Re: [c-nsp] Monitoring tools for MPLS VPN customers

2008-10-31 Thread Ben Steele
You definitely want a Management vrf that you leak into all your customer
vrf's, from this you can use something like nagios or whatever your tool of
choice is to alert to downed nodes, just remember not to overlap your CPE IP
addressing even though they are in separate vrf's.

As far as voip monitoring goes you can use ip sla on your routers to monitor
jitter/loss/delay etc..

Check out - 

http://www.cisco.com/en/US/technologies/tk648/tk362/tk920/technologies_white
_paper0900aecd8017531d.html

and

http://www.cisco.com/en/US/technologies/tk648/tk362/tk920/technologies_white
_paper0900aecd801752ec.html

For ideas on what ip sla can do for you, there are plenty of configuration
examples around to look at too.

Ben

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Andy Saykao
Sent: Friday, 31 October 2008 4:25 PM
To: cisco-nsp@puck.nether.net
Subject: [c-nsp] Monitoring tools for MPLS VPN customers

Hi All,
 
We have some MPLS VPN customers waiting to come on board and have asked
us about what sort of monitoring we can provide for all their sites. By
monitoring I can only guess that the customer is asking us to identify
when a VPN site goes down. Other desirable features might be to
implement some SLA to monitor latency and round trip time for those
customer's who rely heavily on VoIP. Ideally, the IT person for the
organization should be doing most of this monitoring, but Management
have asked me to investigate what we sort of monitring we can provide to
the customer to help bring them on baord.
 
We are currently using Cisco's MPLS Diagnostics Expert but this doesn't
seem to have any proactive monitoring tool via it's SLA feature. We
could set up a management station within a management VRF and run some
monitoring software on it which is another option.
 
Just curious to know what software Service Providers are using to
proactively monitor their VPN customers.
 
Thanks.
 
Andy

This email and any files transmitted with it are confidential and intended
 solely for the use of the individual or entity to whom they are addressed. 
Please notify the sender immediately by email if you have received this 
email by mistake and delete this email from your system. Please note that
 any views or opinions presented in this email are solely those of the
 author and do not necessarily represent those of the organisation. 
Finally, the recipient should check this email and any attachments for 
the presence of viruses. The organisation accepts no liability for any 
damage caused by any virus transmitted by this email.

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] Giants and mtu-size

2008-10-31 Thread Arne Larsen / Region Nordjylland
Hi Folks.

Could someone give a hint at what I need to look at.
I've got several tag-switching interfaces that got giant in the counters.
We are using jumbo ( mtu 9216 ) frames on Gigabit Ethernet interfaces and the 
mtu for mpls ip is 1546. Negotiation is off on all interfaces.
I know that giants is packets that are discarded because they exceed the 
medium's maximum packet size. But how can I verify the right mtu size.

/Arne
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] EARL_L2_ASIC-SP-4-DBUS_HDR_ERR

2008-10-31 Thread Christian Bering
Hi, 

Any idea if this is a bad thing? We've seen it three times on a
7600 just just upgraded from SUP720 to RSP720.

Judging by the replies, it sounds like it's a good idea to have TAC take
a look at it and tell us if we need to RMA it.

Thanks,

-- 
Regards
 Christian Bering
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Giants and mtu-size

2008-10-31 Thread Mikael Abrahamsson

On Fri, 31 Oct 2008, Arne Larsen / Region Nordjylland wrote:

I know that giants is packets that are discarded because they exceed the 
medium's maximum packet size. But how can I verify the right mtu size.


Please share MTU-related config from both ends and we'll be able to help.

Short story:

Set MTU to whatever you want the highest MTU to be (normally what you want 
MPLS to use). Set clns mtu (if you're running ISIS) and ip mtu if other 
end needs it.


