pace in the DC class. Your really trading out
lock-in if stick to SP class chips in the commodity space, at least until there
are more alternatives.
David
___
cisco-nsp mailing list cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinf
n do it using
traditional protocols if you really want to, or you can write a controller to
do it for you. And it doesn't take 100's of people to do so. It doesn't even
take 10. So, yes, you need to justify the funding of those people, so milage
will vary based on si
will look at the
inner-header of a IPIP frame for entropy calculations if you configure them to
do so. You also have the problem that most of the very high-performance
commodity ASIC's are moving away from VXLAN/UDP encap since they are in the
middle of the classic core/edge feature split
on, we should choose
> the lowest overhead and narrowest working keys.
In the abstract, sure. But if you want a practical, deployable, production
network, it's multi-dimensioned.
David
___
cisco-nsp mailing list cisco-nsp@puck.nether.net
https://puck.
rames taking the same paths but ultimately reaching different
destinations are re-written (e.g. DMAC, egress-port) identically. And, at least
with IPIP, you are able to look at the inner-frame for ECMP calculations.
Depending on your MPLS design, that may not be the case. If you have too deep
ransit won't inspect the stack, it doesn't have to care
> about it, so it can be very deep.
Unless you want ECMP then it VERY much matters. But I guess since we are only
talking about theoretical instead of building an actual practical network, it
doesn't matter.
David
> On Jun 12, 2020, at 8:26 AM, Saku Ytti wrote:
>
> On Fri, 12 Jun 2020 at 18:16, David Sinn wrote:
>
>> I'm not sure what implementation you are saying doesn't exist. The Broadcom
>> XGS line is all on-die. The two largest cloud providers are using them in
&g
> On Jun 11, 2020, at 2:02 PM, Mark Tinka wrote:
>
>
>
> On 11/Jun/20 17:32, David Sinn wrote:
>
>> Respectfully, that is deployment dependent. In a traditional SP topology
>> that focuses on large do everything boxes, where the topology is fairly
>&
> On Jun 11, 2020, at 12:39 PM, Saku Ytti wrote:
>
> On Thu, 11 Jun 2020 at 21:04, David Sinn wrote:
>
>> You've made my point for me. If you are building the core of your network
>> out of MX's, to turn a phrase, in a past life "I fully support my
>> c
> On Jun 11, 2020, at 8:41 AM, Saku Ytti wrote:
>
> On Thu, 11 Jun 2020 at 18:32, David Sinn wrote:
>
>> However if you move away from large multi-chip systems, which hide internal
>> links which can only be debugged and monitored if you know the the obscure,
. The community got v6 wrong
in a number of areas and SR is not helping that. v4 as a transport vs. MPLS is
a useful conversation to be had, again depending on deployment and philosophy
around large vs. small network nodes.
David
> On Jun 10, 2020, at 9:51 PM, Saku Ytti wrote:
>
> O
ual-rate-port.pdf
Cheers
David
On 18/03/2020 23:47, Shawn L wrote:
I don't think this is due to switching between SFP and SFP+. In this
particular case, the switch has never had any SFPs or SFP+ in it, it's
brand new. Fire up, accept the license agreement, reload. Install new
IOS, rel
Supported in IOS-XE. VASI on the GSR has been long gone. IOS-XR had it at one
point as well.
David
--
http://dcp.dcptech.com
On 9/3/19, 4:32 AM, "James Bensley" wrote:
On Tue, 3 Sep 2019 at 00:39, David Prall wrote:
>
> Have you looked at VASI confi
Have you looked at VASI configuration.
https://www.cisco.com/c/en/us/support/docs/ip/network-address-translation-nat/200255-Configure-VRF-Aware-Software-Infrastruct.html
David
--
http://dcp.dcptech.com
On 8/19/19, 8:58 AM, "cisco-nsp on behalf of Aaron Gould"
wrote:
We
What platform are you on? I ran into numerous issues with XR + BFD on
NCS5501-SE hardware; worked with TAC and confirmed. It's broken for bundle
interfaces (gives an error, won't take the config), broken for BGP (takes the
config without error but doesn't work), and broken if VRRP is in use.
additional information
before we can proceed further'.
