[c-nsp] RS CCIE Lab wait times - Sydney

2008-08-26 Thread Ben Steele
Does anyone have any idea on the current wait times for the Lab? I'm about
to sit the written in a couple of weeks and someone mentioned to me the
current wait is around a year and a half?? Is there a specific wait for each
stream or is that in general, only interested in Sydney Lab dates, a year
and a half seems pretty steep, i'm hoping it's not right, although I have
heard of time frames like that for the Security Lab in Europe.

 

Cheers

 

Ben

 

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] CoPP Service Policy

2008-08-26 Thread Aftab Siddiqui
Dear All,


I would like to know the difference in performance and implementation if I
put the service-policy within the specified interface (e.g. gix/x) or with
in the control-plane in globally.
*First Option:*

Router(config)# *control-plane *

Router(config-cp)# *service-policy input* *service-policy-name *

Router(config-cp)# *service-policy output* *service-policy-name *

*Second Option:*

interface GigabitEthernetxx/yy
 service-policy input *service-policy-name *
 service-policy output *service-policy-name *

Note: Platform catalyst6500, 122-33.SXH2a

-- 
Regards,

Aftab A. Siddiqui
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] Improved queuing in 12.4(20)T?

2008-08-26 Thread Per Carlson
Hi.

I'm doing some QoS-testings and notice a remarkable change in the
latencies on a priority queue (as well as some improvement on other
queues) in 12.4(20)T compared with 12.4M (19, 19b and 21) and
12.4(15)T7. The scenario is H-QoS with a parent doing shape average
and a child with 4 queues:

class-map match-any Voice
 match  dscp cs5  ef
!
class-map match-any Business
 match  dscp cs3  af31
!
class-map match-any Network
 match  dscp cs6  cs7
!
policy-map Child
 class Voice
priority percent 33
 class Business
bandwidth percent 40
 class Network
bandwidth percent 2
!
policy-map Parent
 class class-default
shape average 800
  service-policy Child
!
interface FastEthernet X
 service-policy output Parent
!
end


When pushing traffic through the policy (Voice and Business within
contract and enough class-default traffic to trigger back-pressure)
I get the following latencies:

   Voice Business  class-default
12.4M/12.4(15)T:13 ms  14 ms  126 ms
12.4(20)T  :   0.4 ms 8.5 ms  138 ms

There is no drop in neither the Voice nor Business queues, and about
21% in the class-default queue.

I have tried the same test on both a 871 (the WAN-port) and a 1841
with similar results. This makes me think there has been some major
improvement in 12.4(20)T, but can't verify this in the RN for
12.4(20)T.

There *is* a new H-QoS feature in 12.4(20)T called HQF
(http://www.cisco.com/en/US/docs/ios/qos/configuration/guide/qos_frhqf_support.html),
but I can't see that it's directly relevant.

Does anyone have some knowledge or insight to enlighten me here?

-- 
Pelle
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] CoPP Service Policy

2008-08-26 Thread Oliver Boehmer (oboehmer)
Aftab Siddiqui  wrote on Tuesday, August 26, 2008 10:29 AM:

 Dear All,
 
 
 I would like to know the difference in performance and implementation
 if I put the service-policy within the specified interface (e.g.
 gix/x) or with in the control-plane in globally.
 *First Option:*
 
 Router(config)# *control-plane *
 
 Router(config-cp)# *service-policy input* *service-policy-name *
 Router(config-cp)# *service-policy output* *service-policy-name *

there is no outbound conrol-plane policing.

 *Second Option:*
 
 interface GigabitEthernetxx/yy
  service-policy input *service-policy-name *
  service-policy output *service-policy-name *
 

What are you trying to achieve?

CoPP policy (first config) is processed only for traffic terminating on
the router, while the interface QoS policy is applied to all traffic
entering (or leaving) the respective interface. So the semantic is quite
different.
CoPP ensures that the aggregate traffic (from all interfaces) does not
exceed a certain rate, while the interface QoS policy is only looking at
the rate of this specific interface (assuming you want to use the policy
to rate-limit/police certain traffic to the box).

Another advantage of CoPP is the easy filtering as it is only applied
to traffic terminating on the router, so you usually don't need to match
on any possible destination address in an ACL/class-map.

Both policies are execued in hardware (there is an addtl. software
CoPP), no performance impact. 

You might want to look at http://tinyurl.com/5hew55 for more info about
CoPP..

oli

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] ES20 crashing on bad DWDM

2008-08-26 Thread Tomas Daniska
Hi,

has anybody experienced ES20 2x10G cards crashing when DWDM link quality
degrades? Usually when the error rate increases so that IGP and PIM
start flapping, the card stops responding to CPU heartbeats and is
rebooted.

We have seen this at two customers now, TAC is failing to reproduce...
I'd like to collect as many similar scenarios as possible to help them
recreate the issue.


Thanks for any hints

--

Tomas Daniska
systems engineer

Soitron, a.s.
Plynarenska 5, 829 75 Bratislava, Slovakia
tel: +421 2 58224111, fax: +421 2 58224199

My hovercraft is full of eels.


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Improved queuing in 12.4(20)T?

2008-08-26 Thread Oliver Boehmer (oboehmer)
Per Carlson  wrote on Tuesday, August 26, 2008 10:47 AM:

 Hi.
 
 I'm doing some QoS-testings and notice a remarkable change in the
 latencies on a priority queue (as well as some improvement on other
 queues) in 12.4(20)T compared with 12.4M (19, 19b and 21) and
 12.4(15)T7. The scenario is H-QoS with a parent doing shape average
 and a child with 4 queues:
[...]

 
 There *is* a new H-QoS feature in 12.4(20)T called HQF

(http://www.cisco.com/en/US/docs/ios/qos/configuration/guide/qos_frhqf_s
upport.html),
 but I can't see that it's directly relevant.

HQF is a totally different QoS infrastructure (previously available on
the 7500/7200 in 12.0S as well as some other trains), so I would assume
this being the reason for the improved behavior.

I haven't looked at HQF for a while, but I recall the H-QoS scenario
you're using benefits especially from HQF as the parent shaper is aware
of the LLQ within the child, but not entirely sure about this. It would
explain the improved behaviour, though.

oli
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Web Caches

2008-08-26 Thread Ziv Leyes
I second Alan's suggestion.
I've seen this product in a POC we did and it works great.
I've also seen some graphs of one of their biggest customers and the saved 
bandwidth rates were impressive.
My bests to Aviad, the man!
Ziv



-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Alan Arolovitch
Sent: Monday, August 25, 2008 9:11 PM
To: Lala Lander; cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] Web Caches

Hi,

I suggest you take a look at our clustered UltraBand cache,
http://www.peerapp.com/
UltraBand cache is a combined HTTP/P2P cache for service providers,
supporting progressive download Flash video (e.g. YouTube) and software
downloads over HTTP, among other things, as well as URL filtering

Cheers,
Alan
--

Message: 5
Date: Sat, 23 Aug 2008 01:42:44 -0700
From: Lala Lander [EMAIL PROTECTED]
Subject: [c-nsp] Web Caches
To: cisco-nsp@puck.nether.net cisco-nsp@puck.nether.net
Message-ID:
[EMAIL PROTECTED]
Content-Type: text/plain; charset=ISO-8859-1

Hi guys,

I am looking for information on Web Caches. I need to find out what
vendors are out there and what is your deployment and operational
experience My objective is to reduce Internet bandwidth usage and some
URL filtering. I am currently evaluating BlueCoat and Secure Computing
but I need your opinion before I test them any further.

thanks.


--
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/






This footnote confirms that this email message has been scanned by
PineApp Mail-SeCure for the presence of malicious code, vandals  computer 
viruses.







 
 

This footnote confirms that this email message has been scanned by
PineApp Mail-SeCure for the presence of malicious code, vandals  computer 
viruses.




___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] MPLS VPN Question about PE-CE - Private or Public IP?

2008-08-26 Thread Tim Franklin
On Thu, August 21, 2008 12:59 am, Brandon Price wrote:
 Other than just saying its bad can you give some specifics as to the
 problems you've run into using private addresses for PE-CE links? As
 long as the SP hands out unique addresses across all of the links, what
 does it matter whether they are private or public ?

Customers using *all* of RFC1918 space (or at least claiming they do).

e.g. if you have WAN links as /30s out of 10.11.12.0/24, and the customer
has that range on a LAN somewhere, each site will be unable to reach the
particular hosts on it's WAN /30.  (At least - if you're redistributing
WAN routes into BGP / MBGP, the lack of visibility gets worse).

You end up wasting a lot of time negotiating with customers to try and
find an acceptable range, hacking exceptions into your network and
processes to get around the fact you're having to allocate WANs from
something other than your normal block - assuming you can get that far at
all.  I've dealt with the occasional customer loudly and fairly
aggressively insisting that RFC1918 space is entirely theirs, we may not
use any of it, fix our service now, incoming lawyers, etc.

If you then end up with public WAN addresses an exception only, you give
yourself more pain in trying to document sufficiently that your support
guys six months down the line don't assume that it must be an Internet
service, it's public addresses and do something unpleasent to it, like
remove the VRF.

Regards,
Tim.




