Re: [c-nsp] Can not enter privileged mode

2008-06-30 Thread Ziv Leyes
Can you try getting into enable 10 level and from there to try enable ? If not, I guess you'll have to get physical access to the box and fix it through console. Ziv -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Lu Wen-yan Sent: Friday, June 27,

Re: [c-nsp] BGP vs PepLink / ATT metrics on BGP

2008-06-30 Thread Jay Hennigan
Rogelio wrote: For a campus environment, I've got two WAN connections, one through Charter (30Mbps) and one through ATT (50 Mbps). For load balancing, I am evaluating whether or not to use BGP or some sort of load sharing device, like PepLink. With BGP, I am told that my ATT pipe may get

[c-nsp] Telnet FROM a PIX Appliance?

2008-06-30 Thread Felix Nkansah
HI, I would like to know how to telnet FROM a CLI session on the PIX. After logging into a CLI session on the PIX, the need arises that I sometimes telnet to another device from the PIX. I dont seem to find the command for doing so on the PIX. Please let me know. Regards, Felix

Re: [c-nsp] Telnet FROM a PIX Appliance?

2008-06-30 Thread Aaron R
It is disabled as a security feature. I have also wanted to do the same for troubleshooting purposes. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Felix Nkansah Sent: Monday, June 30, 2008 6:11 PM To: cisco-nsp@puck.nether.net Subject: [c-nsp] Telnet

[c-nsp] RSVP and split-horizon

2008-06-30 Thread Sam Stickland
Hi, Is there some way to disable/work-around RSVPs split horizon checks? Currently it will log messages like this when receiving path requests on the same interface it needs to forward out of: RSVP: can't forward Path out received interface This could be fixed in the topology, but I'm

Re: [c-nsp] RSVP and split-horizon

2008-06-30 Thread Oliver Boehmer (oboehmer)
Sam Stickland wrote on Monday, June 30, 2008 12:48 PM: Hi, Is there some way to disable/work-around RSVPs split horizon checks? Currently it will log messages like this when receiving path requests on the same interface it needs to forward out of: RSVP: can't forward Path out received

Re: [c-nsp] real time polling graphing

2008-06-30 Thread Sam Stickland
Daniel Hooper wrote: Hi, I'm currently using Cacti to graph my interfaces, this doesn't seem to be real time enough. What are others using for graphing and data collection? I was playing around with the realtime plugin for Cacti this morning, comparing the graphs taken with 5 second polling

Re: [c-nsp] RSVP and split-horizon

2008-06-30 Thread Sam Stickland
Oliver Boehmer (oboehmer) wrote: Sam Stickland wrote on Monday, June 30, 2008 12:48 PM: Hi, Is there some way to disable/work-around RSVPs split horizon checks? Currently it will log messages like this when receiving path requests on the same interface it needs to forward out of: RSVP:

Re: [c-nsp] Telnet FROM a PIX Appliance?

2008-06-30 Thread Joerg Mayer
On Mon, Jun 30, 2008 at 06:30:59PM +0800, Aaron R wrote: It is disabled as a security feature. I have also wanted to do the same for troubleshooting purposes. And why exactly is this a security feature? What is the *gain* in security? Ciao Joerg -- Joerg Mayer

Re: [c-nsp] RSVP and split-horizon

2008-06-30 Thread Sam Stickland
Oliver Boehmer (oboehmer) wrote: Sam Stickland wrote on Monday, June 30, 2008 12:48 PM: Hi, Is there some way to disable/work-around RSVPs split horizon checks? Currently it will log messages like this when receiving path requests on the same interface it needs to forward out of: RSVP:

Re: [c-nsp] Telnet FROM a PIX Appliance?

2008-06-30 Thread Sam Stickland
Felix Nkansah wrote: HI, I would like to know how to telnet FROM a CLI session on the PIX. After logging into a CLI session on the PIX, the need arises that I sometimes telnet to another device from the PIX. I dont seem to find the command for doing so on the PIX Along with being able to

Re: [c-nsp] RSVP and split-horizon

2008-06-30 Thread Oliver Boehmer (oboehmer)
Sam Stickland mailto:[EMAIL PROTECTED] wrote on Monday, June 30, 2008 2:21 PM: Oliver Boehmer (oboehmer) wrote: Sam Stickland wrote on Monday, June 30, 2008 12:48 PM: Hi, Is there some way to disable/work-around RSVPs split horizon checks? Currently it will log messages like this when

Re: [c-nsp] Telnet FROM a PIX Appliance?

2008-06-30 Thread Ziv Leyes
I guess it's more as a working right educational purpose, so you won't use your firewall as a debugging client. In newer versions there's the packet tracker that can help you debug connectivity problems. Ziv -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf

Re: [c-nsp] Recovery time under interface failure - VPLS - MPLS L3 VPN- Plenty L3

2008-06-30 Thread Oliver Boehmer (oboehmer)
[EMAIL PROTECTED] mailto:[EMAIL PROTECTED] wrote on Monday, June 30, 2008 2:55 PM: Hi Oliver, Question is very specific to issue in ethernet connection between R1 and laptop and comparing recovery time under this failure in VPLS, L3MPLS VPN and pure L3 routing. That is, how VPLS will

Re: [c-nsp] Recovery time under interface failure - VPLS - MPLS L3 VPN- Plenty L3

2008-06-30 Thread alaerte.vidali
Tks Oliver, assuming there is no STP delay (portfast/etc.) this should be rather quick That is as I see it should work for VPLS. But crazily, it is taking 19 to 20 seconds, even though portfast is enabled. Any clue? -Original Message- From: ext Oliver Boehmer (oboehmer) [mailto:[EMAIL

Re: [c-nsp] Recovery time under interface failure - VPLS - MPLS L3 VPN- Plenty L3

2008-06-30 Thread Oliver Boehmer (oboehmer)
[EMAIL PROTECTED] mailto:[EMAIL PROTECTED] wrote on Monday, June 30, 2008 4:24 PM: Tks Oliver, assuming there is no STP delay (portfast/etc.) this should be rather quick That is as I see it should work for VPLS. But crazily, it is taking 19 to 20 seconds, even though portfast is

Re: [c-nsp] Telnet FROM a PIX Appliance?

