On Dec 13, 2011 3:57 AM, John Brown j...@citylinkfiber.com wrote:
Hi oh wise and wonderful list :)
I've got cisco 17xx and 18xx routers in the field with DSL interface
(WIC's) in them.
I'm trying to gain better inside in the quality of the ILEC provided DSL
loop by using the
show dsl
Hi
In this case I'd be careful with these features
Even though the advantage is that you won't loose the label mappings from the
particular neighbor in case the direct link fails as the ldp hellos would be
exchanged between the loopbacks and can be routed around the failed link same
as the tcp
Hey,
just a quick heads up, maybe someone is hitting that, too. Since
upgrading our test Nexus 7000 from 5.2(1) to 5.2(3) this morning we have
a failover due to a crashing vlan_mgr process every hour. It turns out
sh vlan (which is executed by RANCID every hour) reliably kills the
box.
2011 Dec
On Dec 13, 2011, at 5:09 AM, Bernhard Schmidt wrote:
Hey,
just a quick heads up, maybe someone is hitting that, too. Since
upgrading our test Nexus 7000 from 5.2(1) to 5.2(3) this morning we have
a failover due to a crashing vlan_mgr process every hour. It turns out
sh vlan (which is
On Dec 13, 2011, at 5:09 AM, Bernhard Schmidt wrote:
Hey,
just a quick heads up, maybe someone is hitting that, too. Since
upgrading our test Nexus 7000 from 5.2(1) to 5.2(3) this morning we
have a failover due to a crashing vlan_mgr process every hour. It
turns out sh vlan (which is
Bernhard Schmidt be...@birkenwald.de wrote:
just a quick heads up, maybe someone is hitting that, too. Since
upgrading our test Nexus 7000 from 5.2(1) to 5.2(3) this morning we have
a failover due to a crashing vlan_mgr process every hour. It turns out
sh vlan (which is executed by RANCID
Daniel,
Kron script is the old way used to backup files (IOS). Problem was
that in earlier NX-OS releases there was no TCL-TK scripting
available. We had only short EEM scripting using objects, but it was
useful only to control vPC peer-link and keepalive status in ordert to
avoid blackholing
Hi John,
For starters, look at the standard DSL stats, ie. attenuation SNR. It's hard
to say what is a good DSL loop though as it depends so much on any number of
things (copper guage, joins, etc).
You can also monitor the number of errors you're getting on the line.
All of this can be done
Has anyone run into issues with adding new vlans to a VPC for HP blades? I
have just provisioned a new network to pump down to my HP blades but have run
into issues on the HP farm.
HP Flexfabric certainly feels like a black hole in the data center
network infrastructure. Are you sure the
On 13.12.2011 12:01, Daniel Hooper wrote:
Just on the topic of rancid and Cisco, I've seen a couple of
alternative methods posted around the place recently of different ways
to keep a device config backed up and was just curious as to whether
people are using these instead of rancid?
I
Indeed I should have specified this in the initial email...
We're using T1, DS3, OC3, and OC-12, depending on site size. Some of
them run through our legacy ATM network, while others run HDLC/PPP or
POS. We have almost no Ethernet WAN (thanks for the Ethernet OAM
suggestion above, but won't
I agree that the 10g-1G is probably the culprit amplifying the burst nature of
the packets. At our colo at the NYSE in Mahwah we have implemented HP's flex
fabric in blade chassis instead of doing what you are doing with the Arista's
and it's working fine. We probably are going to have to do
Bernhard Schmidt be...@birkenwald.de wrote:
just a quick heads up, maybe someone is hitting that, too. Since
upgrading our test Nexus 7000 from 5.2(1) to 5.2(3) this morning we have
a failover due to a crashing vlan_mgr process every hour. It turns out
sh vlan (which is executed by RANCID
Hi,
I have an odd question. We have a Cisco WS-C2950T-24 that was working fine
until we changed the device it is directly connected to for its uplink. The
switch was connected to a gig port on a 3550 and was reachable. It is now
connected to a gig port on a 6509. The strange thing is, it passes
Hi,
On Tue, 13 Dec 2011, Lee Starnes wrote:
Hi,
I have an odd question. We have a Cisco WS-C2950T-24 that was working fine
until we changed the device it is directly connected to for its uplink. The
switch was connected to a gig port on a 3550 and was reachable. It is now
connected to a gig
Have a crypto map that was working to build a tunnel between 65.119.118.75
and 24.235.0.25. Peers for the vpn tunnel were 24.235.0.26 and
65.119.118.136. Due to some network changes 24.235.0.26, which was the
egress interface toward the remote end, is now an ingress interface. Still,
I don't
Hey all - Looking for some un-biased feedback; and I will get it here. :)
As an alternative to a ToR design within our data center, I've been
asked to consider the HP Flexfabric product with an integrated Cisco
Nexus 2K built into it. I'm not a fan of converged infrastructure as
this, but the
Actually, I mis-spoke on the HP Flexfabric question.
