750 ?

2012-01-07 Thread Ivan

Hi Oliver,

I think what you are wanting to do is called "selective QinQ".  For this 
you are looking at hardware such as ME3400 
(http://www.cisco.com/en/US/docs/switches/metro/me3400e/software/release/12.2_50_se/configuration/guide/swtunnel.html#wp1059629)


For port A you would end up with something like this on a ME3400

Switch(config)# interface gigabiethernet0/1
Switch(config-if)# switchport vlan mapping 500-600 dot1q-tunnel 100
Switch(config-if)# switchport vlan mapping 700-800 dot1q-tunnel 101
Switch(config-if)# switchport vlan mapping 900-1000 dot1q-tunnel 102
Switch(config-if)# switchport vlan mapping drop default
Switch(config-if)# exit

You can also do similar on the ES+ lincards and maybe even the 3750ME 
(probably limited to the ES ports..)


Ivan



On 8/Jan/2012 12:16 a.m., Olivier CALVANO wrote:

Hi

I am search a solution for this project:


Cisco 7301 connected to a Cisco 3750 "A"  by a Fiber Gig port. Port is in
trunk
  C7301<==>  C3750 port gig 0/24


The cisco 3750 "A" is connecter in trunk to a carrier by the Gig 0/23.

The carrier supply 4 ports:
 1 Central Port connected to C3750 "A"
 1 Port connected to C3750 "B"
 1 Port connected to C3750 "C"
 1 Port connected to C3750 "D"

And on each, he supply one vlan
   Vlan 100: From C3750"A" to Cisco 3750 "B"
   Vlan 101: From C3750"A" to Cisco 3750 "C"
   Vlan 102: From C3750"A" to Cisco 3750 "D"


I want use QinQ for:
  Cisco 7301 use vlan 500 to 600 for going on 3750 "B"
  Cisco 7301 use vlan 700 to 800 for going on 3750 "C"
  Cisco 7301 use vlan 900 to 1000 for going on 3750 "D"



Sample:

 C7301 ge0/1.500 =>  trunk =>  C3750 "A"<== Dot1q Tunnel into Vlan 100
==>  C3750 "B" =>  Trunk =>  C2821 ge1/1.500

 C7301 ge0/1.750 =>  trunk =>  C3750 "A"<== Dot1q Tunnel into Vlan 101
==>  C3750 "C" =>  Trunk =>  C1841 ge1/1.750

 C7301 ge0/1.950 =>  trunk =>  C3750 "A"<== Dot1q Tunnel into Vlan 102
==>  C3750 "D" =>  Trunk =>  C2811 ge1/1.950



It's possible ?

Thanks
Olivier
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] MPLS-Aware (Flexible) NetFlow

2011-12-01 Thread Ivan

Hi,

I am trying to get Netflow going on some ASR1004s running 
asr1000rp2-advipservicesk9.03.04.01.S.151-3.S1.bin.  I started off 
simple and did regular Netflow for IPv4 something like


ip flow-export version 9
ip flow-export destination x.x.x.x 5000

interface x
 ip flow ingress

This worked for IPv4 but gave me no stats for MPLS labelled traffic so I 
tried


ip flow-cache mpls label-positions 1 2

That didn't help at all.

I also wanted IPv6 Netflow and it seems that regular Netflow is not an 
option so I have now moved to "Flexible Netflow" - something like the 
following


flow exporter FE
 destination x.x.x.x
 transport udp 5000

flow monitor FM_IPv4
 record netflow ipv4 original-input
 exporter FE

flow monitor FM_IPv6
 record netflow ipv6 original-input
 exporter FE

interface x
 no ip flow ingress
 ip flow monitor FM_IPv4 input
 ipv6 flow monitor FM_IPv6 input

So far I seem to be good for IPv4 and IPv6 but still am missing stats 
for MPLS labelled packets.  Does anyone know if MPLS-Aware ingress 
Netflow is available in ASR1004/IOS-XE in either regular or Flexible 
flavour?  If anyone has a working example or can point to some doco that 
would be great.  From what I have seen I am suspecting that MPLS-Aware 
Netflow may only be available in egress using standard no flexible 
version???


Also an anyone confirm Flexible Netflow is the only way to get IPv6 flows?

Thanks

Ivan
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Central services VRF, how to

2011-11-23 Thread Ivan
A number of years ago I came across some limitations regarding the 
number of route targets that could be associated with a prefix.  I do 
not recall the details but one could imagine that there is some limit to 
the number or RTs (64 bits) that can be attached to a prefix (exported). 
 I have not been able to find any Cisco documentation but if indeed 
this is the case the solution you propose would only be possible up 
until a certain number of customer VRFs.


Googling found this good reference, although I thought the number I came 
across was much less - perhaps an older softwrae limitaion.


http://blog.ioshints.info/2011/05/scalability-of-common-services-mplsvpn.html

Cheers

Ivan

On 24/Nov/2011 9:35 a.m., Peter Rathlev wrote:

Before I make a complete fool of myself I thought I'd ask you nerds. :-)

I'm testing setting up a "central services" VRF that's supposed to
service 30-something other VRFs. The idea is of course to have all the
other VRFs be able to reach stuff within this VRF and vice versa.
Overlapping addressing is not a concern here.


From "school" (642-611) I learned that one would use different "hub" and

"spoke" route-targets, like described in RFC 4364 4.3.5. Something like
this:

ip vrf CustA
  rd 1:1
  route-target both 1:1!<-- "own" RT
  route-target import 2:1  !<-- import from "spoke" RT
  route-target export 2:2  !<-- export to "hub" RT
!
ip vrf CustB
  rd 1:2
  route-target both 1:2!<-- same as above...
  route-target import 2:1
  route-target export 2:2
!
ip vrf CS
  description Central Services
  rd 3:1
  route-target both 3:1
  route-target import 2:1  !<-- import from "hub" RT
  route-target export 2:2  !<-- export to "spoke" RT
!

What I don't like about this is that I'd have to configure each and
every PE in each of the "customer" VRFs. Why not just do like this:

ip vrf CustA
  rd 1:1
  route-target both 1:1!<-- Completely plain VRF
!
ip vrf CustB
  rd 1:2
  route-target both 1:2
!
ip vrf CS
  description Central Services
  rd 3:1
  route-target both 3:1
  route-target both 1:1!<-- Import&  export CustA
  route-target both 1:2!<-- Import&  export CustB
!

Any gotchas with this compared to the former? What am I missing that the
school book example would give me? AFAICT I would only need this
configuration on the PE devices actually hosting CS networks, since I
export directly to all the relevant VRFs.

This is very simplified. I would of course use an import map on the CS
VRF and also make sure that only the relevant prefixes are exported from
it. (The networks I'd like to "CS-ify" would be the only ones in that
VRF on that PE; external routes (default etc.) would come from another
PE that wouldn't have this configuration.)

I also tested exporting via a route-map, and though it seems to scale a
little better on account of not needing the "route-target export"
statements, I can find no functional differences.

Feel free to refer me to literature, "fine" or otherwise. :-)


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Unable to transmit tagged frames over q-in-q tunnel

2011-10-27 Thread Ivan

Hi,

It would be useful to see your PE configuration and have details of the 
hardware and OS versions.


I recently came across an issue like this when using ASR1001s as PEs. 
As far as I could tell the ASRs wouldn't match up a double tagged packet 
to an interface defined to match a single tag.  Eventually an IOS 
upgrade fixed this problem.  You can easily test by reconfiguring the PE 
interface to "encapsulation dot1Q xxx second‐dot1q any" then you may be 
able to pass the double tagged traffic but no longer the traffic in the 
native vlan (single SVID only).


asr1000rp1‐advipservicesk9.03.04.01.S.151‐3.S1.bin fixed the issue for 
me.  (I had trouble with 
asr1000rp1-advipservicesk9.03.03.01.S.151‐2.S1.bin and 
asr1001‐universalk9.03.02.00.S.151‐1.S.bin


Ivan

On 28/Oct/2011 5:28 a.m., Gökhan Gümüş wrote:

Dear folks,

I have an issue with one of our customer service.

