Re: [c-nsp] NPE-G1 support for jumbo frames

2008-04-04 Thread Hendry Sarumpaet
How about PA-2FE-TX does anybody have a chance to test ?
Maybe we need to test it with 12.2(3X)SBX also :)
PA-2FE-TX with NPE-G2/7206VXR run 12.4.4-XD9

on slot 5

5/1
foo#mtu ?
  64-17940  MTU size in bytes
foo#mtu 1570
% Interface FastEthernet5/0 does not support user settable mtu.


--
hsa





Tuesday, April 1, 2008, 7:34:53 PM, you wrote:

 Jose schrieb:
 We have not been able to change the MTU for the PA-FE-TXs to anything 
 larger than the standard 1500.  Every time you try and change it, it 
 spits back an error about not being allowed on this interface.  This is 
 with the 7206VXR NPE300 running 12.2(15)T.

 We're running up to 1530 on a PA-FE-TX (NPE300/7206VXR with 
 12.2(31)SB) because of MPLS:

 Slot 4:
  Fast-ethernet (TX-ISL) Port adapter, 1 port
  Port adapter is analyzed
  Port adapter insertion time 28w3d ago
  EEPROM contents at hardware discovery:
  Hardware revision 1.0   Board revision A0
  Serial number 3579616   Part number73-1688-03
  FRU Part Number:  PA-FE-TX

 !
 interface FastEthernet4/0
   ...
   mtu 1530
   ...
 !

 --
 Gerald   (ax/tc)
 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/


-- 
Best regards,

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] OT: Check Point v Cisco PIX (ASA 5500 Series)

2008-04-04 Thread nick.nauwelaerts
 -Original Message-
 From: [EMAIL PROTECTED] 
 [mailto:[EMAIL PROTECTED] On Behalf Of 
 Jarrod Friedland
 Sent: Friday, April 04, 2008 03:18
 To: cisco-nsp@puck.nether.net
 Subject: [c-nsp] OT: Check Point v Cisco PIX (ASA 5500 Series)
 
 Hi All
 
 I wonder if anyone can offer me some sound professional 
 opinion in terms of
 using a Check Point FW device v Cisco PIX (ASA 5500 Series) Devices.
 
 Currently we are using Checkpoint Devices however, I have an 
 opportunity to
 possible include a pix device in our mix, however all my 
 reading thus far
 seems to be more based on personal opinion than operational 
 pro's and con's.
 
 Im looking for info in relation to can do's and cannots - 
 Administration
 comparisons etc.
 
 If you are able to offer some insight but would like to take 
 this offline,
 please let me know and I can send you my direct contact details.

Since we're using both checkpoint  asas, here's what I think about
them. We only use them for ipsec (enduser  site to site) and packet
filtering. All kinds of protocol inspection run on seperate proxies,
where they belong.

Checkpoint has a great log viewer, but that's just about all I can say
in their favor. They don't know how to apply rulesets to interfaces,
just globally. Setting up vpns is a pain because they like to send out
strange subnet configs. They're horribly expensive (we ran them on
Nokia's, whose network cards do not support autoneg btw). Their support
is pretty terrible as well. They also need arcane changes to their
backend firewall database whenever something doesn't go as expected.

Cisco ASAs are pretty cheap and have reasonable performance, but has
lots of strange quirks. They don't decrement TTL by default (and I still
haven't found a way to decrement it over vpn connections), handling icmp
errors is a black art (still haven't gotten mtr working through asa's),
do strange things with your tcp MSS, don't send out RSTs to denied
connections, and other such fun stuff. Most of there can be configured
to work correctly, but they're far from the default. Cisco's central
management tool (Cisco Security Manager) is pretty horrible, I guess the
lag is about 1 year between when the ASA gets a new feature and when
Security Manager learns how to use it. On the other hand, the free gui
(asdm) is pretty decent, and unliky checkpoint it comes with a cli.
Software updates  fixes don't get released as often as checkpoint,
which I consider a downside for the ASAs.

I still think ASAs are a step up from checkpoint gear, but neither are
great. I'm seriously considering netscreens for my next rollouts.

If I ever manage to convince the upper echelons here, I'd go with pf on
either openbsd  freebsd.

// nick
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Speed limitations - RF problem or IP ?

2008-04-04 Thread Progressus
Yes, I´ve tested this on an unused downstream and upstrean port in the head
end and the download speed is achieved without problem.

Apparently there are no factors to unable to pass 20Mb of download  on some
of the optical...

Someone has a similar problem?

On Fri, Apr 4, 2008 at 2:58 AM, Frank Bulk - iNAME [EMAIL PROTECTED]
wrote:

 It will be difficult to attain the ~38 Mbps of downstream if you're shared
 with other usershave you tested this on an unused downstream and
 upstream port in the head end?

 Frank

 -Original Message-
 From: [EMAIL PROTECTED]
 [mailto:[EMAIL PROTECTED] On Behalf Of Miguel
 Sent: Thursday, April 03, 2008 6:03 PM
 To: cisco-nsp@puck.nether.net
 Subject: [c-nsp] Speed limitations - RF problem or IP ?

   Hello,

 Does anyone know what the best things to do when you have speed problems
 with cable modems in different downstream/upstream?

 This is the scenario:

 uBR 10K with about 17000 customers. Each downstream is configured with
 256qam and all upstream have 16qam of modulation.
 In some cases the upstreams have a load-balance configuration with 2 or 3
 upstream per optical node.

 There are no problems of SNR and FEC. All values are regular... And the
 used
 bandwidth are low..

 After that, in some upstream can not go to the 20Mb of download Bandwidth
 and with the configuration used, should arrive without problem to 37Mb...

 I tested several cable modems and the problem still remain ...

 Someone has suggestions or ways of action to overcome this type of
 problem?

 Thks for your help
 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/

 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] OT: Check Point v Cisco PIX (ASA 5500 Series)

2008-04-04 Thread Masood Ahmad Shah
If you really need a firewall thn you must go for Netscreen. Netscreen is a
truly firewall with pretty nice/stable packet inspection engine and pretty
nice GUI/Command line interface.

A single box (netscreen 500) will work like a charm for packet inspection,
attack prevention and vpn tunnels termination. 

Oh yea you will not face any issue like icmp response packets or tcp
flags... mtr is working fine too :) 

Regards,
Masood Ahmad Shah


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of
[EMAIL PROTECTED]
Sent: Friday, April 04, 2008 12:39 PM
To: cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] OT: Check Point v Cisco PIX (ASA 5500 Series)

 -Original Message-
 From: [EMAIL PROTECTED] 
 [mailto:[EMAIL PROTECTED] On Behalf Of 
 Jarrod Friedland
 Sent: Friday, April 04, 2008 03:18
 To: cisco-nsp@puck.nether.net
 Subject: [c-nsp] OT: Check Point v Cisco PIX (ASA 5500 Series)
 
 Hi All
 
 I wonder if anyone can offer me some sound professional 
 opinion in terms of
 using a Check Point FW device v Cisco PIX (ASA 5500 Series) Devices.
 
 Currently we are using Checkpoint Devices however, I have an 
 opportunity to
 possible include a pix device in our mix, however all my 
 reading thus far
 seems to be more based on personal opinion than operational 
 pro's and con's.
 
 Im looking for info in relation to can do's and cannots - 
 Administration
 comparisons etc.
 
 If you are able to offer some insight but would like to take 
 this offline,
 please let me know and I can send you my direct contact details.

Since we're using both checkpoint  asas, here's what I think about
them. We only use them for ipsec (enduser  site to site) and packet
filtering. All kinds of protocol inspection run on seperate proxies,
where they belong.

Checkpoint has a great log viewer, but that's just about all I can say
in their favor. They don't know how to apply rulesets to interfaces,
just globally. Setting up vpns is a pain because they like to send out
strange subnet configs. They're horribly expensive (we ran them on
Nokia's, whose network cards do not support autoneg btw). Their support
is pretty terrible as well. They also need arcane changes to their
backend firewall database whenever something doesn't go as expected.