So, for instance if you're running a LAN with mixed MPLS enabled devices 
and some not, and some only supports 1500 ip mtu:


int gi1/0
mtu 1546
ip mtu 1500
clns mtu 1497
ipv6 mtu 1500

As far as I have been able to discern from the cisco docs (and after being 
pointed out to me actually on this list), the only time mpls mtu 
(tag-switching mtu) should be used is on old 7200 FE based ports.


There are platforms with cosmetics bugs where all jumbos are counted as 
giants in interface counters, you might want to check the bug database.


--
Mikael Abrahamsson email: [EMAIL PROTECTED]
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Lightstream Alternative

2008-10-31 Thread Sebastian Ganschow

 -Ursprüngliche Nachricht-
 Von: Mateusz B?aszczyk [mailto:[EMAIL PROTECTED]
 I am not sure but it seems to me that some fancy SPA card in c7600
 would do the local switching, wouldn't it?

I'm not sure. 

In the end-of-live announcement for the lightstream I've found, that cat 
4500 and cat 6500 should be able to take over for the lightstream. But I 
can't find anything at cisco, which assures that can configure 
everything on the cat 6500, which I've configured on my lightstream.

If the SPA card for the 7600 could do the switching, the cat 6500 should 
also be able to do it. But even for the 7600 I can't find any 
information on atm switching.

I just need to switch pvc from one OC3/STM-1 to another and configure 
soft-vc's.

Sebastian

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Giants and mtu-size

2008-10-31 Thread Arne Larsen / Region Nordjylland
Hi Mikael

Here are two interface config that peers.


interface GigabitEthernet1/15
 description B: Uplink to MPLS aasnxc2 gi5/1
 mtu 9216
 ip address x
 ip router isis
 load-interval 30
 tag-switching mtu 1546
 tag-switching ip


interface GigabitEthernet5/1
 description B: Uplink to MPLS aasnxt1 gi1/15
 mtu 9216
 ip address x
 ip router isis
 load-interval 30
 tag-switching mtu 1546
 tag-switching ip

/Arne

-Oprindelig meddelelse-
Fra: Mikael Abrahamsson [mailto:[EMAIL PROTECTED]
Sendt: 31. oktober 2008 08:01
Til: Arne Larsen / Region Nordjylland
Cc: cisco-nsp@puck.nether.net
Emne: Re: [c-nsp] Giants and mtu-size

On Fri, 31 Oct 2008, Arne Larsen / Region Nordjylland wrote:

 I know that giants is packets that are discarded because they exceed
 the medium's maximum packet size. But how can I verify the right mtu size.

Please share MTU-related config from both ends and we'll be able to help.

Short story:

Set MTU to whatever you want the highest MTU to be (normally what you want MPLS 
to use). Set clns mtu (if you're running ISIS) and ip mtu if other end needs it.

So, for instance if you're running a LAN with mixed MPLS enabled devices and 
some not, and some only supports 1500 ip mtu:

int gi1/0
mtu 1546
ip mtu 1500
clns mtu 1497
ipv6 mtu 1500

As far as I have been able to discern from the cisco docs (and after being 
pointed out to me actually on this list), the only time mpls mtu
(tag-switching mtu) should be used is on old 7200 FE based ports.

There are platforms with cosmetics bugs where all jumbos are counted as giants 
in interface counters, you might want to check the bug database.

--
Mikael Abrahamsson email: [EMAIL PROTECTED]
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] RS232 to TCP/IP

2008-10-31 Thread Venu Gopal

Hi,

We have been using MOXA NPort servers to communicate to serial devices
over TCP/IP. For more information refer to the specifications and 
applications

at MOXA site. I remember the document has plenty of examples.

Cheers,
Venu
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] 10G 6704 and 6708

2008-10-31 Thread Phil Mayers

vince anton wrote:

Hi,

im looking at 10G cards for 7600 with SUP720-3BXL (running SXF) and wanted
an opinion from the list


Both seem to work fine in our 6500s using SXF10 (caveat - we're using 
-3B/3C, not XL)


The QoS queueing model is different between 6704 and 6708. This had the 
practical outcome in our case of preventing a port channel with on port 
on a 6704 and one on a 6708.


