Re: [c-nsp] Juniper - Cisco Catalyst Fast Ether Channel Load Balancing

2008-01-28 Thread a. rahman isnaini r.sutan
Yep,

Already there.
Thanks for 2950  Hjan.

rgs
a.r.i.rangkayo sutan

Gert Doering wrote:
 Hi,
 
 On Fri, Jan 25, 2008 at 07:24:25PM +0700, a. rahman isnaini r.sutan  wrote:
 Both direction, cat 2950.
 
 To repeat my questions, with a few more words:
 
 Which of the directions do you have problems with the load distribution?
 (it needs to be tuned on the sender side, and we're not the Juniper list,
 so for tuning Juniper-Cisco, please go to j-nsp).
 
 How many ports?
 (load balancing will only work properly on 2-, 4- or 8-port channels)
 
 
 Besides this, with a 2950, it's a bit tough, since it will only balance
 based on ethernet MAC addresses.  So if you have only a few machines
 on one side, talking to a single router on the other sides, traffic will
 almost always be imbalanced (because everything a single machine sends
 to the router will use only use ONE link of the channel).
 
 The direction Juniper-2950 might have different constraints.
 
 gert
 

-- 


a. rahman isnaini r.sutan
Research  Development Division
PT IndoInternet
Cyber Building 8th Floor
Jl. Kuningan Barat no.8
Jakarta Selatan
Phone : +62 21 5210607
Fax   : +62 21 5210612
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] IDSM load splitting with EC on C6k

2008-01-28 Thread Peter Rathlev
Hi,

Sorry if I keep spamming the list with data center related question.
Write me if you think this is the wrong place. :-)

I've been reading about IDSM load splitting with Etherchannels on
Cat6500/Sup720, and it seems really nice that you can scale away from
the 600 mbps per IDSM bottleneck. I still have a few worries though.

First, the load splitting uses the standard EC hashing to make sure all
packets from the same flow uses the same IDSM. What worries me is that
communication between two hosts, e.g. a TCP stream, is actually two
different flows. So I could have client-server traffic using one IDSM
and server-client traffic using another. Doesn't that mean that the
IDSM cannot identify bad streams, or do they work in a way that makes
this a non-issue?

Second, with DFC-enabled LAN cards and a Sup720, there shouldn't be any
performance issues for traffic switched between these LAN cards, even if
I put 6 IDSM classic bus modules in the chassis. But when using VLAN
capture or SPAN to send the traffic to the IDSM, do I defeat the DFC
advantages, ruining the decentralised concept? Or doesn't VLAN
capture/SPAN replication disturb the forwarding process? Am I
downgrading the system to 30 Mpps also for inter-DFC traffic?

Again, thanks for any comments. :-)

Regards,
Peter


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] S/W for ASA 5550

2008-01-28 Thread Peter Rathlev
On Sun, 2008-01-27 at 15:55 -0500, christian wrote:
 I've been running 7.2(3) in a production network terminating around 10
 l2l vpn tunnels, ravpn, and passing about 90+mbps of traffic
 consistently since october..i've found no issues at all
 lately,stability seems to be great so far for an ED release.

On Sun, 2008-01-27 at 15:48 -0500, Justin M. Streiner wrote:
 I can't speak specifically about the 5550, but I have other ASA 5500 
 series boxes running on 7.2(2) and 7.2(3) with no complaints.  As always, 
 your mileage may vary and I would balance stability against security, so 
 definitely do a bug scrub on the versions of code that you're considering.

We're running 7.2(2) in two data centers ourselves and it works without
problems so far. (The only error we've run into was the snmp-server host
limit mentioned a short while ago on this list.)

So I think 7.2(3) it is. Thanks both. :-)

On Sun, 2008-01-27 at 15:55 -0500, christian wrote:
 not sure how the 5580's compare, i havent really looked into them much
 yet, but pricing is around 50k for the 5580-20 and 100k for the
 5580-40 i THINK

That's not really bad, considering the performance. I'll ask my local
equipment pusher for details.

On Sun, 2008-01-27 at 15:48 -0500, Justin M. Streiner wrote:
 I have several FWSMs in production but I haven't been able to stress them 
 to the point where I can say whether the numbers in the data sheets are 
 legit.  If I find out one way or the other, I'll let the list know :)

We've tried pushing a couple of Gigs through an FWSM without problems.
Now we're facing a medical imaging project saying they'll collect around
100 TB per year with some nice peaks, and we're wondering if we have to
route traffic around the data center firewalls to make sure performance
is okay for the rest of the servers...

I wish they made a CEF720 FWSM with the 5580-40 performance. :-)

Regards,
Peter


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] Incoming calls in AS5350

2008-01-28 Thread Eusebio López
Hi,

 

I am using a Cisco AS5350 as VOIP gateway and I have a problem. 80% of incoming 
calls come up with the number of head, and not with the telephone number 
assigned to each customer in our Asterisk. Where can be the problem? I am sure 
that problem is configuration AS, but not it can be.

 

Thanks.

 

AS configuration is as follows:

 

Current configuration : 10675 bytes

!

version 12.3

service timestamps debug datetime msec

service timestamps log datetime msec

service password-encryption

!

boot-start-marker

boot system flash c5350-is-mz.123-11.T9.bin

no boot startup-test

boot-end-marker

!

!

!

resource-pool disable

spe default-firmware spe-firmware-1

no aaa new-model

ip subnet-zero

!

!

no ip cef

!

!

isdn switch-type primary-net5

!

!

voice service voip

 fax protocol t38 ls-redundancy 0 hs-redundancy 0 fallback cisco

 modem passthrough nse codec g711alaw

 sip

!

!

voice class codec 1

 codec preference 1 g729r8

 codec preference 2 g711alaw

!

!

!

!

controller E1 3/0

 framing NO-CRC4

 pri-group timeslots 1-31

!

controller E1 3/1

 framing NO-CRC4

 pri-group timeslots 1-31

!

controller E1 3/2

!

controller E1 3/3

!

controller E1 3/4

!

controller E1 3/5

!

controller E1 3/6

!

controller E1 3/7

!

!

interface FastEthernet0/0

 ip address 192.168.100.253 255.255.255.0 secondary

 ip address 192.168.100.2 255.255.255.0

 duplex auto

 speed auto

!

interface FastEthernet0/1

 no ip address

 shutdown

 duplex auto

 speed auto

!

interface Serial0/0

 no ip address

 shutdown

 clockrate 200

!

interface Serial3/0

 no ip address

 shutdown

!

interface Serial0/1

 no ip address

 shutdown

 clockrate 200

!

interface Serial3/0:15

 no ip address

 isdn switch-type primary-net5

 isdn incoming-voice modem

 no cdp enable

!

interface Serial3/1:15

 no ip address

 isdn switch-type primary-net5

 isdn incoming-voice modem

 no cdp enable

!

interface Async1/00

 no ip address

!

interface Async1/01

 no ip address

!

(...)

!

interface Async2/106

 no ip address

!

interface Async2/107

 no ip address

!

interface Group-Async0

 no ip address

 no group-range

!

!

ip classless

ip route 0.0.0.0 0.0.0.0 192.168.100.3

no ip http server

!

!

!

control-plane

!

!

!

voice-port 3/0:D

!

voice-port 3/1:D

!

!

!

dial-peer voice 200 voip

 destination-pattern .

 voice-class codec 1

 session protocol sipv2

 session target sip-server

 dtmf-relay rtp-nte

 no vad

!

dial-peer voice 1000 pots

 application session

 destination-pattern .

 translate-outgoing called 1

 direct-inward-dial

 port 3/0:D

 forward-digits all

!

dial-peer voice 1001 pots

 application session

 destination-pattern .

 translate-outgoing called 1

 direct-inward-dial

 port 3/1:D

 forward-digits all

!

!

sip-ua

 sip-server ipv4:10.10.0.54

!

ss7 mtp2-variant Bellcore 0

ss7 mtp2-variant Bellcore 1

ss7 mtp2-variant Bellcore 2

ss7 mtp2-variant Bellcore 3

!

line con 0

line aux 0

line vty 0 4

  login local

line 1/00 2/107

 modem InOut

!

scheduler allocate 1 400

ntp clock-period 17179943

ntp server 202.182.192.94

end

 

 

Eusebio López Ruiz

Administrador de Sistemas

Palmanet Networking Services

[EMAIL PROTECTED] mailto:[EMAIL PROTECTED] 

http://www.palmanet.net http://www.palmanet.net 

Tel  +34 957649199

Fax +34 957644926

 

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Reflexive ACLs or CBAC on 6500

2008-01-28 Thread Tassos Chatzithomaoglou
Thanks Brian  Roland,

I guess i'll stick with the ACLs then.

Imho, cisco should put out a warning when configuring these features.

