Re: [c-nsp] Is this QoS config possible in 7600 with WS-X6724-SFP?

2011-03-26 Thread Chris Evans
No. You need to research lan qos. That card is a LAN card. On Mar 26, 2011 6:56 PM, "Peter Olsson" wrote: > We usually use this QoS config to give voice traffic priority: > class-map match-all VOICE > match ip dscp ef > policy-map BRANCH-WAN-EDGE_child > class VOICE > priority percent 10 > class

Re: [c-nsp] Unknown unicast only occuring when a host is under attack...

2011-03-26 Thread Jeroen van Ingen
Hi, On Sat, Mar 26, 2011 at 03:51:02PM -0400, ML wrote: > If the Host under attack doesn't have a gateway and is dependent on > proxy ARP then it would be possible for the CAM to overflow. That would be such a serious misconfiguration that all ensuring pain is well-deserved. Agreeing with

[c-nsp] Is this QoS config possible in 7600 with WS-X6724-SFP?

2011-03-26 Thread Peter Olsson
We usually use this QoS config to give voice traffic priority: class-map match-all VOICE match ip dscp ef policy-map BRANCH-WAN-EDGE_child class VOICE priority percent 10 class class-default fair-queue random-detect dscp-based policy-map BRANCH-WAN-EDGE_parent class class-default shape

Re: [c-nsp] Unknown unicast only occuring when a host is under attack...

2011-03-26 Thread Gert Doering
Hi, On Sat, Mar 26, 2011 at 03:51:02PM -0400, ML wrote: > If the Host under attack doesn't have a gateway and is dependent on > proxy ARP then it would be possible for the CAM to overflow. That would be such a serious misconfiguration that all ensuring pain is well-deserved. gert -- USENET is

Re: [c-nsp] Unknown unicast only occuring when a host is under attack...

2011-03-26 Thread ML
On 3/26/2011 9:08 AM, Jeroen van Ingen wrote: > Assuming the DoS attack is routed traffic (since it's in netflow) it > won't cause overflows in L2 forwarding table CAM. Unless there's a layer2 device downstream from the router. Not even then. Layer 2 source/dest addresses are rewritten on eve

Re: [c-nsp] 6500/BGP/full route tables [even more] confusing...

2011-03-26 Thread Tim Stevenson
DFC is optional on CEF256 cards. CEF256 is just a family name. The "dCEF" under CEF mode indicates whether it's doing central or distributed (d = distributed, ie, DFC). sh module will clearly tell you whether a DFC is present or not, under the Sub-Module heading. Tim At 12:22 PM 3/26/2011,

Re: [c-nsp] 6500/BGP/full route tables [even more] confusing...

2011-03-26 Thread Andriy Bilous
My bad. Somehow I've got the impression only 67xx using DFC. On Sat, Mar 26, 2011 at 8:32 PM, Tim Stevenson wrote: > DFC is optional on CEF256 cards. CEF256 is just a family name. The "dCEF" > under CEF mode indicates whether it's doing central or distributed (d = > distributed, ie, DFC). > > sh

Re: [c-nsp] 6500/BGP/full route tables [even more] confusing...

2011-03-26 Thread Andriy Bilous
disregard =) On Sat, Mar 26, 2011 at 8:22 PM, Andriy Bilous wrote: > As far as I'm aware there is no DFC in 6516, it's a "legacy" card with > a single 8Gb (duplex) connection to the fabric. Your output actually > confirms that, saying CEF256. Are there any other modules in the > chassis? > > On S

Re: [c-nsp] 6500/BGP/full route tables [even more] confusing...

2011-03-26 Thread Tim Stevenson
Hi Jeff, Removing the DFC from a 65xx card & letting the PFC do the work is HIGHLY preferable to letting traffic punt for your shortest mask prefixes, which are the ones that won't get into the h/w if you blow out the FIB TCAM. In order of preference: * get an XL DFC, list price on a DFC3CXL

Re: [c-nsp] 6500/BGP/full route tables [even more] confusing...

2011-03-26 Thread Gert Doering
Hi, On Sat, Mar 26, 2011 at 03:05:13PM -0400, Jeff Kell wrote: > > If you're not doing that much traffic, is removing the DFC from the > > WS-X6516-GBIC an option? > > I don't know, that's why I'm asking, but if that's a viable option, will > certainly give it a try. Well, it will fall back to c

Re: [c-nsp] 6500/BGP/full route tables [even more] confusing...

2011-03-26 Thread Andriy Bilous
As far as I'm aware there is no DFC in 6516, it's a "legacy" card with a single 8Gb (duplex) connection to the fabric. Your output actually confirms that, saying CEF256. Are there any other modules in the chassis? On Sat, Mar 26, 2011 at 8:05 PM, Jeff Kell wrote: > On 3/26/2011 2:32 PM, Jon Lewis

Re: [c-nsp] 6500/BGP/full route tables [even more] confusing...

2011-03-26 Thread Jeff Kell
On 3/26/2011 2:32 PM, Jon Lewis wrote: > On Sat, 26 Mar 2011, Jeff Kell wrote: >> I intended to upgrade this to "something" suitable for full routing >> tables, and went for a Sup720/PFC3CXL. A million routes, right? > > Not really. The million routes thing is highly misleading. It at least "dep

Re: [c-nsp] 6500/BGP/full route tables [even more] confusing...

2011-03-26 Thread Jon Lewis
On Sat, 26 Mar 2011, Jeff Kell wrote: I had a 6509/Sup2 (clearly can't do full tables) for some time, using various route-maps and filtering tricks to keep the IPv4 routes under 128K (which seems to be the magic number with uRPF enabled). If that is exceeded, it generates TCAM overflow errors a

[c-nsp] 6500/BGP/full route tables [even more] confusing...

2011-03-26 Thread Jeff Kell
This topic seems to come up periodically... and I thought I had it figured out... but apparently not. So I'm seeking some real-world answers and opinions on my particular combination/options. I had a 6509/Sup2 (clearly can't do full tables) for some time, using various route-maps and filtering tr

Re: [c-nsp] Unknown unicast only occuring when a host is under attack...

2011-03-26 Thread Dobbins, Roland
On Mar 25, 2011, at 2:11 AM, Drew Weaver wrote: > Basically what is happening is a host in a VLAN is getting flooded with http > requests and when this happens the http requests are being unicast to all > ports in this VLAN. How was this diagnosed? Are you sure that the /32 of the individual

Re: [c-nsp] Unknown unicast only occuring when a host is under attack...

2011-03-26 Thread Jeroen van Ingen
> Assuming the DoS attack is routed traffic (since it's in netflow) it > won't cause overflows in L2 forwarding table CAM. Unless there's a layer2 device downstream from the router. Not even then. Layer 2 source/dest addresses are rewritten on every router hop. All traffic going through

Re: [c-nsp] Unknown unicast only occuring when a host is under attack...

2011-03-26 Thread Jeroen van Ingen
On 03/25/2011 05:11 PM, John Neiberger wrote: > Hmm, I noticed when I looked in the netflow for the attack traffic that there were more than 400,000 source IPs participating in the attack, they were obviously spoofed/what-have-you, but would that make a difference? I don't think I've ever see