 Gi0/5
Gi0/27
Gi5/13  Fa3/13
Customer SW  Customer Edge Switch-A PE1
--MPLS Core --PE 2--Customer Edge Switch-B
--Customer SW

I am using q-in-q tunneling to enable customer traffic. Before, customer
port on Customer SW facing our edge switch was in ACCESS mode and it was
working.
Now they have decided to configure this interface as a TRUNK to transmit
multiple VLANs over the trunk. But they can not.
Currently ports are configured as trunk and customer can only transmit
traffic when they do not tag frames ( native-vlan config )

For note, i am not using " vlan dot1q tag native " command which is also
double-tagging native vlans.
MTU is fine and above 1504 bytes.

Please see our configs on Customer Edge Switch below;


*Customer Edge Switch A;*

A#sh run interface Gigabit Ethernet0/5
Building configuration...

Current configuration : 337 bytes
!
interface GigabitEthernet0/5
  switchport access vlan 1106
  switchport mode dot1q-tunnel
  switchport nonegotiate
  load-interval 60
  speed 100
  duplex full
  l2protocol-tunnel cdp
  l2protocol-tunnel stp
  l2protocol-tunnel vtp
  no cdp enable
end

A#sh run interface GigabitEthernet0/27
Building configuration...

Current configuration : 251 bytes
!
interface GigabitEthernet0/27
  switchport trunk encapsulation dot1q
  switchport trunk allowed vlan 1,9,1101,1102,1106
  switchport mode trunk
  switchport nonegotiate
end

-

*Customer Edge Switch B;*

B#sh run interface fa3/13
Building configuration...

Current configuration : 366 bytes
!
interface FastEthernet3/13
  mtu 2000
  load-interval 60
  switchport
  switchport access vlan 1106
  switchport mode dot1q-tunnel
  switchport nonegotiate
  l2protocol-tunnel cdp
  l2protocol-tunnel stp
  l2protocol-tunnel vtp
  no cdp enable
  spanning-tree bpdufilter enable
end

B#sh run interface gi5/13
Building configuration...

Current configuration : 298 bytes
!
interface GigabitEthernet5/13
  mtu 2000
  load-interval 30
  speed nonegotiate
  switchport
  switchport trunk encapsulation dot1q
  switchport trunk allowed vlan 1101,1102,1106
  switchport mode trunk
  no cdp enable
end


Is there anybody who had such issue before?

Thanks and regards,
Gokhan Gumus
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

Re: [c-nsp] How to terminate 100.000 IPsec VPN clients?

2011-09-06 Thread Ivan Ivanov
Hi Florian,

Yeah, it is quite interesting! But on first look over the link maybe it does
not support RA IPsec tunnels or at least it is not stated. But on the other
hand the module is supported by IOS so I don't see a reason why it will not
support it.

If you don't forget share with us your findings as it seams that this
product is pretty new.

HTH,

On Tue, Sep 6, 2011 at 10:34, Florian Bauhaus
wrote:

> On 09/05/11 21:11, Ivan Ivanov wrote:
> > Hi,
> >
> > Did you check that? The target customers for that module are the mobile
> > operators but could fit your requirements.
> >
> >
> http://www.cisco.com/en/US/prod/collateral/wireless/wirelssw/ps10346/data_sheet_c78-532047.html-
>  Cisco
> > Wireless Security Gateway R2
> >
> > HTH,
> >
> > --
> > Best Regards!
> >
> > Ivan Ivanov
>
>
> That one actually seems pretty interesting. I'll have a deeper look into
> it.
>
>
> Best regards,
> Florian
> ___
> cisco-nsp mailing list  cisco-nsp@puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/
>



-- 
Best Regards!

Ivan Ivanov
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] How to terminate 100.000 IPsec VPN clients?

2011-09-05 Thread Ivan Ivanov
Hi,

Did you check that? The target customers for that module are the mobile
operators but could fit your requirements.

http://www.cisco.com/en/US/prod/collateral/wireless/wirelssw/ps10346/data_sheet_c78-532047.html
- Cisco
Wireless Security Gateway R2

HTH,



On Fri, Sep 2, 2011 at 16:55, Florian Bauhaus
wrote:

> Hello,
>
> What would be the best way to terminate 100k IPsec VPN clients?
>
> Use a 6500/7600 with appropriate modules? Put 10 ASA5580-20 in a rack?
> How to manage the whole thing?
> The clients won't make a lot of traffic so throughput isn't really a
> matter.
>
> I already got a few ideas on how to do this but I would like to know if
> someone else got experience with this and could help me out a bit.
>
>
> Best regards,
> Florian
> ___
> cisco-nsp mailing list  cisco-nsp@puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/
>



-- 
Best Regards!

Ivan Ivanov
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] 7600 RP Invalid Packet Drops

2011-05-05 Thread Ivan
TAC did confirm that we were encountering CSCte89940.  As is seems to 
only be an issue for ping traffic to the RP we will not be upgrading 
imeediately but waiting for the next upgrade cycle so I can't comment 
regarding the fixed software.


Thanks all (especially) Antonio for your help.

Cheers

Ivan

On 30/Apr/2011 10:07 p.m., Antonio Soares wrote:

My end customer was running the same release (122-33.SRD4) but they didn't
perform the upgrade since the issue was not affecting transit traffic. But
TAC said that the upgrade to 122-33.SRD5 would solve the problem.


Regards,

Antonio Soares, CCIE #18473 (R&S/SP)
amsoa...@netcabo.pt
http://www.ccie18473.net


-Original Message-----
From: Ivan [mailto:cisco-...@itpro.co.nz]
Sent: sábado, 30 de Abril de 2011 02:48
To: Antonio Soares; cisco-nsp
Subject: Re: [c-nsp] 7600 RP Invalid Packet Drops

Hi Antonio,

Thanks for the bug id.  I forgot to mention in my first post the 7600 in
question is running 12.2(33)SRD4.  The bud info indicates it should be
fixed in 12.2(33)SRD5.  Did you manage to upgrade your 7600 and fix the
issue successfully?

Cheers

Ivan

On 30/Apr/2011 12:54 p.m., Antonio Soares wrote:

I had this problem a few weeks ago. It was bug CSCte89940:

+++
IBC invalid packet drop on RSP 720
Symptoms While pinging 7600 with RSP 720 we see some drops. These drops

are

counted under show ibc under "Invalid pkts dropped" Conditions The issue

is

seen on RSP 720 with SRD image. Workaround SRC05 and SRB07 do not have

this

issue, nor it is present with SUP 720.
+++


Regards,

Antonio Soares, CCIE #18473 (R&S/SP)
amsoa...@netcabo.pt
http://www.ccie18473.net



-Original Message-
From: cisco-nsp-boun...@puck.nether.net
[mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of Ivan
Sent: sábado, 30 de Abril de 2011 01:24
To: cisco-nsp
Subject: [c-nsp] 7600 RP Invalid Packet Drops

I have a 7600 with a RSP720-3CXL-GE.  When pinging between the 7600 and
any other device (I have tried a few) I am loosing packets - usually
5/1 ish.