Regards,
Tassos

Brian Stiff (bstiff) wrote on 27/1/2008 7:07 πμ:
 Hi Tassos-
 
 While YMMV, the IOS Firewall product management team has been
 discouraging use of IOS Firewall Inspection (CBAC) on the Cat6K for some
 time.  For whatever reason, I can't locate the IOSFW EoL page, but
 please have a look at a link from last year:
 
 http://puck.nether.net/pipermail/cisco-nsp/2007-June/041176.html
 
 You may find that Classic FW is entirely adequate for your application.
 However, in the event that it works badly (as Roland pointed out that it
 may), there won't be much recourse for a resolution.  ASA is Cisco's
 best option for inspection with a Cat 6K.
 
 Regards,
 Brian
 
 
 
 Brian Stiff
 720.562.6462
 IOS Firewall
 Technical Marketing Eng.
 Security Technology Group
 http://www.cisco.com/go/iosfw
  
 
 Date: Fri, 25 Jan 2008 12:19:20 +0200
 From: Tassos Chatzithomaoglou [EMAIL PROTECTED]

 Has anyone real world experience of using these 2 features 
 (Reflexive ACLs or CBAC) on 6500 with
 MSFC2 (SUP2) or MSFC3 (SUP720)?

 If i understand right (according do the documentation) both 
 are processed in software in the MSFC, so that's going to 
 hurt a little.

 Are there any hidden limitations?
 Does MSFC3 perform better than MSFC2?
 Should we prefer one instead of the other?
 Can we use both at the same time?

 We're already using FWSM on our main 6500s, but we have some 
 spare 6500s (for test servers mainly) and we'd like to 
 implement something better (and easier to maintain) than 
 simple ACLs.

 --
 Tassos


 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/
 
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

Re: [c-nsp] ASA5510 Code

2008-01-28 Thread Matt Carter
 
 would love to know what bugs you;ve encountered so far?
 
 As im testing this in lab right now, and so far all has been good

my experience has been from stable PIX environment to what i would consider
to be unstable ASA environment. on a trial deployment with the intention of
phasing out various deployed PIX (nothing spectacular in terms of conf,
firewall with a few spokes, acl's and inpsects, no ipsec/vpn) and within a
short time we have discovered some rather problematic inspect bugs then soon
after that crashing on 7.2(2), but no crash file written due to another
bug.. went to 7.2(3) which was reasonably new at the time, within a week or
so both my primary and secondary asa had crashed and rebooted a couple of
times, with a crash file at least..

i still am awaiting a fix for this bug CSCsl89317, case was opened in nov
'07 but as you can see the details on the bug are still sketchy at best.

CSCsl89317 Status Open Severity 2 1st Found-In 7.2(3)
ASA 7.2.3 crash Thread Name: Dispatch Unit (Old pc 0x00223a67 ebp 0x018b
ASA 7.2.3 Crash Thread Name: Dispatch Unit (Old pc 0x00223a67 ebp0x018b0a90)
ASA 7.2.3:

Workaround:
None

nice eh

less than impressed with the ASA (and cisco's response to addressing issues)
at this point in time..

when you've come from rock solid PIX deployments to crashing high
availability clusters it doesn't wash too well..

... maybe i've just had an unlucky experience ...

--matt






___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] LLDP-MED on Cisco 3750 12.2(44)SE

2008-01-28 Thread Jay Young
I am trying to get a Cisco 3750 to send a voice vlan via LLDP-MED. In
the release notes
this looks supported in version 12.2(44)SE. I can get LLDP sending but no MED.

Any pointers?

Thanks,
Jay
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] Accelerate Failure Detection of EoMPLS

2008-01-28 Thread alaerte.vidali
 Do you know if there is ways to accelerate detection of failure between
PEs and shutdown extended Vlan (through EoMPLS or VPLS).

PC1--PE1-PE2--PC2
 |___|

When simulating failure on link PE1---PE2, it is taking to long for
traffic switchover.
(already tested EoMPLS over TE with FRR, but it seems some issue with
extended Vlan)

By the way, there is layer 3 configured on Vlan with xconnect command. I
am wondering if this is making IOS go crazy.

Tks,
Alaerte

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] MPLS PE to PE over GRE/IPIP

2008-01-28 Thread Masood Ahmad Shah
I'm in process to connect two or more Provider Edge router using GRE/IPIP
tunnels. What were your experiences? If the answer is yes than I would love
to ask how do you connect a PE to another PE using the GRE/IPIP tunnel
interfaces. Keeping in mind that I'm going to carry multiple customers
traffic (VRF BGP-VPN) between these PEs.



___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Top 10 Network Engineering Tools

2008-01-28 Thread Christoph Loibl
I vote for traceroute as one of the top tools (if not the topmost  
tool).

Stoffi

On Jan 28, 2008, at 9:22 PM, Joseph Jackson wrote:

 Hey all,

 Myself and a coworker are trying to get together a list of the top  
 ten tools
 any network engineer shouldn't be without.  We're looking for  
 vendor neutral
 tools.  So what do you all think are the most haves?




 Thanks
 Joseph
 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/

-- 
CHRISTOPH LOIBL 
mailto:[EMAIL PROTECTED]   |No trees were killed in the creation of this 
message.
http://pix.tix.at |However, many electrons were terrible inconvenienced.
CL8-RIPE  PGP-Key-ID: 0x4B2C0055 +++



___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] 7604/Sup720 not MLS/CEF switching

2008-01-28 Thread Sukumar Subburayan (sukumars)
To answer your last question, since the packets that are punted to
software for switching are 
handled by one of the EARL7 rate-limiters, which don't have counters and
also you cannot see what packets,
are being punted to software, the best option would be use 

CPU-SPAN, to SPAN the traffic destined to RP-CPU and analyse that.


sukumar
 

 
Oh well.  I found the problem - someone leaked too many prefixes, and
it's  

%MLSCEF-SP-7-FIB_EXCEPTION: FIB TCAM exception for IPv4 unicast, Some
routes will be software switched.

Dunno why it's showing *these* symptoms, affecting some interfaces more
than others.  But still I'm interested in finding out how to see what
packets are not being MLS/CEF-switched, and why, for the next round of
debugging :-)



-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Gert Doering
Sent: Friday, January 25, 2008 8:07 AM
To: cisco-nsp@puck.nether.net
Subject: [c-nsp] 7604/Sup720 not MLS/CEF switching

Hi,

I could use a hint to start nailing this down.

We have two 7604/Sup720s with 12.2(18)SXF7 here, doing a pretty similar
traffic load (about 2-3 Gbit/s aggregate), and similar traffic pattern.

IPv4, IPv6, MPLS, netflow export for IPv4.

One of the boxes is running at 1-2% CPU, the other one is running at
60-80% (which started at 22:18 yesterday evening, with no significant
change in traffic patterns).

So, it's moving packets with a CPU not meant to be used for this.  

So I've checked two interfaces with very similar usage patterns (audio
streaming of life radio, long-lasting flows with medium-to-large packets
sizes), and there's a big difference in the percentage here:

vlan1700, about 4% not MLS/CEF switched:

 Protocol   PathPkts In   Chars In   Pkts Out  Chars Out
   IPProcess  25150   24734247  0  0
Cache misses  0
Fast 1328140746 1350996135423191  58674
   Auton/SSE 30723864532 30882213532050 18184117236
1335974238797

vlan4062, about 0.1% not MLS/CEF switched:

 Protocol   PathPkts In   Chars In   Pkts Out  Chars Out
   IPProcess 368914   54599634   31636639 3543640264
Cache misses  0
Fast 1670054191 1924596882515168   9913
   Auton/SSE 1029709651247 1137649776167566 229040036204
16614962888496

there's difference on L2 for these interfaces (4062 is coming in via a
dedicated port, 1700 is coming in via a trunk port), but I don't think
this should make any difference.

Most of the egress traffic for this is going via a L3 port-channel, or
via a single L3 port.  For both VLANs.


Traffic level is about 400 Mbit on vlan 1700, 500 Mbit on vlan 4062,
most of it incoming.  No big difference here either.  Similar PPS
levels, about 50.000 pps incoming.

This is how vlan1700 looks like:

interface Vlan1700
 description Streaming2/Trust (an1)
 ip address 194.97.x.y 255.255.255.240
 ip verify unicast source reachable-via rx allow-default  ip flow
ingress  no mop enabled end


Something is funny here... - so - how do I start figuring out why 1/20
of those packets are not being MLS/CEF switched?


Oh well.  I found the problem - someone leaked too many prefixes, and
it's  

%MLSCEF-SP-7-FIB_EXCEPTION: FIB TCAM exception for IPv4 unicast, Some
routes will be software switched.

Dunno why it's showing *these* symptoms, affecting some interfaces more
than others.  But still I'm interested in finding out how to see what
packets are not being MLS/CEF-switched, and why, for the next round of
debugging :-)

gert


--
USENET is *not* the non-clickable part of WWW!
 