I've been asked to consider the HP Flexfabric product OR the
integrated Cisco Nexus 2K within an HP Blade serverIf anyone has
deployed either solution, I would love some feedback
thanks
p-
On Tue, Dec 13, 2011 at 2:00 PM, Pablo Espinosa
So, in the example below, will this cause the vpn to connect to the peer
from FastEthernet0/0, but identify as the ip address of FastEthernet1/1?
crypto map WinnetToSyniverse local-address FastEthernet1/1
crypto map WinnetToSyniverse 20 ipsec-isakmp
description PHL-3845-SS7-VPN router
set peer
Joseph,
With anything VPN related it may be better to either post outputs of a
'debug isakmp sa' or 'debug ipsec sa' or the relevent portions of the
configurations on both devices. It's not easy to get an idea of what is
going on with small config snippets.
Regards,
Clint Wade
On Tue, Dec 13,
This might sound incredibly silly, but in the case I've had better luck with
4900s. They use a single central buffer, so the buffer is effectively
considerably deeper, depending on the specific workload of course.
I've never been quite able to bring myself to use a dell blade chassis, and
Mostly I was just trying to find out, never having used the local address
parameter in the global crypto map config, if I was using it correctly. Here is
the debug output you mentioned.
With the config shown below, pinging from 24.235.0.25 to 65.119.118.76 to bring
the vpn up...
Router#show
All I've ever had here is 12.2-based stuff - cat4k and cat6k, a handful of
2800/3800s for minor stuff. So I've never seen IOS 15.
The shiny new sup2t in my test rack keeps hinting at me try 15... try 15...
The 15SY release notes seem to indicate that it's not going to look much
different
Tried all of these things kind of lost on this one. Waiting to hear back from
HP.
-Original Message-
From: Håvard Staub Nyhus [mailto:hny...@gmail.com]
Sent: Tuesday, 13 December 2011 11:16 PM
To: Thomason, Simon
Cc: cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] Cisco 5k with HP flex
Hi,
Is there a handy changes from 12 to 15 for dummies guide? Or, don't worry
about it, it's really not a big deal? Mostly care about cat6k mgmt, MPLS VPN
and MVPN, BGP, OSPF, IPv4 environment.
Anyone using sup2t in anger yet, and opinions on 12 vs 15? (Though clearly
12.2(50) doesn't
Joseph--
When I played VPN day in and out, and couldn't make a tunnel come up I
found that it was typically due to one of four reasons:
1) Mismatch in ACLs on the two peers
2) A route was not correct
3) Crypto map bound to the wrong interface
4) NAT goof up
If you have checked those 4
Hi,
Is there a handy changes from 12 to 15 for dummies guide? Or, don't worry
about it, it's really not a big deal? Mostly care about cat6k mgmt, MPLS VPN and MVPN,
BGP, OSPF, IPv4 environment.
Anyone using sup2t in anger yet, and opinions on 12 vs 15? (Though clearly
12.2(50) doesn't seem
27 matches
Mail list logo