Re: [c-nsp] Applying ACL

2007-06-01 Thread John Kougoulos
my preferred method is to upload the acl with tftp, ofcourse with the 
first line  permit tcp any any established

also I have created a script on the tftp server (which works only with 
non-named access-lists), which extracts the acls from a router 
configuration file, and places each acl on a different file:

#!/bin/sh
myfile=$1
\rm /tftpboot/acls/*
for i in `grep access-list $myfile | grep -v as-path | awk ' { print 
$2 } ' | sort | uniq`
do
 echo no access-list $i acls/acl-$i
 grep access-list $i  $myfile  acls/acl-$i
 echo end acls/acl-$i
done


therefore I apply the changes with this method

router# wri net (- to tftp server)
tftpserver# vi router-confg
tftpserver# ./abovescript router-confg
router# copy tftp://tftpserver/acls/acl-140 running-config


Best Regards,
John

Jeff Kell wrote:
 Gert Doering wrote:
 But usually you're dead in the water as soon as you copy-and-paste a
 new version of the ACL and the first line gets active, prohibiting any
 further lines to go through...
 
 ...unless that first line is a 'permit tcp any any established' 
 
 Still might want to do a 'reload in 5' right before, just in case you lock 
 yourself out of the playhouse :-)
 
 Jeff
 
 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Windows Vista, Gratuitous ARP and DHCP conflicts

2007-06-01 Thread Phil Mayers
Asbjorn Hojmark - Lists wrote:
 You're saying that gateways with proxy arp enabled will 
 respond to ARP requests when the target IP is INSIDE the
 subnet?
 
 That only happens when you have 'ip local-proxy-arp' configured.
 
 It should be apparent that's not the case, or nothing would 
 work on that subnet ever.
 
 If one was running Private VLAN in that subnet, it would.

Presumably only if one also disabled icmp redirects.
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Windows Vista, Gratuitous ARP and DHCP conflicts

2007-06-01 Thread Phil Mayers
Justin Shore wrote:
 Phil Mayers wrote:
 It's all good up until this point.  The g-arp that Vista sends uses a 
 BS MAC (a multi-cast MAC no less) for the THA (target hardware 
 address). It 

 That's odd.

 uses 0.0.0.0 for the SPA (source protocol address).  Herein lies the 

 That's normal.
 
 So a host can send ARPs without a valid SPA?

Sending with an SPA of 0.0.0.0 is part of the duplicate address 
detection that certainly every version of windows from win98 onwards, 
most linux /sbin/dhclient-script setups and MacOSX have used. So yes.

My Google-fu is weak finding the relevant RFCs however.

The rationale is that of course during DAD you don't *have* a valid SPA.

 
 problem.  Any device that performs proxy-arp functions will respond 
 to this ARP because 1) it has a connected network to the target 
 device in question and 2) it knows based on the SPA that the sending 
 host is not already in that subnet (otherwise the local host would 
 respond to the ARP itself).  When the proxy-arp device responds, in 
 our case the 

 You're saying that gateways with proxy arp enabled will respond to ARP 
 requests when the target IP is INSIDE the subnet?

 It should be apparent that's not the case, or nothing would work on 
 that subnet ever.
 
 Proxy-ARP is supposed to kick in when a router receives an ARP request 
 for a TPA that's part of a subnet on another interface.  In the case of 
 our VisionNet 202s the modem is pulling an IP even in bridged mode 

Ah, I see.

 unless you explicitly disable the built DHCP client which is on by 
 default.  That means that the modem has a connected route to the TPA's 
 subnet thus meeting the requirements for proxy-arp and allowing it to 
 reply to the g-arp with its own MAC in the reply.  This was easily 
 proven once we realized this by disabling the DHCP client on the modem. 
  It no longer had a connected route to the TPA's subnet and would no 
 longer respond to the g-arps.
 