//www.muc.de/~gert/
Gert Doering - Munich, Germany
[EMAIL PROTECTED]
fax: +49-89-35655025
[EMAIL PROTECTED]
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Top 10 Network Engineering Tools

2008-01-28 Thread Tony Li

 1. A laptop with a built-in serial port or a USB-Serial converter that
 you know works (in fact, even if your laptop has a built-in serial
 port it could be useful to have a USB-Serial converter handy in case
 you need to connect to multiple devices at once).  Also need to make
 sure that your terminal client works well and that you know how to
 configure it to access all your serial ports.

 2. Console cables for connecting to all of the various devices you are
 in charge of.

 3. Wireshark

 4. SSH  telnet clients.


5. An up-to-date, fully functional TFTP server

6. Rancid

7. A SQL database, with configuration infrastructure

8. ping, traceroute, whois


Tony

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Top 10 Network Engineering Tools

2008-01-28 Thread Gert Doering
Hi,

On Mon, Jan 28, 2008 at 12:22:51PM -0800, Joseph Jackson wrote:
 Myself and a coworker are trying to get together a list of the top ten tools
 any network engineer shouldn't be without.  We're looking for vendor neutral
 tools.  So what do you all think are the most haves?

ping
traceroute
mtr
lft
smokeping
telnet

gert
-- 
USENET is *not* the non-clickable part of WWW!
   //www.muc.de/~gert/
Gert Doering - Munich, Germany [EMAIL PROTECTED]
fax: +49-89-35655025[EMAIL PROTECTED]


pgpVDGC8FEhsL.pgp
Description: PGP signature
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

Re: [c-nsp] Top 10 Network Engineering Tools

2008-01-28 Thread Jay Hennigan
Joseph Jackson wrote:
 Hey all,
 
 Myself and a coworker are trying to get together a list of the top ten tools
 any network engineer shouldn't be without.  We're looking for vendor neutral
 tools.  So what do you all think are the most haves?

Unix laptop (or OSX) with serial port or usb/serial adapter
ssh client
tftp server
ethereal/wireshark
nmap
minicom
loopback plugs/cables for T1, Ethernet, v.35, DS3, ST and SC fiber


--
Jay Hennigan - CCIE #7880 - Network Engineering - [EMAIL PROTECTED]
Impulse Internet Service  -  http://www.impulse.net/
Your local telephone and internet company - 805 884-6323 - WB6RDV
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Control plane policy recommendation

2008-01-28 Thread Kristian Larsson
On Tue, Jan 22, 2008 at 12:27:47PM +0530, Vikas Sharma wrote:
 Hi,
 
 I am configuring CoPP. If any one previously have implemented the same, pls
 help me in finding what should be the PPS for different traffic class?

This depends on what platform you are running.
The NPE-G1 or RSP720 can take quite a beating
while Sup32 for example can't handle much at all.

  -K

-- 
Kristian LarssonKLL-RIPE
Network Engineer  Peering Coordinator  SpriteLink [AS39525]
+46 704 910401[EMAIL PROTECTED]
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] MAC address from cisco IOS switches

2008-01-28 Thread Prabhu Gurumurthy
All,

We have close to 15 2960 switches connected to twin 3750's with 15+ VLANs in the
domain. 3750's are stacked and it is the VTP server with 2960's being client.
There are no switches acting in transparent mode.

I want to get the MAC addresses from 3750's and 2960 using SNMP, instead of
logging into each switch and looking up mac address using sh mac address-table.

I looked through Cisco website and stumbled upon this website:
http://www.cisco.com/en/US/tech/tk648/tk362/technologies_tech_note09186a00801c9199.shtml

This document deals only with Catalyst not IOS. Is there a easy way to get MAC 
entries using SNMP on IOS switch.

BTW I am using
pgurumur-vm-openbsd (OpenBSD): [~]
10.200.3.0: [1500]$  snmpget -v 1 -c silver4ro c2960-04 sysDescr.0
SNMPv2-MIB::sysDescr.0 = STRING: Cisco IOS Software, C2960 Software 
(C2960-LANBASEK9-M), Version 12.2(37)SE, RELEASE SOFTWARE (fc2)
Copyright (c) 1986-2007 by Cisco Systems, Inc.
Compiled Thu 10-May-07 16:43 by antonino

when I query RFC1213-MIB::atPhysAddress I am getting the following entries but 
not the entire list

pgurumur-vm-openbsd (OpenBSD): [~]
10.200.3.0: [1498]$ snmpwalk -v 1 -c silver4ro c2960-04 1.3.6.1.2.1.3.1.1.2   
RFC1213-MIB::atPhysAddress.93.1.10.42.166.19 = Hex-STRING: 00 1C 0F A6 63 44
RFC1213-MIB::atPhysAddress.93.1.10.57.93.1 = Hex-STRING: 00 1C 0F A6 63 44
RFC1213-MIB::atPhysAddress.93.1.10.57.93.20 = Hex-STRING: 00 1C 0F 9D 26 41
RFC1213-MIB::atPhysAddress.93.1.10.57.166.241 = Hex-STRING: 00 1C 0F A6 63 44
RFC1213-MIB::atPhysAddress.93.1.10.200.1.253 = Hex-STRING: 00 1C 0F A6 63 44


sh mac address-table:

   Mac Address Table
---

VlanMac Address   TypePorts
---   -
  All0100.0ccc.STATIC  CPU
  All0100.0ccc.cccdSTATIC  CPU
  All0180.c200.STATIC  CPU
  All0180.c200.0001STATIC  CPU
  All0180.c200.0002STATIC  CPU
  All0180.c200.0003STATIC  CPU
  All0180.c200.0004STATIC  CPU
  All0180.c200.0005STATIC  CPU
  All0180.c200.0006STATIC  CPU
  All0180.c200.0007STATIC  CPU
  All0180.c200.0008STATIC  CPU
  All0180.c200.0009STATIC  CPU
  All0180.c200.000aSTATIC  CPU
  All0180.c200.000bSTATIC  CPU
  All0180.c200.000cSTATIC  CPU
  All0180.c200.000dSTATIC  CPU
  All0180.c200.000eSTATIC  CPU
  All0180.c200.000fSTATIC  CPU
  All0180.c200.0010STATIC  CPU
  All..STATIC  CPU
1000c.30fa.d6c0DYNAMIC Gi0/48
1001c.0fa6.6306DYNAMIC Gi0/48
7001c.0fa6.6306DYNAMIC Gi0/48
   64001c.0fa6.6306DYNAMIC Gi0/48
   64001c.0fa6.6342DYNAMIC Gi0/48
   93001c.0fa6.6300DYNAMIC Gi0/48
   93001c.0fa6.6306DYNAMIC Gi0/48
   93001c.0fa6.6344DYNAMIC Gi0/48
  136000b.46f4.b740DYNAMIC Gi0/48
  136000b.5fb6.4760DYNAMIC Gi0/48
  136000c.30fa.d6c0DYNAMIC Gi0/48
  1360010.7b9b.d840DYNAMIC Gi0/48
  1360014.a850.dfbdDYNAMIC Gi0/48
  136001c.0fa6.6306DYNAMIC Gi0/48
  136001c.0fa6.6347DYNAMIC Gi0/48
  1360030.4882.79afDYNAMIC Gi0/3
   41000b.46f4.b741DYNAMIC Gi0/48
   410010.7b9b.d861DYNAMIC Gi0/48
   41001c.0fa6.6306DYNAMIC Gi0/48
   41001c.0fa6.6341DYNAMIC Gi0/48
   44000c.30fa.d6c0DYNAMIC Gi0/48
   44001c.0fa6.6306DYNAMIC Gi0/48
   44001c.0fa6.634aDYNAMIC Gi0/48
   450004.23a6.467cDYNAMIC Gi0/48
   450019.b9ea.ed0cDYNAMIC Gi0/48
   45001c.0fa6.6306DYNAMIC Gi0/48
   45001c.0fa6.634bDYNAMIC Gi0/48
   450030.bd71.5c67DYNAMIC Gi0/48
   90.747c.a0a7DYNAMIC Gi0/48
   900004.23a6.37c3DYNAMIC Gi0/48
   900005.1bbd.8500DYNAMIC Gi0/48
   900007.4d22.7c70DYNAMIC Gi0/48
   900008.744f.d97dDYNAMIC Gi0/48
   90000b.db78.d8bcDYNAMIC Gi0/48
   90000b.db7d.2f55DYNAMIC Gi0/48
   90000d.565e.ef7dDYNAMIC Gi0/48
   90000d.566e.3780DYNAMIC Gi0/48
   90000d.5692.b1fbDYNAMIC Gi0/48
   90000d.5699.1e48DYNAMIC Gi0/48
   90000d.5699.41d3DYNAMIC Gi0/48
   90000d.56be.89ceDYNAMIC Gi0/48
   90000d.56fc.efbaDYNAMIC Gi0/48
   90000f.1f8e.6679DYNAMIC Gi0/48
   90000f.1fa5.5005DYNAMIC Gi0/48
   90000f.1fa5.5dccDYNAMIC Gi0/48
   90000f.1fff.0fceDYNAMIC Gi0/48
   900011.434c.a4c3DYNAMIC Gi0/48
   900012.3f01.2490DYNAMIC Gi0/48
   900012.3f09.ca7eDYNAMIC Gi0/48
   900012.3f14.da48DYNAMIC Gi0/48
   900012.3f18.f91bDYNAMIC Gi0/48
   900012.3ff3.e0e2

Re: [c-nsp] ASA5510 Code

2008-01-28 Thread Michael Malitsky
I'd been running with no problems:
--7.2(2)23 on my PIXs
Had to upgrade from 7.2(2) to resolve a NAT bug
I use these as firewalls, no VPNs

--7.2(3) on ASA5510s
These serve as firewalls, and also terminate L2L VPNs and VPN clients.