I have eventually been able to match the number of lost packets with a
counter from the output of "show ibc" which from my searching of the
archives "shows you the inband interface leading to the RP CPU".  The
counter is: Invalid pkts dropped: 306

Can anyone advise what this counter indicates?  Only seems to increment
with my ping traffic and not any customer traffic.  I have other similar
hardware but can not reproduce the issue :-(

The output

7600#show ibc
Interface information:
   Interface IBC0/0(idb 0x1C88ECE8)
   5 minute rx rate 1138000 bits/sec, 156 packets/sec
   5 minute tx rate 2305000 bits/sec, 306 packets/sec
   1529092452 packets input, 97618397184 bytes
   1480180863 broadcasts received
   1522436849 packets output, 93778000882 bytes
   15858294 broadcasts sent
   0 Bridge Packet loopback drops
   1415112685 Packets CEF Switched, 0 Packets Fast Switched
   0 Packets SLB Switched, 0 Packets CWAN Switched
   Label switched pkts dropped: 0Pkts dropped during dma: 0
   Invalid pkts dropped: 306Pkts dropped(not cwan consumed): 0
   Xconnect pkts processed: 29, dropped: 0
   Xconnect pkt reflection drops: 0
   Total paks copied for process level 29
   Total short paks sent in route cache 1346148563
   Total throttle drops 0Input queue drops 0
   total spd packets classified (50929199 low, 6698050 medium,
34521686 high)
   total spd packets dropped (0 low, 0 medium, 0 high)
   spd prio pkts allowed in due to selective throttling (0 med, 0
high)
   IBC resets   = 1; last at xxx 2010

Driver Level Counters: (Cumulative, Zeroed only at Reset)
 Frames  Bytes
 Rx(0)   878738849   2018480538
 Rx(1)   653772091   3242895654
 Tx(0)   1522436850  1746755712

Input Drop Frame Count
Rx0 = 0Rx1 = 0
Per Queue Receive Errors:
FRME   OFLW   BUFE   NOENP  DISCRD DISABLE BADCOUNT
Rx0 0  0  0  0  000
Rx1 0  0  0  0  000


 Tx Errors/State:
  One Collision Error   = 0More Collisions   = 0
  No Encap Error= 0Deferred Error= 0
  Loss Carrier Error= 0Late Collision Error  = 0
  Excessive Collisions  = 0Buffer Error  = 0
  Tx Freeze Count   = 0Tx Intrpt Serv timeout= 1

 Counters collected at Idb:
  Is input throttled= 0Throttle Count= 0
  Rx Resource Errors= 0Input Drops   = 306
  Input Errors   = 0
  Output Drops  = 0Giants/Runts  = 0/0
  Dma Mem Error = 0Input Overrun = 0

7600#sh

Re: [c-nsp] 7600 RP Invalid Packet Drops

2011-04-29 Thread Ivan

Hi Antonio,

Thanks for the bug id.  I forgot to mention in my first post the 7600 in 
question is running 12.2(33)SRD4.  The bud info indicates it should be 
fixed in 12.2(33)SRD5.  Did you manage to upgrade your 7600 and fix the 
issue successfully?


Cheers

Ivan

On 30/Apr/2011 12:54 p.m., Antonio Soares wrote:

I had this problem a few weeks ago. It was bug CSCte89940:

+++
IBC invalid packet drop on RSP 720
Symptoms While pinging 7600 with RSP 720 we see some drops. These drops are
counted under show ibc under "Invalid pkts dropped" Conditions The issue is
seen on RSP 720 with SRD image. Workaround SRC05 and SRB07 do not have this
issue, nor it is present with SUP 720.
+++


Regards,

Antonio Soares, CCIE #18473 (R&S/SP)
amsoa...@netcabo.pt
http://www.ccie18473.net



-Original Message-
From: cisco-nsp-boun...@puck.nether.net
[mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of Ivan
Sent: sábado, 30 de Abril de 2011 01:24
To: cisco-nsp
Subject: [c-nsp] 7600 RP Invalid Packet Drops

I have a 7600 with a RSP720-3CXL-GE.  When pinging between the 7600 and
any other device (I have tried a few) I am loosing packets - usually
5/1 ish.

I have eventually been able to match the number of lost packets with a
counter from the output of "show ibc" which from my searching of the
archives "shows you the inband interface leading to the RP CPU".  The
counter is: Invalid pkts dropped: 306

Can anyone advise what this counter indicates?  Only seems to increment
with my ping traffic and not any customer traffic.  I have other similar
hardware but can not reproduce the issue :-(

The output

7600#show ibc
Interface information:
  Interface IBC0/0(idb 0x1C88ECE8)
  5 minute rx rate 1138000 bits/sec, 156 packets/sec
  5 minute tx rate 2305000 bits/sec, 306 packets/sec
  1529092452 packets input, 97618397184 bytes
  1480180863 broadcasts received
  1522436849 packets output, 93778000882 bytes
  15858294 broadcasts sent
  0 Bridge Packet loopback drops
  1415112685 Packets CEF Switched, 0 Packets Fast Switched
  0 Packets SLB Switched, 0 Packets CWAN Switched
  Label switched pkts dropped: 0Pkts dropped during dma: 0
  Invalid pkts dropped: 306Pkts dropped(not cwan consumed): 0
  Xconnect pkts processed: 29, dropped: 0
  Xconnect pkt reflection drops: 0
  Total paks copied for process level 29
  Total short paks sent in route cache 1346148563
  Total throttle drops 0Input queue drops 0
  total spd packets classified (50929199 low, 6698050 medium,
34521686 high)
  total spd packets dropped (0 low, 0 medium, 0 high)
  spd prio pkts allowed in due to selective throttling (0 med, 0
high)
  IBC resets   = 1; last at xxx 2010

Driver Level Counters: (Cumulative, Zeroed only at Reset)
Frames  Bytes
Rx(0)   878738849   2018480538
Rx(1)   653772091   3242895654
Tx(0)   1522436850  1746755712

   Input Drop Frame Count
   Rx0 = 0Rx1 = 0
   Per Queue Receive Errors:
   FRME   OFLW   BUFE   NOENP  DISCRD DISABLE BADCOUNT
   Rx0 0  0  0  0  000
   Rx1 0  0  0  0  000


Tx Errors/State:
 One Collision Error   = 0More Collisions   = 0
 No Encap Error= 0Deferred Error= 0
 Loss Carrier Error= 0Late Collision Error  = 0
 Excessive Collisions  = 0Buffer Error  = 0
 Tx Freeze Count   = 0Tx Intrpt Serv timeout= 1

Counters collected at Idb:
 Is input throttled= 0Throttle Count= 0
 Rx Resource Errors= 0Input Drops   = 306
 Input Errors   = 0
 Output Drops  = 0Giants/Runts  = 0/0
 Dma Mem Error = 0Input Overrun = 0

7600#show platform hardware pfc mode
PFC operating mode : PFC3CXL

Cheers

Ivan
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] 7600 RP Invalid Packet Drops

2011-04-29 Thread Ivan
I have a 7600 with a RSP720-3CXL-GE.  When pinging between the 7600 and 
any other device (I have tried a few) I am loosing packets - usually 
5/1 ish.


I have eventually been able to match the number of lost packets with a 
counter from the output of "show ibc" which from my searching of the 
archives "shows you the inband interface leading to the RP CPU".  The 
counter is: Invalid pkts dropped: 306


Can anyone advise what this counter indicates?  Only seems to increment 
with my ping traffic and not any customer traffic.  I have other similar 
hardware but can not reproduce the issue :-(


The output

7600#show ibc
Interface information:
Interface IBC0/0(idb 0x1C88ECE8)
5 minute rx rate 1138000 bits/sec, 156 packets/sec
5 minute tx rate 2305000 bits/sec, 306 packets/sec
1529092452 packets input, 97618397184 bytes
1480180863 broadcasts received
1522436849 packets output, 93778000882 bytes
15858294 broadcasts sent
0 Bridge Packet loopback drops
1415112685 Packets CEF Switched, 0 Packets Fast Switched
0 Packets SLB Switched, 0 Packets CWAN Switched
Label switched pkts dropped: 0Pkts dropped during dma: 0
Invalid pkts dropped: 306Pkts dropped(not cwan consumed): 0
Xconnect pkts processed: 29, dropped: 0
Xconnect pkt reflection drops: 0
Total paks copied for process level 29
Total short paks sent in route cache 1346148563
Total throttle drops 0Input queue drops 0
total spd packets classified (50929199 low, 6698050 medium, 
34521686 high)

total spd packets dropped (0 low, 0 medium, 0 high)
spd prio pkts allowed in due to selective throttling (0 med, 0 
high)

IBC resets   = 1; last at xxx 2010

Driver Level Counters: (Cumulative, Zeroed only at Reset)
  Frames  Bytes
  Rx(0)   878738849   2018480538
  Rx(1)   653772091   3242895654
  Tx(0)   1522436850  1746755712

 Input Drop Frame Count
 Rx0 = 0Rx1 = 0
 Per Queue Receive Errors:
 FRME   OFLW   BUFE   NOENP  DISCRD DISABLE BADCOUNT
 Rx0 0  0  0  0  000
 Rx1 0  0  0  0  000