Cisco ASAs are pretty cheap and have reasonable performance, but has
lots of strange quirks. They don't decrement TTL by default (and I still
haven't found a way to decrement it over vpn connections), handling icmp
errors is a black art (still haven't gotten mtr working through asa's),
do strange things with your tcp MSS, don't send out RSTs to denied
connections, and other such fun stuff. Most of there can be configured
to work correctly, but they're far from the default. Cisco's central
management tool (Cisco Security Manager) is pretty horrible, I guess the
lag is about 1 year between when the ASA gets a new feature and when
Security Manager learns how to use it. On the other hand, the free gui
(asdm) is pretty decent, and unliky checkpoint it comes with a cli.
Software updates  fixes don't get released as often as checkpoint,
which I consider a downside for the ASAs.

I still think ASAs are a step up from checkpoint gear, but neither are
great. I'm seriously considering netscreens for my next rollouts.

If I ever manage to convince the upper echelons here, I'd go with pf on
either openbsd  freebsd.

// nick
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] OT: Check Point v Cisco PIX (ASA 5500 Series)

2008-04-04 Thread A . L . M . Buxey
Hi,
 If you really need a firewall thn you must go for Netscreen. Netscreen is a
 truly firewall with pretty nice/stable packet inspection engine and pretty
 nice GUI/Command line interface.

even against ASA 5580-40 ? can someone point me to a compelling reason
to think of a netscreen instead of such a box? 

alan
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] OT: Check Point v Cisco PIX (ASA 5500 Series)

2008-04-04 Thread Christian
i wouldnt use a netscreen over an asa 5520 + at all..we're phasing out all
our netscreens, iIMO they arent a great performer... however the SSG/ISG
platforms are more solid

On Fri, Apr 4, 2008 at 9:15 AM, [EMAIL PROTECTED] wrote:

 Hi,
  If you really need a firewall thn you must go for Netscreen. Netscreen
 is a
  truly firewall with pretty nice/stable packet inspection engine and
 pretty
  nice GUI/Command line interface.

 even against ASA 5580-40 ? can someone point me to a compelling reason
 to think of a netscreen instead of such a box?

 alan
 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] OT: Check Point v Cisco PIX (ASA 5500 Series)

2008-04-04 Thread Javier Liendo
 don't send out RSTs to denied connections, and other such fun stuff.

for a firewall, not sending an RST for a denied connection, isn´t it
the Right Thing to do?

regards

javier

On 4/4/08, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
  -Original Message-
   From: [EMAIL PROTECTED]
   [mailto:[EMAIL PROTECTED] On Behalf Of
   Jarrod Friedland
   Sent: Friday, April 04, 2008 03:18
   To: cisco-nsp@puck.nether.net
   Subject: [c-nsp] OT: Check Point v Cisco PIX (ASA 5500 Series)
  
   Hi All
  
   I wonder if anyone can offer me some sound professional
   opinion in terms of
   using a Check Point FW device v Cisco PIX (ASA 5500 Series) Devices.
  
   Currently we are using Checkpoint Devices however, I have an
   opportunity to
   possible include a pix device in our mix, however all my
   reading thus far
   seems to be more based on personal opinion than operational
   pro's and con's.
  
   Im looking for info in relation to can do's and cannots -
   Administration
   comparisons etc.
  
   If you are able to offer some insight but would like to take
   this offline,
   please let me know and I can send you my direct contact details.


 Since we're using both checkpoint  asas, here's what I think about
  them. We only use them for ipsec (enduser  site to site) and packet
  filtering. All kinds of protocol inspection run on seperate proxies,
  where they belong.

  Checkpoint has a great log viewer, but that's just about all I can say
  in their favor. They don't know how to apply rulesets to interfaces,
  just globally. Setting up vpns is a pain because they like to send out
  strange subnet configs. They're horribly expensive (we ran them on
  Nokia's, whose network cards do not support autoneg btw). Their support
  is pretty terrible as well. They also need arcane changes to their
  backend firewall database whenever something doesn't go as expected.

  Cisco ASAs are pretty cheap and have reasonable performance, but has
  lots of strange quirks. They don't decrement TTL by default (and I still
  haven't found a way to decrement it over vpn connections), handling icmp
  errors is a black art (still haven't gotten mtr working through asa's),
  do strange things with your tcp MSS, don't send out RSTs to denied
  connections, and other such fun stuff. Most of there can be configured
  to work correctly, but they're far from the default. Cisco's central
  management tool (Cisco Security Manager) is pretty horrible, I guess the
  lag is about 1 year between when the ASA gets a new feature and when
  Security Manager learns how to use it. On the other hand, the free gui
  (asdm) is pretty decent, and unliky checkpoint it comes with a cli.
  Software updates  fixes don't get released as often as checkpoint,
  which I consider a downside for the ASAs.

  I still think ASAs are a step up from checkpoint gear, but neither are
  great. I'm seriously considering netscreens for my next rollouts.

  If I ever manage to convince the upper echelons here, I'd go with pf on
  either openbsd  freebsd.

  // nick

 ___
  cisco-nsp mailing list  cisco-nsp@puck.nether.net
  https://puck.nether.net/mailman/listinfo/cisco-nsp
  archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] OT: Check Point v Cisco PIX (ASA 5500 Series)

2008-04-04 Thread A . L . M . Buxey
Hi,

 for a firewall, not sending an RST for a denied connection, isn´t it
 the Right Thing to do?

ah, the perennial DROP or REJECT question. 

alan
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] Router down - What is Net Background?

2008-04-04 Thread Justin Shore
I just had a 3660 terminating about 1500 PVCs for DSL die this AM.  The 
3660 is running 12.3(22) w/ 256MB of RAM.  I'm at the remote POP now, 
consoled in and looking at the box.  The console hangs for 45-60s before 
I get a chance to run a quick command or two.  Then it goes back to the 
hung state about 5 seconds later.  The box keeps dropping my 2 OC3s and 
bouncing my IS-IS processes.  Syslog didn't appear to capture anything 
interesting leading up to this crash.  I had the box power cycled while 
I was driving down here.

Overall the CPU is low and neither CPU nor memory were being taxed over 
the past number of months.  The Net Background process is using a fair 
bit of the processor.  Actually, that's an understatement.  At times 
it's only using 9% or so.  At other times it's up to 97% as was the case 
here:

3660-2.brd#sh proc cpu sort 5m
CPU utilization for five seconds: 1%/0%; one minute: 17%; five minutes: 19%
  PID Runtime(ms)   Invoked  uSecs   5Sec   1Min   5Min TTY Process
   28 4715940   6117731049 97.09% 13.74%  9.23%   0 Net 
Background
   31  238608   865 275847  2.65%  8.58%  8.48%   0 
Per-Second Jobs
58336   684  12187  0.00%  0.56%  0.68%   0 Check 
heaps
   607764  7776998  0.01%  0.27%  0.43%   0 IP Input 

   183856  8741441  0.00%  0.42%  0.33%   0 ARP 
Input
  1672556  3046839  0.02%  0.12%  0.13%   0 ISIS Upd 

  140273215 182133  0.00%  0.00%  0.12%   0 Key Proc 

  1791680  1676   1002  0.00%  0.13%  0.11%   0 OSPF 
Router
   471912   152  12578  0.00%  0.12%  0.11%   0 
Per-minute Jobs
   821792   597   3001  0.01%  0.15%  0.11%   0 IP 
Background
31828   238   7680  0.00%  0.11%  0.09%   0 OSPF 
Hello
  100 644  1217529  0.00%  0.13%  0.08%   0 DHCPD 
Receive
   511700   376   4521  0.00%  0.04%  0.05%   0 ATM 
Periodic
   83 700   417   1678  0.00%  0.01%  0.02%   0 IP RIB 
Update
  108 500   871574  0.00%  0.06%  0.02%   0 CEF 
process
  124 172   471365  0.00%  0.04%  0.02%   0 Exec 

  166 620  1908324  0.00%  0.03%  0.02%   0 ISIS Adj 

  106 420   284   1478  0.00%  0.03%  0.00%   0 Adj 
Manager
6 436  1406310  0.00%  0.02%  0.00%   0 Pool 
Manager
   91 188   556338  0.00%  0.01%  0.00%   0 ILMI 
Timer Proce
  163  92  1795 51  0.00%  0.00%  0.00%   0 CLNS 
Input


Per-Second Jobs is also using quite a bit of CPU.  The log has CPUHOG 
entries in it pointing at the Net Background process too:

000428: .Apr  4 08:36:31 CDT: %SYS-3-CPUHOG: Task ran for 50332 msec 
(10/0), process = Net Background, PC = 60439FFC.
-Traceback= 6043A004

What does the Net Background process do?  I haven't been able to find 
any answers on Cisco.com.