--8.0(2) on ASA5505s
These are just used as SOHO/small site firewalls and EzVPN devices.

Sincerely,
Michael 

 --
 
 Message: 4
 Date: Fri, 25 Jan 2008 08:27:37 +
 From: William [EMAIL PROTECTED]
 Subject: [c-nsp] ASA5510 Code
 To: [c-nsp] cisco-nsp@puck.nether.net
 Message-ID:
   [EMAIL PROTECTED]
 Content-Type: text/plain; charset=ISO-8859-1
 
 Hey,
 
 I'm implementing a ASA5510 for L2L VPN, EzVPN, VPN Client and other
 basic firewall functions, can the list recommend a stable version of
 code for my application?
 
 thanks for your time!
 
 W
 
 
 --
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Top 10 Network Engineering Tools

2008-01-28 Thread Masood Ahmad Shah
Here are the key network tools any network engineer shouldn't be without :)

Packet sniffing (ethereal, tcpdump)
terminal/console (v100)
ping
traceroute
arp
hping (ip spoofing, flooding to test your link or firewall and packet
manipulation send custom ICMP, UDP and TCP packets)
nslookup
ssh (I don't like telnet anymore)
nmap (TCP/UDP port scanner)
gogle (www.google.com)

Regards,
Masood Ahmad Shah 


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Joseph Jackson
Sent: Tuesday, January 29, 2008 1:23 AM
To: Cisco
Subject: [c-nsp] Top 10 Network Engineering Tools

Hey all,

Myself and a coworker are trying to get together a list of the top ten tools
any network engineer shouldn't be without.  We're looking for vendor neutral
tools.  So what do you all think are the most haves?




Thanks
Joseph
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] Top 10 Network Engineering Tools

2008-01-28 Thread Joseph Jackson
Hey all,

Myself and a coworker are trying to get together a list of the top ten tools
any network engineer shouldn't be without.  We're looking for vendor neutral
tools.  So what do you all think are the most haves?




Thanks
Joseph
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] MPLS PE to PE over GRE/IPIP

2008-01-28 Thread Luan Nguyen
If you don't have mpls then using GRE between PEs would be okay.
Do some thing like:
int tun1
ip address 1.1.1.1
tunnel source x.x.x.x
tunnel dest y.y.y.y

y.y.y.y is the other PE backbone facing ip, reachable by x.x.x.x
then advertise your loopback address through the tunnel using whatever you
like...eigrp, ospf, static route.  Loopback is mbgp peering point.
Then just do your normal configs.

-lmn

On Jan 28, 2008 2:49 PM, Masood Ahmad Shah [EMAIL PROTECTED] wrote:

 I'm in process to connect two or more Provider Edge router using GRE/IPIP
 tunnels. What were your experiences? If the answer is yes than I would
 love
 to ask how do you connect a PE to another PE using the GRE/IPIP tunnel
 interfaces. Keeping in mind that I'm going to carry multiple customers
 traffic (VRF BGP-VPN) between these PEs.



 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] S/W for ASA 5550

2008-01-28 Thread Peter Rathlev
On Mon, 2008-01-28 at 11:11 -0600, Dale W. Carder wrote:
  Now we're facing a medical imaging project saying they'll collect  
  around 100 TB per year with some nice peaks, and we're wondering if 
  we have to route traffic around the data center firewalls to make
  sure performance is okay for the rest of the servers...
 
 Talk to your account team about this.  There could be a FWSM
 feature in beta soon that maybe could address this.  That's
 about all I can say without breaking NDA.

Thanks, will do. Sounds interesting. :-)

Regards,
Peter


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] MAC address from cisco IOS switches

2008-01-28 Thread Howard Jones
Prabhu Gurumurthy wrote:
 All,

 We have close to 15 2960 switches connected to twin 3750's with 15+ VLANs in 
 the
 domain. 3750's are stacked and it is the VTP server with 2960's being client.
 There are no switches acting in transparent mode.

 I want to get the MAC addresses from 3750's and 2960 using SNMP, instead of
 logging into each switch and looking up mac address using sh mac 
 address-table.
   
If you are intending to track movements of individual MAC addresses, or 
search for particular devices, you might like to take a look at nedi, 
which will do this for you (www.nedi.ch), amonst a lot of other useful 
switch-related tasks.

Howie
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Top 10 Network Engineering Tools

2008-01-28 Thread Justin M. Streiner
On Mon, 28 Jan 2008, Joseph Jackson wrote:

 Myself and a coworker are trying to get together a list of the top ten tools
 any network engineer shouldn't be without.  We're looking for vendor neutral
 tools.  So what do you all think are the most haves?

My must-have tools (physical):
1. a laptop with a real RS-232 serial port
2. console cables for whatever I need to touch
3. an assortment of flat and phillips-head screwdrivers
4. wire cutter/leatherman
5. reusable ESD grounding strap
6. keys for whatever cabinets/cages I need to get into
7. building access (swipe cards, proximity badges/fobs, keys, ID badges...)
8. jumpers - if not pre-made, include ends and tools to make them
9. OTDR with appropriate modules to test the lengths and types of fiber I
need to test
10. extra flash/CF cards/CF to PC card adapters


My must-have tools (software for my laptop (Linux)):
1. Minicom
2. SSH/SSH2 client
3. nmap
4. lft (layer 4 traceroute)
5. dhclient, in case I need to connect to a network that requires DHCP
7. wireshark
8. tcpdump
9. iperf
10. DNS tools (nslookup, host, dig, etc...)
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] MAC address from cisco IOS switches

2008-01-28 Thread Masood Ahmad Shah
I don't have any problem with below Cisco snmp query while retrieving
learned mac table from a Cisco switch.
  
snmpwalk -v2c -c nexsecure 192.168.0.1 RFC1213-MIB::atPhysAddress

I suggest you must run with -v2c instead of -v 1


Regards,
Masood Ahmad Shah

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Prabhu Gurumurthy
Sent: Tuesday, January 29, 2008 1:51 AM
To: cisco-nsp@puck.nether.net
Subject: [c-nsp] MAC address from cisco IOS switches

All,

We have close to 15 2960 switches connected to twin 3750's with 15+ VLANs in
the
domain. 3750's are stacked and it is the VTP server with 2960's being
client.
There are no switches acting in transparent mode.

I want to get the MAC addresses from 3750's and 2960 using SNMP, instead of
logging into each switch and looking up mac address using sh mac
address-table.

I looked through Cisco website and stumbled upon this website:
http://www.cisco.com/en/US/tech/tk648/tk362/technologies_tech_note09186a0080
1c9199.shtml

This document deals only with Catalyst not IOS. Is there a easy way to get
MAC 
entries using SNMP on IOS switch.

BTW I am using
pgurumur-vm-openbsd (OpenBSD): [~]
10.200.3.0: [1500]$  snmpget -v 1 -c silver4ro c2960-04 sysDescr.0
SNMPv2-MIB::sysDescr.0 = STRING: Cisco IOS Software, C2960 Software 
(C2960-LANBASEK9-M), Version 12.2(37)SE, RELEASE SOFTWARE (fc2)
Copyright (c) 1986-2007 by Cisco Systems, Inc.
Compiled Thu 10-May-07 16:43 by antonino

when I query RFC1213-MIB::atPhysAddress I am getting the following entries
but 
not the entire list

pgurumur-vm-openbsd (OpenBSD): [~]
10.200.3.0: [1498]$ snmpwalk -v 1 -c silver4ro c2960-04 1.3.6.1.2.1.3.1.1.2

RFC1213-MIB::atPhysAddress.93.1.10.42.166.19 = Hex-STRING: 00 1C 0F A6 63 44
RFC1213-MIB::atPhysAddress.93.1.10.57.93.1 = Hex-STRING: 00 1C 0F A6 63 44
RFC1213-MIB::atPhysAddress.93.1.10.57.93.20 = Hex-STRING: 00 1C 0F 9D 26 41
RFC1213-MIB::atPhysAddress.93.1.10.57.166.241 = Hex-STRING: 00 1C 0F A6 63
44
RFC1213-MIB::atPhysAddress.93.1.10.200.1.253 = Hex-STRING: 00 1C 0F A6 63 44


sh mac address-table:

   Mac Address Table
---

VlanMac Address   TypePorts
---   -
  All0100.0ccc.STATIC  CPU
  All0100.0ccc.cccdSTATIC  CPU
  All0180.c200.STATIC  CPU
  All0180.c200.0001STATIC  CPU
  All0180.c200.0002STATIC  CPU
  All0180.c200.0003STATIC  CPU
  All0180.c200.0004STATIC  CPU
  All0180.c200.0005STATIC  CPU
  All0180.c200.0006STATIC  CPU
  All0180.c200.0007STATIC  CPU
  All0180.c200.0008STATIC  CPU
  All0180.c200.0009STATIC  CPU
  All0180.c200.000aSTATIC  CPU
  All0180.c200.000bSTATIC  CPU
  All0180.c200.000cSTATIC  CPU
  All0180.c200.000dSTATIC  CPU
  All0180.c200.000eSTATIC  CPU
  All0180.c200.000fSTATIC  CPU
  All0180.c200.0010STATIC  CPU
  All..STATIC  CPU
1000c.30fa.d6c0DYNAMIC Gi0/48
1001c.0fa6.6306DYNAMIC Gi0/48
7001c.0fa6.6306DYNAMIC Gi0/48
   64001c.0fa6.6306DYNAMIC Gi0/48
   64001c.0fa6.6342DYNAMIC Gi0/48
   93001c.0fa6.6300DYNAMIC Gi0/48
   93001c.0fa6.6306DYNAMIC Gi0/48
   93001c.0fa6.6344DYNAMIC Gi0/48
  136000b.46f4.b740DYNAMIC Gi0/48
  136000b.5fb6.4760DYNAMIC Gi0/48
  136000c.30fa.d6c0DYNAMIC Gi0/48
  1360010.7b9b.d840DYNAMIC Gi0/48
  1360014.a850.dfbdDYNAMIC Gi0/48
  136001c.0fa6.6306DYNAMIC Gi0/48
  136001c.0fa6.6347DYNAMIC Gi0/48
  1360030.4882.79afDYNAMIC Gi0/3
   41000b.46f4.b741DYNAMIC Gi0/48
   410010.7b9b.d861DYNAMIC Gi0/48
   41001c.0fa6.6306DYNAMIC Gi0/48
   41001c.0fa6.6341DYNAMIC Gi0/48
   44000c.30fa.d6c0DYNAMIC Gi0/48
   44001c.0fa6.6306DYNAMIC Gi0/48
   44001c.0fa6.634aDYNAMIC Gi0/48
   450004.23a6.467cDYNAMIC Gi0/48
   450019.b9ea.ed0cDYNAMIC Gi0/48
   45001c.0fa6.6306DYNAMIC Gi0/48
   45001c.0fa6.634bDYNAMIC Gi0/48
   450030.bd71.5c67DYNAMIC Gi0/48
   90.747c.a0a7DYNAMIC Gi0/48
   900004.23a6.37c3DYNAMIC Gi0/48
   900005.1bbd.8500DYNAMIC Gi0/48
   900007.4d22.7c70DYNAMIC Gi0/48
   900008.744f.d97dDYNAMIC Gi0/48
   90000b.db78.d8bcDYNAMIC Gi0/48
   90000b.db7d.2f55DYNAMIC Gi0/48
   90000d.565e.ef7dDYNAMIC Gi0/48
   90000d.566e.3780DYNAMIC Gi0/48
   90000d.5692.b1fbDYNAMIC Gi0/48
   90000d.5699.1e48DYNAMIC Gi0/48
   90000d.5699.41d3DYNAMIC Gi0/48
   90000d.56be.89ceDYNAMIC Gi0/48

Re: [c-nsp] Top 10 Network Engineering Tools

2008-01-28 Thread Jeff Fitzwater


This are just some of the junk I could think of.

   If you know how to use tcpdump, and can configure your switches to  
mirror data, then you can do a lot without any specialized hardware,  
but you must know what you are looking at first.


UNIX
tcpdump
traceroute
shell scripting
perl
snmp get, getnext, set, walk
ssh


TCP IP
IP classes and masks
ping
arp
DHCP bootp
SNMP proto mibs and oids
DNS
Unicast/multicast

Know your  switch/router vendor Commands and what they really do.
CISCO is usually a must

switch-basics
STP/MST
bridge forwarding tables
ACLs
security

routers
RIP
BGP
security
ACLs





Jeff Fitzwater
OIT Network Systems
Princeton University




On Jan 28, 2008, at 3:22 PM, Joseph Jackson wrote:

 Hey all,

 Myself and a coworker are trying to get together a list of the top  
 ten tools
 any network engineer shouldn't be without.  We're looking for vendor  
 neutral
 tools.  So what do you all think are the most haves?




 Thanks
 Joseph
 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] 6509 vrrp issue

2008-01-28 Thread Jon Lewis
I had a strange issue crop up last week with vrrp.  In the following 
setup, all customer facing ports are L3 ports.  The interconnect 
between the 6509s is L2.

   |--6509-1-cust2
cust1---2900XL |
   |--6509-2

Given the above setup, with the 6509s doing vrrp for cust1, and cust2 
directly attached just to 6509-1, cust1 misconfigured their systems to use 
6509-2's real IP rather than the vrrp virtual IP.  6509-1 was configured 
(higher priority) to be the vrrp master.

This resulted in reachability issues between cust1 and cust2 reminiscent 
of dcef bugs we used to run into on the 7500 platform.  Certain cust2 IPs 
could send packets to certain cust1 IPs, but replies wouldn't get back to 
them.  i.e. TCP connections couldn't be opened.  I was able to verify that 
for these failed connections, packets were getting to cust1 and cust1 was 
replying.  Other cust2 IPs were able to communicate with other cust1 IPs. 
I fixed the problem by shutting cust1's interface on 6509-1.

I need to wait until we can break things again, and try monitoring 
cust2's 6509-1 port to see if we're actually sending them the packets 
they're 'not receiving'...but I don't see why we wouldn't be...but I also 
don't see why their hosts wouldn't receive them if we were.

--
  Jon Lewis   |  I route
  Senior Network Engineer |  therefore you are
  Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Top 10 Network Engineering Tools

2008-01-28 Thread Casey Mills
putty.exe
http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html


Casey




On 1/28/08, Joseph Jackson [EMAIL PROTECTED] wrote:
 Hey all,

 Myself and a coworker are trying to get together a list of the top ten tools
 any network engineer shouldn't be without.  We're looking for vendor neutral
 tools.  So what do you all think are the most haves?




 Thanks
 Joseph
 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] IDSM load splitting with EC on C6k

2008-01-28 Thread Peter Rathlev
On Mon, 2008-01-28 at 13:56 +0100, Peter Rathlev wrote:
 First, the load splitting uses the standard EC hashing to make sure all
 packets from the same flow uses the same IDSM. What worries me is that
 communication between two hosts, e.g. a TCP stream, is actually two
 different flows. So I could have client-server traffic using one IDSM
 and server-client traffic using another. Doesn't that mean that the
 IDSM cannot identify bad streams, or do they work in a way that makes
 this a non-issue?

Thinking about this for a while, I can see I overlooked something. Using
a Src XOR Dst algorithm will give the same result for Src-Dst as for
Dst-Src, so that way I can always force both parts of the flow through
the same box. Just needed that extra cup of coffee. :-)

Still unsure about the DFC/SPAN/classic bus issue though...

Regards,
Peter


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Top 10 Network Engineering Tools

2008-01-28 Thread Yaroslav Doroshenko
In addition to tools already mentioned perhaps the following are good  
also:

-- rancid (besides it's ability to backup configs and show changes, it  
has very useful tools like clogin which for example allows you to make  
configuration changes on many devices by one command)
-- monitoring is essential. nagios plus as very good addition mrtg,  
cacti or similar.
-- perhaps ftp/tftp server at least running on laptop


On Jan 28, 2008, at 11:22 PM, Joseph Jackson wrote:

 Hey all,

 Myself and a coworker are trying to get together a list of the top  
 ten tools
 any network engineer shouldn't be without.  We're looking for vendor  
 neutral
 tools.  So what do you all think are the most haves?

--
Yaroslav Doroshenko




___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Top 10 Network Engineering Tools

2008-01-28 Thread Pablo Almido

  Other network tools:

 mtr
 iperf
 arping
 pathload
 tracepath









 2008/1/28, Masood Ahmad Shah [EMAIL PROTECTED]:
 
  Here are the key network tools any network engineer shouldn't be without
  :)
 
  Packet sniffing (ethereal, tcpdump)
  terminal/console (v100)
  ping
  traceroute
  arp
  hping (ip spoofing, flooding to test your link or firewall and packet
  manipulation send custom ICMP, UDP and TCP packets)
  nslookup
  ssh (I don't like telnet anymore)
  nmap (TCP/UDP port scanner)
  gogle (www.google.com)
 
  Regards,
  Masood Ahmad Shah
 
 
  -Original Message-
  From: [EMAIL PROTECTED]
  [mailto:[EMAIL PROTECTED] On Behalf Of Joseph Jackson
  Sent: Tuesday, January 29, 2008 1:23 AM
  To: Cisco
  Subject: [c-nsp] Top 10 Network Engineering Tools
 
  Hey all,
 
  Myself and a coworker are trying to get together a list of the top ten
  tools
  any network engineer shouldn't be without.  We're looking for vendor
  neutral
  tools.  So what do you all think are the most haves?
 