 It was a very annoying and costly problem for us.  I had to watch the 
 DHCP conflicts for signs of the problem, debug the DHCP server to find 
 out which PVC the DECLINE was coming in on, cross-referenced the VPI/VCI 
 to a specific customer and generate a truck roll to go out and either 
 replace the modem or switch it to bridged modem and disable the DHCP 
 client.  Needless to say that was a lot of truck rolls.

Yes - I can imagine that was very tedious!

 
 This may not be what Kurt is seeing but this may help him find a more 
 workable solution.

 
 Justin
 

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] [Query] Bgp Session timers

2007-06-01 Thread Jeff Tantsura
Hi,

Not only that, don't forget BGP walker :)
The BGP scanner process normally runs every 60 sec

Default BGP Scanner Behavior

BGP monitors the next hop of installed routes to verify next-hop
reachability and to select, install, and validate the BGP best path. By
default, the BGP scanner is used to poll the RIB for this information every
60 seconds. During the 60 second time period between scan cycles, Interior
Gateway Protocol (IGP) instability or other network failures can cause black
holes and routing loops to temporarily form.

So if you don't use some kind of event driven notification like:
BGP Support for Next-Hop Address Tracking and BGP Support for Fast Peering
Session Deactivation there's a possibility that your traffic would be 
blackholed for up to 60 sec

Regards,
Jeff

 -Original Message-
 From: [EMAIL PROTECTED] [mailto:cisco-nsp-
 [EMAIL PROTECTED] On Behalf Of Christoph Loibl
 Sent: vrijdag 1 juni 2007 8:53
 To: Simon Leinen
 Cc: Danny; cisco-nsp@puck.nether.net
 Subject: Re: [c-nsp] [Query] Bgp Session timers
 
 Hi!
 
 On Jun 1, 2007, at 12:21 AM, Simon Leinen wrote:
 
  Arie Vayner \(avayner\) writes:
  Danny,
  With iBGP the timers for BGP are not really important... You
  actually need to worry about the IGP convergence.
  The reason for that is that usually when a link fails, you don't
  really expect the BGP session to the RR to go down, but just use the
  redundant IGP path.
 
  Yes, but what about when a router fails, in particular a border
  (eBGP+iBGP) router?
 
  In such a case, iBGP timers (or the configuration of a mechanism such
  as BFD) will determine how long it takes for other routers that the
  eBGP routes from the dead router have to be dropped.  This can be very
  important, because using the dead router's eBGP routes can mean
  blackholing traffic.
 
 No need to adjust the iBGP timers in that case. Your bgp-next-hop
 (which is ideally a loopback-ip of the crashed router) will simply
 disapear from your internal routing-table, and all iBGP neighbors
 (also the RRs) will remove all routes that are unreachable (because
 of the unreachable next-hop) from their tables. You only rely on the
 convergence-time of your igp (ospf? isis? ...?) to remove the dead
 loopback-ip from its table and the calculation of BGP that is
 triggered when the loopback-ip disappears.
 
 Stoffi
 
 --
 CHRISTOPH LOIBL 
 mailto:[EMAIL PROTECTED]   |No trees were killed in the creation of this 
 message.
 http://pix.tix.at |However, many electrons were terrible inconvenienced.
 CL8-RIPE  PGP-Key-ID: 0x4B2C0055 +++
 
 
 
 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Applying ACL

2007-06-01 Thread Phil Mayers
Gert Doering wrote:
 Hi,
 
 On Wed, May 30, 2007 at 01:33:21PM -0700, Kevin Graham wrote:
 If you are wiping them out, you should always remove them to be safe
 (even if weren't default-deny behavior when missing, there is an
 unavoidable window between creation and completion).
 
 Just to correct this small bit: default in IOS for packet ACLs is 
 default-permit *if the ACL is completely missing*.
 
 But usually you're dead in the water as soon as you copy-and-paste a
 new version of the ACL and the first line gets active, prohibiting any
 further lines to go through...