We're in the middle of SmartNet renewals and negotiations and 
unfortunately this box's contract has expired.  I can have our AM bless 
a TAC case for us if need be, assuming I can locate him; I think he's in 
training this week back East.

Any ideas?  I'm going to go back and scrutinize the log for anything 
useful.  As of right now the box is intermittently pingable, 
corresponding directly to the brief instances that I can use the 
console.  Customer packets seem to flow about as well.

Thanks
  Justin

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] OT: Check Point v Cisco PIX (ASA 5500 Series)

2008-04-04 Thread nick.nauwelaerts
 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
 Sent: Friday, April 04, 2008 16:42
 To: Javier Liendo
 Cc: Nauwelaerts, Nick (TCM); cisco-nsp@puck.nether.net
 Subject: Re: [c-nsp] OT: Check Point v Cisco PIX (ASA 5500 Series)
 
 Hi,
 
  for a firewall, not sending an RST for a denied connection, isn´t it
  the Right Thing to do?
 
 ah, the perennial DROP or REJECT question. 

Yup, I'm for rejecting. It's what applications expect and I still have not 
heared any convincing arguments as to why I would want to drop instead. It 
seems dropping increases your security in some magical way, but for a well done 
portscan dropping isn't even an extra hurdle. All dropping does is make 
troubleshooting a pain.

// nick
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] OT: Check Point v Cisco PIX (ASA 5500 Series)

2008-04-04 Thread robbie . jacka
I'd tend to think that it's less about portscans and more about preventing
someone using you to perform a bounced RST flood. Just my 0x2.
--
robbie




   
 nick.nauwelaerts 
 @thomson.com 
 Sent by:   To 
 cisco-nsp-bounces cisco-nsp@puck.nether.net 
 @puck.nether.net   cc 
   
   Subject 
 04/04/2008 09:55  Re: [c-nsp] OT: Check Point v Cisco 
 AMPIX (ASA 5500 Series)   
   
   
   
   
   
   




 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
 Sent: Friday, April 04, 2008 16:42
 To: Javier Liendo
 Cc: Nauwelaerts, Nick (TCM); cisco-nsp@puck.nether.net
 Subject: Re: [c-nsp] OT: Check Point v Cisco PIX (ASA 5500 Series)

 Hi,

  for a firewall, not sending an RST for a denied connection, isn´t it
  the Right Thing to do?

 ah, the perennial DROP or REJECT question.

Yup, I'm for rejecting. It's what applications expect and I still have not
heared any convincing arguments as to why I would want to drop instead. It
seems dropping increases your security in some magical way, but for a well
done portscan dropping isn't even an extra hurdle. All dropping does is
make troubleshooting a pain.

// nick
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] OT: Check Point v Cisco PIX (ASA 5500 Series)

2008-04-04 Thread nick.nauwelaerts
 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
 Sent: Friday, April 04, 2008 17:04
 To: Nauwelaerts, Nick (TCM)
 Cc: cisco-nsp@puck.nether.net; [EMAIL PROTECTED]
 Subject: Re: [c-nsp] OT: Check Point v Cisco PIX (ASA 5500 Series)
 
 I'd tend to think that it's less about portscans and more 
 about preventing
 someone using you to perform a bounced RST flood. Just my 0x2.

That's a good argument, but you can use your regular rate limiters
(which are in place for icmp for example) and anomaly detection for
that. Or whatever antispoofing you might have in place.

// nick
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Speed limitations - RF problem or IP ?

2008-04-04 Thread Frank Bulk - iNAME
If it works fine on an unused downstream and upstream port, then wouldn’t
the angle that it’s sharing traffic with others be a reason why 38 Mbps
can’t be achieved on production link?   There’s also all the
timing/contention issues involved in a product link, too.

 

Frank

 

From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf
Of Progressus
Sent: Friday, April 04, 2008 3:51 AM
To: [EMAIL PROTECTED]
Cc: cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] Speed limitations - RF problem or IP ?

 

Yes, I´ve tested this on an unused downstream and upstrean port in the head
end and the download speed is achieved without problem.
 
Apparently there are no factors to unable to pass 20Mb of download  on some
of the optical...
 
Someone has a similar problem?

On Fri, Apr 4, 2008 at 2:58 AM, Frank Bulk - iNAME [EMAIL PROTECTED]
wrote:

It will be difficult to attain the ~38 Mbps of downstream if you're shared
with other usershave you tested this on an unused downstream and
upstream port in the head end?

Frank


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Miguel
Sent: Thursday, April 03, 2008 6:03 PM
To: cisco-nsp@puck.nether.net
Subject: [c-nsp] Speed limitations - RF problem or IP ?

 Hello,

Does anyone know what the best things to do when you have speed problems
with cable modems in different downstream/upstream?

This is the scenario:

uBR 10K with about 17000 customers. Each downstream is configured with
256qam and all upstream have 16qam of modulation.
In some cases the upstreams have a load-balance configuration with 2 or 3
upstream per optical node.

There are no problems of SNR and FEC. All values are regular... And the used
bandwidth are low..

After that, in some upstream can not go to the 20Mb of download Bandwidth
and with the configuration used, should arrive without problem to 37Mb...

I tested several cable modems and the problem still remain ...

Someone has suggestions or ways of action to overcome this type of problem?

Thks for your help
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

 

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Router down - What is Net Background?

2008-04-04 Thread Christian
the net background proess. sends interface keepalive packets and processes
interface state changes

On Fri, Apr 4, 2008 at 10:42 AM, Justin Shore [EMAIL PROTECTED]
wrote:

 I just had a 3660 terminating about 1500 PVCs for DSL die this AM.  The
 3660 is running 12.3(22) w/ 256MB of RAM.  I'm at the remote POP now,
 consoled in and looking at the box.  The console hangs for 45-60s before
 I get a chance to run a quick command or two.  Then it goes back to the
 hung state about 5 seconds later.  The box keeps dropping my 2 OC3s and
 bouncing my IS-IS processes.  Syslog didn't appear to capture anything
 interesting leading up to this crash.  I had the box power cycled while
 I was driving down here.

 Overall the CPU is low and neither CPU nor memory were being taxed over
 the past number of months.  The Net Background process is using a fair
 bit of the processor.  Actually, that's an understatement.  At times
 it's only using 9% or so.  At other times it's up to 97% as was the case
 here:

 3660-2.brd#sh proc cpu sort 5m
 CPU utilization for five seconds: 1%/0%; one minute: 17%; five minutes:
 19%
  PID Runtime(ms)   Invoked  uSecs   5Sec   1Min   5Min TTY Process
   28 4715940   6117731049 97.09% 13.74%  9.23%   0 Net
 Background
   31  238608   865 275847  2.65%  8.58%  8.48%   0
 Per-Second Jobs
58336   684  12187  0.00%  0.56%  0.68%   0 Check
 heaps
   607764  7776998  0.01%  0.27%  0.43%   0 IP Input

   183856  8741441  0.00%  0.42%  0.33%   0 ARP
 Input
  1672556  3046839  0.02%  0.12%  0.13%   0 ISIS Upd