6708s do not support VACL capture, which we are using (so a 6704 had to 
stay in the box to run the ports we want to capture).


6708 are unsupported in 6503 or 7603 chassis.
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Restricting VLANs on 802.1q Tunnel Port

2008-10-31 Thread Pelle
On Thu, Oct 30, 2008 at 10:47, FAHAD ALI KHAN [EMAIL PROTECTED] wrote:

 Consider a scenario, if im using 802.1q tunnel service to carry customer
 VLANs and want to allow only 10, 11  12 VLANs from CE (by restricting it on
 UPE port). Is this possible on ME3400 with Merto Access IOS?

 Is there any workarround available?

Not on the classic ME3400. You need hardware that can do Selective
Q-in-Q (the EVC-framework), like ME3400E or 7600 with ES20 (could be
others as well).

-- 
Pelle
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] hierarchical MPLS VPN

2008-10-31 Thread Ibrahim Abo Zaid
Hi All


i have a small question about the set up of hierarchical MPLS VPN
(carrier-of-carriers VPN) , the customer carrier will establish MP-iBGP
sessions between its PEs directly to exchange VPNv4 routes and all LDP or
BGP between customer carrier CE and backbone provider PE to exchange IPv4
routes and labels

my question is , i believe there will be some command needed at backbone
provide PE to enable carrier-of-carriers support and allow PE to tag
incoming labeled packets with double-label based on 2 lookups , lookup for
incoming label and lookup for NH network


in Juniper , this feature is supported by *mpls topology-driven-lsp *command
, what about Cisco IOS ?
**
**

best regards
--Ibrahim Abo Zaid
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] IOS and Calea Feature Set

2008-10-31 Thread Adam Greene
Not sure about the Cisco approach to this, but I am doing almost the same 
thing, with the exception that we SPAN from the point of customer entry into 
our network, which in this case is a switch, so all traffic can be captured.


We are using the OpenCALEA standard: http://www.opencalea.org/

Good luck elucidating the Cisco options ... interested to know what people 
have to say about it 


Thanks,
Adam

- Original Message - 
From: Frank Bulk [EMAIL PROTECTED]

To: 'Forrest W Christian' [EMAIL PROTECTED]; cisco-nsp@puck.nether.net
Sent: Thursday, October 30, 2008 11:30 PM
Subject: Re: [c-nsp] IOS and Calea Feature Set



You may want to check out this project:
http://www.openintercept.org/

I have a contact involved with this, if you need it.

Regards,

Frank

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Forrest W 
Christian

Sent: Thursday, October 30, 2008 1:11 PM
To: cisco-nsp@puck.nether.net
Subject: [c-nsp] IOS and Calea Feature Set

I'm working on improving my CALEA compliance here.   One of the big
things I need to handle is better extraction of frames out of several
cisco routers we have scattered around our network.

Today, we handle our CALEA requests by using a span/mirroring port on a
switch plugged into a CALEA collection device which conforms to the
WISPA CALEA standard.   That way, we can capture all of the internet and
most of the on-network traffic, but not quite 100% since traffic which
never leaves the border router doesn't ever exit the border router so it
can't be captured for Law Enforcement.

It looks like the IP Traffic Export would allow me to basically use the
tools we already have in place for this.   But, I also am looking at the
CALEA features in the later IOS'es.   Unfortunately, the documentation
is written in CALEA-speak, which makes for confusing reading, especially
when you are trying to figure out what pieces you need to make this work.

I'm curious if someone on-list  has gotten the CALEA features to work in
a Broadband provider setting, and if so, if they could perhaps point me
in the right direction as far as what pieces we need (aka specific
products instead of functions) other than the Cisco router w/CALEA
features?

