Re: [c-nsp] Finding source of ISIS authentication failure

2013-07-01 Thread John Neiberger
Thanks! On a related note, I'm stumped by the bewildering array of authentication options and commands in 12.2. We know that some authentication problem exists between this 7600 and another device but I don't know exactly what it is. We have the following on our interfaces: isis authentication m

Re: [c-nsp] Finding source of ISIS authentication failure

2013-07-01 Thread John Neiberger
Yep, that's the one we were looking for. I don't know how we missed it before. I tried it now and it gave us the info I was looking for. I know I tried it before, but I think maybe I had it enabled along with other debug commands and just missed it in the flood of info. It's easy to spot when you o

Re: [c-nsp] Finding source of ISIS authentication failure

2013-07-01 Thread daniel . dib
As pointed out to me by Ytti I was doing interface authentication and you are doing LSP autentication. I changed my lab and got the following debug from debug isis update-packets: ISIS-Upd: Rec L1 LSP ..0002.00-00, seq 4, ht 1199, ISIS-Upd: from SNPA c201.22dc. (FastEthernet0/0) %C

Re: [c-nsp] Finding source of ISIS authentication failure

2013-07-01 Thread Thomas Sillaber
Hi, have you tried "debug isis update-packets"? Works on SRC2: 000484: Jul 1 19:27:57.428: ISIS-Upd (): Rec L2 LSP , seq 1D, ht 65171, 000485: Jul 1 19:27:57.428: ISIS-Upd (): from SNPA (GigabitEthernet2/0/0) 000486: Jul 1 19:27:57.428: %CLNS-4-AUTH_FAIL: ISIS: LSP authentication failed 00048

Re: [c-nsp] Finding source of ISIS authentication failure

2013-07-01 Thread Saku Ytti
On (2013-07-01 10:31 -0600), John Neiberger wrote: > This box is running 12.2(33)SRC code. The TAC engineer and I haven't really > found a good way to find what we're looking for. I have found some debugs > that confirm that we're having an authentication problem but they also > don't show the sou

Re: [c-nsp] Finding source of ISIS authentication failure

2013-07-01 Thread daniel . dib
When testing on 12.4 code I get the following from debug isis adj-packets and debug isis authentication information: ISIS-Adj: Rec L2 IIH from c201.0d84. (FastEthernet0/0), cir type L1L2, cir id ..0002.01, length 1497 ISIS-AuthInfo: Packet failed the md5 check, 1497 bytes, type 16

Re: [c-nsp] Finding source of ISIS authentication failure

2013-07-01 Thread John Neiberger
This box is running 12.2(33)SRC code. The TAC engineer and I haven't really found a good way to find what we're looking for. I have found some debugs that confirm that we're having an authentication problem but they also don't show the source of the problem. Not even an interface. On Mon, Jul 1,

Re: [c-nsp] Finding source of ISIS authentication failure

2013-07-01 Thread John Neiberger
We've tried pretty much every relevant isis and clns debug and haven't found one that works. It's pretty strange. I wonder if this is just a quirk of the code we're running. On Mon, Jul 1, 2013 at 10:31 AM, Aaron wrote: > debug isis > possibly add lsp at the end > > > On Mon, Jul 1, 2013 at 11:

Re: [c-nsp] Finding source of ISIS authentication failure

2013-07-01 Thread Aaron
debug isis possibly add lsp at the end On Mon, Jul 1, 2013 at 11:41 AM, John Neiberger wrote: > This one has me and TAC stumped. Let's say you have a 7600 with multiple > devices connected to it running ISIS. One of them has the wrong > authentication key, so you see a bunch of this in the logs:

Re: [c-nsp] Finding source of ISIS authentication failure

2013-07-01 Thread Alan Buxey
Hi Odd. Unless the 7600 is missing a whole load of things then you shouldn't have any issues running the standard debug commands for ISIS...I certainly did to find source of an issue onour 6500. This was on SXI release of 12.2(18) or such.. we're on 15.x now alan _

