Re: [c-nsp] LDPv6 Census Check

2020-06-15 Thread David Sinn
pace in the DC class. Your really trading out lock-in if stick to SP class chips in the commodity space, at least until there are more alternatives. David ___ cisco-nsp mailing list cisco-nsp@puck.nether.net https://puck.nether.net/mailman/listinf

Re: [c-nsp] LDPv6 Census Check

2020-06-15 Thread David Sinn
n do it using traditional protocols if you really want to, or you can write a controller to do it for you. And it doesn't take 100's of people to do so. It doesn't even take 10. So, yes, you need to justify the funding of those people, so milage will vary based on si

Re: [c-nsp] LDPv6 Census Check

2020-06-12 Thread David Sinn
will look at the inner-header of a IPIP frame for entropy calculations if you configure them to do so. You also have the problem that most of the very high-performance commodity ASIC's are moving away from VXLAN/UDP encap since they are in the middle of the classic core/edge feature split

Re: [c-nsp] LDPv6 Census Check

2020-06-12 Thread David Sinn
on, we should choose > the lowest overhead and narrowest working keys. In the abstract, sure. But if you want a practical, deployable, production network, it's multi-dimensioned. David ___ cisco-nsp mailing list cisco-nsp@puck.nether.net https://puck.

Re: [c-nsp] LDPv6 Census Check

2020-06-12 Thread David Sinn
rames taking the same paths but ultimately reaching different destinations are re-written (e.g. DMAC, egress-port) identically. And, at least with IPIP, you are able to look at the inner-frame for ECMP calculations. Depending on your MPLS design, that may not be the case. If you have too deep

Re: [c-nsp] LDPv6 Census Check

2020-06-12 Thread David Sinn
ransit won't inspect the stack, it doesn't have to care > about it, so it can be very deep. Unless you want ECMP then it VERY much matters. But I guess since we are only talking about theoretical instead of building an actual practical network, it doesn't matter. David

Re: [c-nsp] LDPv6 Census Check

2020-06-12 Thread David Sinn
> On Jun 12, 2020, at 8:26 AM, Saku Ytti wrote: > > On Fri, 12 Jun 2020 at 18:16, David Sinn wrote: > >> I'm not sure what implementation you are saying doesn't exist. The Broadcom >> XGS line is all on-die. The two largest cloud providers are using them in &g

Re: [c-nsp] LDPv6 Census Check

2020-06-12 Thread David Sinn
> On Jun 11, 2020, at 2:02 PM, Mark Tinka wrote: > > > > On 11/Jun/20 17:32, David Sinn wrote: > >> Respectfully, that is deployment dependent. In a traditional SP topology >> that focuses on large do everything boxes, where the topology is fairly >&

Re: [c-nsp] LDPv6 Census Check

2020-06-12 Thread David Sinn
> On Jun 11, 2020, at 12:39 PM, Saku Ytti wrote: > > On Thu, 11 Jun 2020 at 21:04, David Sinn wrote: > >> You've made my point for me. If you are building the core of your network >> out of MX's, to turn a phrase, in a past life "I fully support my >> c

Re: [c-nsp] LDPv6 Census Check

2020-06-11 Thread David Sinn
> On Jun 11, 2020, at 8:41 AM, Saku Ytti wrote: > > On Thu, 11 Jun 2020 at 18:32, David Sinn wrote: > >> However if you move away from large multi-chip systems, which hide internal >> links which can only be debugged and monitored if you know the the obscure,

Re: [c-nsp] LDPv6 Census Check

2020-06-11 Thread David Sinn
. The community got v6 wrong in a number of areas and SR is not helping that. v4 as a transport vs. MPLS is a useful conversation to be had, again depending on deployment and philosophy around large vs. small network nodes. David > On Jun 10, 2020, at 9:51 PM, Saku Ytti wrote: > > O

Re: [c-nsp] ASR 920 Strange SFP behavior

2020-03-18 Thread David H
ual-rate-port.pdf Cheers David On 18/03/2020 23:47, Shawn L wrote: I don't think this is due to switching between SFP and SFP+. In this particular case, the switch has never had any SFPs or SFP+ in it, it's brand new. Fire up, accept the license agreement, reload. Install new IOS, rel

Re: [c-nsp] Inter-VRF with NAT

2019-09-03 Thread David Prall
Supported in IOS-XE. VASI on the GSR has been long gone. IOS-XR had it at one point as well. David -- http://dcp.dcptech.com On 9/3/19, 4:32 AM, "James Bensley" wrote: On Tue, 3 Sep 2019 at 00:39, David Prall wrote: > > Have you looked at VASI confi

Re: [c-nsp] Inter-VRF with NAT

2019-09-02 Thread David Prall
Have you looked at VASI configuration. https://www.cisco.com/c/en/us/support/docs/ip/network-address-translation-nat/200255-Configure-VRF-Aware-Software-Infrastruct.html David -- http://dcp.dcptech.com On 8/19/19, 8:58 AM, "cisco-nsp on behalf of Aaron Gould" wrote: We

Re: [c-nsp] (BGP) BFD on XR in vrf on sub-interface of bundle-ether interface

2019-06-28 Thread David Hubbard
What platform are you on? I ran into numerous issues with XR + BFD on NCS5501-SE hardware; worked with TAC and confirmed. It's broken for bundle interfaces (gives an error, won't take the config), broken for BGP (takes the config without error but doesn't work), and broken if VRRP is in use.

