Re: [c-nsp] BFD on port channel

2011-10-26 Thread umair saeed
Dear Zaid, You can use LACP for port-chanel failure detection if your router supports it. Thanks & Best Regards, Umair SaeedAM IP Operations Core South , Pakistan Telecommunication Company Ltd, Phone # +92 333 2354591 > Date: Tue, 25 Oct 2011 06:58:48 -0700 > From: zaidoo...@yahoo.com > To: ci

Re: [c-nsp] Alternate setup for "better" HA

2011-10-26 Thread John Elliot
diag was rejected - here's a link to it instead: http://i1137.photobucket.com/albums/n511/johnelliot67/new_pop_propA.jpg From: johnellio...@hotmail.com To: cisco-nsp@puck.nether.net Date: Thu, 27 Oct 2011 09:04:28 +1100 Subject: [c-nsp] Alternate setup for "better" HA Hi Guys, About to rol

[c-nsp] Alternate setup for "better" HA

2011-10-26 Thread John Elliot
Hi Guys, About to roll out a new "mini-pop" witth a a pair of 2851's and pair of 2960's - They will be handling ~50 ethernet tails from a couple of carriers via individual vlans on trunk ports from carriers->2960(So 2960 only does L2), then trunking those vlans up to 2851 for L3(Tails will be

Re: [c-nsp] 3750 Metro internal vlan allocation for loopback?

2011-10-26 Thread Gert Doering
Hi, On Wed, Oct 26, 2011 at 10:57:31AM -0700, Jared Gillis wrote: > Along similar lines, I investigated to see whether it was possible > to manually assign a VLAN id to the lo1 interface, but there does > not seem to be any switchport or vlan-related commands available > on that if: Well, Loopbac

Re: [c-nsp] 3750 Metro internal vlan allocation for loopback?

2011-10-26 Thread Jared Gillis
On 10/26/2011 09:58 AM, Peter Rathlev wrote: > On Wed, 2011-10-26 at 09:41 +0200, Michele Bergonzoni wrote: >> You might try to trade the Lo1 for a VLAN: >> >> vlan 4000 >> exit >> >> no spanning-tree vlan 4000 >> >> int Vlan4000 >> description Primary Management/Peering IP >> ip address a.b.c.

Re: [c-nsp] nvram private-config ??

2011-10-26 Thread Aaron
Can you not generate a new key? On Tue, Oct 25, 2011 at 13:58, Jeffrey G. Fitzwater wrote: > I am running SXI3 which has the SSH bug that stops SSH logins from working if > you change the HOSTNAME. > > Well... I went and changed the hostname and now ssh fails and have to use > Telnet until I f

Re: [c-nsp] GRE over IPSEC wtf?!

2011-10-26 Thread Gert Doering
Hi, On Wed, Oct 26, 2011 at 11:58:43AM -0200, Persio Pucci wrote: > I have read somewhere that GRE tunnels need exclusivity on their loopbacks > (can't share it with other tunnels), does that really apply? Only on 6500/7600 (every tunnel needs a distinctive local address, otherwise processing wi

Re: [c-nsp] 3750 Metro internal vlan allocation for loopback?

2011-10-26 Thread Peter Rathlev
On Wed, 2011-10-26 at 09:41 +0200, Michele Bergonzoni wrote: > You might try to trade the Lo1 for a VLAN: > > vlan 4000 > exit > > no spanning-tree vlan 4000 > > int Vlan4000 > description Primary Management/Peering IP > ip address a.b.c.d 255.255.255.255 I don't think SVIs can take /32 mas

Re: [c-nsp] GRE over IPSEC wtf?!