  Tx Errors/State:
   One Collision Error   = 0More Collisions   = 0
   No Encap Error= 0Deferred Error= 0
   Loss Carrier Error= 0Late Collision Error  = 0
   Excessive Collisions  = 0Buffer Error  = 0
   Tx Freeze Count   = 0Tx Intrpt Serv timeout= 1

  Counters collected at Idb:
   Is input throttled= 0Throttle Count= 0
   Rx Resource Errors= 0Input Drops   = 306
   Input Errors   = 0
   Output Drops  = 0Giants/Runts  = 0/0
   Dma Mem Error = 0Input Overrun = 0

7600#show platform hardware pfc mode
PFC operating mode : PFC3CXL

Cheers

Ivan
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] IP Header Checksum Errors

2011-02-14 Thread Ivan
Hi,

I have a 6509 running 12.2(18)SXF4.  I find a lot of the following errors
in the logs

%MLS_STAT-SP-4-IP_CSUM_ERR: IP checksum errors
%EARL_L3_ASIC-SP-3-INTR_WARN: EARL L3 ASIC: Non-fatal interrupt Packet
Parser block interrupt

>From what I read, these are informational
(http://www.cisco.com/en/US/products/hw/switches/ps700/products_tech_note09186a00801b42bf.shtml#EARL)

While as per the above I could disable the informational message I could
also try to locate and fix the problem.  I don't imagine SPAN will
actually SPAN packets with IP header checksum errors and even if it does
it seems it may be hard to get a sniffer that has an OS that will not also
discard the packets.  I was wondering if anyone had any ideas or
experience with this.

Also using ELAM
(http://cisco.cluepon.net/index.php/Using_capture_buffer_with_ELAM or
https://supportforums.cisco.com/message/3006679?tstart=-1) would be good. 
I am not sure if the filter can be set to packets with IP header checksum
errors either

Cheers

Ivan

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] VTP war stories (was Re: EoMPLS or VPLS loop prevention/storm control)

2011-02-09 Thread Ivan
It is not always as well known, but client mode will not prevent "usurping
the vtp domains"  This article covers things in a bit more detail -
http://www.networkworld.com/community/node/19931

Ivan

> I'd agree that vtp can cause major problems if not deployed with caution
> & mechanisms to mitigate disasters.  we have a huge lan infrastructure
> here with over 65,000 edge ports.  what we do is divide the
> campus/enterprise into 18 vtp domains so if there is a layer2 or vtp
> meltdown this doesn't affect all of campus; also the core switch (in
> this case 6509 w/sup720-3bxl) per vtp domain is the sole designated vtp
> "server" mode device (this is important) as well as the root bridge
> (fine-tune stp cost to do so); all others are in client mode or
> transparent.  for edge or distribution switches, it also important to
> change default "server" mode to client (or transparent) -- again this is
> important to avoid usurping the vtp domains. vtp comes in handy when
> dealing with large amount of ports and one doesn't want to hand
> configure vlan to port mapping manually; however as already mention all
> of this is not without risks.
>
> when our current network was deployed intially about 7 years ago, we had
> periodic spanning-tree meltdown per vtp domain, but never to all 18 vtp
> domain at the same time; root cause was typical offenders:
> * misbehaving gear that seized control as root bridge
> * dumb hub connecting multiple vlans
> * etc.
>
> over the years, cisco ios has had many vtp/stp/layer-2 bugs worked out;
> and I'd say one doesn't see as much issues in this area as was in the
> past; but caution is always a good thing.
>
>
> --
> Regards,
> Ge Moua
>
> Network Design Engineer
> University of Minnesota | OIT - NTS
> --
>
>
> On 2/9/11 4:28 PM, Paul Wozney wrote:
>> I've seen VTP fail spectacularly.
>>
>> A customer was using it on about 30 switches distributed to about 10-15
>> wiring closets.  They had a temp student come in who wanted to learn
>> about
>> networking, so the student copied the core switch configuration and
>> deployed
>> it on a lab switch.  The student decided to wipe the VLANs from this lab
>> switch and start from scratch.
>>
>> When the lab switch was connected to the production network, its VTP
>> instance had the correct VTP password (as it was copied from the core
>> switch), but it had none of the VLANs required for the correct operation
>> of
>> the network, and of course it had the higher revision number.
>>
>> It was an innocent mistake, but it ended up to be a very bad day for
>> everyone involved and we've never used VTP for any other customer since
>> that
>> day.
>>
>> ---
>> Paul Wozney
>> Network Consultant
>> phone: +1 604-629-9975
>> toll free: +1 866-748-0516
>> email: p...@wozney.ca
>> web: http://wozney.ca
>>
>>
>>
>> On Wed, Feb 9, 2011 at 14:10, Martin Barry  wrote:
>>
>>> $quoted_author = "Nick Hilliard" ;
>>>> Also, don't use VTP unless you like living dangerously.
>>> Nick, that sounds like you have a good war story or three. Care to
>>> share?
>>>
>>> Can't say I've blown anything up with VTP ... yet.  :-)
>>>
>>> cheers
>>> Marty
>>> ___
>>> cisco-nsp mailing list  cisco-nsp@puck.nether.net
>>> https://puck.nether.net/mailman/listinfo/cisco-nsp
>>> archive at http://puck.nether.net/pipermail/cisco-nsp/
>>>
>> ___
>> cisco-nsp mailing list  cisco-nsp@puck.nether.net
>> https://puck.nether.net/mailman/listinfo/cisco-nsp
>> archive at http://puck.nether.net/pipermail/cisco-nsp/
> ___
> cisco-nsp mailing list  cisco-nsp@puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/
>


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Mysterious tunnel interfaces

2010-08-11 Thread Ivan
> I was working on a ISR 1941 with 15.0(1)M2.  I am running DMVPN on it
> and using one tunnel interface.  (Tunnel 1).  No other tunnel
> interfaces are configured on the router.  However when I do "show int
> summary" I get this;
>
> #sh int summary
>
>  *: interface is up
>  IHQ: pkts in input hold queue IQD: pkts dropped from input queue
>  OHQ: pkts in output hold queueOQD: pkts dropped from output queue
>  RXBS: rx rate (bits/sec)  RXPS: rx rate (pkts/sec)
>  TXBS: tx rate (bits/sec)  TXPS: tx rate (pkts/sec)
>  TRTL: throttle count
>
>   Interface  IHQ   IQD  OHQ   OQD  RXBS RXPS  TXBS TXPS TRTL
> 
> * GigabitEthernet0/0   0 00 0  60005  600050
>   GigabitEthernet0/1   0 00 0 00 000
> * Serial0/0/0  0 00 0  30003  200020
>   NVI0 0 00 0 00 000
> * Tunnel0  0 00 0 00 000
> * Tunnel1  0 0010  10002  100020
> * Tunnel2  0 00 0 00 000
> * Tunnel3  0 00 0 00 000
>
> I thought may be something got left behind while I was monkeying
> around in it so I reloaded the router and the tunnel 0,2,3 are still
> there and it says it's up.   None of those interfaces are in the
> startup or running-config.
>
> What is going on here?  My other routers with similar config on a 1841
> with 12.4(15)T* doesn't have this issue.  It doesn't seem to be
> affecting the routing of traffic but it's really bothering me.
>
> -Jay

I have seen similar on ASRs.  From memory I think there were some of the
mystery tunnels and then quite a few more after enabling multicast.. 
Would be great to see an explaination though.

Cheers

Ivan

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] IPv6 ACL

2010-08-10 Thread Ivan
Can anyone confirm that IPv6 ACLs successfully match packets on upper
layer protocols (ULP) such as TCP even when the Hop-by-Hop EH (extension
header) is present?

I found some information regarding matching ULPs when the AH extension
header is present but have been unable to do the same for the Hop-by-Hop
EH. 
(http://www.cisco.com/en/US/docs/ios/ipv6/configuration/guide/ip6-sec_trfltr_fw.html#wp1072428)

Cheers

Ivan



___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Bundling ports on different WS6704 linecards

2010-08-09 Thread Ivan

On 9/Aug/2010 11:22 p.m., Phil Mayers wrote:

On 09/08/10 08:47, Rin wrote:

Hi group,



We are building a Core network of 3 7609 routers connecting as a 40Gbps
ring. On each router we have 4 WS6704 linecards. Each router will be
connected to other routers via 4 10G-links, these links will be
configured
as Port-Channel.



