Can you try getting into enable 10 level and from there to try enable ? If
not, I guess you'll have to get physical access to the box and fix it through
console.
Ziv
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Lu Wen-yan
Sent: Friday, June 27,
Rogelio wrote:
For a campus environment, I've got two WAN connections, one through
Charter (30Mbps) and one through ATT (50 Mbps). For load balancing, I
am evaluating whether or not to use BGP or some sort of load sharing
device, like PepLink.
With BGP, I am told that my ATT pipe may get
HI,
I would like to know how to telnet FROM a CLI session on the PIX.
After logging into a CLI session on the PIX, the need arises that I
sometimes telnet to another device from the PIX. I dont seem to find the
command for doing so on the PIX.
Please let me know.
Regards,
Felix
It is disabled as a security feature. I have also wanted to do the same for
troubleshooting purposes.
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Felix Nkansah
Sent: Monday, June 30, 2008 6:11 PM
To: cisco-nsp@puck.nether.net
Subject: [c-nsp] Telnet
Hi,
Is there some way to disable/work-around RSVPs split horizon checks?
Currently it will log messages like this when receiving path requests on
the same interface it needs to forward out of:
RSVP: can't forward Path out received interface
This could be fixed in the topology, but I'm
Sam Stickland wrote on Monday, June 30, 2008 12:48 PM:
Hi,
Is there some way to disable/work-around RSVPs split horizon checks?
Currently it will log messages like this when receiving path requests
on the same interface it needs to forward out of:
RSVP: can't forward Path out received
Daniel Hooper wrote:
Hi,
I'm currently using Cacti to graph my interfaces, this doesn't seem to
be real time enough.
What are others using for graphing and data collection?
I was playing around with the realtime plugin for Cacti this morning,
comparing the graphs taken with 5 second polling
Oliver Boehmer (oboehmer) wrote:
Sam Stickland wrote on Monday, June 30, 2008 12:48 PM:
Hi,
Is there some way to disable/work-around RSVPs split horizon checks?
Currently it will log messages like this when receiving path requests
on the same interface it needs to forward out of:
RSVP:
On Mon, Jun 30, 2008 at 06:30:59PM +0800, Aaron R wrote:
It is disabled as a security feature. I have also wanted to do the same for
troubleshooting purposes.
And why exactly is this a security feature? What is the *gain* in security?
Ciao
Joerg
--
Joerg Mayer
Oliver Boehmer (oboehmer) wrote:
Sam Stickland wrote on Monday, June 30, 2008 12:48 PM:
Hi,
Is there some way to disable/work-around RSVPs split horizon checks?
Currently it will log messages like this when receiving path requests
on the same interface it needs to forward out of:
RSVP:
Felix Nkansah wrote:
HI,
I would like to know how to telnet FROM a CLI session on the PIX.
After logging into a CLI session on the PIX, the need arises that I
sometimes telnet to another device from the PIX. I dont seem to find the
command for doing so on the PIX
Along with being able to
Sam Stickland mailto:[EMAIL PROTECTED] wrote on Monday,
June 30, 2008 2:21 PM:
Oliver Boehmer (oboehmer) wrote:
Sam Stickland wrote on Monday, June 30, 2008 12:48 PM:
Hi,
Is there some way to disable/work-around RSVPs split horizon checks?
Currently it will log messages like this when
I guess it's more as a working right educational purpose, so you won't use
your firewall as a debugging client.
In newer versions there's the packet tracker that can help you debug
connectivity problems.
Ziv
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf
[EMAIL PROTECTED] mailto:[EMAIL PROTECTED] wrote on Monday,
June 30, 2008 2:55 PM:
Hi Oliver,
Question is very specific to issue in ethernet connection between R1
and laptop and comparing recovery time under this failure in VPLS,
L3MPLS
VPN and pure L3 routing.
That is, how VPLS will
Tks Oliver,
assuming there is no STP delay (portfast/etc.) this should be rather
quick
That is as I see it should work for VPLS. But crazily, it is taking 19
to 20 seconds, even though portfast is enabled.
Any clue?