-forrest
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/





___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] IOS and Calea Feature Set

2008-10-31 Thread Rodney Dunn
Forrest,

I'm not an expert in this area but...

my understanding is Lawful Intercept (search Cisco.com for lawful intercept)
is supposed to be the target solution for what you describe.

Rodney

On Thu, Oct 30, 2008 at 12:10:40PM -0600, Forrest W Christian wrote:
 I'm working on improving my CALEA compliance here.   One of the big 
 things I need to handle is better extraction of frames out of several 
 cisco routers we have scattered around our network. 
 
 Today, we handle our CALEA requests by using a span/mirroring port on a 
 switch plugged into a CALEA collection device which conforms to the 
 WISPA CALEA standard.   That way, we can capture all of the internet and 
 most of the on-network traffic, but not quite 100% since traffic which 
 never leaves the border router doesn't ever exit the border router so it 
 can't be captured for Law Enforcement.
 
 It looks like the IP Traffic Export would allow me to basically use the 
 tools we already have in place for this.   But, I also am looking at the 
 CALEA features in the later IOS'es.   Unfortunately, the documentation 
 is written in CALEA-speak, which makes for confusing reading, especially 
 when you are trying to figure out what pieces you need to make this work.
 
 I'm curious if someone on-list  has gotten the CALEA features to work in 
 a Broadband provider setting, and if so, if they could perhaps point me 
 in the right direction as far as what pieces we need (aka specific 
 products instead of functions) other than the Cisco router w/CALEA 
 features?
 
 -forrest
 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] hierarchical MPLS VPN

2008-10-31 Thread Oliver Boehmer (oboehmer)
Ibrahim Abo Zaid  wrote:
 Hi All
 
 
 i have a small question about the set up of hierarchical MPLS VPN
 (carrier-of-carriers VPN) , the customer carrier will establish
 MP-iBGP sessions between its PEs directly to exchange VPNv4 routes
 and all LDP or BGP between customer carrier CE and backbone provider
 PE to exchange IPv4 routes and labels
 
 my question is , i believe there will be some command needed at
 backbone provide PE to enable carrier-of-carriers support and allow
 PE to tag incoming labeled packets with double-label based on 2
 lookups , lookup for incoming label and lookup for NH network

well, there is no specific enable CsC command, it's only the
presence of LDP or eBGP+label on the PE-CE VRF interface which tells the
PE to populate the LFIB and to label-switch packets..

oli
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] Multiple RTR trackers

2008-10-31 Thread Paul Stewart
Hi there..

I'm trying to get multiple RTR trackers running on a 7206VXR-NPE2G:

track 1 rtr 1 reachability
!
track 2 rtr 2 reachability

ip sla 1
 icmp-echo xxx.xxx.xxx.116
 timeout 3000
ip sla schedule 1 life forever start-time now
ip sla 2
 icmp-echo xxx.xxx.xxx.198
 timeout 3000
ip sla schedule 2 life forever start-time now

The first one works great:

Oct 22 07:04:30: %TRACKING-5-STATE: 1 rtr 1 reachability Down-Up
Oct 26 19:29:33: %TRACKING-5-STATE: 1 rtr 1 reachability Up-Down
Oct 26 19:30:34: %TRACKING-5-STATE: 1 rtr 1 reachability Down-Up
Oct 28 16:54:38: %TRACKING-5-STATE: 1 rtr 1 reachability Up-Down
Oct 28 16:55:34: %TRACKING-5-STATE: 1 rtr 1 reachability Down-Up

The second one doesn't work at all can't figure out if I'm missing
something obvious ;)


What I'm using this for is to setup static routes based on reachability ...
long story as to why..

ip route xxx.xxx.xxx.0 255.255.255.240 xxx.xxx.xxx.116 track 1

Any clues? 