Re: [c-nsp] ASR920 is a ticking timebomb (CSCvk35460)

2019-01-24 Thread David White, Jr. (dwhitejr) via cisco-nsp
additional information before we can proceed further'. In the case of CSCvk35460, it's the Unreproducible meaning which applies.  So, opening a TAC case is not a waste of time. Sincerely, David. On 1/23/2019 5:42 PM, Reuben Farrelly via cisco-nsp wrote: To: On 24/01/2019 6:23 am, Giles

Re: [c-nsp] ASR920 is a ticking timebomb (CSCvk35460)

2019-01-23 Thread David White, Jr. (dwhitejr) via cisco-nsp
they can assist with getting the necessary logs to make forward progress? Thanks much, David White Cisco TAC On 1/23/2019 11:28 AM, Tassos Chatzithomaoglou wrote: ...answering to Lucas and James: We have EXACTLY the same behavior. And it's worrying that the bug notes do not include all this info

[c-nsp] GRE tunnel (inside ICMP fails after two pings) - Wits End

2018-08-23 Thread David Deutsch
for years. Any advice/ideas? Thanks, David ___ cisco-nsp mailing list cisco-nsp@puck.nether.net https://puck.nether.net/mailman/listinfo/cisco-nsp archive at http://puck.nether.net/pipermail/cisco-nsp/

Re: [c-nsp] Cisco ME3600X IOS 15.5.3S7 and pseudowires

2018-08-08 Thread David Wilkinson
On 2018-08-07 11:38, Nick Hilliard wrote: David Wilkinson wrote on 07/08/2018 13:11: I was setting up a couple of EoMPLS circuits on pair of Cisco ME3600Xs and while the pseudowires would come up and a "show mpls l2transport vc" would show the sent counter increasing the recei

[c-nsp] Cisco ME3600X IOS 15.5.3S7 and pseudowires

2018-08-07 Thread David Wilkinson
arked them as recommend based on software quality, stability and longevity. Regards David A end: #show mpls l2transport vc 1337 detail Local interface: Gi0/23 up, line protocol up, Ethernet up Destination address: 10.2.11.8, VC ID: 1337, VC status: up Output interface: Vl101, imposed label

[c-nsp] LACP and QinQ

2018-07-16 Thread David Wilkinson
yer 3/4 headers, possibly due to the packets being double tagged assuming it does the XOR before the outer tag is removed? Any ideas on what might be going on here? Regards David ___ cisco-nsp mailing list cisco-nsp@puck.nether.net https://puck.nether.net/mail

[c-nsp] cbgpPeer2AdvertisedPrefixes different than 'show bgp nei X advertised-routes'

2018-04-19 Thread David Hubbard
I’m curious if anyone has noticed issues with CISCO-BGP4-MIB values related to prefix counts on IOS XR? I’m querying a 6.2.3 device and seeing weird results. I’d like to monitor the number of prefixes advertised and received from eBGP peers. The mib defines cbgpPeerAcceptedPrefixes as a

[c-nsp] IPv6 uRPF broken on NCS5500 XR 6.2.3?

2018-02-23 Thread David Hubbard
Hi all, curious if anyone has run into issues with IPv6 uRPF on NCS5500 and/or XR 6.2.3? I have an interface where I added: Ipv4 verify unicast source reachable-via any ipv6 verify unicast source reachable-via any and immediately lost my ability to talk to a BGP peer connected to it using a

Re: [c-nsp] XR on NCS5500 6.2.25 vs 6.2.3

2018-02-02 Thread David Hubbard
Ah that makes more sense; thanks! On 2/2/18, 10:31 AM, "James Jun" <ja...@towardex.com> wrote: Hey, On Fri, Feb 02, 2018 at 01:46:26PM +, David Hubbard wrote: > However, in the release notes, both bootloader and MB-IOFPGA have bumped up revisions in 6.2.

[c-nsp] XR on NCS5500 6.2.25 vs 6.2.3

2018-02-02 Thread David Hubbard
I’m curious if anyone knows, specific to NCS5500 series, if there are actually two software trains in the 6.2.x series, where 6.2.3 and 6.2.25 are somehow treated differently, or, illogically, 3 is somehow higher than 25? I noticed that 6.2.3 was released after 6.2.25, which seems odd given

Re: [c-nsp] Does NCS behave like Nexus w/regard to vPC+VRRP active/active?