 
 
 
  Thanks
  Joseph
  ___
  cisco-nsp mailing list  cisco-nsp@puck.nether.net
  https://puck.nether.net/mailman/listinfo/cisco-nsp
  archive at http://puck.nether.net/pipermail/cisco-nsp/
 
  ___
  cisco-nsp mailing list  cisco-nsp@puck.nether.net
  https://puck.nether.net/mailman/listinfo/cisco-nsp
  archive at http://puck.nether.net/pipermail/cisco-nsp/
 


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Top 10 Network Engineering Tools

2008-01-28 Thread Ed Ravin
On Mon, Jan 28, 2008 at 12:22:51PM -0800, Joseph Jackson wrote:
 Myself and a coworker are trying to get together a list of the top ten tools
 any network engineer shouldn't be without.  We're looking for vendor neutral
 tools.  So what do you all think are the most haves?

I recently discovered Scamper:

  http://www.wand.net.nz/scamper/scamper-cvs-20070523i.tar.gz

I use it to detect the maximum MTU size at each hop along a connection.
Good for troubleshooting path MTU discovery problems.
 
Having Netflow up and running on your network is an important tool,
for problem diagnostics, performance measurement, forensics, billing,
and more.

Another handy tool is ngrep, like tcpdump but it only prints packets
that match a particular pattern in the data.

I'd also like to put in a word for tcptraceroute, which is like regular
traceroute but via TCP so it can often give you extra information about
hosts behind firewalls since the TCP packets make it all the way to the
end host.
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Top 10 Network Engineering Tools

2008-01-28 Thread GIULIANO (UOL)
Nmap
Ping
Tftp server
Tracertoute
Mtr
Wireshark
Tcpdump
Ettercap
Net-snmp tools
Iperf
Mrtg/rrdtool
Flow-Tools (CAIDA)


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Jens
Link
Sent: Monday, January 28, 2008 7:24 PM
To: 'Cisco'
Subject: Re: [c-nsp] Top 10 Network Engineering Tools

Masood Ahmad Shah [EMAIL PROTECTED] writes:

 Packet sniffing (ethereal, tcpdump)

Ethereal is dead for more then 1.5 years now. Wireshark
(http://www.wireshark.org/) is the successor and I strongly
recommend an
upgrade.

For details about the change in names see: 

http://www.wireshark.org/faq.html#q1.2

cheers 

Jens
-- 
[EMAIL PROTECTED] Berlin: http://www.guug.de/lokal/berlin/index.html
  http://www.openbc.com/go/invita/4269460
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

__ NOD32 2826 (20080127) Information __

This message was checked by NOD32 antivirus system.
http://www.eset.com


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Top 10 Network Engineering Tools

2008-01-28 Thread Jorge Evangelista
mtr
arping
pathload
pathrate




On Jan 28, 2008 4:12 PM, Garry [EMAIL PROTECTED] wrote:

 Joseph Jackson wrote:
  Hey all,
 
  Myself and a coworker are trying to get together a list of the top ten
 tools
  any network engineer shouldn't be without.  We're looking for vendor
 neutral
  tools.  So what do you all think are the most haves?

 Dunno if 10 will do, probably depends on your line of work ...

 - mtr
 - AsItHappens


 -garry

 --
 Terrorists can't threaten a country's freedom and democracy.
 Only lawmakers and voters can do that.
  ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/




-- 
The network is the computer
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Top 10 Network Engineering Tools

2008-01-28 Thread Peter Rathlev
On Mon, 2008-01-28 at 13:02 -0800, Tony Li wrote:
  1. A laptop with a built-in serial port or a USB-Serial converter that
  you know works (in fact, even if your laptop has a built-in serial
  port it could be useful to have a USB-Serial converter handy in case
  you need to connect to multiple devices at once).  Also need to make
  sure that your terminal client works well and that you know how to
  configure it to access all your serial ports.
 
  2. Console cables for connecting to all of the various devices you are
  in charge of.
 
  3. Wireshark
 
  4. SSH  telnet clients.
 
 
 5. An up-to-date, fully functional TFTP server
 
 6. Rancid
 
 7. A SQL database, with configuration infrastructure

7.5: Documentation. Lots of it. :-)

 8. ping, traceroute, whois

9. A decent text-editor (I personally prefer Vim) with at least som
(e)grep search and replace. (I used to use Textpad when I used Windows.)


Regards,
Peter


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Top 10 Network Engineering Tools

2008-01-28 Thread Jens Link
Masood Ahmad Shah [EMAIL PROTECTED] writes:

 Packet sniffing (ethereal, tcpdump)

Ethereal is dead for more then 1.5 years now. Wireshark
(http://www.wireshark.org/) is the successor and I strongly recommend an
upgrade.

For details about the change in names see: 

http://www.wireshark.org/faq.html#q1.2

cheers 

Jens
-- 
[EMAIL PROTECTED] Berlin: http://www.guug.de/lokal/berlin/index.html
  http://www.openbc.com/go/invita/4269460
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Top 10 Network Engineering Tools

2008-01-28 Thread Justin Shore
I 2nd RANCID.  A properly configured RANCID install is indispensable.

A multi-homed sniffing box (or probe) connected to key points in the 
network.  I have 2 Linux boxes connected to both core routers in our 
main POPs, each has multiple Ethernet connections for no purpose other 
than sniffing.  I can't live without my tcpdump.

I also 2nd Cacti/MRTG/RRDTool and Nagios.

Syslog.  Where would we be without a working syslog daemon.

Your SSH client of choice.  For me I can't do without SecureCRT. 
Everything else pales in comparison to the features of SecureCRT in my 
book.  A good SSH client is like a good keyboard.  You fumble around in 
a drunken stupor without the tool that you're used to.

A reliable IP subnet calculator.  It never hurts to doublecheck your 
work before you make a bone-headed mistake on a mask.

A good command line.  GUIs are great but CLIs are tops.

Beef jerky.

A working mail client with ready access to my friends on C-NSP.

Justin


Yaroslav Doroshenko wrote:
 In addition to tools already mentioned perhaps the following are good  
 also:
 
 -- rancid (besides it's ability to backup configs and show changes, it  
 has very useful tools like clogin which for example allows you to make  
 configuration changes on many devices by one command)
 -- monitoring is essential. nagios plus as very good addition mrtg,  
 cacti or similar.
 -- perhaps ftp/tftp server at least running on laptop

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Top 10 Network Engineering Tools

2008-01-28 Thread Mark Boolootian

 Myself and a coworker are trying to get together a list of the top ten tools
 any network engineer shouldn't be without.  We're looking for vendor neutral
 tools.  So what do you all think are the most haves?

Beer
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Top 10 Network Engineering Tools

2008-01-28 Thread john heasley
Mon, Jan 28, 2008 at 01:02:54PM -0800, Tony Li:
 
  1. A laptop with a built-in serial port or a USB-Serial converter that
  you know works (in fact, even if your laptop has a built-in serial
  port it could be useful to have a USB-Serial converter handy in case
  you need to connect to multiple devices at once).  Also need to make
  sure that your terminal client works well and that you know how to
  configure it to access all your serial ports.
 
  2. Console cables for connecting to all of the various devices you are
  in charge of.
 
  3. Wireshark
 
  4. SSH  telnet clients.
 
 
 5. An up-to-date, fully functional TFTP server

rcpd and ftp; tftp doesnt really cut it anymore.

 6. Rancid
 
 7. A SQL database, with configuration infrastructure
 
 8. ping, traceroute, whois
 
 
 Tony
 
 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Top 10 Network Engineering Tools

2008-01-28 Thread Garry
Joseph Jackson wrote:
 Hey all,
 
 Myself and a coworker are trying to get together a list of the top ten tools
 any network engineer shouldn't be without.  We're looking for vendor neutral
 tools.  So what do you all think are the most haves?

Dunno if 10 will do, probably depends on your line of work ...

- mtr
- AsItHappens


-garry

-- 
Terrorists can't threaten a country's freedom and democracy.
Only lawmakers and voters can do that.
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Top 10 Network Engineering Tools

2008-01-28 Thread john heasley
Tue, Jan 29, 2008 at 12:00:20AM +, Stephen Stuart:
 heas said:
   5. An up-to-date, fully functional TFTP server
  
  rcpd and ftp; tftp doesnt really cut it anymore.
 