-Original Message-
From: ext Oliver Boehmer (oboehmer) [mailto:[EMAIL
[EMAIL PROTECTED] mailto:[EMAIL PROTECTED] wrote on Monday,
June 30, 2008 4:24 PM:
Tks Oliver,
assuming there is no STP delay (portfast/etc.) this should be
rather quick
That is as I see it should work for VPLS. But crazily, it is taking 19
to 20 seconds, even though portfast is
On Mon, Jun 30, 2008 at 01:24:26PM +0100, Sam Stickland wrote:
After logging into a CLI session on the PIX, the need arises that I
sometimes telnet to another device from the PIX. I dont seem to find the
command for doing so on the PIX
Along with being able to scroll backwards in the config
The original message was received at Mon, 30 Jun 2008 18:09:20 +0200
from greenie.muc.de [168.218.142.88]
- The following addresses had permanent fatal errors -
cisco-nsp@puck.nether.net
___
cisco-nsp mailing list cisco-nsp@puck.nether.net
The original message was received at Mon, 30 Jun 2008 18:09:20 +0200
from greenie.muc.de [168.218.142.88]
- The following addresses had permanent fatal errors -
cisco-nsp@puck.nether.net
___
cisco-nsp mailing list cisco-nsp@puck.nether.net
Hi,
On Mon, Jun 30, 2008 at 06:09:20PM +0200, [EMAIL PROTECTED] wrote:
The original message was received at Mon, 30 Jun 2008 18:09:20 +0200
from greenie.muc.de [168.218.142.88]
- The following addresses had permanent fatal errors -
cisco-nsp@puck.nether.net
I'm not *exactly* sure
Higham, Josh wrote:
[mailto:[EMAIL PROTECTED] On Behalf Of Ziv Leyes
I guess it's more as a working right educational purpose,
so you won't use your firewall as a debugging client.
In newer versions there's the packet tracker that can help
you debug connectivity problems.
Ziv
As an
Tony Varriale wrote:
Any chance you could give the group more details before saying it
can't be trusted?
I'm afraid I don't have any concrete details to add, but I've found
capture expressions on Firewall Service Modules to be quite
inconsistent. Presumably this is something to do with the
Do you have static routes pointing to both loopbacks? 1 for you and on the
isp side, 1 back to you?
On Sat, Jun 28, 2008 at 3:29 AM, Lincoln Dale [EMAIL PROTECTED] wrote:
Roy wrote:
Just to bring everybody up to date, the ISP keeps saying its something we
are doing.
did you try any of
matthew zeier wrote:
Trying to find a pre-build set of ACLs for filtering bogus inbound udp,
if one already exists, otherwise I'll have to build my own :)
Where are you trying to filter this? At your CPE router?
___
cisco-nsp mailing list
All is well.
Back a few decades ago in my mainframe days, a crash was called an abend
(short for Abnormal Ending). The type of error was a hex code (0x0C1
was an operation exception). We came up with the abend code of 0xooc
standing for out of control for preventable human error.
It took
I've got 12.2(25)S8 on various 7200 NPE-G1 and NPE-400 boxes in core and edge
NSP roles. The last NPE-400 is about to get upgraded to a G1 or G2.
This OS has been rock-solid for years. I'm using the routers for various
combinations of mpls ldp/bgp vpn, ip4, ip6, bgp, ospf, multilink,
MPF (multi-processor-forwarding)
http://www.cisco.com/en/US/prod/collateral/routers/ps341/prod_end-of-life_notice0900aecd8067dd9f_ps352_Products_End-of-Life_Notice.html
http://www.cisco.com/en/US/docs/ios/12_3t/12_3t7/feature/guide/MPF123T7.html
On Tue, Jul 1, 2008 at 12:41 AM, Wilkinson, Alex
haven't made up my mind on that - either the routers directly connecting
to the Internet or closer into my core.
Rogelio wrote:
matthew zeier wrote:
Trying to find a pre-build set of ACLs for filtering bogus inbound
udp, if one already exists, otherwise I'll have to build my own :)
Where
Hey Matt:
From: matthew zeier [EMAIL PROTECTED]
Date: Mon, 30 Jun 2008 13:32:06 -0700
To: cisco-nsp@puck.nether.net cisco-nsp@puck.nether.net
Subject: [c-nsp] bcp on edge filtering udp
Trying to find a pre-build set of ACLs for filtering bogus inbound udp,
if one already exists,
29 matches
Mail list logo