On Tuesday, January 07, 2014 09:55:39 PM Blake Dunlap wrote:
> But you're legally allowed to run the software that came
> on the car.
Agree - I'm talking about what happens in real life.
Mark.
signature.asc
Description: This is a digitally signed message part.
_
Hi All,
I have upgraded my existing tails to ADSL2+ and noted that I am not getting
gigawords for my radius.
My IOS is 12.2(33)SRD4, and it is supporting only 32 bit counters. I need
to know which IOS supports 64 bit counters which can fix the problem.
Regards,
*Ali Sumsam *
Running them for a home lab is another story.
It's another story from the vulnerability perspective, but the same
story
from the "am I entitled to run this software?" perspective, which is
the
one I'd like to better understand.
Good luck with that.
I've been trying to clarify something
For some hardware, especially the fixed-chassis Catalysts, there is a
"limited lifetime warranty" that is supposed to include software
updates, particularly those related to security defects and known
release defects.
However, the current TAC "downloads" will show releases, but requests a
login to
I can confirm getting software from TAC due to a PSIRT vulnerability as well,
it's not usually too much trouble (although more hassle than just being able to
download it).
We had the strange situation where an EOL piece of kit was out of maintenance
and past the date for adding maintenance to
On 07/01/2014 22:54, Chris Marget wrote:
> FWIW, it seems that the security fixes might be available for free, so long
> as Cisco PSIRT recognizes a vulnerability in a particular bit of software.
> ...But the document describing that process suggests calling TAC, which
> doesn't usually go well if
On Tue, Jan 7, 2014 at 5:23 PM, Andrew Miehs wrote:
> If you can't afford new Cisco hardware for production, then find another
> platform.
According to this thread, even those who can afford new Cisco hardware are
going to have a problem unless they can *also* afford a support contract.
See the
If you can't afford new Cisco hardware for production, then find another
platform.
You NEED to be able to update the software on the boxes. These devices
become a danger to the Internet if you don't keep up to date with the
security fixes.
Running them for a home lab is another story.
Regards
A
On Tue, Jan 7, 2014 at 1:37 PM, Mark Tinka wrote:
> They call this "Cisco Remarket". It's like selling a car to
> someone else two minutes after it leaves the showroom. As a
> buyer you get a discount, but you're better off buying a new
> unit yourself.
>
> Mark.
>
>
But you're legally allowed to
On Tuesday, January 07, 2014 07:33:24 PM scott owens wrote:
> It really depends I think on the level of technology you
> are looking for - Nexus 7K, 6800 ... gotta go with
> Cisco.
> 6500, 2960s, 3850/ ... you can pick up in alternate
> market.
Agree, the grey market won't help you for modern dev
List,
I have two Cisco 7604s (sup720 Base) and I have installed SPA-IPSEC-2Gs in
them. Currently I am running s72033-advipservicesk9_wan-mz.122-33 and I have
yet to find success in protecting tunnel traffic. The second I configure the
tunnel mode to ipsec, the tunnel goes up/down proto. All
My primary interest with this query is to do everything above-board from a
software licensing perspective.
Hardware support (warranty) and TAC support is a secondary concern.
Software updates, on the other hand, do kind of matter.
Is there a "right way" to handle software updates without a suppo
What about support with Cisco (eg TAC) and software updates, security patches,
bug fixes etc?
alan
--
Sent from my Android device with K-9 Mail. Please excuse my brevity.
___
cisco-nsp mailing list cisco-nsp@puck.nether.net
https://puck.nether.net/
We bought a bunch of 6500s a few years back, saved a bundle ...
however now the "E" chassis are the only ones supported for
Sup720s/VSS/Sup32-10s so any of the gear we bought that was non-E .. has to
be replaced.
Still cheaper.
We can get a Sup32-10G for $2K. Cisco wants 20+K.
I can put a few sp
Hi,
as long as you don't enable "ipv6 unicast-routing" it shouldn't send out any
RAs anyway.
this is at least what I've seen on all Cisco devices so far.
best
Enno
On Tue, Jan 07, 2014 at 09:47:20AM -0700, John Neiberger wrote:
> I have a 4948 running 12.2(53)SG2 connected via trunk to an
On 07/01/14 16:47, John Neiberger wrote:
The documentation for 12.2(53)SG2 doesn't even mention IPv6 but the
commands are there. What would be the best (safest) way to do this?
Should I configure "ipv6 nd ra suppress" and then configure an IPv6
address on the SVI?
I think you really need:
ipv
I have a 4948 running 12.2(53)SG2 connected via trunk to an upstream
router. I need to do some testing (long, unrelated story) because
we're having some IPv6-related issues with devices in a certain VLAN
on that switch. I can't test to a production server, so I was thinking
about adding an IPv6 add
On Tuesday, January 07, 2014 04:50:46 PM Chris Marget wrote:
> I'm curious to hear experience stories from anyone who's
> explored the hardware inspection and relicensing
> program:
>
> http://www.cisco.com/en/US/prod/hw_sw_relicensing_program
> .html
>
> Specifically, I'm curious about:
> - the
I'm curious to hear experience stories from anyone who's explored the
hardware inspection and relicensing program:
http://www.cisco.com/en/US/prod/hw_sw_relicensing_program.html
Specifically, I'm curious about:
- the inspection process/logistics
- the costs associated with the inspection
- the co
On (2014-01-07 14:02 +0100), "Rolf Hanßen" wrote:
> Hi,
>
> what kind of optics is that ?
>
> The readings rely on the optics used.
> Here an output of a system with some OEM LR optics and China DWDM:
>
> I am quite sure the Xenpaks neither have -63 nor 104 degree Celsius. ;)
Are those statics?
I have X2-10GB-SR on the c6500, on the opposite side of the fiber there are
some firewalls.
But can these alarms trigger issues in traffic passing through ?
I'm asking since I'm experiencing some problems time to time.
Tks
> Date: Tue, 7 Jan 2014 14:02:32 +0100
> Subject: Re: [c-nsp] c6500 Lo
On 07/01/14 12:08, R S wrote:
I saw some (--) low alarms (current mA) on my optics in intfs ten3/2, 4/2, 4/7,
4/8, 7/1, 7/2, 7/12, 7/13, 7/16.
I'm wondering if these alarms can cause any kind of problems.
Has anyone experience ?
You can ignore these in my experience. We see them with both XEN
Hi,
what kind of optics is that ?
The readings rely on the optics used.
Here an output of a system with some OEM LR optics and China DWDM:
Optical Optical
Temperature Voltage Current Tx Power Rx Power
Port (Celsius)(Volts) (
I saw some (--) low alarms (current mA) on my optics in intfs ten3/2, 4/2, 4/7,
4/8, 7/1, 7/2, 7/12, 7/13, 7/16.
I'm wondering if these alarms can cause any kind of problems.
Has anyone experience ?
Tks
#sh inter transceiver
Transceiver monitoring is disabled for all interfaces.
If device is
After spending a small fortune on sticks I found one that works from romon
and IOS for the whole ISR G2 range
Corsair Flash Survivor Stealth - USB flash drive - 16 GB - USB 3.0
Its also waterproof, sturdy and comes in matt gangsta black.
On 2 December 2013 22:42, Richard Clayton wrote:
> Thou
25 matches
Mail list logo