  140273215 182133  0.00%  0.00%  0.12%   0 Key Proc

  1791680  1676   1002  0.00%  0.13%  0.11%   0 OSPF
 Router
   471912   152  12578  0.00%  0.12%  0.11%   0
 Per-minute Jobs
   821792   597   3001  0.01%  0.15%  0.11%   0 IP
 Background
31828   238   7680  0.00%  0.11%  0.09%   0 OSPF
 Hello
  100 644  1217529  0.00%  0.13%  0.08%   0 DHCPD
 Receive
   511700   376   4521  0.00%  0.04%  0.05%   0 ATM
 Periodic
   83 700   417   1678  0.00%  0.01%  0.02%   0 IP RIB
 Update
  108 500   871574  0.00%  0.06%  0.02%   0 CEF
 process
  124 172   471365  0.00%  0.04%  0.02%   0 Exec

  166 620  1908324  0.00%  0.03%  0.02%   0 ISIS Adj

  106 420   284   1478  0.00%  0.03%  0.00%   0 Adj
 Manager
6 436  1406310  0.00%  0.02%  0.00%   0 Pool
 Manager
   91 188   556338  0.00%  0.01%  0.00%   0 ILMI
 Timer Proce
  163  92  1795 51  0.00%  0.00%  0.00%   0 CLNS
 Input


 Per-Second Jobs is also using quite a bit of CPU.  The log has CPUHOG
 entries in it pointing at the Net Background process too:

 000428: .Apr  4 08:36:31 CDT: %SYS-3-CPUHOG: Task ran for 50332 msec
 (10/0), process = Net Background, PC = 60439FFC.
 -Traceback= 6043A004

 What does the Net Background process do?  I haven't been able to find
 any answers on Cisco.com.


 We're in the middle of SmartNet renewals and negotiations and
 unfortunately this box's contract has expired.  I can have our AM bless
 a TAC case for us if need be, assuming I can locate him; I think he's in
 training this week back East.

 Any ideas?  I'm going to go back and scrutinize the log for anything
 useful.  As of right now the box is intermittently pingable,
 corresponding directly to the brief instances that I can use the
 console.  Customer packets seem to flow about as well.

 Thanks
  Justin

 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] OT: Check Point v Cisco PIX (ASA 5500 Series)

2008-04-04 Thread William S. Duncanson
RST wouldn't be the right thing to do if you choose to reject anyway; ICMP
Administratively Prohibited would be the correct response.

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of
[EMAIL PROTECTED]
Sent: Friday, April 04, 2008 9:42
To: Javier Liendo
Cc: cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] OT: Check Point v Cisco PIX (ASA 5500 Series)

Hi,

 for a firewall, not sending an RST for a denied connection, isn´t it
 the Right Thing to do?

ah, the perennial DROP or REJECT question.

alan
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Router down - What is Net Background?

2008-04-04 Thread Justin Shore
Thanks for all the replies.  One of our OC3s had the FREF light on, 
sometimes flashing too.  I started pulling IMA T1s to see if it was 
customer traffic.  None of them fixed the problem.  When I pulled that 
particular OC3 the problem cleared up.

I did see flaps in the log for that particular OC3.  They were happening 
approximately every 60s.  Looking at the log a little closer I see that 
ATM3/0 would come up and then drop within 3-4s, wait 60s, rinse and repeat.

I have on that OC3 about 300 PVCs.  None of the PVCs have a ubr over 
1664.  We're using RBE instead of PPPoX.  I have ingress  egress ACLs 
on each PVC as well as uRPF.  The vast majority of the PVCs are 
unnumbered to a loopback, though a few have /30s.  Other than that the 
interface config is basic.  There isn't any QoS or shaping going on, 
other than setting the ubr.

When I started disconnecting circuits I was speculating that customer 
traffic could have been to blame.  In the log I noticed repeating ACL 
drops from RFC1918 IPs to our name servers.  There weren't that many 
hits on the ACL but there were some occasional ACL rate-limit overruns. 
  I've seen far worse though.  I can't remember if ACLs happen in HW on 
the 3660 or not; even if they do ACL logging is a process level function 
isn't it?

Every time that OC3 bounces that's about 300 sub-ints bouncing with it. 
  I imagine repeated bounces would be a painful thing.  I've pulled the 
carrier's OC3 card to get the 3660 back online.  I'm planning on 
shutting down all 300 sub-ints on that OC3 and bring the OC3 back up. 
If the 3660 is still ok I'll enable about 50 PVCs at a time until the 
box either flips out or I have all the PVCs back online.  I have a spare 
carrier card but I don't think I have a spare OC3 NM so hopefully that's 
not the problem.

Thanks for all the input.
  Justin

Christian wrote:
 the net background proess. sends interface keepalive packets and 
 processes interface state changes
 
 On Fri, Apr 4, 2008 at 10:42 AM, Justin Shore [EMAIL PROTECTED] 
 mailto:[EMAIL PROTECTED] wrote:
 
 I just had a 3660 terminating about 1500 PVCs for DSL die this AM.  The
 3660 is running 12.3(22) w/ 256MB of RAM.  I'm at the remote POP now,
 consoled in and looking at the box.  The console hangs for 45-60s before
 I get a chance to run a quick command or two.  Then it goes back to the
 hung state about 5 seconds later.  The box keeps dropping my 2 OC3s and
 bouncing my IS-IS processes.  Syslog didn't appear to capture anything
 interesting leading up to this crash.  I had the box power cycled while
 I was driving down here.
 
 Overall the CPU is low and neither CPU nor memory were being taxed over
 the past number of months.  The Net Background process is using a fair
 bit of the processor.  Actually, that's an understatement.  At times
 it's only using 9% or so.  At other times it's up to 97% as was the case
 here:
 
 3660-2.brd#sh proc cpu sort 5m
 CPU utilization for five seconds: 1%/0%; one minute: 17%; five
 minutes: 19%
  PID Runtime(ms)   Invoked  uSecs   5Sec   1Min   5Min TTY Process
   28 4715940   6117731049 97.09% 13.74%  9.23%   0 Net
 Background
   31  238608   865 275847  2.65%  8.58%  8.48%   0
 Per-Second Jobs
58336   684  12187  0.00%  0.56%  0.68%   0 Check
 heaps
   607764  7776998  0.01%  0.27%  0.43%   0 IP Input
 
   183856  8741441  0.00%  0.42%  0.33%   0 ARP
 Input
  1672556  3046839  0.02%  0.12%  0.13%   0 ISIS Upd
 
  140273215 182133  0.00%  0.00%  0.12%   0 Key Proc
 
  1791680  1676   1002  0.00%  0.13%  0.11%   0 OSPF
 Router
   471912   152  12578  0.00%  0.12%  0.11%   0
 Per-minute Jobs
   821792   597   3001  0.01%  0.15%  0.11%   0 IP
 Background
31828   238   7680  0.00%  0.11%  0.09%   0 OSPF
 Hello
  100 644  1217529  0.00%  0.13%  0.08%   0 DHCPD
 Receive
   511700   376   4521  0.00%  0.04%  0.05%   0 ATM
 Periodic
   83 700   417   1678  0.00%  0.01%  0.02%   0 IP RIB
 Update
  108 500   871574  0.00%  0.06%  0.02%   0 CEF
 process
  124 172   471365  0.00%  0.04%  0.02%   0 Exec
 
  166 620  1908324  0.00%  0.03%  0.02%   0 ISIS Adj
 
  106 420   284   1478  0.00%  0.03%  0.00%   0 Adj
 Manager
6 436  1406310  0.00%  0.02%  0.00%   0 Pool
 Manager
   91 188   556338  0.00%  0.01%  0.00%   0 ILMI
 Timer Proce
  163  92  1795 51  0.00%  0.00%  0.00%   0 CLNS
 Input
 
 
 Per-Second Jobs is also using quite a bit of CPU.  The log 

Re: [c-nsp] OT: Check Point v Cisco PIX (ASA 5500 Series)

2008-04-04 Thread Brandon Price
Netscreen 5400

15x the 3des performance, 2.5x number of tunnels and SUB 1 second
stateful failover arent compelling enough reasons? 