Thanks,

Paul



___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] CSC unable to ping PE address

2008-10-31 Thread kevin gannon
I have a basic CSC topology and am having inconsistent problems on
both 12.2(25)S9 and
also on S15

Below is a snip of the configs from both boxes. The issue is on the CE
if I try to ping
the PE 150.1.12.2 it does not work. You can see the CE is tagging a label of
20 on the packet but it is not been seen in the CE forwarding table. Also on the
PE has no label twenty installed

If I clear the ldp neighbor while the neighbor is down I can ping from
CE to neighbor
so it is not a basic L2 issue.

Any ideas ?

=CE=
interface Serial2/2
 ip address 150.1.12.1 255.255.255.0
 mpls ip
 serial restart-delay 0
 no clns route-cache
end

Rack1R1#
1d21h: ldp: Scan listening TCBs
Rack1R1#show ip route 150.1.12.2
Routing entry for 150.1.12.0/24
  Known via connected, distance 0, metric 0 (connected, via interface)
  Routing Descriptor Blocks:
  * directly connected, via Serial2/2
  Route metric is 0, traffic share count is 1

Rack1R1#show ip cef 150.1.12.2
150.1.12.0/24
  attached to Serial2/2 label 20
Rack1R1#
Rack1R1#show mpls for
Local  Outgoing  PrefixBytes Label   Outgoing   Next Hop
Label  Label or VC   or Tunnel Id  Switched  interface
16 Pop Label 150.1.3.3/32  208868Se2/1  point2point
18 23150.1.56.0/24 0 Se2/2  point2point
19 24150.1.45.0/24 0 Se2/2  point2point
20 25150.1.6.6/32  67Se2/2  point2point
21 26150.1.5.5/32  0 Se2/2  point2point
22 22150.1.222.222/32  0 Se2/2  point2point
Rack1R1#


=CSC PE

Current configuration : 141 bytes
!
interface Serial2/2
 ip vrf forwarding csc
 ip address 150.1.12.2 255.255.255.0
 mpls ip
 serial restart-delay 0
 no clns route-cache
end

Rack1R2#show mpls for vrf csc
Local  Outgoing  PrefixBytes Label   Outgoing   Next Hop
Label  Label or VC   or Tunnel Id  Switched  interface
18 No Label  150.1.1.1/32[V]   0 Se2/2  point2point
19 No Label  150.1.3.3/32[V]   331   Se2/2  point2point
20 Pop Label 150.1.12.0/24[V]  687164Se2/2  point2point
21 No Label  150.1.13.0/24[V]  0 Se2/2  point2point
22 Aggregate 150.1.222.222/32[V]   \
   0 csc
23 25150.1.56.0/24[V]  0 Fa0/0  150.1.24.4
24 24150.1.45.0/24[V]  0 Fa0/0  150.1.24.4
25 23150.1.6.6/32[V]   235922Fa0/0  150.1.24.4
26 22150.1.5.5/32[V]   0 Fa0/0  150.1.24.4
Rack1R2#
Rack1R2#sho ip cef vrf csc 150.1.12.1
150.1.12.0/24
  attached to Serial2/2
Rack1R2#sho ip cef vrf csc 150.1.12.2
150.1.12.2/32
  receive
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] 10G 6704 and 6708

2008-10-31 Thread Tim Stevenson

You can disable that check with no mls qos channel-consistency.

Tim

At 02:48 AM 10/31/2008, Phil Mayers observed:
The QoS queueing model is different between 6704 and 6708. This had 
the practical outcome in our case of preventing a port channel with 
on port on a 6704 and one on a 6708.




Tim Stevenson, [EMAIL PROTECTED]
Routing  Switching CCIE #5561
Technical Marketing Engineer, Data Center BU
Cisco Systems, http://www.cisco.com
IP Phone: 408-526-6759

The contents of this message may be *Cisco Confidential*
and are intended for the specified recipients only.

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] Order-of-operations question about adjust-mss and crypto...

2008-10-31 Thread Derick Winkworth
If you apply the ip tcp adjust-mss command on an interface that has a crypto 
statement on it...

Does it perform the MSS adjustment on outbound packets before they are 
encrypted?  
Does it perform the MSS adjustment on inbound packets after they are decrypted?