___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] WS-X4506-GB-T Ports not connected

2008-08-26 Thread Sebastian Wiesinger
Hello,

I'm having a little problem here with a new Cisco 4510R-E. It's
running the following configuration:

Mod Ports Card Type  Model
---+-+--+-
 5 6  Sup 6-E 10GE (X2), 1000BaseX (SFP) WS-X45-SUP6-E
 918  1000BaseX (GBIC)   WS-X4418-GB  
10 6  SFP, 10/100/1000BaseT (RJ45)V, Cisco/I WS-X4506-GB-T

 M MAC addressesHw  Fw   Sw   Status
--++---+++-
 5 0021.d808.6a00 to 0021.d808.6a05 1.1 12.2(44r)SG  12.2(40)SG   Ok   
 9 000c.3000.280a to 000c.3000.281b 1.1   Ok   
10 001e.7ad0.f90c to 001e.7ad0.f911 1.4   Ok   

Mod  Redundancy role Operating mode  Redundancy status
+---+---+--
 5   Active Supervisor   RPR Active

I'm tryubg to activate the ports on the WS-X4506-GB-T, but I'm unable to
get any connection. I connected the first two ports on the card to
create a loopback and still the ports are shown as not connected. I
use RJ45 and have set the media-type of the ports to rj45 which
is also stated in the log:

00:00:05: %C4K_REDUNDANCY-6-INIT: Initializing as ACTIVE supervisor
00:00:05: 512 MB of system memory installed. Do 'show platform hardware sdram 
spd' for details.
00:00:37: %SPANTREE-5-EXTENDED_SYSID: Extended SysId enabled for type vlan
00:00:38: %SYS-5-CONFIG_I: Configured from memory by console
00:00:38: %SYS-5-RESTART: System restarted --
Cisco IOS Software, Catalyst 4500 L3 Switch Software (cat4500e-IPBASE-M), 
Version 12.2(40)SG, RELEASE SOFTWAR)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2007 by Cisco Systems, Inc.
Compiled Wed 07-Nov-07 19:52 by prod_rel_team
00:00:38: %C4K_IOSMODPORTMAN-6-MODULEONLINE: Module 5 (WS-X45-SUP6-E S/N: 
JAE1222JOZS Hw: 1.1) is online
00:00:38: %C4K_IOSMODPORTMAN-6-MODULEONLINE: Module 9 (WS-X4418-GB S/N: 
JAE07340WR1 Hw: 1.1) is online
00:00:38: %C4K_IOSMODPORTMAN-6-MODULEONLINE: Module 10 (WS-X4506-GB-T S/N: 
JAE1218GSWU Hw: 1.4) is online
00:21:07: %C4K_IOSINTF-5-RJ45ACTIVE: Slot= 10 Port= 1:  RJ45 connector has 
become active
00:45:41: %C4K_IOSINTF-5-RJ45ACTIVE: Slot= 10 Port= 2:  RJ45 connector has 
become active

Here is the port configuration:

interface GigabitEthernet10/1
 no switchport
 ip address dhcp
 no keepalive
 media-type rj45
!
interface GigabitEthernet10/2
 no switchport
 ip address dhcp
 no keepalive
 media-type rj45
!

Is there anything I'm missing? I already changed the cabling so that's
not the problem. Any ideas/suggestions welcome.

Regards,

Sebastian



-- 
GPG Key-ID: 0x76B79F20 (0x1B6034F476B79F20)
'Are you Death?' ... IT'S THE SCYTHE, ISN'T IT? PEOPLE ALWAYS NOTICE THE SCYTHE.
-- Terry Pratchett, The Fifth Elephant
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Improved queuing in 12.4(20)T?

2008-08-26 Thread Per Carlson
Hi Oli.

 I haven't looked at HQF for a while, but I recall the H-QoS scenario
 you're using benefits especially from HQF as the parent shaper is aware
 of the LLQ within the child, but not entirely sure about this. It would
 explain the improved behaviour, though.

I have always had the impression that the parent shaper *is* aware of
the child policy. Otherwise the whole H-QoS scheme is rather useless,
at least with respect to LLQ/PQ.

So far I haven't found any references on CCO confirming either
possibility (aware/unaware). The closest match is a configuration
example[1] with a priority queue in the child, but it says nothing
about awareness in the parent. And there is this note about
subinterfaces/PVCs...

[1] 
http://www.cisco.com/en/US/docs/ios/qos/configuration/guide/qos_mqc_ps6350_TSD_Products_Configuration_Guide_Chapter.html#wp1060235

-- 
Pelle
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] WS-X4506-GB-T Ports not connected

2008-08-26 Thread Sebastian Wiesinger
* Sebastian Wiesinger [EMAIL PROTECTED] [2008-08-26 12:30]:
 Hello,
 
 I'm having a little problem here with a new Cisco 4510R-E. It's
 running the following configuration:

Problem solved. Someone hinted that I should not assume that the
linecard does have auto MDI/X detection. Which apparently it hasn't.
So connecting a crossover cable solved the problem.

I was under the impression that auto MDI/X was a feature present on
all linecards but it seems I was wrong. Or is there a way to turn this
on on a port? I looked over the commands for the port but didn't see
anything obvious..

Regards,

Sebastian

-- 
GPG Key-ID: 0x76B79F20 (0x1B6034F476B79F20)
'Are you Death?' ... IT'S THE SCYTHE, ISN'T IT? PEOPLE ALWAYS NOTICE THE SCYTHE.
-- Terry Pratchett, The Fifth Elephant
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] WS-X4506-GB-T Ports not connected

2008-08-26 Thread Mateusz Błaszczyk
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Sebastian,

 interface GigabitEthernet10/1
  no switchport
  ip address dhcp
  no keepalive
  media-type rj45
 !
 interface GigabitEthernet10/2
  no switchport
  ip address dhcp
  no keepalive
  media-type rj45
 !

 Is there anything I'm missing? I already changed the cabling so that's
 not the problem. Any ideas/suggestions welcome.

I doubt it is what you are looking for, but

no shutdown?

- --
- -mat



-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFIs+YkIvBv0k5esR4RAhVoAKCGLyvdSdLcAG2DbQrlH32+WhmVxgCcCKyb
wwvaGvUL3veothr3CcNZTOc=
=iwdW
-END PGP SIGNATURE-
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] WS-X4506-GB-T Ports not connected

2008-08-26 Thread Nic Tjirkalli

howdy ho,


* Sebastian Wiesinger [EMAIL PROTECTED] [2008-08-26 12:30]:

Hello,

I'm having a little problem here with a new Cisco 4510R-E. It's
running the following configuration:


Problem solved. Someone hinted that I should not assume that the
linecard does have auto MDI/X detection. Which apparently it hasn't.
So connecting a crossover cable solved the problem.

I was under the impression that auto MDI/X was a feature present on
all linecards but it seems I was wrong. Or is there a way to turn this
on on a port? I looked over the commands for the port but didn't see
anything obvious..

in my expeierence not all line cards support the auto MDI/X feature but
for those taht do, add the command :-
mdix auto
on the interface

hope this helps

later





Regards,

Sebastian

--
GPG Key-ID: 0x76B79F20 (0x1B6034F476B79F20)
'Are you Death?' ... IT'S THE SCYTHE, ISN'T IT? PEOPLE ALWAYS NOTICE THE SCYTHE.
   -- Terry Pratchett, The Fifth Elephant
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/




-
I'm not cheap, but I am on special this week.

Nic Tjirkalli
Verizon Business South Africa
Network Strategy Team

Verizon Business is a brand of Verizon South Africa (Pty) Ltd. This e-mail
is strictly confidential and intended only for use by the addressee unless
otherwise indicated.

Company Information:http:// www.verizonbusiness.com/za/contact/legal/

This e-mail is strictly confidential and intended only for use by the
addressee unless otherwise indicated.
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Improved queuing in 12.4(20)T?

2008-08-26 Thread Oliver Boehmer (oboehmer)
Per Carlson mailto:[EMAIL PROTECTED] wrote on Tuesday, August 26, 2008
1:16 PM:

 Hi Oli.
 
 I haven't looked at HQF for a while, but I recall the H-QoS scenario
 you're using benefits especially from HQF as the parent shaper is
 aware of the LLQ within the child, but not entirely sure about this.
 It would explain the improved behaviour, though.
 
 I have always had the impression that the parent shaper *is* aware of
 the child policy. Otherwise the whole H-QoS scheme is rather useless,
 at least with respect to LLQ/PQ.

Hmm, I think I would need to do some digging here, but I was thinking
about a different kind of awareness here. Obviously the shaper in the
parent is aware of a child, so when the shaper has to queue a packet
(i.e. signals connections), it'll use the child policy (which, as you
write, is the whole point of H-QoS).

Maybe Rodney can comment more, but I would still assume HQF being the
reason for the different behavior in your environment.

oli
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] VTP and Vlan 1

2008-08-26 Thread Paul Cosgrove
Hi Michel,

Appologies for confusing the issue. You are of course correct about VTP,
which does use vlan 1.

UDLD is not sent with a dot1q tag, but is associated with vlan 1 on ISL
trunks.  Changing the (dot1q) native vlan on the trunk has no effect on
how UDLD is sent over ISL, it is still sent on vlan 1.

Paul.

Michel Grossenbacher wrote:
 Paul, indeed DTP is sent over the native VLAN, but VTP is pretty sure still
 over VLAN 1. I did a trace and mixed VTP with DTP, hence I said its using
 the native VLAN. But after I did some more traces the VTP packets did not
 show any VLAN informations anymore (actually they never did I only hit the
 wrong line within wireshark ;) ).
 So Im quite sure VTP and CDP are not sent via the native VLAN, after I
 changed it from VLAN 1 to VLAN 10. Probably have to have a look with ISL
 too.
 