At least on the 6500 platforms, I believe the defined behaviour for 
named ACLs is that the changes are only applied once you exit the sub-mode?

...which makes it a particular shame that the commands:

no all
abort

...don't exist in that sub-mode.
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] Device export in ACS-SE

2007-06-01 Thread Daniel Kratz
  Dear Gurus,

  Any one know a way to export a list of all network devices
in appliance ACS-SE? I need to do some scripts to automate the validation of
data. Our net have often changes, manual validation is too hard... I tried
read the binary backup, but it has no public format.

  Our ACS is an ACS-SE 4.1, but suggestion on ACS for windows
are appreciated too.

  Thanks,
  Kratz
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] 3725 packet loss

2007-06-01 Thread Rodney Dunn
On Thu, May 31, 2007 at 05:27:24PM -0400, Scott Dunn wrote:
 Hi
 
 We are seeing 2-4% packet loss on a 60Mbps link with 3725 when traffic
 reaches about 35-40Mbps (based 30s load interval) (FYI the circuit has
 been tested multiple times and is clean). I suspect that the traffic
 is bursting to 60Mbps for short period and causing the loss.

Easy to verify. Configure a MQC policy with a policer with a conform
action to transmit and an exceed action to transmit.

Then watch for matches in the exceed line of 'sh policy-map interface blah'.
If you see them you are bursting. Also, you would be seeing drops in the
'sh int blah' on output drops if you are bursting, overrunning the tx
side line rate, and filling up the outputqueue.

 
 The Cisco command interpreter seems to indicate that the buffers need
 tuning as I'm getting lots of failures vs hits for the larger buffers.
 
 VeryBig buffers, 4520 bytes (total 10, permanent 10, peak 13 @ 1w6d):
  10 in free list (0 min, 100 max allowed)
  84 hits, 685 misses, 11 trims, 11 created
  685 failures (0 no memory)
 Large buffers, 5024 bytes (total 1, permanent 0, peak 4 @ 1w4d):
  1 in free list (0 min, 10 max allowed)
  14 hits, 671 misses, 131 trims, 132 created
  671 failures (0 no memory)
 Huge buffers, 18024 bytes (total 1, permanent 0, peak 3 @ 1w4d):
  1 in free list (0 min, 4 max allowed)
  11 hits, 660 misses, 128 trims, 129 created
  660 failures (0 no memory)

No they don't. And you shouldn't be hitting the system buffers for
transit traffic anyway. Those buffers are only for process switched
traffic.

 
 I don't have any experience playing with buffer sizes and was hoping
 for some insight before experimenting,
 
 Thanks
 
 Scott
 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Best Routing Protocol for Scenario

2007-06-01 Thread Rodney Dunn
Can you draw a jpeg that shows the layout?

That's a lot easier than trying to draw it from email.

Rodney


On Thu, May 31, 2007 at 01:11:38PM -0400, Paul Stewart wrote:
 Hi folks...
 
 A while back (month or so) I posed a few questions about Policy Based
 Routing - thinking that was best way to conquer a new challenge... now I'm
 not so sure so looking for input.
 
 Here's the layout and what I want to accomplish
 
 Customer premise has a Cisco 3662 router.  From the 3662 we have 2 TI's
 leaving and 2 Ethernet connections leaving towards a 6509 back in our data
 center.  The 2 T1's go to a remote POP where they terminate on a Cisco 3640
 router.  The Cisco 3640 router connects to a Cisco 7206VXR which in turn
 connects via TLS back to the same 6509 in our data center.  The ethernet
 connections leaving the customer site from the Cisco 3662 connect directly
 back to the 6509 with speeds of 6 Mb/s X 800Kb/s each.  The T1's are full
 1.544 Mb/s.
 
 So, one router at customer premise that needs to connect back to one router
 in our data center using 4 paths.  The pair of T1's and the pair of ethernet
 ports should be bonded or load balanced.  Traditionally this has been done
 via OSPF/CEF on our side of things.
 