2008-06-30 Thread Joerg Mayer
On Mon, Jun 30, 2008 at 01:24:26PM +0100, Sam Stickland wrote: After logging into a CLI session on the PIX, the need arises that I sometimes telnet to another device from the PIX. I dont seem to find the command for doing so on the PIX Along with being able to scroll backwards in the config

[c-nsp] Error

2008-06-30 Thread gert
The original message was received at Mon, 30 Jun 2008 18:09:20 +0200 from greenie.muc.de [168.218.142.88] - The following addresses had permanent fatal errors - cisco-nsp@puck.nether.net ___ cisco-nsp mailing list cisco-nsp@puck.nether.net

[c-nsp] Error

2008-06-30 Thread gert
The original message was received at Mon, 30 Jun 2008 18:09:20 +0200 from greenie.muc.de [168.218.142.88] - The following addresses had permanent fatal errors - cisco-nsp@puck.nether.net ___ cisco-nsp mailing list cisco-nsp@puck.nether.net

Re: [c-nsp] Error

2008-06-30 Thread Gert Doering
Hi, On Mon, Jun 30, 2008 at 06:09:20PM +0200, [EMAIL PROTECTED] wrote: The original message was received at Mon, 30 Jun 2008 18:09:20 +0200 from greenie.muc.de [168.218.142.88] - The following addresses had permanent fatal errors - cisco-nsp@puck.nether.net I'm not *exactly* sure

Re: [c-nsp] Telnet FROM a PIX Appliance?

2008-06-30 Thread Sam Stickland
Higham, Josh wrote: [mailto:[EMAIL PROTECTED] On Behalf Of Ziv Leyes I guess it's more as a working right educational purpose, so you won't use your firewall as a debugging client. In newer versions there's the packet tracker that can help you debug connectivity problems. Ziv As an

[c-nsp] Capture expressions on an FWSM (was Re: Telnet FROM a PIX Appliance?)

2008-06-30 Thread Sam Stickland
Tony Varriale wrote: Any chance you could give the group more details before saying it can't be trusted? I'm afraid I don't have any concrete details to add, but I've found capture expressions on Firewall Service Modules to be quite inconsistent. Presumably this is something to do with the

Re: [c-nsp] BGP sessions won't establish.

2008-06-30 Thread Aaron
Do you have static routes pointing to both loopbacks? 1 for you and on the isp side, 1 back to you? On Sat, Jun 28, 2008 at 3:29 AM, Lincoln Dale [EMAIL PROTECTED] wrote: Roy wrote: Just to bring everybody up to date, the ISP keeps saying its something we are doing. did you try any of

Re: [c-nsp] bcp on edge filtering udp

2008-06-30 Thread Rogelio
matthew zeier wrote: Trying to find a pre-build set of ACLs for filtering bogus inbound udp, if one already exists, otherwise I'll have to build my own :) Where are you trying to filter this? At your CPE router? ___ cisco-nsp mailing list

Re: [c-nsp] BGP sessions won't establish.

2008-06-30 Thread Roy
All is well. Back a few decades ago in my mainframe days, a crash was called an abend (short for Abnormal Ending). The type of error was a hex code (0x0C1 was an operation exception). We came up with the abend code of 0xooc standing for out of control for preventable human error. It took

[c-nsp] 7200 upgrade from 12.2(25)S8

2008-06-30 Thread Chris Cappuccio
I've got 12.2(25)S8 on various 7200 NPE-G1 and NPE-400 boxes in core and edge NSP roles. The last NPE-400 is about to get upgraded to a G1 or G2. This OS has been rock-solid for years. I'm using the routers for various combinations of mpls ldp/bgp vpn, ip4, ip6, bgp, ospf, multilink,

Re: [c-nsp] 7200 upgrade from 12.2(25)S8

2008-06-30 Thread Christian Koch
MPF (multi-processor-forwarding) http://www.cisco.com/en/US/prod/collateral/routers/ps341/prod_end-of-life_notice0900aecd8067dd9f_ps352_Products_End-of-Life_Notice.html http://www.cisco.com/en/US/docs/ios/12_3t/12_3t7/feature/guide/MPF123T7.html On Tue, Jul 1, 2008 at 12:41 AM, Wilkinson, Alex

Re: [c-nsp] bcp on edge filtering udp

2008-06-30 Thread matthew zeier
haven't made up my mind on that - either the routers directly connecting to the Internet or closer into my core. Rogelio wrote: matthew zeier wrote: Trying to find a pre-build set of ACLs for filtering bogus inbound udp, if one already exists, otherwise I'll have to build my own :) Where

Re: [c-nsp] bcp on edge filtering udp

2008-06-30 Thread Michael Smith
Hey Matt: From: matthew zeier [EMAIL PROTECTED] Date: Mon, 30 Jun 2008 13:32:06 -0700 To: cisco-nsp@puck.nether.net cisco-nsp@puck.nether.net Subject: [c-nsp] bcp on edge filtering udp Trying to find a pre-build set of ACLs for filtering bogus inbound udp, if one already exists,