Brandon

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of
[EMAIL PROTECTED]
Sent: Friday, April 04, 2008 6:15 AM
To: Masood Ahmad Shah
Cc: cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] OT: Check Point v Cisco PIX (ASA 5500 Series)

Hi,
 If you really need a firewall thn you must go for Netscreen. Netscreen

 is a truly firewall with pretty nice/stable packet inspection engine 
 and pretty nice GUI/Command line interface.

even against ASA 5580-40 ? can someone point me to a compelling reason
to think of a netscreen instead of such a box? 

alan
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Router down - What is Net Background?

2008-04-04 Thread e ninja
Justin,

What do you mean by die? A crash is not the same thing as a hang. Did your
3660 crash or hang? If the former, IOS should dump a crashinfo file - if you
have one, lets take a look at it. If the latter, take a look at;

http://www.cisco.com/en/US/products/hw/routers/ps359/products_tech_note09186a0080106fd7.shtml

/eninja




On Fri, Apr 4, 2008 at 7:42 AM, Justin Shore [EMAIL PROTECTED] wrote:

 I just had a 3660 terminating about 1500 PVCs for DSL die this AM.  The
 3660 is running 12.3(22) w/ 256MB of RAM.  I'm at the remote POP now,
 consoled in and looking at the box.  The console hangs for 45-60s before
 I get a chance to run a quick command or two.  Then it goes back to the
 hung state about 5 seconds later.  The box keeps dropping my 2 OC3s and
 bouncing my IS-IS processes.  Syslog didn't appear to capture anything
 interesting leading up to this crash.  I had the box power cycled while
 I was driving down here.

 Overall the CPU is low and neither CPU nor memory were being taxed over
 the past number of months.  The Net Background process is using a fair
 bit of the processor.  Actually, that's an understatement.  At times
 it's only using 9% or so.  At other times it's up to 97% as was the case
 here:

 3660-2.brd#sh proc cpu sort 5m
 CPU utilization for five seconds: 1%/0%; one minute: 17%; five minutes:
 19%
  PID Runtime(ms)   Invoked  uSecs   5Sec   1Min   5Min TTY Process
   28 4715940   6117731049 97.09% 13.74%  9.23%   0 Net
 Background
   31  238608   865 275847  2.65%  8.58%  8.48%   0
 Per-Second Jobs
58336   684  12187  0.00%  0.56%  0.68%   0 Check
 heaps
   607764  7776998  0.01%  0.27%  0.43%   0 IP Input

   183856  8741441  0.00%  0.42%  0.33%   0 ARP
 Input
  1672556  3046839  0.02%  0.12%  0.13%   0 ISIS Upd

  140273215 182133  0.00%  0.00%  0.12%   0 Key Proc

  1791680  1676   1002  0.00%  0.13%  0.11%   0 OSPF
 Router
   471912   152  12578  0.00%  0.12%  0.11%   0
 Per-minute Jobs
   821792   597   3001  0.01%  0.15%  0.11%   0 IP
 Background
31828   238   7680  0.00%  0.11%  0.09%   0 OSPF
 Hello
  100 644  1217529  0.00%  0.13%  0.08%   0 DHCPD
 Receive
   511700   376   4521  0.00%  0.04%  0.05%   0 ATM
 Periodic
   83 700   417   1678  0.00%  0.01%  0.02%   0 IP RIB
 Update
  108 500   871574  0.00%  0.06%  0.02%   0 CEF
 process
  124 172   471365  0.00%  0.04%  0.02%   0 Exec

  166 620  1908324  0.00%  0.03%  0.02%   0 ISIS Adj

  106 420   284   1478  0.00%  0.03%  0.00%   0 Adj
 Manager
6 436  1406310  0.00%  0.02%  0.00%   0 Pool
 Manager
   91 188   556338  0.00%  0.01%  0.00%   0 ILMI
 Timer Proce
  163  92  1795 51  0.00%  0.00%  0.00%   0 CLNS
 Input


 Per-Second Jobs is also using quite a bit of CPU.  The log has CPUHOG
 entries in it pointing at the Net Background process too:

 000428: .Apr  4 08:36:31 CDT: %SYS-3-CPUHOG: Task ran for 50332 msec
 (10/0), process = Net Background, PC = 60439FFC.
 -Traceback= 6043A004

 What does the Net Background process do?  I haven't been able to find
 any answers on Cisco.com.


 We're in the middle of SmartNet renewals and negotiations and
 unfortunately this box's contract has expired.  I can have our AM bless
 a TAC case for us if need be, assuming I can locate him; I think he's in
 training this week back East.

 Any ideas?  I'm going to go back and scrutinize the log for anything
 useful.  As of right now the box is intermittently pingable,
 corresponding directly to the brief instances that I can use the
 console.  Customer packets seem to flow about as well.

 Thanks
  Justin

 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] OT: Check Point v Cisco PIX (ASA 5500 Series)

2008-04-04 Thread nick.nauwelaerts


Van: Yaroslav Doroshenko [mailto:[EMAIL PROTECTED]
Verzonden: vr 4/4/2008 8:37
Aan: Nauwelaerts, Nick (TCM)
CC: [EMAIL PROTECTED]; [EMAIL PROTECTED]; cisco-nsp@puck.nether.net
Onderwerp: Re: [c-nsp] OT: Check Point v Cisco PIX (ASA 5500 Series)



I believe dropping is also preferable if you need more performance and 
bandwidth capacity although I'm not sure sending RST cost CPU time on 
ASA platform.


 

Correct, each packet you schedule takes up a certain amount of bandwidth  cpu 
resources, though it'll be comparably small. Still that bandwidth  cpu power 
will most likely be cheaper than the additional troubleshooting complexity you 
get by dropping.

But as the introductary poster already stated, everyone has their own idea 
about this subject. I'm with the reject crew, that's the way tcp is meant to 
work. 

// nick

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] OT: Check Point v Cisco PIX (ASA 5500 Series)

2008-04-04 Thread Yaroslav Doroshenko
I believe dropping is also preferable if you need more performance and  
bandwidth capacity although I'm not sure sending RST cost CPU time on  
ASA platform.

On Apr 4, 2008, at 7:18 PM, [EMAIL PROTECTED] [EMAIL PROTECTED] 
  wrote:
 I'd tend to think that it's less about portscans and more
 about preventing
 someone using you to perform a bounced RST flood. Just my 0x2.

 That's a good argument, but you can use your regular rate limiters
 (which are in place for icmp for example) and anomaly detection for
 that. Or whatever antispoofing you might have in place

--
Yaroslav Doroshenko




___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Router down - What is Net Background?

2008-04-04 Thread Justin Shore
The problem turned out to be a bad NM-1A-OC3SMI.  I scrounged up a spare 
and replaced it and resolved the issue.  The bouncing circuit was 
definitely the problem.  Even with all the sub-ints admin down the 
bouncing of the OC3 itself was enough to make the 3660 waiver.  I can 
only imagine what it would have been like if I hadn't had the sub-ints 
down.  Actually, I guess I don't have to try and imagine it; it happened 
this AM.

The router did actually crash.  3 times this AM.  I have 3 crash logs to 
work with.  I'm going to use them to RMA the NM with TAC.

All is well right now.  I'm surprised at how painful an OC3 state change 
can be.  I don't recall ever having that kind of drain on the resources 
when working with them before.  It's something to remember though.

Thanks for all the info,
  Justin


e ninja wrote:
 Justin,
 
 What do you mean by die? A crash is not the same thing as a hang. Did 
 your 3660 crash or hang? If the former, IOS should dump a crashinfo file 
 - if you have one, lets take a look at it. If the latter, take a look at;
 
 http://www.cisco.com/en/US/products/hw/routers/ps359/products_tech_note09186a0080106fd7.shtml
 
 /eninja
 
 
 
 
 On Fri, Apr 4, 2008 at 7:42 AM, Justin Shore [EMAIL PROTECTED] 
 mailto:[EMAIL PROTECTED] wrote:
 
 I just had a 3660 terminating about 1500 PVCs for DSL die this AM.  The
 3660 is running 12.3(22) w/ 256MB of RAM.  I'm at the remote POP now,
 consoled in and looking at the box.  The console hangs for 45-60s before
 I get a chance to run a quick command or two.  Then it goes back to the
 hung state about 5 seconds later.  The box keeps dropping my 2 OC3s and
 bouncing my IS-IS processes.  Syslog didn't appear to capture anything
 interesting leading up to this crash.  I had the box power cycled while
 I was driving down here.
 