 We want all VOIP traffic passing between the customer site and our data
 center to travel via the T1 circuits and all Internet traffic to go via the
 ethernet connections.
 
 I'm looking for the best routing protocol in this scenario that will allow
 me to use route-maps (or other alternatives) to identify source IP and
 destination IP subnets and apply priority.  At the same time if the far
 end of each connection is unavailable then I want the traffic to fallover
 to the other connections as a backup automatically.
 
 I had though at one point that OSPF would be ideal but I'm not aware of a
 way to apply a route-map to OSPF specifying only certain traffic prefers a
 certain path.  We do this all the time with BGP so I though maybe iBGP could
 be applied here but I have the feeling that there is a better solution
 
 Open to ideas and appreciate it...
 
 Paul
 
 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Applying ACL

2007-06-01 Thread Ed Ravin
On Fri, Jun 01, 2007 at 10:11:16AM +0300, John Kougoulos wrote:
 my preferred method is to upload the acl with tftp, ofcourse with the 
 first line  permit tcp any any established
...
 Gert Doering wrote:
 But usually you're dead in the water as soon as you copy-and-paste a
 new version of the ACL and the first line gets active, prohibiting any
 further lines to go through...

My handy script, aclmaker, takes care of most of these issues automatically.
It uploads a test version of the ACL with a different name to assure
that the syntax is OK, then modifies the access-group statement for
each interface that references the ACL to point to the test ACL, then
re-uploads the new ACL with the right name, and finally switches the
access-group statements back to the new ACL under its correct name
so that the switchover to the new ACL happens in one stroke.

If you use aclmaker, you will only get locked out if you write an ACL that
locks you out.  There are never any partial ACLs applied to an interface,
and the window where the interface has no ACL applied to it is minimized.
You can edit ACLs with your favorite text editor, even if they're hundreds
of lines long, and then upload them to the router.  It also supports a
diff command so you can compare a locally edited ACL to the one on the
router.

  http://sourceforge.net/project/showfiles.php?group_id=25401

You can also do things like this on the command line on your Unix host:

  # copy every ACL on the router into an individual file on the local host
  for acl in $(aclmaker list); do aclmaker get $acl; done

  # run a command on the Cisco and pipe its output to a local shell command
  aclmaker cmd 'show ip route' | wc -l

  # test an ACL for syntax errors before uploading it
  aclmaker test FILENAME

Requires a Unix-ish system with Perl and a few Perl modules.  One of
these days I'll upgrade it to work with RANCID which should make it a
bit easier to use (assuming you've already climbed over RANCID's learning
curve).
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] ipv6ip vs gre

2007-06-01 Thread matthew zeier
What's the difference between an ipv6ip tunnel and a gre tunnel?
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ipv6ip vs gre

2007-06-01 Thread Bruce Pinsky
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

matthew zeier wrote:
 What's the difference between an ipv6ip tunnel and a gre tunnel?

v6 packets in an ipv6ip tunnel are directly encapsulated in an IPv4 header
where v6 packets in a GRE tunnel are encapsulated in a GRE header and then
the IPv4 header.

See
http://www.cisco.com/en/US/products/sw/iosswrel/ps5187/products_configuration_guide_chapter09186a00801d6604.html#wp1027177

- --
=
bep

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.4 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFGYD4DE1XcgMgrtyYRAlpiAJ0QYuktvB+RMYdkfvFmob+mP7OoQQCgvri6
jgdIT1PMe9rElK9FWE0BTaE=
=Xslu
-END PGP SIGNATURE-
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] SUP-32 and SIP-400

2007-06-01 Thread MKS
Hello list

I was under the impression that sip-400 required sup-720-3b/3bxl or greater
because the sup-32 doesn't have fabric connectivity.

http://www.cisco.com/en/US/products/hw/routers/ps368/products_data_sheet0900aecd8027c9e6.html

According to this document, only the supervisor Engine 720-3B and 720-3BXL
are listed.
But when I tried sloting sip-400 into a chassis with sup-32 it came up just
fine.
Is this something that has changed recently or has sup-32 always supported
the sup-400.
According to this
http://www-search.cisco.com/univercd/cc/td/doc/product/lan/cat6000/122sx/ol_4164.htm#wp2565000
It's only the sip-600 that isn't supported on sup-32.

