Definitely possible.
Create the VRF and interface like normal and then supply your VPDN group
with the following line:
vpn vrf ProvXYZ
Any resultant sessions will assume default routing table unless explicitly
specified in your Virtual-Template or via RADIUS.
Depending on the wireless hardware, some vendors have a feature that
temorarily down the physical port when the radio link fails.
Oliver
-Original Message-
From: cisco-nsp-boun...@puck.nether.net
[mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of Herro91
Sent: Wednesday, 7
I believe you may be exceeding the availble bandwidth points for the
chassis.
First result in google for 7200 bandwidth points should have a PDF where
you can check how many points each interface needs.
Oliver
___
cisco-nsp mailing list
While on the subject, does anyone know if BFD for SVIs has been fixed yet?
Oliver
-Original Message-
From: cisco-nsp-boun...@puck.nether.net
[mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of Chris Evans
Sent: Thursday, 23 September 2010 2:20 PM
To: Pete Lumbis
Cc:
show history all
Oliver
-Original Message-
From: cisco-nsp-boun...@puck.nether.net
[mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of vijay gore
Sent: Wednesday, 22 September 2010 6:21 PM
To: cisco-nsp@puck.nether.net
Subject: [c-nsp] Check command history on CISCO
HI,
I
Havent used it, but Stager looks like it can do that.
http://software.uninett.no/stager/wiki/USERDOC#SelectingReport
Oliver
-Original Message-
From: cisco-nsp-boun...@puck.nether.net
[mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of Sharlon R. Carty
Sent: Monday, 20 September 2010
Further to this, a good start would be to put an ACL on your snmp-server to
only permit hosts that require access.
You may also want to block/slow SNMP on certain interfaces that don't have
any reason to be sending it.
Oliver
-Original Message-
From: cisco-nsp-boun...@puck.nether.net
This is to an external entities switch mind you, so I don't especially see
why you need to be exchanging any of this information.
OP, I suggest the following to ensure you don't get any surprise VLAN DB
changes or strange messages.
Enable:
-BPDU Filter
-switchport nonegotiate
Disable:
-CDP
Have you considered L2TPv3?
Oliver
___
cisco-nsp mailing list cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
Hi Jeff,
Not sure if this is the best solution, but at my office we have a
primary link and a backup link and we NAT out of the loopback so our
telnet and SSH sessions don't crash on us if we ever switch links.
Here are the relevant bits of config (on 1811)
interface Loopback0
ip nat
10 matches
Mail list logo