 Not just any rcpd; you want jhawk's rcpd, whose README says:

thats right; if can be found (with a few additions) here:

ftp://ftp.shrubbery.net/pub/rcpd/rcpd-1.2.tar.gz
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Top 10 Network Engineering Tools

2008-01-28 Thread Stephen Stuart
heas said:
  5. An up-to-date, fully functional TFTP server
 
 rcpd and ftp; tftp doesnt really cut it anymore.

Not just any rcpd; you want jhawk's rcpd, whose README says:

This is a standalone implementation of rcpd.

When we say standalone, we mean it does not require an rshd to be
running (in fact it is incompatible with running one), nor does it
require special entries in /etc/passwd.

This rshd is intended as a drop-in replacement for tftpd, to be
used for uploading software to cisco routers, and other devices
that support rcp as a non-authenticated file-transfer protocol.

This implementation serves up files from a build-time-configurable
directory, defaulting to /tftpboot. You can change that with:

./configure --with-bootdir=/path/to/tftpboot/directory

We also implement a feature found in some tftpds, of looking in a
subdirectory designated by the IP address of the source of the
connection. Eg, an rcp of file from host 199.94.220.184, might
result in the rcpd attempting to fetch /tftpboot/199.94.220.184/file.
This feature is off by default, but may be enabled with

./configure --enable-ipaddrdirs

This rcpd enforces tftpd-style access controls. It setuid()s to nobody
prior to attempting file accesses, so requires files to be world
readable or world writable to read/write from them (respectively). It
also requires a file to exist before writing to it, even if the
directory is world-writable.


This software sets IP precedence INTERNETCONTROL on the tcp
connection(s) it talks over, on the theory that this behavior may be
desirable/important.

See the file INSTALL for building instructions. There is no make
install rule, because the maintainer is lame. I recommend installing
in /usr/local/libexec/rcpd, though.

An appropriate inetd.conf line would be:

# Internet services syntax:
#  service_name socket_type proto flags user
# server_pathname args
#
shell   stream  tcp nowait  root/usr/local/libexec/rcpd
# rcpd


Please send all bug reports by electronic mail to:
[EMAIL PROTECTED] (John Hawkinson)

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Top 10 Network Engineering Tools

2008-01-28 Thread Joseph Jackson
Thanks for all the great replies.  I will complie a list of everything that
I've recivied and email the list.
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] MAC address from cisco IOS switches

2008-01-28 Thread mack
 -Original Message-
 Subject: cisco-nsp Digest, Vol 62, Issue 115


 Message: 9
 Date: Mon, 28 Jan 2008 12:50:47 -0800
 From: Prabhu Gurumurthy [EMAIL PROTECTED]
 Subject: [c-nsp] MAC address from cisco IOS switches
 To: cisco-nsp@puck.nether.net
 Message-ID: [EMAIL PROTECTED]
 Content-Type: text/plain; charset=ISO-8859-1; format=flowed

 All,

 We have close to 15 2960 switches connected to twin 3750's with 15+
 VLANs in the
 domain. 3750's are stacked and it is the VTP server with 2960's being
 client.
 There are no switches acting in transparent mode.

 I want to get the MAC addresses from 3750's and 2960 using SNMP,
 instead of
 logging into each switch and looking up mac address using sh mac
 address-table.

 I looked through Cisco website and stumbled upon this website:
 http://www.cisco.com/en/US/tech/tk648/tk362/technologies_tech_note09186
 a00801c9199.shtml

 This document deals only with Catalyst not IOS. Is there a easy way to
 get MAC
 entries using SNMP on IOS switch.

 BTW I am using
 pgurumur-vm-openbsd (OpenBSD): [~]
 10.200.3.0: [1500]$  snmpget -v 1 -c silver4ro c2960-04 sysDescr.0
 SNMPv2-MIB::sysDescr.0 = STRING: Cisco IOS Software, C2960 Software
 (C2960-LANBASEK9-M), Version 12.2(37)SE, RELEASE SOFTWARE (fc2)
 Copyright (c) 1986-2007 by Cisco Systems, Inc.
 Compiled Thu 10-May-07 16:43 by antonino

 when I query RFC1213-MIB::atPhysAddress I am getting the following
 entries but
 not the entire list


This is the wrong community to retrieve the full table:

You must issue one mac-address retrieval walk for each vlan.
This uses indexed community strings ie.

indexed community string = regular community string@vlan index

The following document explains community string indexing:
http://www.cisco.com/en/US/tech/tk648/tk362/technologies_tech_note09186a00801576ff.shtml

This document and

http://www.cisco.com/en/US/tech/tk648/tk362/technologies_tech_note09186a00801c9199.shtml

Apply to both CatOS and Cisco IOS.

The correct oid to get the mac address list is: 1.3.6.1.2.1.17.4.3.1.1

On larger platforms (6509 for example) with larger mac address tables this can 
be a very long process causing
excessive CPU load.

Matching bridge IDs with mac-addresses uses OID: 1.3.6.1.2.1.17.4.3.1.2
This is probably easiest to use if you are writing custom software.

If you need to get the port you have to also get the bridge id and ifnum 
mappings.

Another poster suggested using SNMP v2 which is not necessary but is 
recommended.

--
LR Mack McBride
Network Administrator
Alpha Red, Inc

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Top 10 Network Engineering Tools

2008-01-28 Thread Aaron Glenn
Seconded. Preferably a nice trappist like st. Bernardus or rochefort.

But more on-topic: everyone lists traceroute; anyone use paris-traceroute?

aaron.glenn

On 1/28/08, Mark Boolootian [EMAIL PROTECTED] wrote:

  Myself and a coworker are trying to get together a list of the top ten
 tools
  any network engineer shouldn't be without.  We're looking for vendor
 neutral
  tools.  So what do you all think are the most haves?

 Beer
 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Top 10 Network Engineering Tools

2008-01-28 Thread Jeff Aitken
On Mon, Jan 28, 2008 at 04:47:27PM -0500, Justin M. Streiner wrote:
 My must-have tools (physical):
 4. wire cutter/leatherman
 8. jumpers - if not pre-made, include ends and tools to make them

A brief note on these two: if you're going to be making cables (copper or
fiber) it's worth it to spend the time  money to learn how to do it right,
including having the right tools.  For example, just because a dull knife
or small flathead screwdriver will work in a pinch, you really should
invest in a nice punchdown tool.  I'll never forget the time one of our
techs was putting ends on a fiber jumper using the unicam kit.  They had
lost/damaged the cleaver and were using garden-variety scissors (you know,
the kind with the blue plastic handles?!) to cut the fiber to length...  
I know, I know, it saves money on attenuators, but still! :-)

If you're going to be touching anything power related, a volt meter might
help keep the magic smoke where it belongs... there is another funny story
about an unnamed facility engineer (we called him sparky, for obvious
reasons) who thought he'd do some DC plant work in the middle of the day.
While holding a *LIVE* -48v lead in his hand he managed to short it to the
rack he was working on.  Luckily he didn't kill himself, or anyone else,
but he did knock out the DC plant for about 10 minutes... at noon... doh!


--Jeff

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] Nexus 7000

2008-01-28 Thread mack
Has anyone looked at this monster?

http://www.cisco.com/en/US/products/ps9402/index.html

It looks like it only comes with two blades:

10GE and copper 10/100/1000

Lack of an fiber 1gbit blade is a major drawback.

Has anyone checked out an approximate price?

If it has higher throughput than the CRS-1,
Where does that leave the CRS-1?

--
LR Mack McBride
Network Administrator
Alpha Red, Inc.


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Nexus 7000

2008-01-28 Thread Tom Storey
 Has anyone looked at this monster?

 http://www.cisco.com/en/US/products/ps9402/index.html

 It looks like it only comes with two blades:

 10GE and copper 10/100/1000

 Lack of an fiber 1gbit blade is a major drawback.

 Has anyone checked out an approximate price?

 If it has higher throughput than the CRS-1,
 Where does that leave the CRS-1?


I came accross it about 30 mins ago. It looks like a beast.

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Nexus 7000

2008-01-28 Thread Stephen Stuart
 If it has higher throughput than the CRS-1,
 Where does that leave the CRS-1?

Able to terminate SONET connections?

Stephen
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Top 10 Network Engineering Tools

2008-01-28 Thread Daniel Hooper

The 5-in-1 cross-over/console/null modem cable is a must for any type of
field engineer

http://www.ossmann.com/5-in-1.html

I also highly suggest a cheap labelling machine if your connecting a lot
of devices with no structured cabling systems.