What about performance difference between sip-400 with sup32 vs. sup-720 ?

Regards
MKS
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] display last lines of logging

2007-06-01 Thread Rodney Dunn
I've had some preliminary discussions with them about some of
these ideas. Unfortunately the way it's implemented today it's
not as simple as it seems. I'm not sure I will be able to
make these happen unfortunately.

The event logs are a different infrastructure so they had
some of this capability designed in to it.

Rodney

On Thu, May 31, 2007 at 01:03:35AM +0930, Brad Gould wrote:
 How about
 
 rtr#sh log last x
 
 where x=minutes?
 
 
 Brad
 
 
 
 Rodney Dunn wrote:
  Good suggestion. Let me see if I can convince development to code it.
  
  We have some of those things with the event log infrastructure already.
  
  UUT_#sh monitor event-trace ssm ?
all Show all the traces in current buffer
backShow trace from this far back in the past
clock   Show trace from a specific clock time/date
from-boot   Show trace from this many seconds after booting
latest  Show latest trace events since last display
parameters  Paramters of the trace
  
  
  On Thu, May 24, 2007 at 05:26:01PM +0300, Tassos Chatzithomaoglou wrote:
  I was wondering
 
  Is there a way to display the x last lines of the log of a router (through 
  the cli) ?
  Like the CatOS sh logging buffer -x is doing.
 
 
  -- 
  Tassos
  ___
  cisco-nsp mailing list  cisco-nsp@puck.nether.net
  https://puck.nether.net/mailman/listinfo/cisco-nsp
  archive at http://puck.nether.net/pipermail/cisco-nsp/
  ___
  cisco-nsp mailing list  cisco-nsp@puck.nether.net
  https://puck.nether.net/mailman/listinfo/cisco-nsp
  archive at http://puck.nether.net/pipermail/cisco-nsp/
 
 -- 
 Brad Gould, Network Engineer
 Internode
 PO Box 284, Rundle Mall 5000
 Level 3, 132 Grenfell Street, Adelaide 5000
 P: 08 8228 2999  F: 08 8235 6999
 [EMAIL PROTECTED]; http://www.internode.on.net/
 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ipv6ip vs gre

2007-06-01 Thread Mohacsi Janos



On Fri, 1 Jun 2007, Gert Doering wrote:

 Hi,

 On Fri, Jun 01, 2007 at 07:41:01AM -0700, matthew zeier wrote:
 What's the difference between an ipv6ip tunnel and a gre tunnel?

 Well, one is using IPv6-IP encapsulation, and the other is using GRE
 encapsulation.

 Sort of like what is the difference between a BMW and a Chrysler? - both
 are transport vehicles, but they look different...

One important difference: ipv6-ip encapsulation is an IPv6 only solution, 
while GRE is more general one (with some more byte overhead). However if 
you want to run IS-IS on the tunnel you should use GRE since CLNS can be 
transfered over GRE...
Regards,

Janos Mohacsi
Network Engineer, Research Associate, Head of Network Planning and Projects
NIIF/HUNGARNET, HUNGARY
Key 70EF9882: DEC2 C685 1ED4 C95A 145F  4300 6F64 7B00 70EF 9882

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] Private ASN

2007-06-01 Thread Raman Sud
Is there a way to setup BGP with a customer using a private ASN and
still be able to route that IP block over the internet?

I am removing private ASN from leaving our network but I have not tested
the implementation where traffic originating from Private AS can pass
pass thru to the internet.