 Overall the CPU is low and neither CPU nor memory were being taxed over
 the past number of months.  The Net Background process is using a fair
 bit of the processor.  Actually, that's an understatement.  At times
 it's only using 9% or so.  At other times it's up to 97% as was the case
 here:
 
 3660-2.brd#sh proc cpu sort 5m
 CPU utilization for five seconds: 1%/0%; one minute: 17%; five
 minutes: 19%
  PID Runtime(ms)   Invoked  uSecs   5Sec   1Min   5Min TTY Process
   28 4715940   6117731049 97.09% 13.74%  9.23%   0 Net
 Background
   31  238608   865 275847  2.65%  8.58%  8.48%   0
 Per-Second Jobs
58336   684  12187  0.00%  0.56%  0.68%   0 Check
 heaps
   607764  7776998  0.01%  0.27%  0.43%   0 IP Input
 
   183856  8741441  0.00%  0.42%  0.33%   0 ARP
 Input
  1672556  3046839  0.02%  0.12%  0.13%   0 ISIS Upd
 
  140273215 182133  0.00%  0.00%  0.12%   0 Key Proc
 
  1791680  1676   1002  0.00%  0.13%  0.11%   0 OSPF
 Router
   471912   152  12578  0.00%  0.12%  0.11%   0
 Per-minute Jobs
   821792   597   3001  0.01%  0.15%  0.11%   0 IP
 Background
31828   238   7680  0.00%  0.11%  0.09%   0 OSPF
 Hello
  100 644  1217529  0.00%  0.13%  0.08%   0 DHCPD
 Receive
   511700   376   4521  0.00%  0.04%  0.05%   0 ATM
 Periodic
   83 700   417   1678  0.00%  0.01%  0.02%   0 IP RIB
 Update
  108 500   871574  0.00%  0.06%  0.02%   0 CEF
 process
  124 172   471365  0.00%  0.04%  0.02%   0 Exec
 
  166 620  1908324  0.00%  0.03%  0.02%   0 ISIS Adj
 
  106 420   284   1478  0.00%  0.03%  0.00%   0 Adj
 Manager
6 436  1406310  0.00%  0.02%  0.00%   0 Pool
 Manager
   91 188   556338  0.00%  0.01%  0.00%   0 ILMI
 Timer Proce
  163  92  1795 51  0.00%  0.00%  0.00%   0 CLNS
 Input
 
 
 Per-Second Jobs is also using quite a bit of CPU.  The log has CPUHOG
 entries in it pointing at the Net Background process too:
 
 000428: .Apr  4 08:36:31 CDT: %SYS-3-CPUHOG: Task ran for 50332 msec
 (10/0), process = Net Background, PC = 60439FFC.
 -Traceback= 6043A004
 
 What does the Net Background process do?  I haven't been able to find
 any answers on Cisco.com.
 
 
 We're in the middle of SmartNet renewals and negotiations and
 unfortunately this box's contract has expired.  I can have our AM bless
 a TAC case for us if need be, assuming I can locate him; I think he's in
 training this week back East.
 
 Any ideas?  I'm going to go back and scrutinize the log for anything
 useful.  As of right now the box is intermittently pingable,
 corresponding directly to the brief 

[c-nsp] BGP redistribution

2008-04-04 Thread Uddin, Tahir
Hi All,

Question on BGP to EIGRP redistribution
In this topology, does the R2 router redistribute the IBGP route learned
route (10.1.1.0/24) from R1. I am redistributing BGP into EIGRP on R2.

I don't think it does, but I am not 100%.

Thanks



10.1.1.0/24 
|
-
|   
R4  R5
|   |
|   |
|EBGP   |EBGP
|   |
|   |   
R1---R2R3--
IBGPEIGRP

-
The information contained in this transmission may be privileged and
confidential and is intended only for the use of the person(s) named
above. If you are not the intended recipient, or an employee or agent 
responsible
for delivering this message to the intended recipient, any review, 
dissemination,
distribution or duplication of this communication is strictly prohibited. If 
you are
not the intended recipient, please contact the sender immediately by reply 
e-mail
and destroy all copies of the original message. Please note that we do not 
accept
account orders and/or instructions by e-mail, and therefore will not be 
responsible
for carrying out such orders and/or instructions.  If you, as the intended 
recipient
of this message, the purpose of which is to inform and update our clients, 
prospects
and consultants of developments relating to our services and products, would not
like to receive further e-mail correspondence from the sender, please reply 
to the
sender indicating your wishes.  In the U.S.: 1345 Avenue of the Americas, New 
York,
NY 10105.

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] BGP redistribution

2008-04-04 Thread Murphy, William
You have to use the bgp redistribute-internal command to redistribute
iBGP routes into an IGP...

Bill Murphy
Senior Network Analyst
University of Texas Health Science Center - Houston


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Uddin, Tahir
Sent: Friday, April 04, 2008 3:23 PM
To: Cisco-nsp
Subject: [c-nsp] BGP redistribution

Hi All,

Question on BGP to EIGRP redistribution
In this topology, does the R2 router redistribute the IBGP route learned
route (10.1.1.0/24) from R1. I am redistributing BGP into EIGRP on R2.

I don't think it does, but I am not 100%.

Thanks



10.1.1.0/24 
|
-
|   
R4  R5
|   |
|   |
|EBGP   |EBGP
|   |
|   |   
R1---R2R3--
IBGPEIGRP

-
The information contained in this transmission may be privileged and
confidential and is intended only for the use of the person(s) named
above. If you are not the intended recipient, or an employee or agent
responsible
for delivering this message to the intended recipient, any review,
dissemination,
distribution or duplication of this communication is strictly
prohibited. If you are
not the intended recipient, please contact the sender immediately by
reply e-mail
and destroy all copies of the original message. Please note that we do
not accept
account orders and/or instructions by e-mail, and therefore will not be
responsible
for carrying out such orders and/or instructions.  If you, as the
intended recipient
of this message, the purpose of which is to inform and update our
clients, prospects
and consultants of developments relating to our services and products,
would not
like to receive further e-mail correspondence from the sender, please
reply to the
sender indicating your wishes.  In the U.S.: 1345 Avenue of the
Americas, New York,
NY 10105.

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] OT: Check Point v Cisco PIX (ASA 5500 Series)

2008-04-04 Thread A . L . M . Buxey
Hi,

 Netscreen 5400
 
 15x the 3des performance, 2.5x number of tunnels and SUB 1 second
 stateful failover arent compelling enough reasons? 

i dont do VPN termination on firewalls. the stateful failover
is a point though

alan
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] OT: Check Point v Cisco PIX (ASA 5500 Series)

2008-04-04 Thread Murphy, William
Checkpoint also does stateful failover...

Bill Murphy
Senior Network Analyst
University of Texas Health Science Center - Houston


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of
[EMAIL PROTECTED]
Sent: Friday, April 04, 2008 5:05 PM
To: Brandon Price
Cc: cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] OT: Check Point v Cisco PIX (ASA 5500 Series)

Hi,

 Netscreen 5400
 
 15x the 3des performance, 2.5x number of tunnels and SUB 1 second
 stateful failover arent compelling enough reasons? 

i dont do VPN termination on firewalls. the stateful failover
is a point though

alan
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] OT: Check Point v Cisco PIX (ASA 5500 Series)

2008-04-04 Thread Gregori Parker
As does the ASA 5520..

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Murphy, William 
Sent: Friday, April 04, 2008 3:31 PM
To: [EMAIL PROTECTED]; Brandon Price
Cc: cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] OT: Check Point v Cisco PIX (ASA 5500 Series)

Checkpoint also does stateful failover...