-Dan



-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Jeff Aitken
Sent: Tuesday, 29 January 2008 12:23 PM
To: Justin M. Streiner
Cc: Cisco
Subject: Re: [c-nsp] Top 10 Network Engineering Tools

On Mon, Jan 28, 2008 at 04:47:27PM -0500, Justin M. Streiner wrote:
 My must-have tools (physical):
 4. wire cutter/leatherman
 8. jumpers - if not pre-made, include ends and tools to make them

A brief note on these two: if you're going to be making cables (copper
or
fiber) it's worth it to spend the time  money to learn how to do it
right,
including having the right tools.  For example, just because a dull
knife
or small flathead screwdriver will work in a pinch, you really should
invest in a nice punchdown tool.  I'll never forget the time one of our
techs was putting ends on a fiber jumper using the unicam kit.  They
had
lost/damaged the cleaver and were using garden-variety scissors (you
know,
the kind with the blue plastic handles?!) to cut the fiber to length...

I know, I know, it saves money on attenuators, but still! :-)

If you're going to be touching anything power related, a volt meter
might
help keep the magic smoke where it belongs... there is another funny
story
about an unnamed facility engineer (we called him sparky, for obvious
reasons) who thought he'd do some DC plant work in the middle of the
day.
While holding a *LIVE* -48v lead in his hand he managed to short it to
the
rack he was working on.  Luckily he didn't kill himself, or anyone else,
but he did knock out the DC plant for about 10 minutes... at noon...
doh!


--Jeff

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Nexus 7000

2008-01-28 Thread Tom Storey

 Call me crazy, but I got no sense that this new thingy can route, from
 the little video or any of the data sheets.  They'd be spouting the pps
 of IPv6 hardware routing, if it could.

I saw mention of VRFs, OSPFv2 and 3, and mentions of IPv4 and IPv6 among
the existing documents, but no mention of PPS or anything else routing
related.

Hopefully more docos are on the way which will detail all of this.

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Nexus 7000

2008-01-28 Thread David Prall
It uses SFP+'s, they supposedly will be available in both 1GE and 10GE.

--
http://dcp.dcptech.com
  

 -Original Message-
 From: [EMAIL PROTECTED] 
 [mailto:[EMAIL PROTECTED] On Behalf Of mack
 Sent: Monday, January 28, 2008 10:25 PM
 To: cisco-nsp@puck.nether.net
 Subject: [c-nsp] Nexus 7000
 
 Has anyone looked at this monster?
 
 http://www.cisco.com/en/US/products/ps9402/index.html
 
 It looks like it only comes with two blades:
 
 10GE and copper 10/100/1000
 
 Lack of an fiber 1gbit blade is a major drawback.
 
 Has anyone checked out an approximate price?
 
 If it has higher throughput than the CRS-1,
 Where does that leave the CRS-1?
 
 --
 LR Mack McBride
 Network Administrator
 Alpha Red, Inc.
 
 
 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Nexus 7000

2008-01-28 Thread Pete Templin
mack wrote:
 Has anyone looked at this monster?
 
 http://www.cisco.com/en/US/products/ps9402/index.html
 
 If it has higher throughput than the CRS-1,
 Where does that leave the CRS-1?

In a routed world, where people think DC power is better, and/or for 
SONET (as others have mentioned)?

Call me crazy, but I got no sense that this new thingy can route, from 
the little video or any of the data sheets.  They'd be spouting the pps 
of IPv6 hardware routing, if it could.

Perhaps the 6500 will shift to closets, the 7600 to routing, and the 
7010 to datacenter switching for enterprises?

At least the Double Clear Front Door Kit is optional...

pt

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Nexus 7000

2008-01-28 Thread mack
The only mentions of routing:

IP routing and multicast: Supports state-of-the-art implementations
of IPv4 and IPv6 services, routing protocols, and IP Multicast features to 
optimize and enhance data center scalability and performance, reducing capital 
expenditures (CapEx) and operating expenses (OpEx)

The OS documents list the various RFC supported including all of the usual BGP 
and IPv6 RFCs.

No mention of MPLS though which gives the CRS-1 a leg up on the backbone 
routing market.

This looks like it kills for everything but SONET and MPLS.

--
LR Mack McBride
Network Administrator
Alpha Red, Inc.


 -Original Message-
 From: Tom Storey [mailto:[EMAIL PROTECTED]
 Sent: Monday, January 28, 2008 10:03 PM
 To: Pete Templin
 Cc: mack; cisco-nsp@puck.nether.net
 Subject: Re: [c-nsp] Nexus 7000


  Call me crazy, but I got no sense that this new thingy can route,
 from
  the little video or any of the data sheets.  They'd be spouting the
 pps
  of IPv6 hardware routing, if it could.

 I saw mention of VRFs, OSPFv2 and 3, and mentions of IPv4 and IPv6
 among
 the existing documents, but no mention of PPS or anything else routing
 related.

 Hopefully more docos are on the way which will detail all of this.

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Nexus 7000

2008-01-28 Thread Geyer, Nick
The documentation out for NX-OS shows support for most IP routing
solutions around today. It will be interesting to see more doco from
Cisco on what this box can actually do and find out where Cisco plans to
slot it into the family tree (perhaps the illegitimate child of Mr.
CRS-1 and Mrs. 7609?)

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Tom Storey
Sent: Tuesday, 29 January 2008 3:03 PM
To: Pete Templin
Cc: mack; cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] Nexus 7000


 Call me crazy, but I got no sense that this new thingy can route, from
 the little video or any of the data sheets.  They'd be spouting the
pps
 of IPv6 hardware routing, if it could.

I saw mention of VRFs, OSPFv2 and 3, and mentions of IPv4 and IPv6 among
the existing documents, but no mention of PPS or anything else routing
related.

Hopefully more docos are on the way which will detail all of this.

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Nexus 7000

2008-01-28 Thread Daniel Hooper
Microsoft is currently performing rigorous testing of the Nexus 7000
Series for security, manageability and performance in a lab environment

I doubt Microsoft would be doing any type of WAN/mpls/backbone testing
on it, just from the small amount of information available it looks to
be good for combining your SAN switch fabrics with your lan/data switch
fabric ... does this just seem like a bad idea to anyone else?

Cheerio

-Dan

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Geyer, Nick
Sent: Tuesday, 29 January 2008 1:20 PM
To: cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] Nexus 7000

The documentation out for NX-OS shows support for most IP routing
solutions around today. It will be interesting to see more doco from
Cisco on what this box can actually do and find out where Cisco plans to
slot it into the family tree (perhaps the illegitimate child of Mr.
CRS-1 and Mrs. 7609?)

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Tom Storey
Sent: Tuesday, 29 January 2008 3:03 PM
To: Pete Templin
Cc: mack; cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] Nexus 7000


 Call me crazy, but I got no sense that this new thingy can route, from
 the little video or any of the data sheets.  They'd be spouting the
pps
 of IPv6 hardware routing, if it could.

I saw mention of VRFs, OSPFv2 and 3, and mentions of IPv4 and IPv6 among
the existing documents, but no mention of PPS or anything else routing
related.

Hopefully more docos are on the way which will detail all of this.

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Nexus 7000

2008-01-28 Thread hjan


Lincoln Dale (ltd) ha scritto:
 mack wrote:
 with initial I/O modules  chassis, up to 240M PPS IPv6 h/w switched
 goodness.


What about NX-OS ?
Is it built upon qnx ?

Regards,
Gianluca

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Nexus 7000

2008-01-28 Thread Saku Ytti
On (2008-01-28 21:24 -0600), mack wrote:
 
 Where does that leave the CRS-1?

In the rack, MPLS switching packets and doing IP lookup on 128k FIB.

It seems as if cisco made sure, that this time SP's won't be buying
it's 'switch' as a cheap alternative to higher margin routers. Saying
that, it looks like a nice product with quite a bit of innovation for the
market it's targeting.

-- 
  ++ytti
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Nexus 7000

2008-01-28 Thread Tim Stevenson
At 09:57 PM 1/28/2008 -0600, Pete Templin observed:
mack wrote:
  Has anyone looked at this monster?
 
  http://www.cisco.com/en/US/products/ps9402/index.html
 
  If it has higher throughput than the CRS-1,
  Where does that leave the CRS-1?

In a routed world, where people think DC power is better, and/or for
SONET (as others have mentioned)?

Call me crazy, but I got no sense that this new thingy can route,

Yes, it can route.

from
the little video or any of the data sheets.  They'd be spouting the pps
of IPv6 hardware routing, if it could.

30Mpps per slot IPv6 unicast routing.


Perhaps the 6500 will shift to closets, the 7600 to routing, and the
7010 to datacenter switching for enterprises?

The product targets data center routing  switching - data center 
core/agg  10G server access are the sweet spots.

At least the Double Clear Front Door Kit is optional...

Wasn't there a thread on cool lookin' data centers? Alright, take the 
doors off if you like, but it'd look sweet w/blue neon behind it or sumthin' ;)

Tim


pt

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/



Tim Stevenson, [EMAIL PROTECTED]
Routing  Switching CCIE #5561
Technical Marketing Engineer, Data Center BU
Cisco Systems, http://www.cisco.com
IP Phone: 408-526-6759

The contents of this message may be *Cisco Confidential*
and are intended for the specified recipients only.

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/