Any ideas?

Thanks

Raman
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] Ever-changing support for non Cisco branded transceivers

2007-06-01 Thread Richard A Steenbergen
6500 with two 6704-10GE's, all non-Cisco branded XENPAKs except for one LW 
wan phy. Under SRA3, the non-Cisco's report unapproved but work, and DOM 
works:

show interface status
Te8/1   notconnect   1full10G unapproved
Te8/2   notconnect   1full10G unapproved
Te8/3   notconnect   1full10G unapproved
Te8/4   notconnect   1full10G unapproved
Te9/1   notconnect   1full10G unapproved
Te9/2   notconnect   1full10G unapproved
Te9/3   notconnect   1full10G 10Gbase-LW
Te9/4   notconnect   1full10G unapproved

show interface transceiver
---  ---  ---      
Te8/1  30.5   0.00  83.2   1.0 -40.0   
Te8/2  30.0   0.00  31.6  -1.2 -40.0   
Te8/3  29.4   0.00  33.0  -1.2 -40.0   
Te8/4  26.1   0.00  32.9  -1.9 -40.0   
Te9/1  30.8   0.00  80.0   0.6 -40.0
Te9/2  30.6   0.00  32.0  -1.4 -40.0   
Te9/3  29.0   0.00  29.1 --   -2.1 -40.0   
Te9/4  29.7   0.00  31.0  -1.2 -40.0

Same box, same config, immediately following an upgrade from SRA3 to SRA4. 
Now all of the non-Cisco xenpaks show up in show int status correctly, but 
DOM stops working:

show interface status
Te8/1   notconnect   1full10G 10Gbase-ER
Te8/2   notconnect   1full10G 10Gbase-LR
Te8/3   notconnect   1full10G 10Gbase-LR
Te8/4   notconnect   1full10G 10Gbase-LR
Te9/1   notconnect   1full10G 10Gbase-LR
Te9/2   notconnect   1full10G 10Gbase-LR
Te9/3   notconnect   1full10G 10Gbase-LW
Te9/4   notconnect   1full10G 10Gbase-LR

show interface transceiver
 ---  ---  ---       
 Te9/3  31.0   0.00  29.6 --   -2.1 -40.0   

Anyone have any idea whats going on here? Is this just a bug/oversight or 
intentional meddling with the non Cisco branded optics support. :)

-- 
Richard A Steenbergen [EMAIL PROTECTED]   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Best Routing Protocol for Scenario

2007-06-01 Thread Paul Stewart
Sure, checkout

http://www.nexicom.net/~turbo/customernetwork.vsd 

It's in Visio...

We want the voice traffic to take the T1's and the data traffic to take the
bridged ADSL ethernet connections we have this working now using static
routing but I want dynamic routing in place - trying to identify best
dynamic routing protocol to use

Someone suggested EIGRP which makes some sense...;)

Thanks,

Paul

-Original Message-
From: Rodney Dunn [mailto:[EMAIL PROTECTED] 
Sent: Friday, June 01, 2007 8:38 AM
To: Paul Stewart
Cc: cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] Best Routing Protocol for Scenario

Can you draw a jpeg that shows the layout?

That's a lot easier than trying to draw it from email.

Rodney


On Thu, May 31, 2007 at 01:11:38PM -0400, Paul Stewart wrote:
 Hi folks...
 
 A while back (month or so) I posed a few questions about Policy Based 
 Routing - thinking that was best way to conquer a new challenge... now 
 I'm not so sure so looking for input.
 
 Here's the layout and what I want to accomplish
 
 Customer premise has a Cisco 3662 router.  From the 3662 we have 2 
 TI's leaving and 2 Ethernet connections leaving towards a 6509 back in 
 our data center.  The 2 T1's go to a remote POP where they terminate 
 on a Cisco 3640 router.  The Cisco 3640 router connects to a Cisco 
 7206VXR which in turn connects via TLS back to the same 6509 in our 
 data center.  The ethernet connections leaving the customer site from 
 the Cisco 3662 connect directly back to the 6509 with speeds of 6 Mb/s 
 X 800Kb/s each.  The T1's are full
 1.544 Mb/s.
 