In the case of CSCvk35460, it's the Unreproducible meaning which
applies. So, opening a TAC case is not a waste of time.
Sincerely,
David.
On 1/23/2019 5:42 PM, Reuben Farrelly via cisco-nsp wrote:
To:
On 24/01/2019 6:23 am, Giles
they can assist with
getting the necessary logs to make forward progress?
Thanks much,
David White
Cisco TAC
On 1/23/2019 11:28 AM, Tassos Chatzithomaoglou wrote:
...answering to Lucas and James:
We have EXACTLY the same behavior. And it's worrying that the bug notes
do not include all this info
for years.
Any advice/ideas?
Thanks,
David
___
cisco-nsp mailing list cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
On 2018-08-07 11:38, Nick Hilliard wrote:
David Wilkinson wrote on 07/08/2018 13:11:
I was setting up a couple of EoMPLS circuits on pair of Cisco ME3600Xs
and while the pseudowires would come up and a "show mpls l2transport
vc" would show the sent counter increasing the recei
arked them as
recommend based on software quality, stability and longevity.
Regards
David
A end:
#show mpls l2transport vc 1337 detail
Local interface: Gi0/23 up, line protocol up, Ethernet up
Destination address: 10.2.11.8, VC ID: 1337, VC status: up
Output interface: Vl101, imposed label
yer 3/4 headers, possibly
due to the packets being double tagged assuming it does the XOR before
the outer tag is removed?
Any ideas on what might be going on here?
Regards
David
___
cisco-nsp mailing list cisco-nsp@puck.nether.net
https://puck.nether.net/mail
I’m curious if anyone has noticed issues with CISCO-BGP4-MIB values related to
prefix counts on IOS XR? I’m querying a 6.2.3 device and seeing weird results.
I’d like to monitor the number of prefixes advertised and received from eBGP
peers. The mib defines cbgpPeerAcceptedPrefixes as a
Hi all, curious if anyone has run into issues with IPv6 uRPF on NCS5500 and/or
XR 6.2.3? I have an interface where I added:
Ipv4 verify unicast source reachable-via any
ipv6 verify unicast source reachable-via any
and immediately lost my ability to talk to a BGP peer connected to it using a
Ah that makes more sense; thanks!
On 2/2/18, 10:31 AM, "James Jun" <ja...@towardex.com> wrote:
Hey,
On Fri, Feb 02, 2018 at 01:46:26PM +, David Hubbard wrote:
> However, in the release notes, both bootloader and MB-IOFPGA have bumped
up revisions in 6.2.
I’m curious if anyone knows, specific to NCS5500 series, if there are actually
two software trains in the 6.2.x series, where 6.2.3 and 6.2.25 are somehow
treated differently, or, illogically, 3 is somehow higher than 25? I noticed
that 6.2.3 was released after 6.2.25, which seems odd given
-class solutions for the telecommunications industry::
> -Original Message-
> From: cisco-nsp [mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of
> Brian Turnbow
> Sent: Thursday, December 14, 2017 5:33 PM
> To: 'David Hubbard'; 'cisco-nsp'
> Subject: Re:
Hey all, before I go too far down the configuration path, was curious if anyone
knows off hand if the NCS5500 line (5501SE with IOS XR 6.2.25) behave like
Nexus when you set up vPC + VRRP where data plane is active/active for
forwarding?
Thanks,
David
This is how much memory has been assigned to iosd. Show version will display
memory allocated to iosd and the total memory installed.