Re: [c-nsp] pros and cons for IPTV multicast in rosen-mvpn vs GRT

2013-07-01 Thread Mark Tinka
On Monday, February 18, 2013 10:19:17 PM Sigurbjörn Birkir Lárusson wrote: > The implementation of draft-rosen on the 7600 is very > quirky and it has been our experience that there are > more bugs and problems with it than can reasonably be > expected. In particular in regards to protected sour

[c-nsp] Finding source of ISIS authentication failure

2013-07-01 Thread John Neiberger
This one has me and TAC stumped. Let's say you have a 7600 with multiple devices connected to it running ISIS. One of them has the wrong authentication key, so you see a bunch of this in the logs: %CLNS-4-AUTH_FAIL: ISIS: LSP authentication failed How do you find out what neighbor is causing that

Re: [c-nsp] Logging

2013-07-01 Thread Peter Rathlev
On Mon, 2013-07-01 at 14:40 +0300, M K wrote: > I have a question , if i have logging buffered informational (facility > 6) configured , that means i am logging facility 6 and 7 messages > right ? does that mean for example when i change the state of an > interface like below%LINK-5-CHANGED: Interf

[c-nsp] Logging

2013-07-01 Thread M K
I have a question , if i have logging buffered informational (facility 6) configured , that means i am logging facility 6 and 7 messages right ? does that mean for example when i change the state of an interface like below%LINK-5-CHANGED: Interface FastEthernet1/5, changed state to administrati

Re: [c-nsp] Testing Tools

2013-07-01 Thread Shawn Nolan
The latest GNS3 you can have VM's. Load a backtrack ISO in the VM, which should accomplish what you're after. BT5 has tonnes of pen testing tools for free. If you want to have physical kit connected to GNS3, use the tap interfaces and bridge it to your Ethernet adapter. Blinghog.net has some tu

Re: [c-nsp] Testing Tools

2013-07-01 Thread Nick Hilliard
On 30/06/2013 23:15, M K wrote: > HiI am trying to test some features on Catalyst switchesI want attack > tools to test mac layer attacks , Vlan Hopping , DHCP spoofing attacksIs > there any free testing tools to test these ? mausezahn: http://www.perihel.at/sec/mz/ Nick

Re: [c-nsp] Drop rule at the end of CoPP conflicts with MAC learning

2013-07-01 Thread Rolf Hanßen
Hi, If I had a support contract for that box I would open a tac case now. ;) kind regards Rolf > On 28/06/2013 17:55, "Rolf Hanßen" wrote: >> does not look like this is a general hardware version issue. > > mmm, ok. I would: > > - run a context diff on the configuration on each of these machine

Re: [c-nsp] Testing Tools

2013-07-01 Thread M K
Thanks a lot for the kind replies , If i installed http://www.yersinia.net/download.htm on Ubuntu , can i connect this to GNS3 if anyone has tried it ? Thanks again BR, Date: Mon, 1 Jul 2013 08:55:49 +0200 Subject: Re: [c-nsp] Testing Tools From: fredrik.vo...@bredband2.se To: gunner_...@live.com

Re: [c-nsp] EIGRP as IPV6 PE-CE

2013-07-01 Thread Adam Vitkovsky
Just verified on XR 4.2.3 router eigrp 123 vrf test address-family ipv6 (config-eigrp-vrf-af)#? autonomous-system Set the autonomous system of VRF clear Clear the uncommitted configuration commit Commit the configuration changes to running defau

Re: [c-nsp] SDR//Logical Routers

2013-07-01 Thread Adam Vitkovsky
Hi Amit, Unfortunately there's no option to configure two BGP processes in XE yet. If you only need to act as a different AS# for a particular eBGP or even iBGP peer, you might use the "local-as" feature. Or if you would like to achieve more separation you might be looking at the "route-server-co

Re: [c-nsp] Testing Tools

2013-07-01 Thread Fredrik Vöcks
Hi, Take a look at www.netrounds.com Cloudbased with active probes in your network. You can configure your own testschemes etc. /Fredrik On 1 Jul 2013 00:31, "M K" wrote: > HiI am trying to test some features on Catalyst switchesI want attack > tools to test mac layer attacks , Vlan Hopping ,