Any CMTS experts on here? We have a Cisco CMTS and have one node that is
causing grief, techs in the field say it's a router issue and I'm not so
sure
All the customers who are experiencing problems (can surf, but very slow)
have output like this:
MAC AddressIP Address I/F
I do have access, I'm not as concerned about the features, most should
include what I am looking for. I'm concerned with going with software that
is up to date and supported on the device I will be using, ie running SXF
code on a 720 in a 7606. Just wondering if there are any concerns with that?
On 5/23/07, Rodney Dunn [EMAIL PROTECTED] wrote:
The title of that bug is:
CSCsi66768 odr route can not be redistributed into ospf
On Wed, May 23, 2007 at 02:04:47AM -0300, Rubens Kuhl Jr. wrote:
We have been suffering a RIP bug on C7600, IOS 12.3(33)SRB, that
causes ugly tracebacks,
How about
rtr#sh log last x
where x=minutes?
Brad
Rodney Dunn wrote:
Good suggestion. Let me see if I can convince development to code it.
We have some of those things with the event log infrastructure already.
UUT_#sh monitor event-trace ssm ?
all Show all the traces in
Hey guys,
I have a 7200 taking sessions from a Redback and either the Redback
is not configured properly (hard to prove as I don't have access), or I have
a local problem.
I'm receiving the log entry below
AAA/AUTHOR (0x0): Pick method list 'local-list'
This seems to suggest
Make sure your radius host(s) is(are) defined with a block similiar to this
(and are reachable)-
radius-server host xx.xx.xx.xx auth-port 1645 acct-port 1646 non-standard
radius-server host xx.xx.xx.xx auth-port 1645 acct-port 1646 non-standard
radius-server deadtime 60
radius-server key 7
What does your virtual template look like?
I have in addition to your ppp group a group for l2tp:-
aaa authentication ppp l2tptunnel group radius
and then :-
vpdn-group 1
accept-dialin
protocol l2tp
virtual-template 1
terminate-from hostname remotehost
lcp renegotiation on-mismatch
l2tp
On 27/05/07, Kevin Graham [EMAIL PROTECTED] wrote:
CISCO-ENVMON-MIB will address the specific case of power supplies (as
well as fans and thermal conditions) and is pretty widely implemented.
CISCO-ENTITY-SENSOR-MIB is cleaner, but I seem to recall a fair number
of platforms lacking support.
Sami,
You should have a look at:
http://qbone.internet2.edu/qbss/
Without knowing what specifically you want to do, You can give your
customers a 10mbps service and allow them to use 2mbps with a 10mbps burst.
You put the first 2mbps in the default-class, and the exceed into scavenger.
If no one
Hi,
What is the difference between this engine models on the 7200 series? From
what I've gathered, the NPE supports multiservice requirement like IPv6 etc.
As for the NSE, its more towards hardware based forwarding resulting in higher
packet transmission and throughput. Am i right?
Regards,
On May 30, 2007, at 11:07 AM, Leonardo Souza wrote:
I'd like to know if it's secure update them doing:
A lot of folks leapfrog the numbers - so, for example, they've access-
list 101 applied, and access-list 102 as a copy of access-list 101.
They push an update to access-list 102, then
I've got this situation:
[upstream1]--[r1]--[r2]--[upstream2],[3],[4]
r1 and r2 are mine. All connections are lan (fastE and gigE).
upstream1 is a backup, it sends me only it's own routes and a default
route via bgp. No other provider sends me a default route via bgp,
but they do send full
Hi, I'm trying to configure a vpn from a 2610XM to a 7206VXR NPE400 and not
having much luck (or debug output).
Router A (2610) has 1 FAST E and one Serial
fast E 0/0 has an IP of 10.200.100.1/24
Serial 0/1.1 has a frame connected IP of 172.16.100.2 and a DLCI of 16
the 7206 has a fast E 1/0
On 5/30/07, Leonardo Souza [EMAIL PROTECTED] wrote:
I have some ACL and Receive ACL applied on my routers.
I'd like to know if it's secure update them doing:
If you're running a release that supports sequenced access-lists, you
can make incremental updates in-place with:
router#sh ip
How about a vbscript that the customer can d/l and run that will just iterate
every interface and set the reg hack?
Thanks,
Brian Desmond
[EMAIL PROTECTED]
c - 312.731.3132
-Original Message-
From: [EMAIL PROTECTED] [mailto:cisco-nsp-
[EMAIL PROTECTED] On Behalf Of Kurt Bales
Jeff Kell wrote:
Kurt Bales wrote:
8. WTF?
I strongly suspect Microsoft LLDP
(http://www.microsoft.com/whdc/Rally/LLTD-spec.mspx).
Ooops, make that LLTD protocol (darned new acronyms...)
Jeff
___
cisco-nsp mailing list cisco-nsp@puck.nether.net
Kurt Bales wrote:
8. WTF?
I strongly suspect Microsoft LLDP
(http://www.microsoft.com/whdc/Rally/LLTD-spec.mspx).
Anyone have a list of pwned cold-war era missile silos we could direct
in Redmond's general direction? :-)
Jeff
___
cisco-nsp mailing
17 matches
Mail list logo