2017-12-15 Thread David Hubbard
-class solutions for the telecommunications industry:: > -Original Message- > From: cisco-nsp [mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of > Brian Turnbow > Sent: Thursday, December 14, 2017 5:33 PM > To: 'David Hubbard'; 'cisco-nsp' > Subject: Re:

[c-nsp] Does NCS behave like Nexus w/regard to vPC+VRRP active/active?

2017-12-14 Thread David Hubbard
Hey all, before I go too far down the configuration path, was curious if anyone knows off hand if the NCS5500 line (5501SE with IOS XR 6.2.25) behave like Nexus when you set up vPC + VRRP where data plane is active/active for forwarding? Thanks, David

Re: [c-nsp] memory issue asr1002-x

2017-11-21 Thread David Prall
This is how much memory has been assigned to iosd. Show version will display memory allocated to iosd and the total memory installed. David -- http://dcp.dcptech.com On 11/21/17, 5:56 AM, "cisco-nsp on behalf of caroyy via cisco-nsp" <cisco-nsp-boun...@puck.nether.net on behalf

Re: [c-nsp] config example xconnent between ASR9K and 6500

2017-09-20 Thread David Wilkinson
On 20/09/17 11:19, James Bensley wrote: To make a point to point pseudowire from an ASR9K to a 6500 using sub-interface you need config as follows; IOS-XR: l2vpn xconnect group test-VC117 p2p XR-to-IOS-vc117 interface TenGigE0/0/0/3.3406 neighbor ipv4 10.0.0.10 pw-id 117

Re: [c-nsp] NCS-5501/NCS-5502 as border/core routers

2017-08-23 Thread David Hubbard
Hey Simon, I’m going to be deploying the 5501se in the edge role to replace some Brocade MLXe’s that can no longer fit a full v4+v6 route table in CAM while also supporting VRF’s. I weighed several options but ultimately felt like the 2M FIB gave me a comfort level slightly higher than

Re: [c-nsp] OT Solarwinds Alternatives

2017-07-27 Thread David Hubbard
Been dramatically happier with Zabbix + ntop after moving off Solarwinds for both NMS and flow data analysis (NTA). Zabbix picked up all the monitoring pieces and felt way more polished than Nagios. We’re not only using zabbix for typical things like snmp and agent-based data collection /

Re: [c-nsp] ASR1006 ESP20 SIP10 LAG/LaCP Limitations

2017-06-09 Thread David Deutsch
Looks like it's a limit of 3.7, however Denali 16.3.1 notes appear to increase this to 16. However of course, it appears 16.3 doesn't support my SIP10 cards, does anyone know if this is the case in 16.5 everest? --David __ David Deutsch Chief

[c-nsp] ASR1006 ESP20 SIP10 LAG/LaCP Limitations

2017-06-09 Thread David Deutsch
has such a small limit, can anyone point me to a model specific document that shows this as a hard limit? or should I look for an IOS XE command to increase it. Any advice appreciated. --David __ David Deutsch Chief Technology Officer Televergence

Re: [c-nsp] BGP route influence question related to multi-path iBGP

2017-01-20 Thread David Hubbard
Ah, perfect, and so obvious now that I think about it. Easy to fix too as they already have an IGP on those links. Thanks! On 1/20/17, 12:38 PM, "Gert Doering" <g...@greenie.muc.de> wrote: Hi, On Fri, Jan 20, 2017 at 05:10:56PM +, David Hubbard wrote: >

[c-nsp] BGP route influence question related to multi-path iBGP

2017-01-20 Thread David Hubbard
on which edge router gets an update first and sends it to the other. Is there a better way for these two to be set up so they can have a backup path that is only used if the primary is down, without negatively influencing normal best path selection? Thanks, David

Re: [c-nsp] Rec for full-table multi-peer bgp router?

2016-11-30 Thread David Hubbard
oint to that and the table has been growing regularly after run out. List is $66k for reference. David On 11/30/16, 2:42 PM, "cisco-nsp on behalf of Gert Doering" <cisco-nsp-boun...@puck.nether.net on behalf of g...@greenie.muc.de> wrote: Hi, On Wed, Nov 30, 2016 at 08:32:02PM

[c-nsp] Rec for full-table multi-peer bgp router?

2016-11-30 Thread David Hubbard
be a bonus, but not one I’d be willing to pay more for at this point. Each router typically talks to one other ibgp, three others ospf/ospfv3, two or three ebgp peers sending full tables. Nothing too exciting. Thanks, David ___ cisco-nsp mailing list cisco

Re: [c-nsp] Port-channel between Cisco 4948 and ASR 9k going err-disable

2016-10-13 Thread David Wilkinson
On 12/10/2016 21:51, Tom Hill wrote: On 12/10/16 18:06, David Wilkinson wrote: Should split horizon stop the loops when connecting downstream switches in a resilient configuration? It can't when you've the ability to loop a broadcast frame around via devices that aren't party to the split

Re: [c-nsp] Port-channel between Cisco 4948 and ASR 9k going err-disable

2016-10-12 Thread David Wilkinson
On 12/10/2016 00:12, Tom Hill wrote: I'm assuming you know what that device is that's claiming the root bridge? That's probably a good clue. The "new" root bridge mac is device which has always been the root for this VLAN, not of the other devices between these and the root logged a change.

