Hi,
first you need to enable ip routing to make it work.
Then your default route should look like this:
ip route 0.0.0.0 0.0.0.0 xxx.xxx.xxx.xxx where is
xxx.xxx.xxx.xxx is the other router interface.
Note: after the destination network follows a subnet mask (not a
wildcard mask).
Make sure
interactive voice over satellite is problematic due to the inherent
latency of the signal travelling 40,000km distance to the satellite
and another 40,000km back. this adds 125ms of latency in each
direction (to/from the bird), give or take. if you remeber using
satellite for long distance
Just for clarification can someone comment on or confirm the following: If
policy routing is enabled on an interface and the policy states that a
packet received on that particular interface be sent to a next hop IP or an
interface, will the packet be sent to that next hop even if a route exists
policy based routing takes place before the routing process, so yes the
packet will be sent to the destination that policy routing states.
Jason Viera wrote:
Just for clarification can someone comment on or confirm the following: If
policy routing is enabled on an interface and the policy
Hi,
ATM technology is based on 53 byte cells. Also ATM has a 5 byte header
per cell. So your payloads length can be 48 bytes per ATM cell.
with a basic calculation, for an ip traffic on 34Mb ATM link :
48 (payload includes the ip header) / 53 (total bytes can be trasnfered
in a cell)
equals
Hi all,
Can any one help about Chat script configuring. It will be very nice if we
get some diagrams for the detailed configurations.
how about this topic for the lab?
Is there any one have experienced it?
cheers,
Heiman.
Message Posted at:
It actually depends on which command u use:
if u use the
set ip next-hop OR set interface THEN packets will be sent to the
destinations defined in these commands
if u use the
set ip default next-hop OR set default interface THEN packets will be sent
to the defined destinations if there is no
Here is a link:
http://www.cisco.com/en/US/products/sw/iosswrel/ps1835/products_configuration_guide_chapter09186a00800ca6f5.html
AK
H T a icrit dans le message de
news:[EMAIL PROTECTED]
Hi all,
Can any one help about Chat script configuring. It will be very nice if we
get some diagrams for
Hi,
Has anyone actually been playing with Cisco TCP intercept lately? Does this
piece of
crap work at all? I am running both IOS version 12.1.5(T9) and 12.2.15(T)
and TCP
intercept is not working in intercept mode. TCP intercept does work in
watch mode.
when it is running in intercept mode,
All,
Below is the configuration I have with AUTH-PROXY. I don't understand why
the configuration works with IOS version 12.2.15(T) but doesn't work with
IOS version
12.1.5T(9). With version 12.1.5T(9), I am not getting a authentication
failed. Instead
I am getting bad request.
Any ideas?
simon watson wrote in message
news:[EMAIL PROTECTED]
Hi
Some how I was thinking VLAN tagging was something more than just
Trunking
in Cisco talk,as you can guess I'm pretty rusty when it comes to
switching.I
have another question.Look at the example below.
Hi Levent,
I thanks your explanation. It was very good.
Best Regards.
Levent Ogut wrote:
Hi,
ATM technology is based on 53 byte cells. Also ATM has a 5 byte header
per cell. So your payloads length can be 48 bytes per ATM cell.
with a basic calculation, for an ip traffic on 34Mb ATM link
Hi Dom, we did test with TFY aplication, generating a burst traffic of 3000
bytes UDP. This aplication stressed the link, but I don`t undestard why not
reach the maximun bandwith permited: 34Mbps. What do you think about this
test? Is right?
Dom wrote:
-Original Message-
From: [EMAIL
Hi Jason,
PBR is used to override the routing table. So if you have a Policy on
an interface to set the nex-hop explicitly then any traffic that matches
your route-map that the policy is calling will have a next-hop set to
what YOU specified not what the routing table states.
