Hello
We have previously had problems with SFPs that has the ability to link up on
10/100/1000.
Even Ciscos own 10/100/1000 SFPs dosent work there for us at least.
When we insert an SFP that can only establish a link on 1000mbit then it has
worked so far for us regardless of manufacturer.
Bäst
On Apr 23, 2014, at 12:39 AM, Mike Hale wrote:
> We've seen really weird behavior with third party SFPs in the past.
> NHR has been surprisingly solid for us across all out platforms so far
> *knock on wood*.
>
> We've got some Finisar-branded SFPs in our ASR which work nicely (but
> that's expec
We've seen really weird behavior with third party SFPs in the past.
NHR has been surprisingly solid for us across all out platforms so far
*knock on wood*.
We've got some Finisar-branded SFPs in our ASR which work nicely (but
that's expected since Finisar is the OEM, IIRC, for Cisco's SFPs).
Actu
Afternoon all
What's an easy way to restrict configuration of anything auth related (aaa,
local users etc..) for a specific user level?
Thanks in advance
--David George
___
cisco-nsp mailing list cisco-nsp@puck.nether.net
https://puck.nether.net/mailm
Ive got some ASR1006's with SPA-5X1GE with NHR Gb copper SFP's that work
finedont have any 1002-X's to test sorry.
___
cisco-nsp mailing list cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/lis
Hello,
I've been banging my head against this all day.
We have an ASR-1002-X that's been living at home until it goes off to the colo
on Friday. I've been trying to learn all the quirks of the platform and get
some of the platform-specific stuff done before bringing in the bulk of the
config
I know that there are a number of hardware limitations when it comes to
L2VPN configurations on the SIPs, so it's probably safe to assume that it's
not supported.
On Tue, Apr 22, 2014 at 9:14 AM, Raheel Muhammad
wrote:
> Yup xconnect worked under service instance.
> On 22 Apr 2014 16:10, "Pete L
I think the next line after "authentication keychain" is
"cryptographic-algorithm MD5"
On Tue, Apr 22, 2014 at 10:55 AM, M K wrote:
> Hi all
> I am facing an issue when configuring EIGRP authentication between IOS and
> IOS XR
>
> R1#sh run | sec key chain
> key chain KEY
> key 1
>key-
I'd be very careful with EPC on sup2t. I can't find anything definitive but
it doesn't sound 100% supported, so I'm not sure what side effects you
could run into.
As far as why capture functions like EPC aren't supported in software on
sup2t is mainly because it hasn't been built. Some of the EPC
Hi all
I am facing an issue when configuring EIGRP authentication between IOS and IOS
XR
R1#sh run | sec key chain
key chain KEY
key 1
key-string cisco
R1#sh run int f0/0 | inc authen
ip authentication mode eigrp 1 md5
ip authentication key-chain eigrp 1 KEY
RP/0/0/CPU0:XR1#sh run key cha
On 22/04/2014 13:58, Pete Lumbis wrote:
Peter,
CPU span on sup2t is unfortunately not implemented. It sounds like there
are both software and hardware limitations to making it happen so it may
never show up. There's an internal but I'll work on pushing external
(meaning currently it's pretty use
On 22/04/2014 09:04, Peter Rathlev wrote:
Would anyone know how to SPAN the CPU of a Sup2T running IOS 15? The
monitor session configuration doesn't include "source cpu" anymore:
Seems per Pete Lumbis' email this isn't implemented, but I note that the
EPC-style CLI is present. Something like:
Peter,
CPU span on sup2t is unfortunately not implemented. It sounds like there
are both software and hardware limitations to making it happen so it may
never show up. There's an internal but I'll work on pushing external
(meaning currently it's pretty useless but give it 24-48 hours), CSCsz68416.
Yup xconnect worked under service instance.
On 22 Apr 2014 16:10, "Pete Lumbis" wrote:
> It's possible that Q-inQ mapping isn't supported but EVC style is. If you
> move it to EVC for the xconnect does it work?
>
>
> On Tue, Apr 22, 2014 at 8:42 AM, Raheel Muhammad <
> raheel.muham...@gmail.com>
It's possible that Q-inQ mapping isn't supported but EVC style is. If you
move it to EVC for the xconnect does it work?
On Tue, Apr 22, 2014 at 8:42 AM, Raheel Muhammad
wrote:
> Hi,
>
> It works and why i wanted to do it is we already have lot of customers
> configured as sub interfaces and this
Hi,
It works and why i wanted to do it is we already have lot of customers
configured as sub interfaces and this interface is the only option to
configure service instance and i was getting error on sub interface when i
was configuring xconnect on a QinQ sub interface.
Thanks
On Tue, Apr 22, 20
Probably not, but I'd ask why? EVC does the same thing as subs but with
more flexibility?
On Tue, Apr 22, 2014 at 4:28 AM, Raheel Muhammad
wrote:
> Hi,
>
> Might be a stupid question but have never done it, can we mix up service
> instance and sub interface configuration on the same main interf
Have you had a look at VASI and or nat match-in-vrf?
On 22 April 2014 18:30, Vladimir Buyalsky wrote:
> Hi all.
>
> I have ASR-1001 with two inet-channels and two default gateways. One from
> them i have put in VRF.
> Port, which connected to lan, and second channel belong global routing
> t
Hi Vladimir,
Try to google for:
asr1001 Match-in-VRF Support for NAT
adam
___
cisco-nsp mailing list cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
Hi all.
I have ASR-1001 with two inet-channels and two default gateways. One
from them i have put in VRF.
Port, which connected to lan, and second channel belong global routing
table.
Is this real to create static nat from VRF inet-channel to lan global?
TIA
Vladimir
Hi,
Might be a stupid question but have never done it, can we mix up service
instance and sub interface configuration on the same main interface.
I am using SPA-5X1GE-V2 on 7600.
Thanks
Raheel Muhammad
___
cisco-nsp mailing list cisco-nsp@puck.nether.
Would anyone know how to SPAN the CPU of a Sup2T running IOS 15? The
monitor session configuration doesn't include "source cpu" anymore:
Sup2T(config)#monitor session 1 type erspan-source
Sup2T(config-mon-erspan-src)#source ?
interface SPAN source interface
intrusion-detecti
22 matches
Mail list logo