Re: [c-nsp] Port-channel between Cisco 4948 and ASR 9k going err-disable

2016-10-11 Thread David Wilkinson
wrote: Spanning tree? tis 11 okt. 2016 kl 13:01 skrev David Wilkinson <cisco-...@noroutetohost.net <mailto:cisco-...@noroutetohost.net>>: Hi We have a couple of port-channels between Cisco 4948 and Cisco ASR 9006 devices, periodicity we are seeing these e

[c-nsp] Port-channel between Cisco 4948 and ASR 9k going err-disable

2016-10-11 Thread David Wilkinson
:39m:40sTe1/52 -- ASR is running XR 5.3.3 4948 is running IOS 15.1(2)SG7 Any ideas on what the issue might be? Thanks David ___ cisco-nsp mailing

Re: [c-nsp] script

2016-09-21 Thread David
Hi!. Use Phyton and paramiko library. David 2016-09-21 13:21 GMT+01:00 Ryan West <rw...@zyedge.com>: > > Hi, > > > On Sep 21, 2016, at 7:11 AM, Lijalem Fetene <lijalem@gmail.com> > wrote: > > > > Dears, > > I want to login to hundreds of rou

Re: [c-nsp] Cisco ASR 9k transporting QinQ traffic

2016-07-14 Thread David Wilkinson
Thanks, that worked. with l2tp enabled it was giving me a inconsistent peer vlan id, soon as I disabled it STP on the 4948 worked as expected. On 14/07/2016 13:48, Lukas Tribus wrote: So: - match dot1q, not 1ad - pop 1 tag - don't tunnel l2tp

Re: [c-nsp] Cisco ASR 9k transporting QinQ traffic

2016-07-14 Thread David Wilkinson
ah yes, good spot, 9198 plus 14 bytes Ethernet header is 9212 not 9206. On 14/07/2016 12:31, James Bensley wrote: On 14 July 2016 at 12:24, David Wilkinson <cisco-...@noroutetohost.net> wrote: The port MTU on the ASR is 9206 and 9198 on the 4948s I'd fix that before it bites you in t

Re: [c-nsp] Cisco ASR 9k transporting QinQ traffic

2016-07-14 Thread David Wilkinson
We don't know what VLANs the customer is using within the QinQ. I wonder if the 4948 is using 8100 for both the outer and inner tags, in which case using dot1ad wouldn't match. I will try with dot1q again. Is "rewrite ingress tag pop [1|2] symmetrical" always required? I thought it was only

Re: [c-nsp] Cisco ASR 9k transporting QinQ traffic

2016-07-14 Thread David Wilkinson
Wouldn't that only affect large packets and not all packets? The port MTU on the ASR is 9206 and 9198 on the 4948s On 14/07/2016 12:15, Curtis Piehler wrote: Make sure the port mtu is higher to allow for additional vlan tags. 4 byte per vlan. On Jul 14, 2016 7:11 AM, "David Wilk

[c-nsp] Cisco ASR 9k transporting QinQ traffic

2016-07-14 Thread David Wilkinson
nQs between the 4948s taking another path without the ASR in the middle work fine. Thanks David ___ cisco-nsp mailing list cisco-nsp@puck.nether.net https://puck.nether.net/mailman/listinfo/cisco-nsp archive at http://puck.nether.net/pipermail/cisco-nsp/

Re: [c-nsp] Cisco ASR 9k and Windows RADIUS server

2016-05-05 Thread David Wilkinson
On 05/05/2016 12:11, Pshem Kowalczyk wrote: Just a suggestion. I've seen something similar with SNMP communities in XR - try prepending all 'special' characters in the secret with a backslash '\' in the configuration. kind regards Pshem I removed the special characters and still getting

Re: [c-nsp] Cisco ASR 9k and Windows RADIUS server

2016-05-05 Thread David Wilkinson
On 04/05/2016 07:37, Ulrik Ivers wrote: Hi David, Has the exact same config, including the shared secret, ever worked? With another RADIUS server? I ask because we had a similar problem getting Radius to work with our ASR 9001 when they were first deployed. Don't remember if we saw any

[c-nsp] Cisco ASR 9k and Windows RADIUS server

2016-05-03 Thread David Wilkinson
IUS config and "show radius" output. Thanks David Router config radius-server host auth-port 1812 acct-port 1813 key 7 ! radius-server host auth-port 1812 acct-port 1813 key 7 ! ! aaa group server radius radservers server auth-port 1812 acct-port 1813 server auth-port 1812

Re: [c-nsp] List dead?