Should we place each link of the port-channel on different linecard on
each
router or should we allocate all 4 links on the same linecard? Anyone has
any problem with configuring etherchannel for ports on different WS6704
linecards?


We do that extensively. It works fine. It is better to have
cross-linecard portchannels in general.

HOWEVER - there are a couple of caveats to be aware of. One is if you've
got different linecards with different QoS queuing, you will need:

int PoX
no mls qos channel-consistency

Second is that there are some issues with cross-linecard portchannels if
you have service modules (ACE, FWSM, WiSM) in the chassis. I can't
remember the details or find the link at the moment.
___
cisco-nsp mailing list cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


I was bitten by the FWSM and DEC.  The link that was referred to is
probably http://www.cisco.com/en/US/ts/fn/610/fn61935.html

Field Notice: FN - 61935 - Catalyst 6500 Series and 7600 Series Service
Module Incompatibility With Distributed EtherChannel and Packet
Re-Circulation

"Problem Description
When the listed service modules transmit packets to VLANs also used with
Distributed EtherChannel (DEC), those packets may be dropped and lost.

Background

The listed service modules do not support packet re-circulation. Packet
re-circulation is a specific means to forward packets internal to the
chassis between modules. When the service module attempts to forward a
packet onto such a VLAN with packet-recirculation enabled, it may fail and
the packet might be lost. When packet re-circulation is not enabled on the
destination VLAN, even if DEC is present, this problem will not be
encountered."

We ended up getting rid of the DEC and using plain EC and "no monitor
session servicemodule" as the span sessions were required for other
purposes.
(http://www.cisco.com/en/US/products/hw/modules/ps2706/products_qanda_item09186a00801e9e26.shtml#q44)

Cheers

Ivan
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] 3750 and L3 service policies

2010-07-29 Thread Ivan
"The show policy-map interface command is not supported on 3750 and 3560
switches, even though it is allowed to be typed in the CLI."
(https://supportforums.cisco.com/message/545443#545443)

*It is possible to see some statistics using the following commands
clear mls qos interface statistics
show mls qos interface  statistics
but the output doesn't confirming marking occurring rather just details
the (DSCP) markings on traffic entering and leaving interfaces.

Ivan

> Hi,
>
> We had to deploy some L3 service policies on a WS-C3750E-24TD. After
> the config was put in place we could see it working on the interface,
> but according the the statistics on the input route-map - there was
> nothing matching at all.
> Is that expected? The switch runs only as a L2 switch, except for that
> single access list.
>
> software: 12.2(44)SE1
>
> class-map match-all CLASS_SLAP
>  match access-group name ACL_SLAP
>
> policy-map POLICY_SLAP
>  class CLASS_SLAP
>   police 8000 128000 exceed-action drop
>
> ip access-list extended ACL_SLAP
>  deny   tcp any eq www any
>  permit ip any any
>
> kind regards
> pshem
> ___
> cisco-nsp mailing list  cisco-nsp@puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/
>


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] Etherchannel load balancing catalyst 3560-E-24TS

2010-07-19 Thread Ivan Šimko
Hi all

I'd like to know if is possible to achieve equal load balancing on 3560-E-TS
switch.
Basically I got 2 switches interconneted with 2 FE ports. 200Mbps is
desirable throughput between themselves. IP routing enabled. CEF not
enabled.

port channel is L2 trunk dot1q.
I have 2 VRFs
VLAN 100 - SW1 customer VRF1
VLAN 200 - SW1 and SW2 interconnection between swithces for VRF1
VLAN 300 - SW2 customer VRF1

VLAN 400 - SW1 customer 2 VRF2
VLAN 500 - SW1 and SW2 interconnection between swtiches for VRF2
VLAN 600 - SW2 customer 2 VRF2

over SVIs is running 2 OSPF processes for VRFs.
Routing is fine.

My issue is as follow:
I can't achieve load balancing even I'm trying to setup src-ip, dst-ip etc.
cisco describes examples but on CCIE blog guy is saying use same config on
each end of etherchannel group otherwise won't work.
I've speculated with all possible combination (hope :) but no success.

Strange is that I'm using testers dedicated to generate traffic.
VRF1 has full 100Mbps duplex
VRF2 has follow:
SW 1 side tester1 : TX-100Mbps RX-100Mbps
SW 2 side tester2 : TX-100Mbps RX-50Mbps

Can You please explain me where is 50Mbps?
Hope these 50s are not in different VRF.

Thanks a lot
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Etherchannel load balancing

2010-06-24 Thread Ivan Šimko
Hi Billy

thanks a lot. Can you send me that doc? Link isn't working :-(

Regards

Ivan

On 24 June 2010 14:16, Billy Guthrie  wrote:

> When you configure an etherchannel bundle, the frames are distributed
> across the individual bundled links deterministically; however, the load is
> not balanced equally across all the links. You may or may not know, but the
> frames are forwarded on a specific link due to the hashing algorithm that is
> used. The algorithm can use destination IP address, source IP address, or a
> combination of both source and destination IP addresses, source and
> destination MAC addresses, or TCP and UDP port numbers. The hashing
> algorithm computes a binary pattern that selects a link number in a bundle
> to carry each frame.
>
> Document may or may not help:
>
> http://www.cisco.com/en/US/tech/tk389/tk213/technologies_tech_note09186a0080094714.shtm
>
>
> Good Luck
> Billy
>
>
> Ivan Šimko wrote:
>
>> Hi all
>>
>> I've got two switches 3560
>> group with 2xFE on both switches and inteconnected together.
>> port channel is L2
>> 2 VRFs - ivan, mark
>> 4 VLANs:
>> - vlan 100 VRF "ivan" for interconnection between swtiches
>> - vlan 11 VRF "ivan" for customer's connection
>>
>> - vlan 200 VRF"mark" for interconnection between switches
>> - vlan 12 VRF "mark" for customer's connection
>>
>> ports 12 and 13 as trunks
>> - interconnection between switches
>>
>> OSPF runs over SVIs of 100 and 200.
>>
>> I'm strugling with load balancing:
>> when I setup port channel load balancing dst-ip switch does correct
>> balancing between interconnected vlans but not for customers' vlans.
>> - vlan 100 would use port 12 - switch interconnection
>> - vlan 200 would use port 13 - switch interconnection
>> - vlan 11 would use port 13 - customer 1
>> - vlan 12 would use port 13 - customer 2
>>
>> when I setup port channel load balancing src-dst-ip switch does correct
>> balance for customers' vlans but not for interconnected vlans.
>> - vlan 100 would use port 13
>> - vlan 200 would use port 13
>> - vlan 11 would use port 12
>> - vlan 12 would use port 13
>>
>> Result is not full bandwidth used for both customers' traffic resp. only
>> 100
>> Mbps.
>>
>>
>> Any ideas how to sort it out?
>>
>> thanks
>> ___
>> cisco-nsp mailing list  cisco-nsp@puck.nether.net
>> https://puck.nether.net/mailman/listinfo/cisco-nsp
>> archive at http://puck.nether.net/pipermail/cisco-nsp/
>>
>>
>>
>
>
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

[c-nsp] Etherchannel load balancing

2010-06-24 Thread Ivan Šimko
Hi all

I've got two switches 3560
group with 2xFE on both switches and inteconnected together.
port channel is L2
2 VRFs - ivan, mark
4 VLANs:
- vlan 100 VRF "ivan" for interconnection between swtiches
- vlan 11 VRF "ivan" for customer's connection

- vlan 200 VRF"mark" for interconnection between switches
- vlan 12 VRF "mark" for customer's connection

ports 12 and 13 as trunks
- interconnection between switches

OSPF runs over SVIs of 100 and 200.