Bill Murphy
Senior Network Analyst
University of Texas Health Science Center - Houston


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of
[EMAIL PROTECTED]
Sent: Friday, April 04, 2008 5:05 PM
To: Brandon Price
Cc: cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] OT: Check Point v Cisco PIX (ASA 5500 Series)

Hi,

 Netscreen 5400
 
 15x the 3des performance, 2.5x number of tunnels and SUB 1 second
 stateful failover arent compelling enough reasons? 

i dont do VPN termination on firewalls. the stateful failover
is a point though

alan
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] changing from ospf to eigrp

2008-04-04 Thread Dan Letkeman
Hello,

I would like to change our layer 3 switches from ospf to eirgrp.  Is
there a way I can accomplish this on a live system without causing
problems?  Can I run both at the same time?

Thanks,
Dan.
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] changing from ospf to eigrp

2008-04-04 Thread Jeff Cartier
Can I run both at the same time?
- You can run both at the same time.

I would like to change our layer 3 switches from ospf to eirgrp.  Is
there a way I can accomplish this on a live system without causing
problems?
- If you talking about redistribution between IGPs, then technically yes.  Just 
be very careful not to create a routing loop.  A strategy on how to do this 
will all depend on the size of your network and the complexity of the migration.

May I inquire as to why your moving from OSPF to EIGRP?

-Original Message-
From: [EMAIL PROTECTED] on behalf of Dan Letkeman
Sent: Fri 4/4/2008 7:48 PM
To: cisco-nsp@puck.nether.net
Subject: [c-nsp] changing from ospf to eigrp
 
Hello,

I would like to change our layer 3 switches from ospf to eirgrp.  Is
there a way I can accomplish this on a live system without causing
problems?  Can I run both at the same time?

Thanks,
Dan.
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] changing from ospf to eigrp

2008-04-04 Thread Dan Armstrong
We just went through years of pain and money to change from eigrp to 
ospf. :-)





Jeff Cartier wrote:
 Can I run both at the same time?
 - You can run both at the same time.

 I would like to change our layer 3 switches from ospf to eirgrp.  Is
 there a way I can accomplish this on a live system without causing
 problems?
 - If you talking about redistribution between IGPs, then technically yes.  
 Just be very careful not to create a routing loop.  A strategy on how to do 
 this will all depend on the size of your network and the complexity of the 
 migration.

 May I inquire as to why your moving from OSPF to EIGRP?

 -Original Message-
 From: [EMAIL PROTECTED] on behalf of Dan Letkeman
 Sent: Fri 4/4/2008 7:48 PM
 To: cisco-nsp@puck.nether.net
 Subject: [c-nsp] changing from ospf to eigrp
  
 Hello,

 I would like to change our layer 3 switches from ospf to eirgrp.  Is
 there a way I can accomplish this on a live system without causing
 problems?  Can I run both at the same time?

 Thanks,
 Dan.
 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/

 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/
   

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] changing from ospf to eigrp

2008-04-04 Thread Robert J. Huey

On Fri, 4 Apr 2008, Dan Letkeman wrote:

 Hello,

 I would like to change our layer 3 switches from ospf to eirgrp.  Is
 there a way I can accomplish this on a live system without causing
 problems?

Yes.  I've done the opposite without much grief but we still called a 
it flag day and did everything in one maintenance window.


 Can I run both at the same time?

YesBut keep in mind that EIGRP carries with it an administrative 
distance of only '5' whereas OSPF is at 110.You might consider moving
the adminstrative distance for EIGRP to something above OSPF across 
your network until everyhting is in both routing processes. Then kill off 
OSFP and move AD back to it's default values.

rgds,
   --r
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] changing from ospf to eigrp

2008-04-04 Thread Jeremy Stretch
  Can I run both at the same time?

If you do, you may want to consider tweaking the administrative 
distances until EIGRP has been fully implemented across the network. 
Remember, by default EIGRP has an AD of 90 (internal) and OSPF of 110, 
so EIGRP-learned routes will be preferred. This has the potential to 
cause problems if EIGRP is misconfigured or only partially enabled 
during migration.

stretch
http://www.packetlife.net/

Dan Letkeman wrote:
 Hello,

 I would like to change our layer 3 switches from ospf to eirgrp.  Is
 there a way I can accomplish this on a live system without causing
 problems?  Can I run both at the same time?

 Thanks,
 Dan.
 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/
   
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] changing from ospf to eigrp

2008-04-04 Thread Whisper
On Sat, Apr 5, 2008 at 12:43 PM, Robert J. Huey [EMAIL PROTECTED] wrote:


 YesBut keep in mind that EIGRP carries with it an administrative
 distance of only '5' whereas OSPF is at 110.You might consider moving
 the adminstrative distance for EIGRP to something above OSPF across
 your network until everyhting is in both routing processes. Then kill off
 OSFP and move AD back to it's default values.

 rgds,
--r


EIGRP Summary Routes have an admin distance of 5 and have to be configured
manually on a per interface basis
Normal EIGRP Routes have an admin distance of 90
OSPF is admin distance is 110

My questions when doing this doing this would be.

1. How complicated is the network?
2. What better, rolling EIGRP in from the edges to the core, or out from the
core to the edges?

The beauty of moving from OSPF TO EIGRP is, in theory at least, the EIGRP
Routes will be prefered over the OSPF Routes when the administrative
distance is the deciding factor.

Cheers
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] changing from ospf to eigrp

2008-04-04 Thread Whisper
So long as the OSPF network remains intact until the EIGRP network is up and
running, OSPF should effectively operate as a backup route in the cases
where EIGRP has no route, correct?

It'd it be like running a floating static route, except your using a dynamic
routing protocol, wouldn't it?

On Sat, Apr 5, 2008 at 10:52 AM, Jeremy Stretch [EMAIL PROTECTED]
wrote:

   Can I run both at the same time?

 If you do, you may want to consider tweaking the administrative
 distances until EIGRP has been fully implemented across the network.
 Remember, by default EIGRP has an AD of 90 (internal) and OSPF of 110,
 so EIGRP-learned routes will be preferred. This has the potential to
 cause problems if EIGRP is misconfigured or only partially enabled
 during migration.

 stretch
 http://www.packetlife.net/

 Dan Letkeman wrote:
  Hello,
 
  I would like to change our layer 3 switches from ospf to eirgrp.  Is
  there a way I can accomplish this on a live system without causing
  problems?  Can I run both at the same time?
 
  Thanks,
  Dan.
  ___
  cisco-nsp mailing list  cisco-nsp@puck.nether.net
  https://puck.nether.net/mailman/listinfo/cisco-nsp
  archive at http://puck.nether.net/pipermail/cisco-nsp/
 
 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] changing from ospf to eigrp

2008-04-04 Thread Ben Steele
What you are doing is known as ships in the night routing where you  
run multiple protocols that are unaware of each other, I would go  
ahead and deploy your EIGRP config while keeping your OSPF running and  
as someone else has mentioned the default admin distance for EIGRP is  
90 which will take precedence over your 110 OSPF, bare in mind if you  
use redistributed routes in EIGRP they will show up as admin distance  
of 170 though.

Either way just go from router to router deploying your EIGRP and then  
when your happy you've done all your devices go and check your route  
tables to see what OSPF routes are still showing up and then determine  
why, and if they are needed, as EIGRP obviously isn't seeing them (at  
least from a non redistributed PoV).

OSPF will pick up your slack while you deploy this in the above  
method, the only real danger I see is if you a) miss a router or b)  
fail to check the route tables for remaining OSPF routes after full  
EIGRP migration before turning OSPF off.

Ben

On 05/04/2008, at 12:30 PM, Whisper wrote:

 So long as the OSPF network remains intact until the EIGRP network  
 is up and
 running, OSPF should effectively operate as a backup route in the  
 cases
 where EIGRP has no route, correct?

 It'd it be like running a floating static route, except your using a  
 dynamic
 routing protocol, wouldn't it?

