Yes, it's good in some areas, but not everybody has so much money to have real 
Cisco at home :-) and just because a lot of people use something doesn't mean 
that it's a good product.

Good security? securityfocus.com provide different view. Too much bugs in their 
IOS. But ok, a lot of people is ok with that. Based on BSD..... "Please take 
note of our Who uses it page, which list just some of the vendors who 
incorporate OpenSSH into their own products -- as a critically important 
security / access feature -- instead of writing their own SSH implementation or 
purchasing one from another vendor. This list specifically includes companies 
like Cisco, Juniper, Apple, Red Hat, and Novell; but probably includes almost 
all router, switch or unix-like operating system vendors. In the 10 years since 
the inception of the OpenSSH project, these companies have contributed not even 
a dime of thanks in support of the OpenSSH project (despite numerous requests)."

This is "funny" too :

> 
> Check that
you are not tagging the incoming traffic as vlan
> 301.  The ports need to be
in trunk mode.
> 

It so funny that you should mention this, yesterday we had
a 7 hour outage due to our Cisco 6506 failing to route anything on our
network.  It took Cisco engineers 5 of those 7 hours to restore service.  Once
everything was back up and running I noticed that the port that I configured
for VLAN 301 was the native VLAN on the Cisco trunk and thus was not tagged.
Even the Cisco guys didn't notice this.

I think everything should work fine
now but I haven't gotten back to working on it because I have several hundred
RT tickets to attend to this morning due to the outage. ;(

Sorry for the
noise and thanks for the help guys.


But I understand your point of view. Not everybody is same in any area.

Regards
-- 
This message posted from opensolaris.org

Reply via email to