I'm strugling with load balancing:
when I setup port channel load balancing dst-ip switch does correct
balancing between interconnected vlans but not for customers' vlans.
- vlan 100 would use port 12 - switch interconnection
- vlan 200 would use port 13 - switch interconnection
- vlan 11 would use port 13 - customer 1
- vlan 12 would use port 13 - customer 2

when I setup port channel load balancing src-dst-ip switch does correct
balance for customers' vlans but not for interconnected vlans.
- vlan 100 would use port 13
- vlan 200 would use port 13
- vlan 11 would use port 12
- vlan 12 would use port 13

Result is not full bandwidth used for both customers' traffic resp. only 100
Mbps.


Any ideas how to sort it out?

thanks
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] Etherchannel plus OSPF in GNS3

2010-06-22 Thread Ivan Šimko
Hi all

I've got question for GNS experienced guys. In my attached topology I have
routers with etherchannel groups. Then 2 VRFs light and OSPF over SVI.
Purpose of the network is achieve load balancing on port-channels and load
balancing over OSPF also. Better understanding is here:

Router has got 2 Etherchannel groups
Router has got VRF with 2 VLANs
One VLAN is memmber of etherchannel group 1
Second VLAN memmber of group 2
Each group consists from 2 ports - I'm using two different links for
transmitting and want use them for higher throughput, that is the reason for
etherchannel group
OSPF for VRF
Both VLANs are memmber of same VRF.
Interconnections are VLANs /30.


Netwrok works pretty nice but only thing what I'm missing are counters on
physical FE ports and Port-channels what are still zero. Only ones updated
counters are SVIs.

OSPF does load balancing based on flow
Port channel is set up based on src-dst-ip - how to confirm??

I want prove that portchannel is using both ports in one direction only.
Counters should to help me  but nothing is incremented.

Used devices: 3640


Thanks for comments

Ivan
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

Re: [c-nsp] mst over etherchannel + QoS

2010-06-16 Thread Ivan Šimko
hmmm :-(

thanks a lot

On 16 June 2010 14:35, Pavel Skovajsa  wrote:

> Hello Ivan,
>
> no currently it is not possible to simulate (proper term is actually
> emulate) anything else "above" PVST+, as the only switch oriented card
> in dynamips is NM-16ESW - which only supports PVST+.
>
> Due to the proprietary hardware used in switches, I don't think you
> will find any other emulator that does this (not speaking about the
> fact that AFAIK there is no other cisco emulator then dynamips).
>
> -pavel
>
>
> On Wed, Jun 16, 2010 at 2:44 PM, Ivan Šimko  wrote:
> > Hi all
> >
> > I'd like to ask You if is possible simulate network in GNS for
> etherchannel
> > with mst and QoS. If not please can You recommned any simulator for?
> >
> > Thanks a lot
> >
> > Ivan
> > ___
> > cisco-nsp mailing list  cisco-nsp@puck.nether.net
> > https://puck.nether.net/mailman/listinfo/cisco-nsp
> > archive at http://puck.nether.net/pipermail/cisco-nsp/
> >
>
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

[c-nsp] mst over etherchannel + QoS

2010-06-16 Thread Ivan Šimko
Hi all

I'd like to ask You if is possible simulate network in GNS for etherchannel
with mst and QoS. If not please can You recommned any simulator for?

Thanks a lot

Ivan
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Leaking VRF routes

2010-05-18 Thread Ivan Ivanov
Hello Dave,

Please check and try this link:
http://www.cisco.com/en/US/tech/tk436/tk832/technologies_configuration_example09186a0080231a3e.shtml

Maybe it will save you the BGP configuration :)

Regards,

On Tue, May 18, 2010 at 6:46 AM, Dave Weis wrote:

>
> Hello
>
> I am doing VRF lite on a 7200 to place PPPoA/PPPoE users into a VRF. My end
> of the PPP link terminates to a loopback in the customer's VRF and assigning
> the far end of the PPP link a routable IP address but still inside the VRF.
> It's all working well.
>
> What I want to accomplish it to make that far end routable IP reachable
> either from the global table or a separate IP range for traffic graphing and
> ping testing. This monitoring segment needs to be able to reach any customer
> VRF as well as being globally routable. I am assigning the far end routers
> unique routable IP's so there is no overlap.
>
> We work around this on Ethernet and T1 customers by using a separate
> management VLAN or DLCI but we are limited to a single PVC on the DSL side.
>
> Any advice?
>
> Thanks
> Dave
>
>
> ___
> cisco-nsp mailing list  cisco-nsp@puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/
>



-- 
Best Regards!

Ivan Ivanov
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] ASA 8.3

2010-05-12 Thread Ivan

Hi All,

Shortly I will be deploying some new ASAs and came across the 8.3 
release.  I didn't expect that a minor release would have quite so many 
fundamental changes.  Without looking at the release notes, migration 
notes 
(http://www.cisco.com/en/US/docs/security/asa/asa83/upgrading/migrating.html) 
and various blogs etc on the Internet I would have expected things to be 
not too different than 8.2 which I have used recently.


I would appreciate any feedback from those who have deployed 8.3 as a 
new install or migration.  I will eventually have to decide if it is 
better to stick with the known 8.2 or the new 8.3 (new features and new 
bugs) to save the pain of an update later.


Ivan


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] Dropping tcp session due to Invalid Flags

2010-04-30 Thread Ivan Poddubnyy

All,

I've recently migrated my Cisco 2821 routers to 15.1T.

It works good except one thing. For some connections I get messages like 
this:


Apr 29 13:29:57 10.0.143.254 11979: rtr02.tu: [sys...@9 s_sn="11979" 
s_id="rtr02.dc3:514" s_tc="3542767" s_dc="0"]: 011979: Apr 29 
14:29:56.363 MDT: %FW-6-DROP_PKT: Dropping tcp session 
143.127.138.33:8085 143.127.138.34:179 on zone-pair zp-out-self class 
cls_permitbpg due to  Invalid Flags with ip ident 0


In this 143.127.138.34 is my router and 143.127.138.33 an upstream 
router and BGP neighbor.


In this particular case BGP is up, I should mention.

I do see those messages for other connections, too, not related to BGP. 
I'm running ZBF.


Here are the related parts of config.

-
...
class-map type inspect match-all cls_permitbpg
 match access-group name acl_permitbgp
...
policy-map type inspect pol-permit
 class type inspect cls_encrypt
  pass log
 class type inspect cls_permittoself
  inspect
 class type inspect cls_permitbpg
  inspect
 class type inspect cls_denytoself
  pass log
 class class-default
  drop log
...
zone-pair security zp-out-self source out-zone destination self
 service-policy type inspect pol-permit
...
ip access-list extended acl_permitbgp
 permit tcp host 143.127.138.33 eq bgp host 143.127.138.34
 permit tcp host 143.127.138.33 host 143.127.138.34 eq bgp
---

Note about this config: I don't see matches against first rule (odd in 
case of BGP), I do see matches against second rule and those packets are 
logged as being dropped (odd!). BGP is up (according to 'show ip bgp').


I have another example with a different set of ports.

Any help is appreciated!

Thank you!

--
Ivan Poddubnyy
Sr. Systems Administrator
Symantec Corporation / EHG
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] IOS 15.1 and 'inspect' rule (zone-based firewall)

2010-04-22 Thread Ivan Poddubnyy

Arie,

No, it didn't work as expected.

However, I got it working by adding another class-map and modifying 
existing class-map.


Here how it looks now:
--
...
parameter-map type inspect audit
 audit-trail on
 alert off
...
class-map type inspect match-any cls_ip_protocols
 match protocol icmp
 match_protocol tcp
 match protocol udp
class-map type inspect match-all cls_10.0.128.0
 match access-group name acl_10.0.128.0
 match class-map cls_ip_protocols
...
policy-map type inspect pol-OutsideToDMZ
 class type inspect cls_10.0.128.0
  inspect audit
 class class-default
  drop log
...
ip access-list extended acl_10.0.128.0
 permit ip 10.0.128.0 0.0.15.255 10.0.80.0 0.0.0.255
...
--

The new class-map fixes it.