2016-04-19 Thread David
Is working Enviado desde mi iPad > El 19 abr 2016, a las 22:00, Mike > escribió: > > > > I have gotten replies so yeah it seems to be working. Thanks for the echo... > > ___ > cisco-nsp mailing list

Re: [c-nsp] NAT problem on ISR 4331

2016-03-21 Thread David Prall
to. David -- http://dcp.dcptech.com On 3/16/16, 7:16 AM, "cisco-nsp on behalf of Eugen Şerban" <cisco-nsp-boun...@puck.nether.net on behalf of eugen@gmail.com> wrote: >Hello, > >I tried to implement the NVI, but according to cisco: NAT Virtual >Interfaces (NVIs) ar

Re: [c-nsp] C3560X Layer 3 throughput

2016-03-07 Thread David Wilkinson
Hi All, Quick update, It turns out that redirects were getting punted up to the CPU even with "no ip redirects" in the config. Split up the ranges on to 2 separate VLANs and the CPU dropped to 10% with 0% interupts. Thanks for your help. Regards David On 17/02/2016 03:55, A

Re: [c-nsp] Cisco Security Advisory: Cisco ASA Software IKEv1 and IKEv2 Buffer Overflow Vulnerability

2016-02-16 Thread David White, Jr. (dwhitejr)
That's correct, and covered by the bug I provided below. Please note, we just posted 9.1(6.11), which contains the fix to the vulnerability, but does not have the APR bug in it (or the SNMP one). Sincerely, David. On 2/16/16 2:21 PM, Jan Gregor wrote: Hi David, yeah, that fixed

Re: [c-nsp] C3560X Layer 3 throughput

2016-02-16 Thread David Wilkinson
% Is that with high levels of throughput? This one is doing layer 3 routing. On 16/02/2016 18:35, Octavio Alvarez wrote: On 02/16/2016 03:53 AM, David Wilkinson wrote: Hi all, What is the real world expected throughput on the C3560X devices when doing basic Layer 3 routing? We have a customer who has

Re: [c-nsp] Cisco Security Advisory: Cisco ASA Software IKEv1 and IKEv2 Buffer Overflow Vulnerability

2016-02-16 Thread David White, Jr. (dwhitejr)
Sounds like CSCux15273 - inaccurate reporting of memory usage in 9.5(2)+ Sincerely, David. On 2/16/16 10:28 AM, Don Nightingale wrote: I'm seeing this as well on our pair we upgraded 2/11 to 9.5(2)2. Memory usage is slowly reported as increasing. It's currently breaking the asdm memory

Re: [c-nsp] C3560X Layer 3 throughput

2016-02-16 Thread David Wilkinson
) processor (revision K0) with 262144K bytes of memory. Last reset from power-on 1 Virtual Ethernet interface 1 FastEthernet interface 28 Gigabit Ethernet interfaces 2 Ten Gigabit Ethernet interfaces Regards David On 16/02/2016 12:28, Elmar K. Bins wrote: p.may...@imperial.ac.uk (Phil Mayers

[c-nsp] C3560X Layer 3 throughput

2016-02-16 Thread David Wilkinson
as it seems a little high to us. The configuarion is very basic, couple of VLANs, HSRP and a static route providing a default route upsteam. Is this normal for the WS-C3560X-24? Thanks David ___ cisco-nsp mailing list cisco-nsp@puck.nether.net https

Re: [c-nsp] A9K-RSP440 SFP+ ports

2016-02-16 Thread David Wilkinson
Hi, Thanks for confirming, we won't count this ports in our capacity planning. Thanks David On 21/01/2016 17:19, Jeffrey Pazahanick wrote: Correct, they are only for nV clustering, and control-plane only at that. You still need to use line card 10G ports for data plane clustering

Re: [c-nsp] Cisco Security Advisory: Cisco ASA Software IKEv1 and IKEv2 Buffer Overflow Vulnerability

2016-02-15 Thread David White, Jr. (dwhitejr)
The non -smp image is also posted (for the 5505). Look on the 5505 download page under: All Releases --> Interim --> 8 --> 8.2.5 Interim Sincerely, David. On 2/15/16 3:43 PM, Nick Cutting wrote: This is best news I've heard all day. Was going to have to move 55 VPNs

[c-nsp] "MPLS in the SDN Era" New book

2016-01-25 Thread david roy
the RSVP-TE Chapter 20, FIB Optimization for Fast Restoration Chapter 21, Egress Service Fast Restoration Regards David *David Roy * *IP/MPLS NOC engineer - Orange France* SkypeID : davidroy.35 *JNCIE x3 (SP #703 ; ENT #305 ; SEC #144)* _

[c-nsp] A9K-RSP440 SFP+ ports

2016-01-20 Thread David Wilkinson
ith VSS/nV, Looking at images of the ASR 9001 it has ports specifically labelled as cluster ports where as the images of the RSP440 labelled them as SFP+. So I am guessing they are normal ports which can be configured to be cluster ports and could used normally to link up to rest of the network? Tha