 Mike, I think I know what you mean, per definition (AFAIK) all VLANs get
 encapsulated by ISL, while with dot1Q all but the native one get a Tag. But
 within an ISL trunk Cisco defines a native VLAN (default is VLAN 1, same as
 dot1Q) and you can configure it the same way as for a dot1Q one so I'd say
 UDLD will use that one. I guess it will still be encapsulated but I did
 never check that.
 Do a *show interface trunk* if you configured an ISL trunk and you'll see it
 at the top.
 
 Michel
 
 2008/8/25 Paul Cosgrove [EMAIL PROTECTED]
 
 Hi Michel,

 You may have been right the first time there.  I think VTP does indeed
 use the native vlan, not necessarily vlan 1.  DTP is also sent on the
 native vlan, untagged and tagged in its case.

 Paul.

 Michel Grossenbacher wrote:
 A little correction on my answer, VTP does not use the Native VLAN :-)

 Here is what I found regarding the use of VTP and VLAN1:
 The Case of VLAN 1

 You cannot apply VTP pruning to VLANs that need to exist everywhere and
 that
 need to be allowed on all switches in the campus, in order to be able to
 carry VTP, Cisco Discovery Protocol [CDP] traffic, and other control
 traffic. However, there is a way to limit the extent of VLAN 1. The
 feature
 is called VLAN 1 disable on trunk. The feature is available on Catalyst
 4500/4000, 5500/5000, and 6500/6000 series switches in CatOS software
 release 5.4(x) and later. The feature allows you to prune VLAN 1 from a
 trunk, as you do for any other VLAN. This pruning does not include all
 the
 control protocol traffic that is still allowed on the trunk (DTP, PAgP,
 CDP,
 VTP, and others). However, the pruning does block all user traffic on
 that
 trunk. With this feature, you can keep the VLAN from spanning the entire
 campus. STP loops are limited in extent, even in VLAN 1. Configure VLAN 1
 to
 be disabled, as you would configure other VLANs to be cleared from the
 trunk:

 UDLD uses native VLAN in order to talk to the neighbor. So, in a trunk
 port,
 the native VLAN must not be pruned in order for UDLD to work properly.

 http://www.cisco.com/en/US/tech/tk389/tk689/technologies_tech_note09186a0080890613.shtml
 Sorry for the confusion.

 best regards

 Michel


 On 25/08/2008, Michel Grossenbacher [EMAIL PROTECTED] wrote:
 Hi Mike
 Actually VLAN 1 is not pruning-eligible so you can not prune VLAN 1 from
 a
 trunk. However you can remove it from the trunk.
 If you remove it from the trunk and change the native VLAN for the
 trunk,
 VTP will then use the new native VLAN for updates.
 best regards

 Michel


  On 25/08/2008, Mike Louis [EMAIL PROTECTED] wrote:
 List,

 I just read in a practice test for an upcoming cert that Vlan 1 is used
 to
 carry VTP advertisements. However, it is possible to prune vlan 1 from
 trunk
 links. Will VTP continue to function without Vlan 1 being enabled on
 the
 link? Has this changed in more recent IOS releases?

 Note: This message and any attachments is intended solely for the use
 of
 the individual or entity to which it is addressed and may contain
 information that is non-public, proprietary, legally privileged,
 confidential, and/or exempt from disclosure.  If you are not the
 intended
 recipient, you are hereby notified that any use, dissemination,
 distribution, or copying of this communication is strictly prohibited.
  If
 you have received this communication in error, please notify the
 original
 sender immediately by telephone or return email and destroy or delete
 this
 message along with any attachments immediately.

 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/

 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/


 --
 HEAnet Limited
 Ireland's Education  Research Network
 5 George's Dock, IFSC, Dublin 1, Ireland
 Tel:  +353.1.6609040
 Web:  http://www.heanet.ie
 Company registered in Ireland: 275301

 Please 

Re: [c-nsp] IOS VPN Client Group Issue

2008-08-26 Thread Thomas Beecher
You're spot on. I came across that yesterday afternoon, it does require 
the 12.2T train.


Guess I should learn to read a little better. :)

Thanks to those that responded, much appreciated

Tom.

Ge Moua wrote:

I'm doing a simlar config with IOS:
12.4(15)T6

I wonder if you need the T code train for this:

Router(config)#crypto isakmp client configuration ? 
  address-pool   Set network address for client

  browser-proxy  Set browser proxy attributes for client
  group  Set group profile attributes for client

Router(config)#crypto isakmp client configuration 





Regards,
Ge Moua | Email: [EMAIL PROTECTED]

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services
2218 University Ave SE | Minneapolis, MN 55414-3029
Office: 612.626.2779 | Pager: 612.648.0103 | Fax: 612.626.1818
 
-Original Message-

From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Thomas Beecher
Sent: Monday, August 25, 2008 11:37 AM
To: cisco-nsp@puck.nether.net
Subject: [c-nsp] IOS VPN Client Group Issue

I've come across something odd. I think that this is just a simple oversight
on my part, hopefully another set of eyes will catch this for me.

I've got a 2621 running 12.2(46a) that I'm using to terminate a few VPN
tunnels. Right now, I have three point to point tunnels up, and working
without issue. This morning, I started adding the config for VPN client
access, and that's where I've getting hung up.

Under the crypto isakmp client configuration command, I should have a
'group' option to setup the VPN group parameters. However, I do not. The
only option I have is 'address-pool' . As far as I can tell, this image
should support that command.

I'm fairly certain that I have the correct aaa commands in place to enable
group authorization, however there are some pre-existing AAA commands on
this router that could be hanging me up.

Here's the aaa config:

aaa new-model
aaa authentication login default group tacacs+ line enable aaa
authentication login rev_tel line enable aaa authentication login userauthen
local aaa authorization network groupauthen local

Am I missing something painfully obvious here?

Thanks in advance,

Tom



___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

  


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] VTP and Vlan 1

2008-08-26 Thread Michel Grossenbacher
Hi Paul
Dont worry, I did the same at the beginning :-)

So UDLD on dot1Q uses the native VLAN while with ISL it stays within VLAN 1
no matter if we changed the native vlan or not?
This means that with ISL trunks UDLD behaves similar to CDP/VTP ?

Thanks

best regards

Michel



On 26/08/2008, Paul Cosgrove [EMAIL PROTECTED] wrote:

 Hi Michel,

 Appologies for confusing the issue. You are of course correct about VTP,
 which does use vlan 1.

 UDLD is not sent with a dot1q tag, but is associated with vlan 1 on ISL
 trunks.  Changing the (dot1q) native vlan on the trunk has no effect on
 how UDLD is sent over ISL, it is still sent on vlan 1.

 Paul.

 Michel Grossenbacher wrote:
  Paul, indeed DTP is sent over the native VLAN, but VTP is pretty sure
 still
  over VLAN 1. I did a trace and mixed VTP with DTP, hence I said its using
  the native VLAN. But after I did some more traces the VTP packets did not
  show any VLAN informations anymore (actually they never did I only hit
 the
  wrong line within wireshark ;) ).
  So Im quite sure VTP and CDP are not sent via the native VLAN, after I
  changed it from VLAN 1 to VLAN 10. Probably have to have a look with ISL
  too.
 
  Mike, I think I know what you mean, per definition (AFAIK) all VLANs get
  encapsulated by ISL, while with dot1Q all but the native one get a Tag.
 But
  within an ISL trunk Cisco defines a native VLAN (default is VLAN 1, same
 as
  dot1Q) and you can configure it the same way as for a dot1Q one so I'd
 say
  UDLD will use that one. I guess it will still be encapsulated but I did
  never check that.
  Do a *show interface trunk* if you configured an ISL trunk and you'll see
 it
  at the top.
 
  Michel
 
  2008/8/25 Paul Cosgrove [EMAIL PROTECTED]
 
  Hi Michel,
 
  You may have been right the first time there.  I think VTP does indeed
  use the native vlan, not necessarily vlan 1.  DTP is also sent on the
  native vlan, untagged and tagged in its case.
 
  Paul.
 
  Michel Grossenbacher wrote:
  A little correction on my answer, VTP does not use the Native VLAN :-)
 
  Here is what I found regarding the use of VTP and VLAN1:
  The Case of VLAN 1
 
  You cannot apply VTP pruning to VLANs that need to exist everywhere and
  that
  need to be allowed on all switches in the campus, in order to be able
 to
  carry VTP, Cisco Discovery Protocol [CDP] traffic, and other control
  traffic. However, there is a way to limit the extent of VLAN 1. The
  feature
  is called VLAN 1 disable on trunk. The feature is available on Catalyst
  4500/4000, 5500/5000, and 6500/6000 series switches in CatOS software
  release 5.4(x) and later. The feature allows you to prune VLAN 1 from a
  trunk, as you do for any other VLAN. This pruning does not include all
  the
  control protocol traffic that is still allowed on the trunk (DTP, PAgP,
  CDP,
  VTP, and others). However, the pruning does block all user traffic on
  that
  trunk. With this feature, you can keep the VLAN from spanning the
 entire
  campus. STP loops are limited in extent, even in VLAN 1. Configure VLAN
 1
  to
  be disabled, as you would configure other VLANs to be cleared from the
  trunk:
 
  UDLD uses native VLAN in order to talk to the neighbor. So, in a trunk
  port,
  the native VLAN must not be pruned in order for UDLD to work properly.
 
 
 http://www.cisco.com/en/US/tech/tk389/tk689/technologies_tech_note09186a0080890613.shtml
  Sorry for the confusion.
 
  best regards
 
  Michel
 
 
  On 25/08/2008, Michel Grossenbacher [EMAIL PROTECTED] wrote:
  Hi Mike
  Actually VLAN 1 is not pruning-eligible so you can not prune VLAN 1
 from
  a
  trunk. However you can remove it from the trunk.
  If you remove it from the trunk and change the native VLAN for the
  trunk,
  VTP will then use the new native VLAN for updates.
  best regards
 
  Michel
 
 
   On 25/08/2008, Mike Louis [EMAIL PROTECTED] wrote:
  List,
 
  I just read in a practice test for an upcoming cert that Vlan 1 is
 used
  to
  carry VTP advertisements. However, it is possible to prune vlan 1
 from
  trunk
  links. Will VTP continue to function without Vlan 1 being enabled on
  the
  link? Has this changed in more recent IOS releases?
 