David
--
http://dcp.dcptech.com
On 11/21/17, 5:56 AM, "cisco-nsp on behalf of caroyy via cisco-nsp"
<cisco-nsp-boun...@puck.nether.net on behalf
On 20/09/17 11:19, James Bensley wrote:
To make a point to point pseudowire from an ASR9K to a 6500 using
sub-interface you need config as follows;
IOS-XR:
l2vpn
xconnect group test-VC117
p2p XR-to-IOS-vc117
interface TenGigE0/0/0/3.3406
neighbor ipv4 10.0.0.10 pw-id 117
Hey Simon, I’m going to be deploying the 5501se in the edge role to replace
some Brocade MLXe’s that can no longer fit a full v4+v6 route table in CAM
while also supporting VRF’s. I weighed several options but ultimately felt
like the 2M FIB gave me a comfort level slightly higher than
Been dramatically happier with Zabbix + ntop after moving off Solarwinds for
both NMS and flow data analysis (NTA). Zabbix picked up all the monitoring
pieces and felt way more polished than Nagios. We’re not only using zabbix for
typical things like snmp and agent-based data collection /
Looks like it's a limit of 3.7, however Denali 16.3.1 notes appear to
increase this to 16.
However of course, it appears 16.3 doesn't support my SIP10 cards, does
anyone know if this is the case in 16.5 everest?
--David
__
David Deutsch
Chief
has such a small limit, can anyone point me
to a model specific document that shows this as a hard limit? or should I
look for an IOS XE command to increase it.
Any advice appreciated.
--David
__
David Deutsch
Chief Technology Officer
Televergence
Ah, perfect, and so obvious now that I think about it. Easy to fix too as they
already have an IGP on those links.
Thanks!
On 1/20/17, 12:38 PM, "Gert Doering" <g...@greenie.muc.de> wrote:
Hi,
On Fri, Jan 20, 2017 at 05:10:56PM +, David Hubbard wrote:
>
on which edge router gets an update first
and sends it to the other.
Is there a better way for these two to be set up so they can have a backup path
that is only used if the primary is down, without negatively influencing normal
best path selection?
Thanks,
David
oint to that and the table has been growing
regularly after run out. List is $66k for reference.
David
On 11/30/16, 2:42 PM, "cisco-nsp on behalf of Gert Doering"
<cisco-nsp-boun...@puck.nether.net on behalf of g...@greenie.muc.de> wrote:
Hi,
On Wed, Nov 30, 2016 at 08:32:02PM
be a bonus, but not
one I’d be willing to pay more for at this point. Each router typically talks
to one other ibgp, three others ospf/ospfv3, two or three ebgp peers sending
full tables. Nothing too exciting.
Thanks,
David
___
cisco-nsp mailing list cisco
On 12/10/2016 21:51, Tom Hill wrote:
On 12/10/16 18:06, David Wilkinson wrote:
Should split horizon stop the loops when connecting downstream switches
in a resilient configuration?
It can't when you've the ability to loop a broadcast frame around via
devices that aren't party to the split
On 12/10/2016 00:12, Tom Hill wrote:
I'm assuming you know what that device is that's claiming the root
bridge? That's probably a good clue.
The "new" root bridge mac is device which has always been the root for
this VLAN, not of the other devices between these and the root logged a
change.
wrote:
Spanning tree?
tis 11 okt. 2016 kl 13:01 skrev David Wilkinson
<cisco-...@noroutetohost.net <mailto:cisco-...@noroutetohost.net>>:
Hi
We have a couple of port-channels between Cisco 4948 and Cisco ASR
9006
devices, periodicity we are seeing these e
:39m:40sTe1/52
--
ASR is running XR 5.3.3
4948 is running IOS 15.1(2)SG7
Any ideas on what the issue might be?
Thanks
David
___
cisco-nsp mailing
Hi!.
Use Phyton and paramiko library.
David
2016-09-21 13:21 GMT+01:00 Ryan West <rw...@zyedge.com>:
>
> Hi,
>
> > On Sep 21, 2016, at 7:11 AM, Lijalem Fetene <lijalem@gmail.com>
> wrote:
> >
> > Dears,
> > I want to login to hundreds of rou
Thanks, that worked.
with l2tp enabled it was giving me a inconsistent peer vlan id, soon as
I disabled it STP on the 4948 worked as expected.
On 14/07/2016 13:48, Lukas Tribus wrote:
So:
- match dot1q, not 1ad
- pop 1 tag
- don't tunnel l2tp
ah yes, good spot, 9198 plus 14 bytes Ethernet header is 9212 not 9206.