Re: [c-nsp] Dell VLT to Cisco VSS

2016-01-18 Thread David Wilkinson
they were in a port channel with a single switch running LACP Hope that helps. Regards David On 18/01/2016 19:56, Paul wrote: Haven't tested it with Dell(force10 stuffs), but have with several other vendors and never had a problem with LAG implementation using the standard so I'd assume

Re: [c-nsp] A switch with huge number of Mac address

2016-01-08 Thread David Hubbard
have had to spend 3x/4x to get into Nexus 7k to get the same table sizes. Arista 7300 chassis would work too if you didn’t want to deal with the whole stacking issue. With the right profile selected, it can do 288k MAC/ARP and 104k v6 ND. David On 1/8/16, 11:05 AM, "cisco-nsp on b

Re: [c-nsp] Remote management console servers?

2015-07-14 Thread David Hubbard
We use and really like the Opengear's as well. Just keep in mind that you're still running a linux box so it should be treated as one. We had to quickly lock all of ours down back when that bash exploit happened as we had the web interface of the units exposed to the cell modem side. David

Re: [c-nsp] Question for TAC

2015-04-30 Thread David White, Jr. (dwhitejr)
). With Respect, David White. Cisco TAC On 4/30/2015 8:47 AM, Eric Van Tol wrote: I think it's because the same engineer is also working on my cases, and since he's busy not working for me, he has no time to be not working for you. (I have a case that is quite straightforward, and after

Re: [c-nsp] Question for TAC

2015-04-30 Thread David White, Jr. (dwhitejr)
they are gone; and notify customers of who to contact if the primary engineer is out of the office... We aren't perfect, but do our best to minimize customer impact due to engineer's absences. David. On 4/30/2015 10:48 AM, Steve Mikulasik wrote: I have noticed this as well. Maybe Cisco should develop

Re: [c-nsp] ASA

2015-02-11 Thread David White, Jr. (dwhitejr)
connection display information and a few more... But, the most noticeable to most people is indeed the permission of traffic based on the security level. Sincerely, David. On 2/11/2015 1:33 PM, Matt Addison wrote: Maybe this is a semantics thing, but isn't implicit rule of 'allow to any less

Re: [c-nsp] ASA

2015-02-11 Thread David White, Jr. (dwhitejr)
to an interface. That is incorrect. Security levels are not negated or affected by applying an ACL (or not) to an interface. Sincerely, David. Cheers,Josh Date: Wed, 11 Feb 2015 20:43:37 +1100 From: dale.shaw+cisco-...@gmail.com To: madu...@gmail.com CC: cisco-nsp@puck.nether.net Subject: Re: [c

Re: [c-nsp] ASA

2015-02-11 Thread David White, Jr. (dwhitejr)
Correct. David. On 2/11/2015 4:22 AM, Alan Buxey wrote: Going from 0 to 100 . That's a default block on the ASA platform isn't it? alan ___ cisco-nsp mailing list cisco-nsp@puck.nether.net https://puck.nether.net/mailman/listinfo/cisco-nsp

Re: [c-nsp] ASA

2015-02-11 Thread David White, Jr. (dwhitejr)
the software to a more recent release. 7.2.3 is extremely old. Sincerely, David. On 2/11/2015 3:26 AM, madu...@gmail.com wrote: I would like to block the following ports: 135,137,138,139,445,593, tcp/udp on my Firewall interface GigabitEthernet0/0 nameif outside security-level 0 ip

[c-nsp] IPv6 ND cache size on NX9k?

2015-02-04 Thread David Hubbard
Hi all, does anyone know the IPv6 ND capacity on the Nexus 9k line? Or 9300 and 9500 specifically? I found ARP at 90k but can't find anything for IPv6. Thanks, David ___ cisco-nsp mailing list cisco-nsp@puck.nether.net https://puck.nether.net

Re: [c-nsp] Secondary IP address causing MTU reduction?

2014-12-16 Thread David Coulson
What platform? What code? Can you post your interface config? Sent from my iPhone On Dec 16, 2014, at 9:22 PM, Eric A Louie via cisco-nsp cisco-nsp@puck.nether.net wrote: I encountered a strange problem that I'm hoping is a bug. Directly connected routersMTU 9200Works fine with single IP

[c-nsp] Capturing remote trafic / RSPAN through non-Cisco

2014-12-12 Thread David Deutsch
even take that. Thanks, David ___ cisco-nsp mailing list cisco-nsp@puck.nether.net https://puck.nether.net/mailman/listinfo/cisco-nsp archive at http://puck.nether.net/pipermail/cisco-nsp/

Re: [c-nsp] Capturing remote trafic / RSPAN through non-Cisco

2014-12-12 Thread David Deutsch
Initial indications point to No. On Fri, Dec 12, 2014 at 12:45 PM, Jared Mauch ja...@puck.nether.net wrote: On Dec 12, 2014, at 12:38 PM, David Deutsch david.deut...@telna.com wrote: Hello all, I have a 7201 router running an ITP image that is used as an SS7 STP, it in turn