 So, one router at customer premise that needs to connect back to one 
 router in our data center using 4 paths.  The pair of T1's and the 
 pair of ethernet ports should be bonded or load balanced.  
 Traditionally this has been done via OSPF/CEF on our side of things.
 
 We want all VOIP traffic passing between the customer site and our 
 data center to travel via the T1 circuits and all Internet traffic to 
 go via the ethernet connections.
 
 I'm looking for the best routing protocol in this scenario that will 
 allow me to use route-maps (or other alternatives) to identify source 
 IP and destination IP subnets and apply priority.  At the same time if 
 the far end of each connection is unavailable then I want the traffic to
fallover
 to the other connections as a backup automatically.
 
 I had though at one point that OSPF would be ideal but I'm not aware 
 of a way to apply a route-map to OSPF specifying only certain traffic 
 prefers a certain path.  We do this all the time with BGP so I though 
 maybe iBGP could be applied here but I have the feeling that there is a
better solution
 
 Open to ideas and appreciate it...
 
 Paul
 
 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net 
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Private ASN

2007-06-01 Thread Joseph Jackson
You should be able to do it easily (sounds like you have it already
setup).  
Check out this link

http://www.cisco.com/en/US/tech/tk365/technologies_tech_note09186a008009
3f27.shtml

It explains what you are wanting to do.



Joseph 

 -Original Message-
 From: [EMAIL PROTECTED] 
 [mailto:[EMAIL PROTECTED] On Behalf Of Raman Sud
 Sent: Friday, June 01, 2007 10:53 AM
 To: cisco-nsp@puck.nether.net
 Cc: cisco-nsp@puck.nether.net
 Subject: [c-nsp] Private ASN
 
 Is there a way to setup BGP with a customer using a private ASN and
 still be able to route that IP block over the internet?
 
 I am removing private ASN from leaving our network but I have 
 not tested
 the implementation where traffic originating from Private AS can pass
 pass thru to the internet.
 
 Any ideas?
 
 Thanks
 
 Raman
 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/
 
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] Different bootldr and system versions

2007-06-01 Thread Rick Kunkel
Sorry about the rapid-fire questions over the past few days.  I can't seem
to find an answer to this.

I've got a newer system image, but not a bootloader for my 6509.  I'm 
considering going from this:

boot system flash sup-bootflash:c6sup22-psv-mz.121-19.E1.bin
boot bootldr bootflash:c6msfc2-boot-mz.121-19.E1.bin

To this:

boot system flash disk0:c6sup22-psv-mz.121-26.E8.bin
boot bootldr bootflash:c6msfc2-boot-mz.121-19.E1.bin

Note the different versions above.  Is this kosher?

BTW, I think when I first started configuring this thing, I left the 
bootloader out entirely and it worked.  Is that viable?

Thanks,

Rick Kunkel

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Private ASN

2007-06-01 Thread Phil Bedard
Sure, just remove the private ASN using the Cisco config to do so,  
and to the Internet it will
look like the prefix originated from your ASN.

Phil

On Jun 1, 2007, at 1:52 PM, Raman Sud wrote:

 Is there a way to setup BGP with a customer using a private ASN and
 still be able to route that IP block over the internet?

 I am removing private ASN from leaving our network but I have not  
 tested
 the implementation where traffic originating from Private AS can pass
 pass thru to the internet.

 Any ideas?

 Thanks

 Raman
 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/




___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Private ASN

2007-06-01 Thread Raman Sud
Thanks guys 

-Original Message-
From: Phil Bedard [mailto:[EMAIL PROTECTED] 
Sent: Friday, June 01, 2007 12:36 PM
To: Raman Sud
Cc: cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] Private ASN

Sure, just remove the private ASN using the Cisco config to do so,  
and to the Internet it will
look like the prefix originated from your ASN.