On 14/07/2016 12:31, James Bensley wrote:
On 14 July 2016 at 12:24, David Wilkinson <cisco-...@noroutetohost.net> wrote:
The port MTU on the ASR is 9206 and 9198 on the 4948s
I'd fix that before it bites you in t
We don't know what VLANs the customer is using within the QinQ.
I wonder if the 4948 is using 8100 for both the outer and inner tags, in
which case using dot1ad wouldn't match. I will try with dot1q again.
Is "rewrite ingress tag pop [1|2] symmetrical" always required?
I thought it was only
Wouldn't that only affect large packets and not all packets?
The port MTU on the ASR is 9206 and 9198 on the 4948s
On 14/07/2016 12:15, Curtis Piehler wrote:
Make sure the port mtu is higher to allow for additional vlan tags. 4
byte per vlan.
On Jul 14, 2016 7:11 AM, "David Wilk
nQs
between the 4948s taking another path without the ASR in the middle work
fine.
Thanks
David
___
cisco-nsp mailing list cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
On 05/05/2016 12:11, Pshem Kowalczyk wrote:
Just a suggestion. I've seen something similar with SNMP communities
in XR - try prepending all 'special' characters in the secret with a
backslash '\' in the configuration.
kind regards
Pshem
I removed the special characters and still getting
On 04/05/2016 07:37, Ulrik Ivers wrote:
Hi David,
Has the exact same config, including the shared secret, ever worked? With
another RADIUS server?
I ask because we had a similar problem getting Radius to work with our ASR 9001
when they were first deployed. Don't remember if we saw any
IUS config and "show radius" output.
Thanks
David
Router config
radius-server host auth-port 1812 acct-port 1813
key 7
!
radius-server host auth-port 1812 acct-port 1813
key 7
!
!
aaa group server radius radservers
server auth-port 1812 acct-port 1813
server auth-port 1812
Is working
Enviado desde mi iPad
> El 19 abr 2016, a las 22:00, Mike
> escribió:
>
>
>
> I have gotten replies so yeah it seems to be working. Thanks for the echo...
>
> ___
> cisco-nsp mailing list
to.
David
--
http://dcp.dcptech.com
On 3/16/16, 7:16 AM, "cisco-nsp on behalf of Eugen Şerban"
<cisco-nsp-boun...@puck.nether.net on behalf of eugen@gmail.com> wrote:
>Hello,
>
>I tried to implement the NVI, but according to cisco: NAT Virtual
>Interfaces (NVIs) ar
Hi All,
Quick update, It turns out that redirects were getting punted up to the
CPU even with "no ip redirects" in the config.
Split up the ranges on to 2 separate VLANs and the CPU dropped to 10%
with 0% interupts.
Thanks for your help.
Regards
David
On 17/02/2016 03:55, A
That's correct, and covered by the bug I provided below.
Please note, we just posted 9.1(6.11), which contains the fix to the
vulnerability, but does not have the APR bug in it (or the SNMP one).
Sincerely,
David.
On 2/16/16 2:21 PM, Jan Gregor wrote:
Hi David,
yeah, that fixed
%
Is that with high levels of throughput?
This one is doing layer 3 routing.
On 16/02/2016 18:35, Octavio Alvarez wrote:
On 02/16/2016 03:53 AM, David Wilkinson wrote:
Hi all,
What is the real world expected throughput on the C3560X devices when
doing basic Layer 3 routing?
We have a customer who has
Sounds like CSCux15273 - inaccurate reporting of memory usage in 9.5(2)+
Sincerely,
David.
On 2/16/16 10:28 AM, Don Nightingale wrote:
I'm seeing this as well on our pair we upgraded 2/11 to 9.5(2)2.
Memory usage is slowly reported as increasing. It's currently
breaking the asdm memory
) processor (revision K0) with 262144K
bytes of memory.