BTW, what Brian suggested in his reply partially answered the question. 
I read the document, but there's an example there that has only ACL 
applied to the policy-map (thus, like in my case, it'll generate "all 
packets will be dropped" message). I'm talking about the example after 
this line in the document:


"By contrast, a similar configuration that adds application-specific 
classes provides more granular application statistics and control, and 
still accommodates the same breadth of services that was shown in the 
first example by defining the last-chance class-map matching only the 
ACL as the last chance in the policy-map:"


Anyways, the problem seems to be resolved. Thank you!

--
Ivan Poddubnyy
Sr. Systems Administrator
Symantec Corporation / EHG


Arie Vayner (avayner) wrote:

Ivan,

I could find a reference with this information:

The reported error message is just seen upon bootup. Reason for this is
router loads the config from top to bottom. Therefore, by the time it
executes the class-map, it has not read the ACL yet. Therefore giving
warning that there's "No specific protocol of access-group configured on
the class"

Can you confirm that the router works as expected after the complete
bootup process?

Tnx
Arie

-Original Message-
From: cisco-nsp-boun...@puck.nether.net
[mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of Ivan Poddubnyy
Sent: Thursday, April 22, 2010 07:30
To: Cisco-nsp
Subject: [c-nsp] IOS 15.1 and 'inspect' rule (zone-based firewall)

Hi all,

I couldn't find explanation to this oddity on TAC, I would appreciate
some help.

I'm running (migrating to) 15.1 on Cisco 2821 router. The router
configured with zone-based firewall.

The config has following lines:

--
...
parameter-map type inspect audit
audit-trail on
alert off
...
class-map type inspect match-all cls_10.0.128.0
match access-group name acl_10.0.128.0
...
policy-map type inspect pol-OutsideToDMZ
class type inspect cls_10.0.128.0
inspect audit
class class-default
drop log
...
ip access-list extended acl_10.0.128.0
permit ip 10.0.128.0 0.0.15.255 10.0.80.0 0.0.0.255
...
--

The way I'm reading it is that class-map is configured with named ACL.
Then the class-map is applied to policy-map with action 'inspect'.
There's no protocol specified thus all protocols should be inspected
(this is what I want).

Here is the problem. When router is booting up the following message
appears on the console:

%No specific protocol or access-group configured in class cls_10.0.128.0

for inspection. All packets will be dropped


IMO this is not correct: there's ACL configured in class-map.

Before (in 12.4) this message was different -- it was about "no
protocols specified, all protocols will be inspected".

Has something changed in the way ZBF behaves in 15.x? And is it
documented anywhere? I was not able to find the information.

Any help is appreciated! Thank you!

--
Ivan Poddubnyy
Sr. Systems Administrator
Symantec Corporation / EHG
___
cisco-nsp mailing list cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] IOS 15.1 and 'inspect' rule (zone-based firewall)

2010-04-21 Thread Ivan Poddubnyy

Hi all,

I couldn't find explanation to this oddity on TAC, I would appreciate 
some help.


I'm running (migrating to) 15.1 on Cisco 2821 router. The router 
configured with zone-based firewall.


The config has following lines:

--
...
parameter-map type inspect audit
 audit-trail on
 alert off
...
class-map type inspect match-all cls_10.0.128.0
 match access-group name acl_10.0.128.0
...
policy-map type inspect pol-OutsideToDMZ
 class type inspect cls_10.0.128.0
  inspect audit
 class class-default
  drop log
...
ip access-list extended acl_10.0.128.0
 permit ip 10.0.128.0 0.0.15.255 10.0.80.0 0.0.0.255
...
--

The way I'm reading it is that class-map is configured with named ACL. 
Then the class-map is applied to policy-map with action 'inspect'. 
There's no protocol specified thus all protocols should be inspected 
(this is what I want).


Here is the problem. When router is booting up the following message 
appears on the console:


%No specific protocol or access-group configured in class cls_10.0.128.0 
for inspection. All packets will be dropped



IMO this is not correct: there's ACL configured in class-map.

Before (in 12.4) this message was different -- it was about "no 
protocols specified, all protocols will be inspected".


Has something changed in the way ZBF behaves in 15.x? And is it 
documented anywhere? I was not able to find the information.


Any help is appreciated! Thank you!

--
Ivan Poddubnyy
Sr. Systems Administrator
Symantec Corporation / EHG
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Load-sharing with two links to the same ISP

2010-02-05 Thread Ivan Pepelnjak
This might help:

http://www.nil.com/ipcorner/LoadBalancingBGP/

Ivan Pepelnjak
blog.ioshints.info / www.ioshints.info

> -Original Message-
> From: Matthew Melbourne [mailto:m...@melbourne.org.uk]
> Sent: Friday, February 05, 2010 12:33 PM
> To: cisco-nsp@puck.nether.net
> Subject: [c-nsp] Load-sharing with two links to the same ISP
> 
> Hi,
> 
> What techniques are available to load-share traffic on two links (of
> equal bandwidth) to the same ISP  (same AS) given that BGP only enters
> the best path into the RIB? We could announce our prefixes over both
> links, but splitting the preferred path announcements over the two
> links, either using MED or ISP communities, but this only really
> addresses inbound traffic. More of an issue is trying to load-share
> outbound traffic; we assume we'll learn the same set of prefixes over
> both links from the same ISP - one technique may be to simple split
> the IPv4 address space in half and local-pref accordingly to prefer
> one link or the other depending on the destination IP prefix?
> 
> Cheers,
> 
> Matt
> 
> --
> Matthew Melbourne



___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] MPLS VPN Running BGP w/ failover IPSec VPN Over Internet

2010-01-27 Thread Ivan Pepelnjak
OK, it looks like I've over-engineered the solution ;)

The best solution (if you can make it work) would be to run BGP over the backup 
links and use BGP attributes to make backup links a less desirable BGP path.

Running OSPF on backup links and BGP on MPLS VPN can be made to work ... 
barely. I did a workshop once using almost exactly the same network. Each site 
was fully redundant with two routers, one connected to Internet, the other one 
to MPLS VPN network. I was able to make it work after a lot of tweaking and 
two-way redistribution, but I'm not sure anyone in the audience got all the 
details ;) 

Your situation might be easier as you're using default routing from the central 
site, but do try to go for "BGP everywhere".

Ivan Pepelnjak
blog.ioshints.info / www.ioshints.info


> -Original Message-
> From: Jason LeBlanc [mailto:jasonlebl...@gmail.com]
> Sent: Wednesday, January 27, 2010 11:12 PM
> To: Ivan Pepelnjak
> Cc: 'Luan Nguyen'; 'Cisco-nsp'
> Subject: Re: [c-nsp] MPLS VPN Running BGP w/ failover IPSec VPN Over
> Internet
> 
> Exactly.  This is a secondary form of calling back home if the MPLS Link
> or BGP breaks.  We have static routes at the remote site pointing traffic
> over the IPSEC tunnel if it fails.  If MPLS is lost we want the remote
> campus to be able to communicate with the main datacenter which is also
> where the main MPLS router exists.  We currently have a VPN devices at the
> Datacenter that runs OSPF on the home end.
> 
> 
> 
> MPLS Router 7200--->  {AT&T MPLS Cloud} -->
> 
> /
> \
> Core 6500 --> Distribution Router 6500 --
> -- Campus Router Cisco or Juniper SSG
> 
> \
> /
> 
> Site to site VPN Juniper ISG-1000 --> {ISP IPSEC VPN}>
> 
> 
> 
> 
> On Jan 27, 2010, at 11:22 AM, Ivan Pepelnjak wrote:
> 
> > Jason, are you trying to solve only the remote site problem? Is the main
> campus receiving specific routes for each remote site through the MPLS VPN
> cloud?
> >
> >> -Original Message-
> >> From: Jason LeBlanc [mailto:jasonlebl...@gmail.com]
> >> Sent: Wednesday, January 27, 2010 1:48 AM
> >> To: Luan Nguyen
> >> Cc: 'Cisco-nsp'
> >> Subject: Re: [c-nsp] MPLS VPN Running BGP w/ failover IPSec VPN Over
> >> Internet
> >>
> >> Current topology is pretty simple.  AT&T drops an MPLS circuit either
> PPP
> >> Multilink Bundled T1's or an Ethernet hand off.  On another interface
> we
> >> generally have an ethernet hand off from another ISP.  We run BGP to
> move
> >> all the traffic around on one 172.x.x.x/30's and then our LAN is on
> >> 10.x.x.x.  We have an outside IP address on another ethernet port which
> is
> >> the IPSEC termination point.  BGP from our main campus injects a
> default
> >> route which we receive.  Currently we just manually added static
> 0.0.0.0
> >> routes out the tunnel interfaces with a metric of 32000.  So when BGP
> >> drops off we will route over the IPSEC VPN Tunnel back home.
> >>
> >> Headquarters 172.1.1.1/30 --> ATTMPLS 172.1.1.2/30 -->
> >>
> >> ATTMPLS 172.2.2.1/30 --> Remote Campus 172.2.2.2/30 (running BGP) -->
> >> 10.1.1.1/24
> >>
> >> ISP-X Ethernet 200.1.1.1/30 --> Remote Campus 200.1.1.2/30 --> IPSEC
> VPN
> >> Tunnel.1 10.1.1.20/24 --> Headquarters Tunnel.1 10.1.1.21/24
> >>
> >> BGP Provides default route
> >> Static 0.0.0.0 0.0.0.0 Tunel.1 Metric 32000
> >>
> >> It is my assumption that if the traffic cant get to its destination
> >> because BGP has lost it our backup link the IPSEC VPN with the higher
> >> metric will become the new default route.
> >