Mario
Somebody (I'm sorry I deleted the post), posted after me, and it does
look like you are hitting the cell tax problem. With other (including
layer 3 overheads) you are not doing to badly
Sorry if this is not what you want to hear ;)
Best regards,
Dom Stocqueler
SysDom Technologies
Visit our
It could just be that in version of 12.2.15(T) it is finally fully
implemented. 12.1.5T(9) is just an earlier version. I ran into this last
night while working on blocking Nimda and Code Red. The feature required to
do the blocking was released in 12.1E (not exactly sure which version, I
can't
That figures. Well I noticed it too late. Class stoarts tomorrow. Such is
life. I will just get an updated cisco press book whenthey come out and
bring myself up to speed. Thanks for the heads up it gives me something to
look for.
David
Message Posted at:
Hi,
I am preparing for the R S written exam and wondering do we have to master
in everything mentioned in the blueprint? I find myself hard to decide how
deep I should dip into some of the subjects. For example, OSI model is
listed in the blue print but do I have to know CNLP, CONP those stuff?
Hi,
Anyone has good reference doc about GRE with Ipsec .
I am a little confused about 2 flavors of crypto ACL used:
A) permit ip
B) permit gre any any
It seems option A is encry first then GRE encap, while option B is encap
first then encrypt.
Is there a good ref about these setups?
Thanks
IPX is no longer in the LAB.
-Original Message-
From: wj chou [mailto:[EMAIL PROTECTED]
Sent: 06 July 2003 23:26
To: [EMAIL PROTECTED]
Subject: OSI routing in CCIE RS exam? [7:71960]
Hi,
I am preparing for the R S written exam and wondering do we have to master
in everything
You need to know EVERYTHING.
I took failed last week.
RIPv2, OSPF, EIGRP, IS-IS, BGP - all redistributing into each other..
-Original Message-
From: alaerte Vidali [mailto:[EMAIL PROTECTED]
Sent: 04 July 2003 22:38
To: [EMAIL PROTECTED]
Subject: RE: CCIE Lab !!! [7:71919]
For
Try this
http://www.cisco.com/en/US/tech/tk583/tk372/tech_configuration_examples_list.html
Lots of examples here.
Annlee
Michael Jia wrote in message
news:[EMAIL PROTECTED]
Hi,
Anyone has good reference doc about GRE with Ipsec .
I am a little confused about 2 flavors of crypto ACL used:
Hi, Joe
There is a sligt difference between A and B.
Could you share some insights as well?
Thanks
Michael
-Original Message-
From: Joe Deleonardo [mailto:[EMAIL PROTECTED]
Sent: Sunday, July 06, 2003 5:17 PM
To: Michael Jia; [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: Re: GRE with
I don't have a source. But, it's really very simple all you do is apply the
crypto map to the tunnel interface AND the physical interface between the
two devices.
Then add an ACL:
access-l 100 permit gre host host
You do that on each device of course.
And then the rest of it is just a
Hmm, not sure what you mean but.
Really all you do is create your regular VPN.
Then you create your GRE tunnel. then the ACL here is an abbreviated
example.
R1#
Int Lo0
ip address 1.1.1.1 255.255.255.0
Int Tu0
ip address 10.1.1.1 255.255.255.0
tun source loop0
tun dest 2.2.2.2
crypto map
I think you have to prepare everything that is in the blueprint.
but like CLNP, you have to know, because it's related with ISIS, is it
right?
everything in the blueprint will be in the written exam.
Message Posted at:
http://www.groupstudy.com/form/read.php?f=7i=71968t=71960
From your original email.
by permitting ip you're allowing everything over the IPSec tunnel. If you
just permit gre you're just allowing the gre tunnel over the ipsec tunnel.
You might want to do this to transport something that ipsec can't handle by
itself, like AppleTalk or IPX.
You're
Thanks ALL, for the clarification!!
Jason
Junoguy wrote in message
news:[EMAIL PROTECTED]
Hi Jason,
PBR is used to override the routing table. So if you have a Policy on
an interface to set the nex-hop explicitly then any traffic that matches
your route-map that the policy is calling will
Hi Gerard,
ATM as a technology per se, is a high overhead technology. As the basic fact
the fixed size cell is of 53 bytes and out of it the Cell Header consumes 5
bytes. So the net payload per cell is actually 48 bytes only, so effectively
you are having a close to 10% overhead, and it is not
29 matches
Mail list logo