Re: [c-nsp] VPDN-aware VRF

2012-03-11 Thread Oliver Eyre
Definitely possible. Create the VRF and interface like normal and then supply your VPDN group with the following line: vpn vrf ProvXYZ Any resultant sessions will assume default routing table unless explicitly specified in your Virtual-Template or via RADIUS.

Re: [c-nsp] LACP and Wireless links

2011-09-07 Thread Oliver Eyre
Depending on the wireless hardware, some vendors have a feature that temorarily down the physical port when the radio link fails. Oliver -Original Message- From: cisco-nsp-boun...@puck.nether.net [mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of Herro91 Sent: Wednesday, 7

Re: [c-nsp] PA-2FE-TX in 7206VXR

2011-01-11 Thread Oliver Eyre
I believe you may be exceeding the availble bandwidth points for the chassis. First result in google for 7200 bandwidth points should have a PDF where you can check how many points each interface needs. Oliver ___ cisco-nsp mailing list

Re: [c-nsp] BFD expectations

2010-09-23 Thread Oliver Eyre
While on the subject, does anyone know if BFD for SVIs has been fixed yet? Oliver -Original Message- From: cisco-nsp-boun...@puck.nether.net [mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of Chris Evans Sent: Thursday, 23 September 2010 2:20 PM To: Pete Lumbis Cc:

Re: [c-nsp] Check command history on CISCO

2010-09-22 Thread Oliver Eyre
show history all Oliver -Original Message- From: cisco-nsp-boun...@puck.nether.net [mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of vijay gore Sent: Wednesday, 22 September 2010 6:21 PM To: cisco-nsp@puck.nether.net Subject: [c-nsp] Check command history on CISCO HI, I

Re: [c-nsp] netflow tools

2010-09-19 Thread Oliver Eyre
Havent used it, but Stager looks like it can do that. http://software.uninett.no/stager/wiki/USERDOC#SelectingReport Oliver -Original Message- From: cisco-nsp-boun...@puck.nether.net [mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of Sharlon R. Carty Sent: Monday, 20 September 2010

Re: [c-nsp] High SNMP ENGINE CPU usage on VXR 7206

2010-07-25 Thread Oliver Eyre
Further to this, a good start would be to put an ACL on your snmp-server to only permit hosts that require access. You may also want to block/slow SNMP on certain interfaces that don't have any reason to be sending it. Oliver -Original Message- From: cisco-nsp-boun...@puck.nether.net

Re: [c-nsp] NATIVE_VLAN_MISMATCH

2010-06-02 Thread Oliver Eyre
This is to an external entities switch mind you, so I don't especially see why you need to be exchanging any of this information. OP, I suggest the following to ensure you don't get any surprise VLAN DB changes or strange messages. Enable: -BPDU Filter -switchport nonegotiate Disable: -CDP

Re: [c-nsp] Ethernet Encryption

2010-06-01 Thread Oliver Eyre
Have you considered L2TPv3? Oliver ___ cisco-nsp mailing list cisco-nsp@puck.nether.net https://puck.nether.net/mailman/listinfo/cisco-nsp archive at http://puck.nether.net/pipermail/cisco-nsp/

Re: [c-nsp] NAT out via loopback

2008-11-18 Thread Oliver Eyre
Hi Jeff, Not sure if this is the best solution, but at my office we have a primary link and a backup link and we NAT out of the loopback so our telnet and SSH sessions don't crash on us if we ever switch links. Here are the relevant bits of config (on 1811) interface Loopback0 ip nat