Last reset from power-on
1 Virtual Ethernet interface
1 FastEthernet interface
28 Gigabit Ethernet interfaces
2 Ten Gigabit Ethernet interfaces
Regards
David
On 16/02/2016 12:28, Elmar K. Bins wrote:
p.may...@imperial.ac.uk (Phil Mayers
as it seems a little high
to us.
The configuarion is very basic, couple of VLANs, HSRP and a static route
providing a default route upsteam.
Is this normal for the WS-C3560X-24?
Thanks
David
___
cisco-nsp mailing list cisco-nsp@puck.nether.net
https
Hi,
Thanks for confirming, we won't count this ports in our capacity planning.
Thanks
David
On 21/01/2016 17:19, Jeffrey Pazahanick wrote:
Correct, they are only for nV clustering, and control-plane only at that. You
still need to use line card 10G ports for data plane clustering
The non -smp image is also posted (for the 5505). Look on the 5505
download page under:
All Releases
--> Interim
--> 8
--> 8.2.5 Interim
Sincerely,
David.
On 2/15/16 3:43 PM, Nick Cutting wrote:
This is best news I've heard all day. Was going to have to move 55 VPNs
the RSVP-TE
Chapter 20, FIB Optimization for Fast Restoration
Chapter 21, Egress Service Fast Restoration
Regards
David
*David Roy *
*IP/MPLS NOC engineer - Orange France*
SkypeID : davidroy.35
*JNCIE x3 (SP #703 ; ENT #305 ; SEC #144)*
_
ith VSS/nV, Looking
at images of the ASR 9001 it has ports specifically labelled as cluster
ports where as the images of the RSP440 labelled them as SFP+. So I am
guessing they are normal ports which can be configured to be cluster
ports and could used normally to link up to rest of the network?
Tha
they were in a port channel with a single
switch running LACP
Hope that helps.
Regards
David
On 18/01/2016 19:56, Paul wrote:
Haven't tested it with Dell(force10 stuffs), but have with several
other vendors and never had a problem with LAG implementation using
the standard so I'd assume
have had to spend 3x/4x to
get into Nexus 7k to get the same table sizes.
Arista 7300 chassis would work too if you didn’t want to deal with the whole
stacking issue. With the right profile selected, it can do 288k MAC/ARP and
104k v6 ND.
David
On 1/8/16, 11:05 AM, "cisco-nsp on b
We use and really like the Opengear's as well. Just keep in
mind that you're still running a linux box so it should be
treated as one. We had to quickly lock all of ours down
back when that bash exploit happened as we had the web
interface of the units exposed to the cell modem side.
David
).
With Respect,
David White.
Cisco TAC
On 4/30/2015 8:47 AM, Eric Van Tol wrote:
I think it's because the same engineer is also working on my cases, and
since he's busy not working for me, he has no time to be not working for
you.
(I have a case that is quite straightforward, and after
they are gone; and notify customers of who to contact if the
primary engineer is out of the office...
We aren't perfect, but do our best to minimize customer impact due to
engineer's absences.
David.
On 4/30/2015 10:48 AM, Steve Mikulasik wrote:
I have noticed this as well. Maybe Cisco should develop
connection display information
and a few more...
But, the most noticeable to most people is indeed the permission of
traffic based on the security level.
Sincerely,
David.
On 2/11/2015 1:33 PM, Matt Addison wrote:
Maybe this is a semantics thing, but isn't implicit rule of 'allow to
any less
to an interface.
That is incorrect. Security levels are not negated or affected by
applying an ACL (or not) to an interface.
Sincerely,
David.
Cheers,Josh
Date: Wed, 11 Feb 2015 20:43:37 +1100
From: dale.shaw+cisco-...@gmail.com
To: madu...@gmail.com
CC: cisco-nsp@puck.nether.net
Subject: Re: [c
Correct.
David.
On 2/11/2015 4:22 AM, Alan Buxey wrote:
Going from 0 to 100 . That's a default block on the ASA platform isn't it?
alan
___
cisco-nsp mailing list cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
the software to a more recent
release. 7.2.3 is extremely old.
Sincerely,
David.
