Thanks!
On a related note, I'm stumped by the bewildering array of authentication
options and commands in 12.2. We know that some authentication problem
exists between this 7600 and another device but I don't know exactly what
it is.
We have the following on our interfaces:
isis authentication m
Yep, that's the one we were looking for. I don't know how we missed it
before. I tried it now and it gave us the info I was looking for. I know I
tried it before, but I think maybe I had it enabled along with other debug
commands and just missed it in the flood of info. It's easy to spot when
you o
As pointed out to me by Ytti I was doing interface authentication
and you are doing LSP autentication. I changed my lab and got the
following debug from debug isis update-packets:
ISIS-Upd: Rec L1 LSP
..0002.00-00, seq 4, ht 1199,
ISIS-Upd: from SNPA c201.22dc.
(FastEthernet0/0)
%C
Hi,
have you tried "debug isis update-packets"? Works on SRC2:
000484: Jul 1 19:27:57.428: ISIS-Upd (): Rec L2 LSP , seq 1D, ht
65171,
000485: Jul 1 19:27:57.428: ISIS-Upd (): from SNPA
(GigabitEthernet2/0/0)
000486: Jul 1 19:27:57.428: %CLNS-4-AUTH_FAIL: ISIS: LSP authentication
failed
00048
On (2013-07-01 10:31 -0600), John Neiberger wrote:
> This box is running 12.2(33)SRC code. The TAC engineer and I haven't really
> found a good way to find what we're looking for. I have found some debugs
> that confirm that we're having an authentication problem but they also
> don't show the sou
When testing on 12.4 code I get the following from debug isis
adj-packets and debug isis authentication information:
ISIS-Adj: Rec
L2 IIH from c201.0d84. (FastEthernet0/0), cir type L1L2, cir id
..0002.01, length 1497
ISIS-AuthInfo: Packet failed the md5
check, 1497 bytes, type 16
This box is running 12.2(33)SRC code. The TAC engineer and I haven't really
found a good way to find what we're looking for. I have found some debugs
that confirm that we're having an authentication problem but they also
don't show the source of the problem. Not even an interface.
On Mon, Jul 1,
We've tried pretty much every relevant isis and clns debug and haven't
found one that works. It's pretty strange. I wonder if this is just a quirk
of the code we're running.
On Mon, Jul 1, 2013 at 10:31 AM, Aaron wrote:
> debug isis
> possibly add lsp at the end
>
>
> On Mon, Jul 1, 2013 at 11:
debug isis
possibly add lsp at the end
On Mon, Jul 1, 2013 at 11:41 AM, John Neiberger wrote:
> This one has me and TAC stumped. Let's say you have a 7600 with multiple
> devices connected to it running ISIS. One of them has the wrong
> authentication key, so you see a bunch of this in the logs:
Hi
Odd. Unless the 7600 is missing a whole load of things then you shouldn't have
any issues running the standard debug commands for ISIS...I certainly did to
find source of an issue onour 6500. This was on SXI release of 12.2(18) or
such.. we're on 15.x now
alan
_
On Monday, February 18, 2013 10:19:17 PM Sigurbjörn Birkir
Lárusson wrote:
> The implementation of draft-rosen on the 7600 is very
> quirky and it has been our experience that there are
> more bugs and problems with it than can reasonably be
> expected. In particular in regards to protected sour
This one has me and TAC stumped. Let's say you have a 7600 with multiple
devices connected to it running ISIS. One of them has the wrong
authentication key, so you see a bunch of this in the logs:
%CLNS-4-AUTH_FAIL: ISIS: LSP authentication failed
How do you find out what neighbor is causing that
On Mon, 2013-07-01 at 14:40 +0300, M K wrote:
> I have a question , if i have logging buffered informational (facility
> 6) configured , that means i am logging facility 6 and 7 messages
> right ? does that mean for example when i change the state of an
> interface like below%LINK-5-CHANGED: Interf
I have a question , if i have logging buffered informational (facility 6)
configured , that means i am logging facility 6 and 7 messages right ? does
that mean for example when i change the state of an interface like
below%LINK-5-CHANGED: Interface FastEthernet1/5, changed state to
administrati
The latest GNS3 you can have VM's. Load a backtrack ISO in the VM, which should
accomplish what you're after. BT5 has tonnes of pen testing tools for free.
If you want to have physical kit connected to GNS3, use the tap interfaces and
bridge it to your Ethernet adapter. Blinghog.net has some tu
On 30/06/2013 23:15, M K wrote:
> HiI am trying to test some features on Catalyst switchesI want attack
> tools to test mac layer attacks , Vlan Hopping , DHCP spoofing attacksIs
> there any free testing tools to test these ?
mausezahn: http://www.perihel.at/sec/mz/
Nick
Hi,
If I had a support contract for that box I would open a tac case now. ;)
kind regards
Rolf
> On 28/06/2013 17:55, "Rolf Hanßen" wrote:
>> does not look like this is a general hardware version issue.
>
> mmm, ok. I would:
>
> - run a context diff on the configuration on each of these machine
Thanks a lot for the kind replies , If i installed
http://www.yersinia.net/download.htm on Ubuntu , can i connect this to GNS3 if
anyone has tried it ?
Thanks again
BR,
Date: Mon, 1 Jul 2013 08:55:49 +0200
Subject: Re: [c-nsp] Testing Tools
From: fredrik.vo...@bredband2.se
To: gunner_...@live.com
Just verified on XR 4.2.3
router eigrp 123
vrf test
address-family ipv6
(config-eigrp-vrf-af)#?
autonomous-system Set the autonomous system of VRF
clear Clear the uncommitted configuration
commit Commit the configuration changes to running
defau
Hi Amit,
Unfortunately there's no option to configure two BGP processes in XE yet.
If you only need to act as a different AS# for a particular eBGP or even
iBGP peer, you might use the "local-as" feature.
Or if you would like to achieve more separation you might be looking at the
"route-server-co
Hi,
Take a look at www.netrounds.com
Cloudbased with active probes in your network. You can configure your own
testschemes etc.
/Fredrik
On 1 Jul 2013 00:31, "M K" wrote:
> HiI am trying to test some features on Catalyst switchesI want attack
> tools to test mac layer attacks , Vlan Hopping ,
21 matches
Mail list logo