  Note: This message and any attachments is intended solely for the use
  of
  the individual or entity to which it is addressed and may contain
  information that is non-public, proprietary, legally privileged,
  confidential, and/or exempt from disclosure.  If you are not the
  intended
  recipient, you are hereby notified that any use, dissemination,
  distribution, or copying of this communication is strictly
 prohibited.
   If
  you have received this communication in error, please notify the
  original
  sender immediately by telephone or return email and destroy or delete
  this
  message along with any attachments immediately.
 
  ___
  cisco-nsp mailing list  cisco-nsp@puck.nether.net
  https://puck.nether.net/mailman/listinfo/cisco-nsp
  

[c-nsp] which IOS supports sup720 + FlexWAN + PA-POS-OC3?

2008-08-26 Thread Marco d'Itri
When I plug in the PA I get this:

SLOT 5/0: 00:00:03: %PA-2-UNDEFIO: Unsupported I/O Controller (type 65535) in 
I/O Bay. The I/O Controller network interfaces will be unavailable. 

a normal fast ethernet PA works fine.
cisco.com says that the PA is supported even by non-enhanced FlexWANs.

IOS (tm) s72033_rp Software (s72033_rp-ADVENTERPRISEK9_WAN-M), Version 
12.2(18)SXF13, RELEASE SOFTWARE (fc1)

-- 
ciao,
Marco
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] LLQ + MLPPPoE - ?

2008-08-26 Thread David Freedman
Have a scenario whereby I've an LLQ policy applied to a CE router doing MLPPPoE 
with following
configuration:

!
class-map match-any REALTIME
 match ip dscp ef 
class-map match-any CRITICAL-DATA
 match ip dscp cs6 
!
!
policy-map LLQ
 class REALTIME
  priority percent 35
 class CRITICAL-DATA
  bandwidth percent 40
  random-detect dscp-based
 class class-default
  fair-queue
  random-detect dscp-based  
!
!
interface ATM0/0/0.132 point-to-point
 pvc 1/32 
  vbr-nrt 2304 2304
  tx-ring-limit 3
  encapsulation aal5snap
  service-policy output LLQ
  pppoe-client dial-pool-number 1
 !  
!
interface ATM0/1/0.132 point-to-point
 pvc 1/32 
  vbr-nrt 2304 2304
  tx-ring-limit 3
  encapsulation aal5snap
  service-policy output LLQ
  pppoe-client dial-pool-number 1
 ! 
interface Dialer0
 bandwidth 4608
 ip address negotiated
 encapsulation ppp
 dialer pool 1
 dialer idle-timeout 0
 dialer-group 1
 no cdp enable
 ppp authentication chap callin
 ppp chap hostname xx
 ppp chap password yy
 ppp ipcp route default
 ppp link reorders
 ppp multilink
 ppp multilink fragment disable
 max-reserved-bandwidth 100
 service-policy output LLQ
end   


So, the LLQ policy is only required to be applied to the VC and not the dialer, 
since I'm only
queuing , but it is applied to both here.

The ATM interface did indeed move to WFQ:

#show queueing int atm0/0/0.132
  Interface ATM0/0/0.132 VC 1/32 
  Queueing strategy: weighted fair
  Output queue: 0/512/64/0 (size/max total/threshold/drops)
 Conversations  0/6/128 (active/max active/max total)
 Reserved Conversations 1/1 (allocated/max allocated)
 Available Bandwidth 1 kilobits/sec

But, the output of show policy-map int a0/0/0.132 does not show anything
being pushed into the PQ at all

#show policy-map int a0/0/0.132 | in Class-map|matched|default
Class-map: REALTIME (match-any)
(pkts matched/bytes matched) 0/0
Class-map: CRITICAL-DATA (match-any)
(pkts matched/bytes matched) 0/0
default   0/0   0/0  0/0   20  40  1/10
Class-map: class-default (match-any)
default 268/19832   0/0 
 0/0   20  40  1/10
#show policy-map int a0/1/0.132 | in Class-map|matched|default
Class-map: REALTIME (match-any)
(pkts matched/bytes matched) 0/0
Class-map: CRITICAL-DATA (match-any)
(pkts matched/bytes matched) 0/0
default   0/0   0/0  0/0   20  40  1/10
Class-map: class-default (match-any)
default 270/19980   0/0  0/0   20  40  1/10 
  

( I do see class matches, omitted here, but they do not appear to be queued)


What is actually observed, is that the LLQ appears to work well until more than 
one member
joins the bundle, then the latency + jitter becomes variable, but I'm not sure 
that it is even working at all since the queue counters do not increment, I 
could just be seeing the results of the WFQ.

From the PE side, ppp multilink fragment disable and ppp link reorders are 
applied via RADIUS but I do not really believe they are having an effect since 
I'm still seeing re-order counters.
(vtemplate clone applies the attributes, but assume they are being ignored)


CE is 12.4(15)T7 and PE is 12.4(19)

Am assuming that I'm doing this correctly as there should be no need for a 
shaper (not that it is accepted anyway) since we can create ATM backpressure 
from the ATM interfaces when I reduce the TX ring size.

Any suggestions appreciated.

Regards,
 


David Freedman
Group Network Engineering 
Claranet Limited
http://www.clara.net

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] which IOS supports sup720 + FlexWAN + PA-POS-OC3?

2008-08-26 Thread Hank Nussbacher

On Tue, 26 Aug 2008, Marco d'Itri wrote:

Works for me on 12.2(18)SXE6b but all are eFlexwans:

Slot 4: Logical_index 9
2 port adapter Enhanced FlexWAN controller
Board is analyzed ipc ready
HW rev 0.1, board revision A01
Serial Number:  Part number: 73-6348-01

Slot database information:
Flags: 0x2004   Insertion time: 0x22C08 (6w5d ago)

Controller Memory Size:
192 MBytes CPU Memory
63 MBytes Packet Memory
255 MBytes Total on Board SDRAM
IOS (tm) cwlc Software (cwpa2-DW-M), Version 12.2(18)SXE6b, 
RELEASE SOFTWARE (fc2)


PA Bay 1 Information:
POS PA, 2 port, PA-POS-2OC3
EEPROM format version 4
HW rev 1.00, Board revision A0
Serial number: JAE09044GVG  Part number: 73-8220-05

-Hank


When I plug in the PA I get this:

SLOT 5/0: 00:00:03: %PA-2-UNDEFIO: Unsupported I/O Controller (type 65535) in 
I/O Bay. The I/O Controller network interfaces will be unavailable.

a normal fast ethernet PA works fine.
cisco.com says that the PA is supported even by non-enhanced FlexWANs.

IOS (tm) s72033_rp Software (s72033_rp-ADVENTERPRISEK9_WAN-M), Version 
12.2(18)SXF13, RELEASE SOFTWARE (fc1)

--
ciao,
Marco
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] VPN Client to 1841, default route into tunnel with exceptions

2008-08-26 Thread Marc Haber
Hi,

this is strictly a client issue and not appropriate for cisco-nsp, but
I haven't found any mailing list with this clue level for other
cisco-related aspects. If there is one, I'd like to learn about it.

I have a bunch of Windows clients with the Cisco VPN Client
5.0.01.0600 and an 1841 running IOS 12.4(9)T4. My configuration is as
follows:

aaa new-model
!
aaa authentication login default local
aaa authentication login userauthen local
aaa authentication login localauth local
aaa authorization exec default local
aaa authorization network groupauthor local
!
aaa session-id common
!
resource policy
!
ip cef
!
username marc.haber privilege 15 secret 5 snip
!
crypto isakmp policy 3
 encr aes 256
 authentication pre-share
 group 2
!
crypto isakmp client configuration group InternClient
 key onsh4OcyivOafmyodzet
 dns 10.1.2.11 10.1.2.15
 wins 10.1.2.11 10.1.2.15
 domain example.com
 pool ippool
 acl DefaultrouteTunnel
!
!
crypto ipsec transform-set InternTransformSet esp-aes 256 esp-sha-hmac
!
crypto dynamic-map InternDynmap 10
 set transform-set InternTransformSet
 reverse-route
!
!
crypto map InternClientMap client authentication list userauthen
crypto map InternClientMap isakmp authorization list groupauthor
crypto map InternClientMap client configuration address respond
crypto map InternClientMap 10 ipsec-isakmp dynamic InternDynmap
!
interface FastEthernet0/0
 description $ETH-LAN$$ETH-SW-LAUNCH$$INTF-INFO-FE 0$
 ip address 172.26.248.10 255.255.255.248
 duplex auto
 speed auto
 crypto map InternClientMap
!
ip access-list extended DefaultrouteTunnel
 permit ip any any
ip access-list extended DefaultrouteWithoutListedNetsTunnel
 deny   ip 192.168.8.0 0.0.0.255 any
 permit ip any any
!