2011-10-26 Thread Persio Pucci
Ding ding ding, we got a winner! "tunnel vrf" did the job. Thank you for all your input! On Wednesday, October 26, 2011, Peter Rathlev wrote: > On Wed, 2011-10-26 at 11:29 -0200, Persio Pucci wrote: >> Here is the rundown on the configs (again, my side but I assume the other >> side is fine and

[c-nsp] Cisco Security Advisory: Cisco Security Agent Remote Code Execution Vulnerabilities

2011-10-26 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Cisco Security Advisory: Cisco Security Agent Remote Code Execution Vulnerabilities Advisory ID: cisco-sa-20111026-csa Revision 1.0 For Public Release 2011 October 26 16:00 UTC (GMT

[c-nsp] Cisco Security Advisory: Buffer Overflow Vulnerabilities in the Cisco WebEx Player

2011-10-26 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Cisco Security Advisory: Buffer Overflow Vulnerabilities in the Cisco WebEx Player Advisory ID: cisco-sa-20111026-webex Revision 1.0 For Public Release 2011 October 26 16:00 UTC (GMT

[c-nsp] Cisco Security Advisory: Cisco Unified Communications Manager Directory Traversal Vulnerability

2011-10-26 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Cisco Unified Communications Manager Directory Traversal Vulnerability Advisory ID: cisco-sa-20111026-cucm Revision 1.0 For Public Release 2011 October 26 16:00 UTC (GMT

[c-nsp] Cisco Security Advisory: Denial of Service Vulnerability in Cisco Video Surveillance IP Cameras

2011-10-26 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Denial of Service Vulnerability in Cisco Video Surveillance IP Cameras Advisory ID: cisco-sa-20111026-camera Revision 1.0 For Public Release 2011 October 26 16:00 UTC (GMT

[c-nsp] Cisco Security Advisory: Cisco Unified Contact Center Express Directory Traversal Vulnerability

2011-10-26 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Cisco Unified Contact Center Express Directory Traversal Vulnerability Advisory ID: cisco-sa-20111026-uccx Revision 1.0 For Public Release 2011 October 26 16:00 UTC (GMT

Re: [c-nsp] GRE over IPSEC wtf?!

2011-10-26 Thread Chuck Church
Are all of the vrf-specific commands in the crypto map and isakmp policies? I last worked on this about 8 months ago, and it was flaky and/or looked like it should be working until we specified the VRF in the places it's needed. Chuck -Original Message- From: cisco-nsp-boun...@puck.nethe

Re: [c-nsp] GRE over IPSEC wtf?!

2011-10-26 Thread Peter Rathlev
On Wed, 2011-10-26 at 11:29 -0200, Persio Pucci wrote: > Here is the rundown on the configs (again, my side but I assume the other > side is fine and there's not much on the tunnel cfg to be wrong). IPs > removed to protect the innocent. ... > interface Loopback100 > description LOOPBACK GRE > ip

Re: [c-nsp] GRE over IPSEC wtf?!

2011-10-26 Thread Persio Pucci
oh well I will have to check with the other party, not sure what are they using... On Wed, Oct 26, 2011 at 12:01 PM, Phil Mayers wrote: > On 26/10/11 14:58, Persio Pucci wrote: > >> I'll try some of those later, for now I think they are doing something >> on the other side as phase 1 is not estab

Re: [c-nsp] GRE over IPSEC wtf?!

2011-10-26 Thread Phil Mayers
On 26/10/11 14:58, Persio Pucci wrote: I'll try some of those later, for now I think they are doing something on the other side as phase 1 is not establishing anymore. I have read somewhere that GRE tunnels need exclusivity on their loopbacks (can't share it with other tunnels), does that really

Re: [c-nsp] partial prefix load in ibgp

2011-10-26 Thread Mark Tinka
On Wednesday, October 26, 2011 04:06:31 PM Nikolay Shopik wrote: > I've got two borders connected via ibgp, both receving > full-view via uplinks, and I notice one of borders > receiving about 190K prefixes via ibgp. But I'm clearly > sure there no filters at all. Configuration between > borders

Re: [c-nsp] GRE over IPSEC wtf?!

2011-10-26 Thread Persio Pucci
I'll try some of those later, for now I think they are doing something on the other side as phase 1 is not establishing anymore. I have read somewhere that GRE tunnels need exclusivity on their loopbacks (can't share it with other tunnels), does that really apply? On Wed, Oct 26, 2011 at 11:45 AM

Re: [c-nsp] GRE over IPSEC wtf?!

2011-10-26 Thread Phil Mayers
On 26/10/11 14:29, Persio Pucci wrote: crypto ipsec transform-set CUSTOMER_CERT esp-3des esp-sha-hmac I think you want "mode transport" here interface Loopback100 description LOOPBACK GRE ip vrf forwarding CUSTOMER ip address y.y.y.y 255.255.255.255 You might need the "crypto map" here

Re: [c-nsp] GRE over IPSEC wtf?!