On 2/11/2015 3:26 AM, madu...@gmail.com wrote:
I would like to block the following ports: 135,137,138,139,445,593,
tcp/udp on my Firewall
interface GigabitEthernet0/0
nameif outside
security-level 0
ip
Hi all, does anyone know the IPv6 ND capacity on the Nexus 9k line? Or
9300 and 9500 specifically? I found ARP at 90k but can't find anything
for IPv6.
Thanks,
David
___
cisco-nsp mailing list cisco-nsp@puck.nether.net
https://puck.nether.net
What platform? What code?
Can you post your interface config?
Sent from my iPhone
On Dec 16, 2014, at 9:22 PM, Eric A Louie via cisco-nsp
cisco-nsp@puck.nether.net wrote:
I encountered a strange problem that I'm hoping is a bug.
Directly connected routersMTU 9200Works fine with single IP
even take that.
Thanks,
David
___
cisco-nsp mailing list cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
Initial indications point to No.
On Fri, Dec 12, 2014 at 12:45 PM, Jared Mauch ja...@puck.nether.net wrote:
On Dec 12, 2014, at 12:38 PM, David Deutsch david.deut...@telna.com
wrote:
Hello all,
I have a 7201 router running an ITP image that is used as an SS7 STP, it
in
turn
ports.
So if your M8024K has command to disable MAC learning in a VLAN,
it's all you need (we're using that on other vendors' switches
on daily basis).
With kind regards,
M.
On Fri, 12 Dec 2014 12:38:02 -0500, David Deutsch wrote
Hello all,
I have a 7201 router running an ITP
Hi Ahsan,
Replies inline...
On 11/25/2014 5:00 PM, Ahsan Rasheed wrote:
Hi David, Fabien all who replies ,
First I would like to say thank you so much for helping me on this issue.
I would like to clear few things. Customer is using /30 IP on Active
Firewall and Standby
the IPs it needs to have failover configured
properly.
Sincerely,
David.
On 11/25/2014 11:50 AM, Ahsan Rasheed wrote:
Hi Guys,
Actually I would like to know if you guys can provide me the solution on
below issue.
we are providing internet to one of our customer. our Connection is
connected
You Have
Requested Is Not Available but IPv4 gives me the actual login page with
user/pass boxes.
If I can log in, I'll get random xml output instead of pages at times.
David
___
cisco-nsp mailing list cisco-nsp@puck.nether.net
https://puck.nether.net
be highly appreciated!
--David Deutsch
___
cisco-nsp mailing list cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
to slide out. I ended up having to push the 'release'
mechanism in with a screwdriver to pop the SFP out. Had to file those
SFPs in the bin.
Cheers,
David.
--
DAVID FARRELL
Technical Manager
Tibus
T: +44 (0)28 9033 1122
F: +44 (0)28 9042 4709
E: dfarr...@tibus.com
W: www.tibus.com
Follow us
just have to get your sales rep to assign a
static IP and your'e good to go with ssh and vpn to your equipment.
David
-Original Message-
From: cisco-nsp [mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of
CiscoNSP List
Sent: Monday, September 01, 2014 9:53 PM
To: cisco-nsp
satisfaction, I'll attempt
to remember to note any oddities here.
Cheers,
David.
___
cisco-nsp mailing list cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
This may be a weird tangent to your question, but if you're running on a Nexus
6004 (maybe other platforms too, but definitely the 6004) and don't mind
wasting a whole 40GE QSFP port to service a 10GE drop (say you're way
overprovisioned on 40GE capacity and can do that), you should check out
Although Cisco puts this switch in the data center product line, the Catalyst
4948E is nice for campus edge QoS/QinQ needs. It is 1RU, has 48 1000BASE-T
ports and four 10GE SFP+, dual PS, and has silicon-parity with the Sup6
Catalyst 4500 line so has all the same QoS capabilities.
used to using:)
Been through the same process. I lifted the 7200 configuration with
little modification. I can't remember anything particularly strange or
startling apart from perhaps having to stay honest with licensing...
Cheers,
David.