With this configuration, a client cannot communicate at all outside
the tunnel, which is a desired feature in this setup. OTOH, some
teleworkers would appreciate to be able to talk to their networked
printers on the local LANs.

I have received the advice of adding the local networks of all
teleworkers to an access list, which has resulted in the
DefaultrouteWithoutListedNetsTunnel ACL. But this does not seem to
work, traffic for 192.168.8.3 still goes into the tunnel after I
changed the acl reference in the crypto isakmp client configuration
group InternClient. Also, I do not see any changes in the Windows
client's routing tables.

Can someone advice what I am doing wrong here? Additionally, do I
really need to exclude all local networks of all teleworkers in the
global configuration, or is it possible to control this on a
per-client basis?

All web-based documentation I have found deals with the VPN
Concentrator series which do not seem to use IOS - at least I cannot
make sense of the advice found there in my configuration.

Any hints will be appreciated.

Greetings
Marc

-- 
-
Marc Haber | I don't trust Computers. They | Mailadresse im Header
Mannheim, Germany  |  lose things.Winona Ryder | Fon: *49 621 72739834
Nordisch by Nature |  How to make an American Quilt | Fax: *49 3221 2323190
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] VPN Client to 1841, default route into tunnel with exceptions

2008-08-26 Thread Ge Moua
Sounds like a routing issue, is your ippool handling out IP addr to the
clients.  I recently set a similar config on a 1811 and this works fine.  I
can send you the working config if you're intersted. 


Regards,
Ge Moua | Email: [EMAIL PROTECTED]

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services
 
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Marc Haber
Sent: Tuesday, August 26, 2008 9:01 AM
To: cisco-nsp@puck.nether.net
Subject: [c-nsp] VPN Client to 1841,default route into tunnel with
exceptions

Hi,

this is strictly a client issue and not appropriate for cisco-nsp, but I
haven't found any mailing list with this clue level for other cisco-related
aspects. If there is one, I'd like to learn about it.

I have a bunch of Windows clients with the Cisco VPN Client 5.0.01.0600 and
an 1841 running IOS 12.4(9)T4. My configuration is as
follows:

aaa new-model
!
aaa authentication login default local
aaa authentication login userauthen local aaa authentication login localauth
local aaa authorization exec default local aaa authorization network
groupauthor local !
aaa session-id common
!
resource policy
!
ip cef
!
username marc.haber privilege 15 secret 5 snip !
crypto isakmp policy 3
 encr aes 256
 authentication pre-share
 group 2
!
crypto isakmp client configuration group InternClient  key
onsh4OcyivOafmyodzet  dns 10.1.2.11 10.1.2.15  wins 10.1.2.11 10.1.2.15
domain example.com  pool ippool  acl DefaultrouteTunnel !
!
crypto ipsec transform-set InternTransformSet esp-aes 256 esp-sha-hmac !
crypto dynamic-map InternDynmap 10
 set transform-set InternTransformSet
 reverse-route
!
!
crypto map InternClientMap client authentication list userauthen crypto map
InternClientMap isakmp authorization list groupauthor crypto map
InternClientMap client configuration address respond crypto map
InternClientMap 10 ipsec-isakmp dynamic InternDynmap !
interface FastEthernet0/0
 description $ETH-LAN$$ETH-SW-LAUNCH$$INTF-INFO-FE 0$  ip address
172.26.248.10 255.255.255.248  duplex auto  speed auto  crypto map
InternClientMap !
ip access-list extended DefaultrouteTunnel  permit ip any any ip access-list
extended DefaultrouteWithoutListedNetsTunnel
 deny   ip 192.168.8.0 0.0.0.255 any
 permit ip any any
!

With this configuration, a client cannot communicate at all outside the
tunnel, which is a desired feature in this setup. OTOH, some teleworkers
would appreciate to be able to talk to their networked printers on the local
LANs.

I have received the advice of adding the local networks of all teleworkers
to an access list, which has resulted in the
DefaultrouteWithoutListedNetsTunnel ACL. But this does not seem to work,
traffic for 192.168.8.3 still goes into the tunnel after I changed the acl
reference in the crypto isakmp client configuration group InternClient.
Also, I do not see any changes in the Windows client's routing tables.

Can someone advice what I am doing wrong here? Additionally, do I really
need to exclude all local networks of all teleworkers in the global
configuration, or is it possible to control this on a per-client basis?

All web-based documentation I have found deals with the VPN Concentrator
series which do not seem to use IOS - at least I cannot make sense of the
advice found there in my configuration.

Any hints will be appreciated.

Greetings
Marc

--

-
Marc Haber | I don't trust Computers. They | Mailadresse im Header
Mannheim, Germany  |  lose things.Winona Ryder | Fon: *49 621 72739834
Nordisch by Nature |  How to make an American Quilt | Fax: *49 3221 2323190
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] DMVPN breaks when IPSEC protection is applied to tunnels

2008-08-26 Thread Aaron
How about putting on the outbound to make sure that you are sending it the
the hub?


On Tue, Aug 26, 2008 at 1:37 AM, Nic Tjirkalli 
[EMAIL PROTECTED] wrote:

 Howdy ho,


  Maybe try to put in an ACL or could use netflow for this as well...
 ip access-list extend check_packets_in
 permit esp any any
 permit udp any eq isakmp any eq isakmp
 permit ip any any
 interface dialer 1
 ip access-group check_packets_in in

 To see if ESP coming in to your spoke router.

 good suggestion but now I am even more c0onfused

 created acl as follows and applied to dialer 1 in :-
 interface Dialer1
  ip access-group check_packets_in in

 but there ar no matches at all - not even IP nhrp-spoke-2#show access-lists
 check_packets_in
 Extended IP access list check_packets_in
10 permit ahp any any
20 permit esp any any
30 permit udp any eq isakmp any eq isakmp
40 permit ip any any


 `:wq``




 -Luan



 -Original Message-
 From: [EMAIL PROTECTED]
 [mailto:[EMAIL PROTECTED] On Behalf Of Nic Tjirkalli
 Sent: Monday, August 25, 2008 3:40 AM
 To: cisco-nsp@puck.nether.net
 Subject: Re: [c-nsp] DMVPN breaks when IPSEC protection is applied to
 tunnels

 howdy ho all,

 thanx to thise who sent through suggestions to how to get the IPSEC to
 work
 - the ideas were :- try mode transport
 :- dont use wilcard for the secret

 so i changed the hub and spoke as follows :-
 crypto ipsec transform-set 3DES_MD5 esp-aes esp-md5-hmac
  mode transport

 crypto isakmp key CISCO address 41.195.37.0 255.255.255.0
 crypto isakmp key CISCO address 196.47.0.204 255.255.255.0


 alss same symptons
 - crypto comes up
 - hub reports IPSEC encaps and decaps
 - spoke sites report 0 decaps for IPSEC and no errors


 any other ideas?

 thanx



 howdy ho all,

 Was hoping I could use this forum to get some direction on resolving a
 strange issue I have with a DMVPN setup.

 All works 100% if I do not protect the tunnels with IPSEC. As soon as I
 enable IPSEC the tunnels stop passing traffic.


 The setup :-
 

 All routers are CISCO 1841 platforms. the IOS image is :-
 C1841-ADVIPSERVICESK9-M
 c1841-advipservicesk9-mz.124-21.bin


 HUB Router
 --
 HUB router connects via ADSL (a PPPOE session over ethernet) and then

 fires

 up an L2TP tunnel to obtain a static IP address.

 The IP address allocated to the L2TP interface is 196.47.0.204

 (Virtual-PPP1)

 This IP address is the NHS. All connections to/from the hub
 use the address of 196.47.0.204.

 Tunnel interface on the hub router is 10.0.0.1


 Spoke Router
 
 the Spoke router (there are 2 I am just showing one) connects via ADSL
 (a PPPOE session over ethernet) and obtains a dynamic IP address. the

 spoke

 routers use Dialer1 as their interface into the NHRP cloud.

 NHRP comes up and if I do not use IPSEC encryption on the Tunnel
 interface
 ie do not add the command tunnel protection ipsec profile DMVPN
 on Tunnel0

 Tunnel interface on the hub router is 10.0.0.3
 all works perfectly.


 The Problem
 ===

 When I enable IPSEC encryption on the tunnel interfaces on all routers
 then things break. I have tried with both 3DES and AES and same issue.

 All the crypto sessions seem correct - correct SAs come up. The

 dynamically

 created crypto-maps seem correct.