Re: [c-nsp] Capturing remote trafic / RSPAN through non-Cisco

2014-12-12 Thread David Deutsch
ports. So if your M8024K has command to disable MAC learning in a VLAN, it's all you need (we're using that on other vendors' switches on daily basis). With kind regards, M. On Fri, 12 Dec 2014 12:38:02 -0500, David Deutsch wrote Hello all, I have a 7201 router running an ITP

Re: [c-nsp] Active/Standy ASA Firewalls are having duplicate IP issue on failover

2014-11-26 Thread David White, Jr. (dwhitejr)
Hi Ahsan, Replies inline... On 11/25/2014 5:00 PM, Ahsan Rasheed wrote: Hi David, Fabien all who replies , First I would like to say thank you so much for helping me on this issue. I would like to clear few things. Customer is using /30 IP on Active Firewall and Standby

Re: [c-nsp] Active/Standy ASA Firewalls are having duplicate IP issue on failover

2014-11-25 Thread David White, Jr. (dwhitejr)
the IPs it needs to have failover configured properly. Sincerely, David. On 11/25/2014 11:50 AM, Ahsan Rasheed wrote: Hi Guys, Actually I would like to know if you guys can provide me the solution on below issue. we are providing internet to one of our customer. our Connection is connected

[c-nsp] Cisco.com randomly broken over ipv6?

2014-10-28 Thread David Hubbard
You Have Requested Is Not Available but IPv4 gives me the actual login page with user/pass boxes. If I can log in, I'll get random xml output instead of pages at times. David ___ cisco-nsp mailing list cisco-nsp@puck.nether.net https://puck.nether.net

[c-nsp] Full Routes / iBGP Issue Question

2014-09-25 Thread David Deutsch
be highly appreciated! --David Deutsch ___ cisco-nsp mailing list cisco-nsp@puck.nether.net https://puck.nether.net/mailman/listinfo/cisco-nsp archive at http://puck.nether.net/pipermail/cisco-nsp/

Re: [c-nsp] SFP's (Third party) for ME3600

2014-09-03 Thread David Farrell
to slide out. I ended up having to push the 'release' mechanism in with a screwdriver to pop the SFP out. Had to file those SFPs in the bin. Cheers, David. -- DAVID FARRELL Technical Manager Tibus T: +44 (0)28 9033 1122 F: +44 (0)28 9042 4709 E: dfarr...@tibus.com W: www.tibus.com Follow us

Re: [c-nsp] OOB Device for remote DC's

2014-09-02 Thread David Hubbard
just have to get your sales rep to assign a static IP and your'e good to go with ssh and vpn to your equipment. David -Original Message- From: cisco-nsp [mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of CiscoNSP List Sent: Monday, September 01, 2014 9:53 PM To: cisco-nsp

Re: [c-nsp] Need suggestion on cisco 3560 sw IOS

2014-06-26 Thread David Farrell
satisfaction, I'll attempt to remember to note any oddities here. Cheers, David. ___ cisco-nsp mailing list cisco-nsp@puck.nether.net https://puck.nether.net/mailman/listinfo/cisco-nsp archive at http://puck.nether.net/pipermail/cisco-nsp/

Re: [c-nsp] 40G QSFP to 4*10G SFP+ Breakout Optical Cable

2014-06-18 Thread David Paul Zimmerman
This may be a weird tangent to your question, but if you're running on a Nexus 6004 (maybe other platforms too, but definitely the 6004) and don't mind wasting a whole 40GE QSFP port to service a 10GE drop (say you're way overprovisioned on 40GE capacity and can do that), you should check out

Re: [c-nsp] Cisco model recommendation

2014-06-17 Thread David Paul Zimmerman
Although Cisco puts this switch in the data center product line, the Catalyst 4948E is nice for campus edge QoS/QinQ needs. It is 1RU, has 48 1000BASE-T ports and four 10GE SFP+, dual PS, and has silicon-parity with the Sup6 Catalyst 4500 line so has all the same QoS capabilities.

Re: [c-nsp] ASR 1002-X as LNS

2014-06-05 Thread David Farrell
used to using:) Been through the same process. I lifted the 7200 configuration with little modification. I can't remember anything particularly strange or startling apart from perhaps having to stay honest with licensing... Cheers, David. ___ cisco

Re: [c-nsp] Log that google doesn't help

2014-05-19 Thread David beckett
a Bug referenced in the search, Bug ID: CSCsj59811 Search was done from my CCO account. HTH Yours sincerely, Sincères salutations, Mit freundlichen Grüssen, Distinti saluti, David BECKETT Network Service Delivery Switzerland DACH IMT IBM Suisse IBM

Re: [c-nsp] Netflow analysis tools?

2014-05-19 Thread David Hubbard
[mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of David beckett Sent: Monday, May 19, 2014 12:45 AM To: cisco-nsp@puck.nether.net Subject: Re: [c-nsp] Netflow analysis tools? Hello Scott, PRTG Network Monitor can present Netflow monitoring in pretty graphs, including usage over time, and top

Re: [c-nsp] Netflow analysis tools?