___
cisco
a Bug referenced in the search, Bug ID: CSCsj59811
Search was done from my CCO account.
HTH
Yours sincerely, Sincères salutations, Mit freundlichen Grüssen, Distinti
saluti,
David BECKETT
Network Service Delivery
Switzerland DACH IMT
IBM Suisse
IBM
[mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of David
beckett
Sent: Monday, May 19, 2014 12:45 AM
To: cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] Netflow analysis tools?
Hello Scott,
PRTG Network Monitor can present Netflow monitoring in pretty graphs, including
usage over time, and top
monitoring everything else.
HTH
Yours sincerely, Sincères salutations, Mit freundlichen Grüssen, Distinti
saluti,
David BECKETT
Network Service Delivery
Switzerland DACH IMT
IBM Suisse
IBM Banking Solutions Center
Avenue de la Vallombreuse 100
CH - 1008
, was more a curiosity point than anything.
David George
System Administrator
P: +61 7 3503 6806 (ext 500)
A: PO Box 476, Annerley Q 4103 Australia
W: oztix.com.au | nztix.co.nz | heatseeker.com.au
This email and attachments are intended for the named address(es) only and may
contain
Afternoon all
What's an easy way to restrict configuration of anything auth related (aaa,
local users etc..) for a specific user level?
Thanks in advance
--David George
___
cisco-nsp mailing list cisco-nsp@puck.nether.net
https://puck.nether.net
selling outright or if I'd get something useful using them as a
trade-in later on.
Thanks,
David
___
cisco-nsp mailing list cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
The error code 62 is indicating a certificate validation has failed.
For this issue, you need to upgrade to patch 1140.
I don't quite understand the challenge you are facing opening a TAC case
- if the CSC module is under a support contract. Have you tried again?
Sincerely,
David.
On 2/16
Hi Chris / All,
Thanks for alerting us to this problem. The Support Case Manager team
put a fix (we hope) in this weekend.
Glad it is now working for you.
Sincerely,
David.
On 2/3/2014 10:12 AM, Chris Marget wrote:
On Sat, Feb 1, 2014 at 12:41 PM, Chris Marget ch...@marget.com wrote:
I
drop. You might want
to clear it, and then look at this output after the next occurrence of
the issue.
Sincerely,
David.
On 2/1/2014 11:27 AM, Adam Greene wrote:
Hi,
We are having a problem with high latency and OSPF drops on an ASA5520.
The portion of our network in question
Hi Rob,
No. Passwords are obscured for security reasons.
Sincerely,
David.
On Feb 2, 2014, at 4:50 PM, Robert Hass robh...@gmail.com wrote:
Hi
I'm just troubleshooting Radius authentications for VPN and PPPoE access.
I enabled Radius auth debug by :
debug radius authentication
No, the SSP modules must match.
Sincerely,
David.
On 10/25/2013 2:26 PM, Yang Yu wrote:
Is it possible to mix SSP and IPS SSP models? For example SSP-20 with
IPS SSP-40? When I mixed them I could not bring up the IPS SSP.
Thanks
___
cisco-nsp
Hi Michael,
If you see the UDP netflow packets leaving the ASA (via say a capture
from the ASA), and they are destined to the prtg server, then the issue
is downstream of the ASA. I would focus the troubleshooting there.
Sincerely,
David.
On 10/24/2013 3:41 PM, Michael Sprouffske wrote:
I am
not run into loss issues.
David
-Original Message-
From: cisco-nsp [mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of
Jeff Kell
Sent: Monday, October 14, 2013 6:12 PM
To: Kenny Kant; cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] SC to LC converter
Cheapest alternative is get an SC
call is here's your
ticket number and someone will call you back soon if you're lucky.
David
-Original Message-
From: cisco-nsp [mailto:cisco-nsp-boun...@puck.nether.net] On
Behalf Of Ahmed Hilmy
Sent: Tuesday, July 09, 2013 7:10 AM
To: cisco-nsp@puck.nether.net
Subject: [c-nsp] Best
1 - 100 of 1014 matches
Mail list logo