 BUT. on the spoke routers, IPSEC reports that no packets are being
 de-encapsulated but no errors are reported.

 nhrp-spoke-2#show crypto ipsec sa

 interface: Tunnel0
  local  ident (addr/mask/prot/port): (41.195.37.191/255.255.255.255/47/0
 )
  remote ident (addr/mask/prot/port): (196.47.0.204/255.255.255.255/47/0)
  current_peer 196.47.0.204 port 500
PERMIT, flags={origin_is_acl,}
   #pkts encaps: 13410, #pkts encrypt: 13410, #pkts digest: 13410
   #pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0
   #pkts compressed: 0, #pkts decompressed: 0
   #pkts not compressed: 0, #pkts compr. failed: 0
   #pkts not decompressed: 0, #pkts decompress failed: 0
   #send errors 3, #recv errors 0


 But on the HUB. all is well
  protected vrf: (none)
  local  ident (addr/mask/prot/port): (196.47.0.204/255.255.255.255/47/0)
  remote ident (addr/mask/prot/port): (41.195.37.191/255.255.255.255/47/0
 )
  current_peer 41.195.37.191 port 500
PERMIT, flags={origin_is_acl,}
   #pkts encaps: 153, #pkts encrypt: 153, #pkts digest: 153
   #pkts decaps: 80, #pkts decrypt: 80, #pkts verify: 80
   #pkts compressed: 0, #pkts decompressed: 0
   #pkts not compressed: 0, #pkts compr. failed: 0
   #pkts not decompressed: 0, #pkts decompress failed: 0
   #send errors 1, #recv errors 0


 Any ideas/thoughts would be greatly appreciated.

 The configuration's and some useful output are  below



 HUB Configuration
 =

 hostname adsl-nhrp-hub
 !
 boot-start-marker
 boot-end-marker
 !
 logging buffered 4096 debugging
 !
 no aaa new-model
 ip cef
 !
 !
 !
 !
 no ip domain lookup
 ip auth-proxy max-nodata-conns 3
 ip admission max-nodata-conns 3
 vpdn enable
 !
 

[c-nsp] Configuring VWIC-1MFT-E1 for Data

2008-08-26 Thread Felix Nkansah
HI,

I would like a reference to an online documentation that explains the
configuration of the data features of a cisco VWIC-1MFT-E1 card.

Any references would be deeply appreciated.

Regards,

Felix
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] which IOS supports sup720 + FlexWAN + PA-POS-OC3?

2008-08-26 Thread Ian Cox
PA-POS-OC3 has been supported in both FlexWANs since they FCS'd. Maybe
that particular PA has the idprom messed up. Try doing a sh diagbus with
it inserted and see what the PA idprom is telling the system.

bourke#sh diagbus
...
Slot 8: Logical_index 16
2 port adapter Enhanced FlexWAN controller
Board is analyzed ipc ready
HW rev 1.5, board revision A0
Serial Number: JABxx Part number: 73-8273-09

Slot database information:
Flags: 0x2004   Insertion time: 0x2CE0C (00:00:11 ago)

CWAN Controller Memory Size: Unknown


PA Bay 0 Information:
2CT3+ single wide PA, 2 ports
EEPROM format version 1
HW rev 1.00, Board revision A0
Serial number:   Part number: 73-3388-03


Ian

Marco d'Itri wrote:
 When I plug in the PA I get this:
 
 SLOT 5/0: 00:00:03: %PA-2-UNDEFIO: Unsupported I/O Controller (type 65535) in 
 I/O Bay. The I/O Controller network interfaces will be unavailable. 
 
 a normal fast ethernet PA works fine.
 cisco.com says that the PA is supported even by non-enhanced FlexWANs.
 
 IOS (tm) s72033_rp Software (s72033_rp-ADVENTERPRISEK9_WAN-M), Version 
 12.2(18)SXF13, RELEASE SOFTWARE (fc1)
 
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Improved queuing in 12.4(20)T?

2008-08-26 Thread Pelle
On Tue, Aug 26, 2008 at 16:28, Rodney Dunn [EMAIL PROTECTED] wrote:

 The difference I suspect is how the time intervals are handled. I worked
 on an issue once where we actually would slightly burst above the
 configured shape rate and it got worse the smaller the Tc was.
 With HQF the excess is handled different and resulted in more accurate
 shaping rates. I forgot all the nitty gritty details of how we did it.

Hmm, that's a good thing and a bad. The good thing is that HQF have
improved something that was suboptimal, the bad thing is that you need
HQF (read: it's not a bug).

The most worrying aspect is that you do use a shaper to handle excess
traffic, and when the shaper kicks in, the latencies increases a
magnitude (from 1 millisec to over 10 millisec). Not very nice to
real time traffic.

Will probably have to stick up with 12.4(20)T were we must, despite
the bleeding-edge nature.

-- 
Pelle
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] SNMP auth failure and malloc issues

2008-08-26 Thread Jay Young
I was wondering if anyone has seen a similar issue.

7609 Sup720 running 7600s72033-advipservicesk9-mz.122-33.SRB3.bin

I am seeing lots of malloc errors after seeing a long running SNMP
querier who is unable to query my router.


Aug 26 12:00:38.136 EST5EDT: %SYS-2-MALLOCFAIL: Memory allocation of
332 bytes failed from 0x42081CA8, alignment 32
Pool: I/O  Free: 123760  Cause: Memory fragmentation
Alternate Pool: None  Free: 0  Cause: No Alternate pool
 -Process= IP Input, ipl= 0, pid= 191
-Traceback= 405BBFD0 405BC514 412630F8 41269850 42081CB0 42082188
420860A8 42080ED0 40951738 40952538 40951CF8 40951F08 409520D8
40948C74 41C112C4 4226E290
Aug 26 12:00:53.072 EST5EDT: %SNMP-3-AUTHFAIL: Authentication failure
for SNMP req from host X.Y.Z.21

I notice this on another box I was running a few months ago but didn't
get any resolution just got the offending host to stop and reloaded
the router.

I didn't see anything in the bug tookkit and we have a case open.

Thanks,
Jay
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] which IOS supports sup720 + FlexWAN + PA-POS-OC3?

2008-08-26 Thread Marco d'Itri
On Aug 26, Ian Cox [EMAIL PROTECTED] wrote:

 PA-POS-OC3 has been supported in both FlexWANs since they FCS'd. Maybe
 that particular PA has the idprom messed up. Try doing a sh diagbus with
 it inserted and see what the PA idprom is telling the system.

This is the output for card back in the 7200 where it has been in use so
far:

picard.mil#show diag 3
Slot 3: 
POS Single Width, Single Mode Port adapter, 1 port
Port adapter is analyzed
Port adapter insertion time 13:18:33 ago
EEPROM contents at hardware discovery:
Hardware revision 2.0   Board revision A0
Serial number 1xx6  Part number73-3193-02
FRU Part Number:  PA-POS-OC3SMI=

Test history  0x0   RMA number 00-00-00
EEPROM format version 1
EEPROM contents (hex):
  0x20: 01 95 02 00 00 E8 71 06 49 0C 79 02 00 00 00 00
  0x30: 50 00 00 00 99 08 27 00 00 00 FF FF FF FF FF FF


 Marco d'Itri wrote:
  When I plug in the PA I get this:
  
  SLOT 5/0: 00:00:03: %PA-2-UNDEFIO: Unsupported I/O Controller (type 65535) 
  in I/O Bay. The I/O Controller network interfaces will be unavailable. 
  
  a normal fast ethernet PA works fine.
  cisco.com says that the PA is supported even by non-enhanced FlexWANs.
  
  IOS (tm) s72033_rp Software (s72033_rp-ADVENTERPRISEK9_WAN-M), Version 
  12.2(18)SXF13, RELEASE SOFTWARE (fc1)
  

-- 
ciao,
Marco
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] MPLS VPN Question about PE-CE - Private or Public IP?

2008-08-26 Thread Alastair Johnson

Tim Franklin wrote:

On Thu, August 21, 2008 12:59 am, Brandon Price wrote:

Other than just saying its bad can you give some specifics as to the
problems you've run into using private addresses for PE-CE links? As
long as the SP hands out unique addresses across all of the links, what
does it matter whether they are private or public ?


Customers using *all* of RFC1918 space (or at least claiming they do).

e.g. if you have WAN links as /30s out of 10.11.12.0/24, and the customer
has that range on a LAN somewhere, each site will be unable to reach the
particular hosts on it's WAN /30.  (At least - if you're redistributing
WAN routes into BGP / MBGP, the lack of visibility gets worse).


Most[1] large telcos I've seen[2] offering IP-VPN services tend to use 
RFC1918 addressing for CE-PE infrastructure.  Using public addressing 
for much of this just often doesn't scale - thinking of some IP-VPNs 
which have thousands of CE elements.


Most of them make this clear when doing the pre-sales design work, and 
have very clear exclusion lists for prefixes that *will not* be accepted 
into the IP-VPN under any circumstances.  The majority of customers I've 
worked with have been comfortable with this, given that it's generally a 
small number of /30s or /31s and very rarely (in fact, I can't think of 
a time) is there a conflict.  In the odd case, if the customer refuses 
to work with the telco the telco will just not accept the customer 
without doing some form of Network Special Deal which results in the 
customer paying a whole bunch more for the service to cover the 
deviation costs.[3]


My own employer, a multinational in 100+ countries, uses RFC1918 
extensively but our WAN group has managed to work around conflicts with 
the multitude of IP-VPN services that use RFC1918 on the WAN.


aj

[1] Obviously this doesn't include all of them. I have a couple of 
IP-VPNs which do make use of public /31 infrastructure but this is rare. 
I have a feeling that these /31s may be re-used across multiple IP-VPN 
services.