2011-10-26 Thread Persio Pucci
> > VPN#sh crypto engine connections active > ID InterfaceIP-Address State Algorithm > Encrypt Decrypt > 1478 Fa0/0.100mypeer setHMAC_MD5+3DES_56_C0 > 0 > 2011 Fa0/0.100mypeer set3DES+SHA 0 >224 > 201

Re: [c-nsp] GRE over IPSEC wtf?!

2011-10-26 Thread Persio Pucci
Phill, 3745 on my side, using 12.4(25c). Here is the rundown on the configs (again, my side but I assume the other side is fine and there's not much on the tunnel cfg to be wrong). IPs removed to protect the innocent. ip vrf CUSTOMER rd 1:25 route-target export 1:25 route-target import 1:25

Re: [c-nsp] GRE over IPSEC wtf?!

2011-10-26 Thread Phil Mayers
On 26/10/11 14:15, Persio Pucci wrote: Hi all, I am trying to get a GRE tunnel to work over IPSEC but as expected I am running into problems, just not the expected ones. Phase 1 is fine and established, Phase 2 is fine, SAs are in place. We can mutually ping our loopbacks, and we see encaps/dec

[c-nsp] GRE over IPSEC wtf?!

2011-10-26 Thread Persio Pucci
Hi all, I am trying to get a GRE tunnel to work over IPSEC but as expected I am running into problems, just not the expected ones. Phase 1 is fine and established, Phase 2 is fine, SAs are in place. We can mutually ping our loopbacks, and we see encaps/decaps increasing as we ping the loopbacks.

Re: [c-nsp] HP VM ESX fcoe issues with Nexus 5020

2011-10-26 Thread Nyman, Eric
Thanks everybody for your responses and information. I have a couple things I'm going to try. First thing I'm going to try is setting the ports to edge ports for spanning tree. My thought is that maybe fcoe is trying to communicate before the port is actually up. I'm also going to ask the server gu

Re: [c-nsp] partial prefix load in ibgp

2011-10-26 Thread Nikolay Shopik
On 26/10/11 13:28, Gert Doering wrote: This is a FAQ... BGP only forward-announces the best prefix it knows. So if you have: ExtA - Ra - Rb - Extb and "Ra" thinks that 150k prefixes are "best via Rb/ExtB", then it will only announce the rest (190k via ExtA) to Rb. Prefixes preferred over Rb w

Re: [c-nsp] partial prefix load in ibgp

2011-10-26 Thread Nick Hilliard
On 26/10/2011 10:28, Gert Doering wrote: > There is research going on to extend BGP here, but that's "the default > behaviour" and I'm not sure whether there's already implementations > out there that support announcing multiple paths there's add-paths support in XR 4.1.0 and recent releases of J

Re: [c-nsp] partial prefix load in ibgp

2011-10-26 Thread Gert Doering
Hi, On Wed, Oct 26, 2011 at 12:06:31PM +0400, Nikolay Shopik wrote: > I've got two borders connected via ibgp, both receving full-view via > uplinks, and I notice one of borders receiving about 190K prefixes via > ibgp. This is a FAQ... BGP only forward-announces the best prefix it knows. So

[c-nsp] partial prefix load in ibgp

2011-10-26 Thread Nikolay Shopik
Hey, I've got two borders connected via ibgp, both receving full-view via uplinks, and I notice one of borders receiving about 190K prefixes via ibgp. But I'm clearly sure there no filters at all. Configuration between borders are pretty simple and consist just two lines. neighbor x.x.x.x rem

Re: [c-nsp] 3750 Metro internal vlan allocation for loopback?

2011-10-26 Thread Michele Bergonzoni
Il 25/10/2011 21.39, Jared Gillis ha scritto: VLAN Usage 1006 Loopback1 interface Loopback1 description Primary Management/Peering IP ip address a.b.c.d 255.255.255.255 You might try to trade the Lo1 for a VLAN: vlan 4000 exit no spanning-tree vlan 4000 int Vl