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ip sla echo vrf with df-bit set?

2010-01-27 Thread Ivan Pepelnjak
Just guessing: Local policy routing that sets DF bit on ICMP ECHO traffic 
between two known IP addresses with the "set ip df 1" command within the 
route-map.

Let me know if it works ;)

Ivan Pepelnjak
blog.ioshints.info / www.ioshints.info

> -Original Message-
> From: Christopher Hunt [mailto:dharmach...@gmail.com]
> Sent: Thursday, January 28, 2010 12:05 AM
> To: cisco-nsp@puck.nether.net
> Subject: [c-nsp] ip sla echo vrf with df-bit set?
> 
> I'm trying to setup a mechanism for ensuring end-to-end MTU in our L3 MPLS
> VPN network.  I'd like to use ip sla tracking to do so and I have setup a
> monitor:
> 
> ip sla monitor 99
>  type echo protocol ipIcmpEcho x.x.x.x
>  request-data-size 1500
>  vrf XYZ
> 
> Unfortunately, I cannot find any way to set the DF bit using "ip sla
> monitor".  Anyone know if it's available anywhere or coming soon?  Can
> anyone else think of another strategy?  I'm currently running 12.4(22)T on
> a
> series of 7200VXRs.
> 
> Cheer,
> Christopher Hunt


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] MPLS VPN Running BGP w/ failover IPSec VPN Over Internet

2010-01-27 Thread Ivan Pepelnjak
Gert,

If I understood the original question correctly, he's an MPLS VPN customer 
running BGP with his Service Provider. Unless I'm mistaken, it's somewhat hard 
to run IGP on top of that, unless you build GRE or DMVPN tunnels over MPLS VPN 
first.

Ivan

> This is why I suggested to make this much more simple - treat all links,
> IPSEC and MPLS, as "AS internal" links, run an IGP over them, and let
> protocols handle end-to-end keepalive and failover that are built to do
> this.  One can do this with BGP, of course, but it tends to be less
> convenient/helpful in these scenarios.
> 
> gert

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] MPLS VPN Running BGP w/ failover IPSec VPN Over Internet

2010-01-26 Thread Ivan Pepelnjak
* Configure EBGP sessions over IPSec between remote sites and central site.
* On remote sites use EEM to detect MPLS VPN EBGP neighbor loss (either default 
route is gone or you might rely on SNMP traps)
* When the MPLS VPN EBGP neighbor is down, enable IPSec tunnel. Only then will 
the EBGP session be established and you'll get more specific routes over IPSec.

This will ensure that the IPSec tunnel on remote sites is operational only when 
the connectivity with the MPLS VPN cloud is gone and so the central site uses 
default route into MPLS VPN cloud unless it has a more specific one over IPSec 
due to failure at one of the remote sites.

Note: You might want to use something else to detect MPLS VPN failure, for 
example IP SLA between remote router and central router. This will detect a 
failure anywhere in the end-to-end path.

Ivan Pepelnjak
blog.ioshints.info / www.ioshints.info

> -Original Message-
> From: Jason LeBlanc [mailto:jasonlebl...@gmail.com]
> Sent: Tuesday, January 26, 2010 10:20 PM
> To: Cisco-nsp
> Subject: [c-nsp] MPLS VPN Running BGP w/ failover IPSec VPN Over Internet
> 
> Team,
> 
> This questions was put out there before in another chain but I wasn't able
> to figure out the best solution.  We have multiple campuses connecting to
> an MPLS VPN cloud running BGP internally.  At some locations we have
> backup ISP services and an IPSec VPN tunnel over that.  Currently BGP
> provides a default route to each campus as external BGP / Pref 40 / Metric
> 0.  Our backup IPSec is in as a Static / Pref 20 / Metric 32000.  When we
> lose BGP/MPLS VPN we want the IPSec tunnel to begin routing traffic
> between the campus and our main datacenter.  What is the best way to
> achieve this?
> 
> Thanks,
> 
> //LeBlanc
> 
> 
> 


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] CPE with tracking redundancy and long lived (UDP) nat sessions

2010-01-25 Thread Ivan Pepelnjak
Just did a few tests with 12.4(24)T. IOS NAT is extra stupid when it comes to 
clearing NAT translation table. Even though you have NAT rules tied to an 
interface ("ip nat inside ... interface") they are not cleared when the 
interface IP address is lost or when the interface is shut down.

So (I guess) the best you can do is to catch changes in tracked object's state 
with an EEM applet that clears all NAT translations.

Ivan Pepelnjak
blog.ioshints.info / www.ioshints.info

> So what is the bottom line? Is this the best that can be done with
> simple end site redundancy with object tracking and without dynamic
> routing?

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] CPE with tracking redundancy and long lived (UDP) nat sessions

2010-01-25 Thread Ivan Pepelnjak
> The problem is that the session stays active. I want the session to be
> lost. I believe the rules should be adhered to a bit more strictly.

The session DOES NOT stay active. The phone is stupid. It should have realized 
there's no reply and restart the session.

> If the current matching nat statement would result in a different value
> for the inside global address, than a new translation should be called
> for.
> 
> It isnt actually all that hard to check for, conceptually.

And then you'd complain about the CPU load. What do you think is cheaper: 
checking the NAT table or NAT rules (including route maps) for every packet?

> (What would you expect to happen when the DHCP client address changes on
> the egress interface? Or if you change the ip address on an interface
> referenced by the ip nat statement?)

You'd lose all sessions, obviously. What else would you expect?

> Apparently, the end stations dont change the source port for new
> attempts. 

Proves my point. The phone is stupid ;) There's a reason every new client 
session should use a new dynamic port number.

> This behavior has very disruptive end user symptoms.

Many stupid implementations have disruptive end-user symptoms. Microsoft 
Network Load Balancing with unknown unicast MAC addresses immediately comes to 
mind ;)

Ivan Pepelnjak
blog.ioshints.info / www.ioshints.info


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] CPE with tracking redundancy and long lived (UDP) nat sessions

2010-01-24 Thread Ivan Pepelnjak
> After the routing and egress changes, the router should be well aware
> that continued traffic no longer matches the
> 
> ip nat inside source route-map ISPA Di1 overload
> 
> and now matches the
> 
> ip nat inside source route-map ISPB Di2 overload
> 
> for a simplistic example.
> 
> So the old translations are no longer valid with the new egress. They
> should be abandoned and new ones created.

Obviously the router does NOT check the "ip nat" rules if it gets a match in 
the NAT translation table. This behavior makes sense; if you'd change the NAT 
parameters of a live session, you'd lose the session anyway.

> And I would be quite happy clearing just the translations for the
> "wrong" global for all local inside translations, but syntax does not
> seem to allow that.

Write a Tcl script that does "show ip nat translations" and kills only the 
relevant ones ;)

Ivan Pepelnjak
blog.ioshints.info / www.ioshints.info




___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


  1   2   3   >