[2] I tend to have a slightly incumbent/tier 1 view of the world.
[3] This is usually *very* expensive for the customer.  If the customer 
wants it bad enough... they'll pay but see [2]. :)

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Configuring VWIC-1MFT-E1 for Data

2008-08-26 Thread Brett Looney
 I would like a reference to an online documentation that explains
 the configuration of the data features of a cisco VWIC-1MFT-E1 card.

Ok then: http://www.cisco.com/en/US/docs/ios/12_4t/12_4t11/intserv.html

B.

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] VPN Client to 1841, default route into tunnel with exceptions

2008-08-26 Thread Brett Looney
 With this configuration, a client cannot communicate at all
 outside the tunnel, which is a desired feature in this setup.
 OTOH, some teleworkers would appreciate to be able to talk to
 their networked printers on the local LANs.

It's been a while but from memory you need to put the include-local-lan
setting into the client configuration group to do this. HTH.

B.

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] LLQ + MLPPPoE - ?

2008-08-26 Thread Ben Steele
Remove the service policy from your ATM int's and just leave it on your
Dialer, then do a sh users and you should see an interface listed as the
MLP Bundle, this is the one you want to be watching, if for example it is
Vi4 then do a sh policy-map int vi4

Also given you are running pppoe, you should be setting your MTU correctly
(ip mtu 1492, if it's a 1500 byte path) and an ip tcp-adjust mss 1452
wouldn't do any harm either.


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of David Freedman
Sent: Tuesday, 26 August 2008 11:20 PM
To: cisco-nsp@puck.nether.net
Subject: [c-nsp] LLQ + MLPPPoE - ?

Have a scenario whereby I've an LLQ policy applied to a CE router doing
MLPPPoE with following
configuration:

!
class-map match-any REALTIME
 match ip dscp ef 
class-map match-any CRITICAL-DATA
 match ip dscp cs6 
!
!
policy-map LLQ
 class REALTIME
  priority percent 35
 class CRITICAL-DATA
  bandwidth percent 40
  random-detect dscp-based
 class class-default
  fair-queue
  random-detect dscp-based  
!
!
interface ATM0/0/0.132 point-to-point
 pvc 1/32 
  vbr-nrt 2304 2304
  tx-ring-limit 3
  encapsulation aal5snap
  service-policy output LLQ
  pppoe-client dial-pool-number 1
 !  
!
interface ATM0/1/0.132 point-to-point
 pvc 1/32 
  vbr-nrt 2304 2304
  tx-ring-limit 3
  encapsulation aal5snap
  service-policy output LLQ
  pppoe-client dial-pool-number 1
 ! 
interface Dialer0
 bandwidth 4608
 ip address negotiated
 encapsulation ppp
 dialer pool 1
 dialer idle-timeout 0
 dialer-group 1
 no cdp enable
 ppp authentication chap callin
 ppp chap hostname xx
 ppp chap password yy
 ppp ipcp route default
 ppp link reorders
 ppp multilink
 ppp multilink fragment disable
 max-reserved-bandwidth 100
 service-policy output LLQ
end   


So, the LLQ policy is only required to be applied to the VC and not the
dialer, since I'm only
queuing , but it is applied to both here.

The ATM interface did indeed move to WFQ:

#show queueing int atm0/0/0.132
  Interface ATM0/0/0.132 VC 1/32 
  Queueing strategy: weighted fair
  Output queue: 0/512/64/0 (size/max total/threshold/drops)
 Conversations  0/6/128 (active/max active/max total)
 Reserved Conversations 1/1 (allocated/max allocated)
 Available Bandwidth 1 kilobits/sec

But, the output of show policy-map int a0/0/0.132 does not show anything
being pushed into the PQ at all

#show policy-map int a0/0/0.132 | in Class-map|matched|default
Class-map: REALTIME (match-any)
(pkts matched/bytes matched) 0/0
Class-map: CRITICAL-DATA (match-any)
(pkts matched/bytes matched) 0/0
default   0/0   0/0  0/0   20  40
1/10
Class-map: class-default (match-any)
default 268/19832   0/0 
 0/0   20  40  1/10
#show policy-map int a0/1/0.132 | in Class-map|matched|default
Class-map: REALTIME (match-any)
(pkts matched/bytes matched) 0/0
Class-map: CRITICAL-DATA (match-any)
(pkts matched/bytes matched) 0/0
default   0/0   0/0  0/0   20  40
1/10
Class-map: class-default (match-any)
default 270/19980   0/0  0/0   20  40
1/10   

( I do see class matches, omitted here, but they do not appear to be queued)


What is actually observed, is that the LLQ appears to work well until more
than one member
joins the bundle, then the latency + jitter becomes variable, but I'm not
sure that it is even working at all since the queue counters do not
increment, I could just be seeing the results of the WFQ.

From the PE side, ppp multilink fragment disable and ppp link reorders
are applied via RADIUS but I do not really believe they are having an effect
since I'm still seeing re-order counters.
(vtemplate clone applies the attributes, but assume they are being ignored)


CE is 12.4(15)T7 and PE is 12.4(19)

Am assuming that I'm doing this correctly as there should be no need for a
shaper (not that it is accepted anyway) since we can create ATM backpressure
from the ATM interfaces when I reduce the TX ring size.

Any suggestions appreciated.

Regards,
 


David Freedman
Group Network Engineering 
Claranet Limited
http://www.clara.net

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] NAT/ACL options in a PIX

2008-08-26 Thread John Ramz
Version 6.3.5
PIX 515

We have been assigned 25 Public IP addresses by our ISP and I want administer 
them in the most efficient way.

We get a lot of requests for external access to different hosts in our private 
network. For example:

Public trusted IP address requesting access: P.P.P.2
Public IP address assigned by ISP: Q.Q.Q.10
Internal host IP: 10.10.10.111
port 80 or 8080 (http://10.10.10.111/site:8080

So far every time we get a request we do this:

static (inside,outside) Q.Q.Q.10 10.10.10.111 netmask 255.255.255.255 0 0
access-list ACL_NAME permit tcp host P.P.P.2 host Q.Q.Q.10 eq 8080

QUESTION
1- Is it possible to do what I believe is called PAT and reuse the same public 
ip address(Q.Q.Q.10) when I get a second request to access a DIFFERENT 
host(10.10.10.112) and redirect them to port 8081 for example? If possible, how?



Today I got a request to allow access to an internal host(10.10.10.110) that I 
have already mapped with this public IP: Q.Q.Q.9 . The source ip address is: 
P.P.P.3 . These are the statements already in the PIX:

static (inside,outside) Q.Q.Q.9 10.10.10.110 netmask 255.255.255.255 0 0
access-list ACL_NAME permit tcp host P.P.P.1 host Q.Q.Q.9 eq 8080

I need to allow P.P.P.3 to access the same internal host (Q.Q.Q.9). I tried to 
assigned a different Public ip address(Q.Q.Q.11) but I got this message:

ERROR: duplicate of existing static

QUESTION
2- Is there anyway to allow 2 IP addresses to access the same host on the same 
port-it could be different-?

I appreciate any help since I am a beginner on this subject


Thanks

John





  
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] NAT/ACL options in a PIX

2008-08-26 Thread John Ramz
--CORRECTION---

As a part of my 2nd question I made a mistake on the internal host IP. This is 
the correction:

I need to allow P.P.P.3 to access the same internal host
(10.10.10.110). I tried to assigned a different Public ip
address(Q.Q.Q.11)...


Thanks 



--- On Tue, 8/26/08, John Ramz [EMAIL PROTECTED] wrote:

 From: John Ramz [EMAIL PROTECTED]
 Subject: NAT/ACL options  in a PIX
 To: cisco-nsp@puck.nether.net
 Date: Tuesday, August 26, 2008, 9:21 PM
 Version 6.3.5
 PIX 515
 
 We have been assigned 25 Public IP addresses by our ISP and
 I want to administer them in the most efficient way.
 
 We get a lot of requests for external access to different
 hosts in our private network. For example:
 
 Public trusted IP address requesting access: P.P.P.2
 Public IP address assigned by ISP: Q.Q.Q.10
 Internal host IP: 10.10.10.111
 port 80 or 8080 (http://10.10.10.111/site:8080
 
 So far every time we get a request we do this:
 
 static (inside,outside) Q.Q.Q.10 10.10.10.111 netmask
 255.255.255.255 0 0
 access-list ACL_NAME permit tcp host P.P.P.2 host Q.Q.Q.10
 eq 8080
 
 QUESTION
 1- Is it possible to do what I believe is called PAT and
 reuse the same public ip address(Q.Q.Q.10) when I get a
 second request to access a DIFFERENT host(10.10.10.112) and
 redirect them to port 8081 for example? If possible, how?
 
 
 
 Today I got a request to allow access to an internal
 host(10.10.10.110) that I have already mapped with this
 public IP: Q.Q.Q.9 . The source ip address is: P.P.P.3 .
 These are the statements already in the PIX:
 
 static (inside,outside) Q.Q.Q.9 10.10.10.110 netmask
 255.255.255.255 0 0
 access-list ACL_NAME permit tcp host P.P.P.1 host Q.Q.Q.9
 eq 8080
 
 I need to allow P.P.P.3 to access the same internal host
 (Q.Q.Q.9). I tried to assigned a different Public ip
 address(Q.Q.Q.11) but I got this message:
 
 ERROR: duplicate of existing static
 
 QUESTION
 2- Is there anyway to allow 2 IP addresses to access the
 same host on the same port-it could be different-?
 