Phil

On Jun 1, 2007, at 1:52 PM, Raman Sud wrote:

 Is there a way to setup BGP with a customer using a private ASN and
 still be able to route that IP block over the internet?

 I am removing private ASN from leaving our network but I have not  
 tested
 the implementation where traffic originating from Private AS can pass
 pass thru to the internet.

 Any ideas?

 Thanks

 Raman
 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/




___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] APC Cabinets with SIde Air Distribution

2007-06-01 Thread Justin M. Streiner
On Fri, 1 Jun 2007, Rick Martin wrote:

 I am interested in what others are doing to accommodate hot isle/cold
 isle configurations with the cold isle in the front of the cabinet? As
 most of you are aware the fan tray on the 6500 is on the left side
 drawing cool air in the left and expelling hot air out the right.

I believe the airflow in the non-NEBS 6509s is right to left.  The fan 
tray pulls the air through the chassis rather than pushing it - makes for 
better airflow.

I haven't used these specific cabinets, but in the past when I had gear 
that threw off a lot of heat, we rigged up some angled baffles between the 
cabinets to get the hot aisle/cold aisle arrangement and to keep the 
exhaust from one device from being drawing into devices in the adjacent 
cabinet.

jms
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] APC Cabinets with SIde Air Distribution

2007-06-01 Thread Simon Hamilton-Wilkes
The best solution for this is the 6509 NEB chassis.  Failing that I've
installed 6513's in 2 post racks rather than 4 post - as the attached cable
management gave a good 6 or 8 inches of airspace.

Simon 

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Rick Martin
Sent: Friday, June 01, 2007 2:40 PM
To: cisco-nsp@puck.nether.net
Subject: [c-nsp] APC Cabinets with SIde Air Distribution


 We are in the process of a hardware refresh on our core network which will
see about 10 Catalyst 6500's replace existing 6006's and older 6509's. All
will have either Sup 720 or Sup 32. Hardware has been ordered and is
arriving daily.

 I am interested in what others are doing to accommodate hot isle/cold isle
configurations with the cold isle in the front of the cabinet? As most of
you are aware the fan tray on the 6500 is on the left side drawing cool air
in the left and expelling hot air out the right. With our current
configuration we have cabinets with an outside measurement of 22 which
leaves very little room for air flow on the sides, shortly after installing
this equipment in 1999 we wound up removing the sides of all cabinets. Of
course this resulted in the exhaust from one switch being drawn in the
intake of the next.

 We want to fix this situation with this hardware refresh project and have
been looking at the APC 29 wide cabinet (PN AR3150) with APC's Side Air
Distribution Fan (PN ACF201BLK).

  Can anybody comment on this setup? Or perhaps offer different/better
solutions for air flow management?

 Thanks for your comments, and or advice.

Rick Martin
Network Engineering Team Lead
State of Arkansas, Department of Information Systems
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] APC Cabinets with SIde Air Distribution

2007-06-01 Thread Tim Stevenson
Correct, horizontal chassis have right to left airflow, exhausting 
hot air on the left.

WRT cabinets, Panduit offers one that is designed to work with 6500 
and converts airflow to front-back. See:
http://www.panduit.com/products/brochures/105309.pdf

Tim

At 05:49 PM 6/1/2007 -0400, Justin M. Streiner opined:
I believe the airflow in the non-NEBS 6509s is right to left.  The fan
tray pulls the air through the chassis rather than pushing it - makes for
better airflow.



Tim Stevenson, [EMAIL PROTECTED]
Routing  Switching CCIE #5561
Technical Marketing Engineer, Data Center BU
Cisco Systems, http://www.cisco.com
IP Phone: 408-526-6759

The contents of this message may be *Cisco Confidential*
and are intended for the specified recipients only.
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/