[c-nsp] Nex3K and MTU

2016-03-02 Thread CiscoNSP List
Ok - Well another "surprise" for me on these boxes, you cant set MTU the "normal" way (Well normal for me, coming from Cat/routers)...i.e. you cant set it globally (system mtu), nor per Int...you have to do it via QOS(Interesting decision by NXOS developers lol) Anyway - What Im a little

[c-nsp] Cisco Security Advisory: Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: March 2016

2016-03-02 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Cisco Security Advisory: Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: March 2016 Advisory ID: cisco-sa-20160302-openssl Version 1.0: Interim For Public Release: 2016 March 2 19:30 UTC (GMT

[c-nsp] Cisco Security Advisory: Cisco Web Security Appliance HTTPS Packet Processing Denial of Service Vulnerability

2016-03-02 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Cisco Security Advisory: Cisco Web Security Appliance HTTPS Packet Processing Denial of Service Vulnerability Advisory ID: cisco-sa-20160302-wsa Revision 1.0 Published: 2016 March 2 16:00 GMT

[c-nsp] Cisco Security Advisory: Cisco NX-OS Software TCP Netstack Denial of Service Vulnerability

2016-03-02 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Cisco NX-OS Software TCP Netstack Denial of Service Vulnerability Advisory ID: cisco-sa-20160302-netstack Revision 1.0 For Public Release 2016 March 02 16:00 UTC (GMT

[c-nsp] Cisco Security Advisory: Cisco Nexus 3000 Series and 3500 Platform Switches Insecure Default Credentials Vulnerability

2016-03-02 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Cisco Nexus 3000 Series and 3500 Platform Switches Insecure Default Credentials Vulnerability Advisory ID: cisco-sa-20160302-n3k Revision 1.0 For Public Release 2016 March 02 16:00 UTC (GMT

[c-nsp] Cisco Security Advisory: Cisco NX-OS Software SNMP Packet Denial of Service Vulnerability

2016-03-02 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Cisco NX-OS Software SNMP Packet Denial of Service Vulnerability Advisory ID: cisco-sa-20160302-n5ksnmp Revision 1.0 For Public Release 2016 March 02 16:00 UTC (GMT) +- Summary

Re: [c-nsp] NCS-5001 - MPLS L3VPN Issue

2016-03-02 Thread Mark Tinka
On 2/Mar/16 17:30, Phil Bedard wrote: > The issues vendors have expressed when I asked was fiber quality, keeping > connectors clean, and then just the HW to interface components at really high > speeds. It’s not that they couldn’t make it work, but it just wasn’t worth it > over what they

Re: [c-nsp] NCS-5001 - MPLS L3VPN Issue

2016-03-02 Thread Phil Bedard
The issues vendors have expressed when I asked was fiber quality, keeping connectors clean, and then just the HW to interface components at really high speeds. It’s not that they couldn’t make it work, but it just wasn’t worth it over what they can do with copper right now and into the future.

Re: [c-nsp] ASR9k with a bundle to Nexus3k

2016-03-02 Thread Harold 'Buz' Dale
Looks like Channel 1 on the Nexus is trunk. Have you tried it without the trunk? Buz -- buz.d...@usg.edu Network Support Specialist University System of GA -IT Services. 706-583-2052 or (Toll Free in GA) 888-875-3697 On 3/2/16, 7:40 AM, "cisco-nsp on behalf of jo...@bjorklund.cn"

[c-nsp] ASR9k with a bundle to Nexus3k

2016-03-02 Thread jonas
Hello, Im trying to do a simple bundle from a ASR9k to Nexus3k. However I cant get it to work. Bundle between Nexus and Nexus is no problem. Or between ASR and ASR. The ports in the nexus get suspended. And the error message in the ASR is: Partner System ID/Key do not match that of the