 I appreciate any help since I am a beginner on this subject
 
 
 Thanks
 
 John


  
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] NAT/ACL options in a PIX

2008-08-26 Thread Vinny Abello
Correct, you are doing NAT as a straight 1 to 1 translation for traffic. Using 
PAT, you can specify either TCP or UDP traffic and the outside and inside port 
numbers. This is still accomplished with the static statement. You'll still 
need the access-list entry as well unless you have another rule already 
covering it.

I'm confused though... If you need a different external host to access an 
internal server, why can't use reuse the same outside address in the 
translation? The PIX does extended translation automatically. Just add it to 
the access-list, or did I misunderstand?

If you are doing this on a different port and want to map various ports on one 
external IP to different internal hosts or ports, you can do this as well with 
the static statement:

static (inside,outside) tcp 1.2.3.4 8080 10.10.10.110 8081 netmask 
255.255.255.255 0 0

This maps traffic that matches TCP port 8080 hitting the outside address of 
1.2.3.4 to port 8081 on internal IP 10.10.10.110.

I wasn't quite clear with your alphanumeric examples, but I hope this helps. I 
believe you truly just want to keep adding more entries to your access-list. 
Once you have a translation be it NAT or PAT defined, the access control is 
done through the access-list at that point.

-Vinny

 -Original Message-
 From: [EMAIL PROTECTED] [mailto:cisco-nsp-
 [EMAIL PROTECTED] On Behalf Of John Ramz
 Sent: Tuesday, August 26, 2008 10:32 PM
 To: cisco-nsp@puck.nether.net
 Subject: [c-nsp] NAT/ACL options in a PIX

 --CORRECTION---

 As a part of my 2nd question I made a mistake on the internal host IP.
 This is the correction:

 I need to allow P.P.P.3 to access the same internal host
 (10.10.10.110). I tried to assigned a different Public ip
 address(Q.Q.Q.11)...


 Thanks



 --- On Tue, 8/26/08, John Ramz [EMAIL PROTECTED] wrote:

  From: John Ramz [EMAIL PROTECTED]
  Subject: NAT/ACL options  in a PIX
  To: cisco-nsp@puck.nether.net
  Date: Tuesday, August 26, 2008, 9:21 PM
  Version 6.3.5
  PIX 515
 
  We have been assigned 25 Public IP addresses by our ISP and
  I want to administer them in the most efficient way.
 
  We get a lot of requests for external access to different
  hosts in our private network. For example:
 
  Public trusted IP address requesting access: P.P.P.2
  Public IP address assigned by ISP: Q.Q.Q.10
  Internal host IP: 10.10.10.111
  port 80 or 8080 (http://10.10.10.111/site:8080
 
  So far every time we get a request we do this:
 
  static (inside,outside) Q.Q.Q.10 10.10.10.111 netmask
  255.255.255.255 0 0
  access-list ACL_NAME permit tcp host P.P.P.2 host Q.Q.Q.10
  eq 8080
 
  QUESTION
  1- Is it possible to do what I believe is called PAT and
  reuse the same public ip address(Q.Q.Q.10) when I get a
  second request to access a DIFFERENT host(10.10.10.112) and
  redirect them to port 8081 for example? If possible, how?
 
 
 
  Today I got a request to allow access to an internal
  host(10.10.10.110) that I have already mapped with this
  public IP: Q.Q.Q.9 . The source ip address is: P.P.P.3 .
  These are the statements already in the PIX:
 
  static (inside,outside) Q.Q.Q.9 10.10.10.110 netmask
  255.255.255.255 0 0
  access-list ACL_NAME permit tcp host P.P.P.1 host Q.Q.Q.9
  eq 8080
 
  I need to allow P.P.P.3 to access the same internal host
  (Q.Q.Q.9). I tried to assigned a different Public ip
  address(Q.Q.Q.11) but I got this message:
 
  ERROR: duplicate of existing static
 
  QUESTION
  2- Is there anyway to allow 2 IP addresses to access the
  same host on the same port-it could be different-?
 
  I appreciate any help since I am a beginner on this subject
 
 
  Thanks
 
  John



 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] DMVPN breaks when IPSEC protection is applied to tunnels

2008-08-26 Thread Nic Tjirkalli

Howdy ho,


How about putting on the outbound to make sure that you are sending it the
the hub?

good idea - add this to the hub router :-

adsl-nhrp-hub#show access-lists  check_packets_in
Extended IP access list check_packets_in
10 permit ahp any any
20 permit esp any any
30 permit udp any eq isakmp any eq isakmp
40 permit ip any any

interface Virtual-PPP1
ip access-group check_packets_in out

just to make sure all was reset and applied, I reloaded the hub router and
both spoke routers and looking at the ACL after a few minutes of all the
routers coming up :-
adsl-nhrp-hub#show access-lists  check_packets_in
Extended IP access list check_packets_in
10 permit ahp any any
20 permit esp any any
30 permit udp any eq isakmp any eq isakmp
40 permit ip any any

no matches . I doubut this can be accurate - at least there should be
IP matches as NHRP is up :-
10.0.0.2/32 via 10.0.0.2, Tunnel0 created 00:01:15, expire 00:00:44
  Type: dynamic, Flags: authoritative unique registered used
  NBMA address: 41.195.37.174
10.0.0.3/32 via 10.0.0.3, Tunnel0 created 00:05:20, expire 00:00:45
  Type: dynamic, Flags: authoritative unique registered
  NBMA address: 41.195.37.191

from routing table on hub, traffic to NHRP neihbours should be going out
of Virtual-PPP1

adsl-nhrp-hub#show ip route 
Gateway of last resort is 0.0.0.0 to network 0.0.0.0


 196.30.121.0/32 is subnetted, 1 subnets
S   196.30.121.42 is directly connected, Dialer1
 172.16.0.0/32 is subnetted, 1 subnets
C   172.16.1.1 is directly connected, Loopback0
 196.47.0.0/32 is subnetted, 1 subnets
C   196.47.0.204 is directly connected, Virtual-PPP1
 10.0.0.0/24 is subnetted, 1 subnets
C   10.0.0.0 is directly connected, Tunnel0
 41.0.0.0/32 is subnetted, 2 subnets
C   41.195.37.199 is directly connected, Dialer1
C   41.195.37.129 is directly connected, Dialer1
S*   0.0.0.0/0 is directly connected, Virtual-PPP1


thanx




On Tue, Aug 26, 2008 at 1:37 AM, Nic Tjirkalli 
[EMAIL PROTECTED] wrote:


Howdy ho,


 Maybe try to put in an ACL or could use netflow for this as well...

ip access-list extend check_packets_in
permit esp any any
permit udp any eq isakmp any eq isakmp
permit ip any any
interface dialer 1
ip access-group check_packets_in in

To see if ESP coming in to your spoke router.


good suggestion but now I am even more c0onfused

created acl as follows and applied to dialer 1 in :-
interface Dialer1
 ip access-group check_packets_in in

but there ar no matches at all - not even IP nhrp-spoke-2#show access-lists
check_packets_in
Extended IP access list check_packets_in
   10 permit ahp any any
   20 permit esp any any
   30 permit udp any eq isakmp any eq isakmp
   40 permit ip any any


`:wq``





-Luan



-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Nic Tjirkalli
Sent: Monday, August 25, 2008 3:40 AM
To: cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] DMVPN breaks when IPSEC protection is applied to
tunnels

howdy ho all,

thanx to thise who sent through suggestions to how to get the IPSEC to
work
- the ideas were :- try mode transport
:- dont use wilcard for the secret

so i changed the hub and spoke as follows :-
crypto ipsec transform-set 3DES_MD5 esp-aes esp-md5-hmac
 mode transport

crypto isakmp key CISCO address 41.195.37.0 255.255.255.0
crypto isakmp key CISCO address 196.47.0.204 255.255.255.0


alss same symptons
- crypto comes up
- hub reports IPSEC encaps and decaps
- spoke sites report 0 decaps for IPSEC and no errors


any other ideas?

thanx




howdy ho all,

Was hoping I could use this forum to get some direction on resolving a
strange issue I have with a DMVPN setup.

All works 100% if I do not protect the tunnels with IPSEC. As soon as I
enable IPSEC the tunnels stop passing traffic.


The setup :-


All routers are CISCO 1841 platforms. the IOS image is :-
C1841-ADVIPSERVICESK9-M
c1841-advipservicesk9-mz.124-21.bin


HUB Router
--
HUB router connects via ADSL (a PPPOE session over ethernet) and then


fires


up an L2TP tunnel to obtain a static IP address.

The IP address allocated to the L2TP interface is 196.47.0.204


(Virtual-PPP1)


This IP address is the NHS. All connections to/from the hub
use the address of 196.47.0.204.

Tunnel interface on the hub router is 10.0.0.1


Spoke Router

the Spoke router (there are 2 I am just showing one) connects via ADSL
(a PPPOE session over ethernet) and obtains a dynamic IP address. the


spoke


routers use Dialer1 as their interface into the NHRP cloud.

NHRP comes up and if I do not use IPSEC encryption on the Tunnel
interface
ie do not add the command tunnel protection ipsec profile DMVPN
on Tunnel0

Tunnel interface on the hub router is 10.0.0.3
all works perfectly.


The Problem
===

When I enable IPSEC encryption on the tunnel interfaces on all routers
then things break. I have tried with both 3DES