 On Sat, Apr 5, 2008 at 10:52 AM, Jeremy Stretch [EMAIL PROTECTED] 
 
 wrote:

 Can I run both at the same time?

 If you do, you may want to consider tweaking the administrative
 distances until EIGRP has been fully implemented across the network.
 Remember, by default EIGRP has an AD of 90 (internal) and OSPF of  
 110,
 so EIGRP-learned routes will be preferred. This has the potential to
 cause problems if EIGRP is misconfigured or only partially enabled
 during migration.

 stretch
 http://www.packetlife.net/

 Dan Letkeman wrote:
 Hello,

 I would like to change our layer 3 switches from ospf to eirgrp.  Is
 there a way I can accomplish this on a live system without causing
 problems?  Can I run both at the same time?

 Thanks,
 Dan.
 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/

 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/

 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] changing from ospf to eigrp

2008-04-04 Thread Ben Steele
Actually just to correct myself before anyone else decides to, I think  
ships in the night refers to using a different network protocol aswell  
as a different routing protocol working independently of each other,  
ie ipv6 with OSPF and ipv4 with EIGRP, either way you get my drift :)

On 05/04/2008, at 1:39 PM, Ben Steele wrote:

 What you are doing is known as ships in the night routing where you
 run multiple protocols that are unaware of each other, I would go
 ahead and deploy your EIGRP config while keeping your OSPF running and
 as someone else has mentioned the default admin distance for EIGRP is
 90 which will take precedence over your 110 OSPF, bare in mind if you
 use redistributed routes in EIGRP they will show up as admin distance
 of 170 though.

 Either way just go from router to router deploying your EIGRP and then
 when your happy you've done all your devices go and check your route
 tables to see what OSPF routes are still showing up and then determine
 why, and if they are needed, as EIGRP obviously isn't seeing them (at
 least from a non redistributed PoV).

 OSPF will pick up your slack while you deploy this in the above
 method, the only real danger I see is if you a) miss a router or b)
 fail to check the route tables for remaining OSPF routes after full
 EIGRP migration before turning OSPF off.

 Ben

 On 05/04/2008, at 12:30 PM, Whisper wrote:

 So long as the OSPF network remains intact until the EIGRP network
 is up and
 running, OSPF should effectively operate as a backup route in the
 cases
 where EIGRP has no route, correct?

 It'd it be like running a floating static route, except your using a
 dynamic
 routing protocol, wouldn't it?

 On Sat, Apr 5, 2008 at 10:52 AM, Jeremy Stretch [EMAIL PROTECTED]

 wrote:

 Can I run both at the same time?

 If you do, you may want to consider tweaking the administrative
 distances until EIGRP has been fully implemented across the network.
 Remember, by default EIGRP has an AD of 90 (internal) and OSPF of
 110,
 so EIGRP-learned routes will be preferred. This has the potential to
 cause problems if EIGRP is misconfigured or only partially enabled
 during migration.

 stretch
 http://www.packetlife.net/

 Dan Letkeman wrote:
 Hello,

 I would like to change our layer 3 switches from ospf to eirgrp.   
 Is
 there a way I can accomplish this on a live system without causing
 problems?  Can I run both at the same time?

 Thanks,
 Dan.
 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/

 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/

 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/

 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] OT: Check Point v Cisco PIX (ASA 5500 Series)

2008-04-04 Thread Ted Mittelstaedt

And yes this is such an important feature since the devices
are so crappy they keep crashing.

Ted

 -Original Message-
 From: [EMAIL PROTECTED]
 [mailto:[EMAIL PROTECTED] Behalf Of Gregori Parker
 Sent: Friday, April 04, 2008 2:36 PM
 To: Murphy, William ; [EMAIL PROTECTED]; Brandon Price
 Cc: cisco-nsp@puck.nether.net
 Subject: Re: [c-nsp] OT: Check Point v Cisco PIX (ASA 5500 Series)
 
 
 As does the ASA 5520..
 
 -Original Message-
 From: [EMAIL PROTECTED]
 [mailto:[EMAIL PROTECTED] On Behalf Of Murphy, William 
 Sent: Friday, April 04, 2008 3:31 PM
 To: [EMAIL PROTECTED]; Brandon Price
 Cc: cisco-nsp@puck.nether.net
 Subject: Re: [c-nsp] OT: Check Point v Cisco PIX (ASA 5500 Series)
 
 Checkpoint also does stateful failover...
 
 Bill Murphy
 Senior Network Analyst
 University of Texas Health Science Center - Houston
 
 
 -Original Message-
 From: [EMAIL PROTECTED]
 [mailto:[EMAIL PROTECTED] On Behalf Of
 [EMAIL PROTECTED]
 Sent: Friday, April 04, 2008 5:05 PM
 To: Brandon Price
 Cc: cisco-nsp@puck.nether.net
 Subject: Re: [c-nsp] OT: Check Point v Cisco PIX (ASA 5500 Series)
 
 Hi,
 
  Netscreen 5400
  
  15x the 3des performance, 2.5x number of tunnels and SUB 1 second
  stateful failover arent compelling enough reasons? 
 
 i dont do VPN termination on firewalls. the stateful failover
 is a point though
 
 alan
 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/
 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/
 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/
 
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Cat6500 - Support for MPLS and IPv6

2008-04-04 Thread Stephen Fulton
Gert,

FWIW, I spent a lot of time researching the 6500/7600 BU issue in 
preparation for our last round of upgrades.  The best (and most honest) 
answer I got about service provider software features on the 6500 series 
was this:  We'll still support MPLS, IPv6 etc, but new feature may be 
released on the 7600 series first, and made available for the 6500 
series later.  It was also implied that some specific features may not 
make the 6500 code train at all.

-- Stephen

Gert Doering wrote:
 Hi,
 
 On Sun, Mar 30, 2008 at 10:52:04PM -0400, Juno Guy wrote:
 It is my understanding that somewhere after the 12.2SX release MPLS and IPv6
 will no longer be supported on the 6500 (but will continue to be supported
 on the 7600 as I understand).  
 
 Well, as far as I understand, this is currently not the case, and I haven't
 seen any announcement to that extent.  (Except as has already been written:
 the *modular* variant of SXF had no support for either, but that was not
 yet, and not not any longer).
 
 OTOH, personally, I have great distrust for the 7600/6500 BUs, and it
 wouldn't surprise me to come to a point in the future where I need to
 decide do I want support for 32 bit AS numbers, or do I want support 
 for my existing hardware.  Cisco needs to do a *lot* to get back the
 customer trust that these two BUs have destroyed.
 
 gert
 
 
 
 
 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Cisco 2811 and WIC-1DSU-T1.

2008-04-04 Thread Ted Mittelstaedt


 -Original Message-
 From: [EMAIL PROTECTED]
 [mailto:[EMAIL PROTECTED] Behalf Of Doug McIntyre
 Sent: Thursday, April 03, 2008 8:38 PM
 To: Justin Shore
 Cc: 'cisco-nsp'
 Subject: Re: [c-nsp] Cisco 2811 and WIC-1DSU-T1.


 I believe the main reason for this (besides the fact that the
 WIC-1DSU-T1 card was EOL'd before the ISR was released) is the rampant
 piracy of this WIC, and this is an effort by Cisco to lessen some of that.


I think that isn't correct.  The V2 introduced the ability to attenuate
output transmission with the cablelength parameter.  This would have
required a fundamental redesign of the CSU part of the ASIC chip.  I'm
sure they also took the opportunity to cheapen the WIC down as well. (ie:
their cost to manufacture, not our price we pay)  Likely there were some
timing parameters between the WIC interface and WIC slot that changed, and
the designers didn't want to go back and redesign the WIC or slot silicon
to match the older routers.

As long as Cisco has their stuff manufactured overseas, in Asia, they
are going to have rampant piracy of their parts.  After all it's the
same production factories that are churning out the Cisco parts for
Cisco that are also churning out the counterfeited stuff on the sly for
the pirates.  If Cisco were to shut down all their Asian production
and start making the stuff in the US like they used to do, the piracy
problems would go away.

Ted

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/