2014-05-18 Thread David beckett
monitoring everything else. HTH Yours sincerely, Sincères salutations, Mit freundlichen Grüssen, Distinti saluti, David BECKETT Network Service Delivery Switzerland DACH IMT IBM Suisse IBM Banking Solutions Center Avenue de la Vallombreuse 100 CH - 1008

Re: [c-nsp] restrict authentication configuration for certain auth levels

2014-04-23 Thread David George
, was more a curiosity point than anything. David George System Administrator P: +61 7 3503 6806 (ext 500) A: PO Box 476, Annerley Q 4103 Australia W: oztix.com.au | nztix.co.nz | heatseeker.com.au  This email and attachments are intended for the named address(es) only and may contain

[c-nsp] restrict authentication configuration for certain auth levels

2014-04-22 Thread David George
Afternoon all What's an easy way to restrict configuration of anything auth related (aaa, local users etc..) for a specific user level? Thanks in advance --David George ___ cisco-nsp mailing list cisco-nsp@puck.nether.net https://puck.nether.net

[c-nsp] Market for used ASR1k's?

2014-03-19 Thread David Hubbard
selling outright or if I'd get something useful using them as a trade-in later on. Thanks, David ___ cisco-nsp mailing list cisco-nsp@puck.nether.net https://puck.nether.net/mailman/listinfo/cisco-nsp archive at http://puck.nether.net/pipermail/cisco-nsp/

Re: [c-nsp] Update error on Cisco CSC-SSM Module..

2014-02-17 Thread David White, Jr. (dwhitejr)
The error code 62 is indicating a certificate validation has failed. For this issue, you need to upgrade to patch 1140. I don't quite understand the challenge you are facing opening a TAC case - if the CSC module is under a support contract. Have you tried again? Sincerely, David. On 2/16

Re: [c-nsp] TAC hits a new record level of aggravation...

2014-02-03 Thread David White, Jr. (dwhitejr)
Hi Chris / All, Thanks for alerting us to this problem. The Support Case Manager team put a fix (we hope) in this weekend. Glad it is now working for you. Sincerely, David. On 2/3/2014 10:12 AM, Chris Marget wrote: On Sat, Feb 1, 2014 at 12:41 PM, Chris Marget ch...@marget.com wrote: I

Re: [c-nsp] ASA5520 latency OSPF drops

2014-02-03 Thread David White, Jr. (dwhitejr)
drop. You might want to clear it, and then look at this output after the next occurrence of the issue. Sincerely, David. On 2/1/2014 11:27 AM, Adam Greene wrote: Hi, We are having a problem with high latency and OSPF drops on an ASA5520. The portion of our network in question

Re: [c-nsp] Debug Radius auth and passwords

2014-02-02 Thread David White (dwhitejr)
Hi Rob, No. Passwords are obscured for security reasons. Sincerely, David. On Feb 2, 2014, at 4:50 PM, Robert Hass robh...@gmail.com wrote: Hi I'm just troubleshooting Radius authentications for VPN and PPPoE access. I enabled Radius auth debug by : debug radius authentication

Re: [c-nsp] ASA 5500-X mismatching SSP with IPS SSP?

2013-10-25 Thread David White, Jr. (dwhitejr)
No, the SSP modules must match. Sincerely, David. On 10/25/2013 2:26 PM, Yang Yu wrote: Is it possible to mix SSP and IPS SSP models? For example SSP-20 with IPS SSP-40? When I mixed them I could not bring up the IPS SSP. Thanks ___ cisco-nsp

Re: [c-nsp] ASA 5525x netflow and cisco 3750x netflow

2013-10-24 Thread David White, Jr. (dwhitejr)
Hi Michael, If you see the UDP netflow packets leaving the ASA (via say a capture from the ASA), and they are destined to the prtg server, then the issue is downstream of the ASA. I would focus the troubleshooting there. Sincerely, David. On 10/24/2013 3:41 PM, Michael Sprouffske wrote: I am

Re: [c-nsp] SC to LC converter

2013-10-14 Thread David Hubbard
not run into loss issues. David -Original Message- From: cisco-nsp [mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of Jeff Kell Sent: Monday, October 14, 2013 6:12 PM To: Kenny Kant; cisco-nsp@puck.nether.net Subject: Re: [c-nsp] SC to LC converter Cheapest alternative is get an SC

Re: [c-nsp] Best Support of Tier 1 ISP

2013-07-09 Thread David Hubbard
call is here's your ticket number and someone will call you back soon if you're lucky. David -Original Message- From: cisco-nsp [mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of Ahmed Hilmy Sent: Tuesday, July 09, 2013 7:10 AM To: cisco-nsp@puck.nether.net Subject: [c-nsp] Best

  1   2   3   4   5   6   7   8   9   10   >