I know that this is typically placed on a tunnel interface or, for instance, on 
an ethernet interface of a remote VPN site or something... but I have a case 
where we have many GET encryped sub-interfaces (each in their own VRF) which 
are the only logical IP interfaces on the box.  The backside is MPLS so there 
is no place to put the statement there...  so I was just going to apply it to 
the interfaces where the crypto maps are.. not sure if this will work.

I'll probably have to lab it up I'm guessing.

Derick
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] CSC unable to ping PE address

2008-10-31 Thread Oliver Boehmer (oboehmer)
kevin gannon  wrote:
 I have a basic CSC topology and am having inconsistent problems on
 both 12.2(25)S9 and also on S15
 
 Below is a snip of the configs from both boxes. The issue is on the CE
 if I try to ping the PE 150.1.12.2 it does not work. You can see the
CE is tagging a
 label of 20 on the packet but it is not been seen in the CE
 forwarding table. Also on the PE has no label twenty installed

[...]
 Rack1R2#show mpls for vrf csc
 Local  Outgoing  PrefixBytes Label   Outgoing   Next
Hop 
 Label  Label or VC   or Tunnel Id  Switched  interface
? 20 Pop Label 150.1.12.0/24[V]  687164Se2/2  

The PE has label 20 installed, however it didn't store this as an
aggregate label (to trigger another lookup), which is wrong. This looks
like a bug, but can't dig into this further right now (sorry, need to
run).. you might want to contact TAC.

oli
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] ME Switch Managment over Trunk Interfaces?

2008-10-31 Thread cp
I'm new to Cisco ME switches, so please bare with my basic question. I
am having a difficult time trying to manage the device over trunk
interface. It doesn't work.  My management IP lives on a vlan interface.
Below is my configuration.  I tried vlan1 without luck too. Do I really
have to burn a port for management? I'm probably missing something
simple. Any assistance is appreciated. 

 

Thanks,

Chip

 

 

 

vlan 100-106

 

interface GigabitEthernet0/1

port-type nni

 switchport trunk native vlan 106

 switchport trunk allowed vlan 100-106

 switchport mode trunk

 

interface Vlan106

 ip address 10.24.100.2 255.255.255.252

 

 

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] 10G 6704 and 6708

2008-10-31 Thread Phil Mayers

Tim Stevenson wrote:

You can disable that check with no mls qos channel-consistency.


That's very useful to know.

Does it have any adverse effect or unwelcome implications?
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] 10G 6704 and 6708

2008-10-31 Thread Tim Stevenson
Clearly each port in the channel may treat the same traffic 
differently, depending on how you configure the queuing for those 
port types. If you are not using qos, then there should be no 
functional difference.


Tim

At 10:48 AM 10/31/2008, Phil Mayers observed:

Tim Stevenson wrote:

You can disable that check with no mls qos channel-consistency.


That's very useful to know.

Does it have any adverse effect or unwelcome implications?




Tim Stevenson, [EMAIL PROTECTED]
Routing  Switching CCIE #5561
Technical Marketing Engineer, Cisco Nexus 7000
Cisco Systems, http://www.cisco.com
IP Phone: 408-526-6759

The contents of this message may be *Cisco Confidential*
and are intended for the specified recipients only.

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Order-of-operations question about adjust-mss and crypto...

2008-10-31 Thread Luan Nguyen
The MSS tells the maximum data a host will accept in an TCP/IP datagram.
Each side reports the value to the other side and the sending will abide by
it.  It's all before encryption.
So typically like you said, people put ip tcp adjust-mss 1360 on the group
member LAN interface and also set ip mtu 1400 on the WAN side hoping for
PMTUD to work its magic.
Putting both on the WAN interface should work as well, though, I don't quite
understand the backside is MPLS statement :)...the packet has to be
originated from somewhere.
There's a very good paper here on Fragmentation
http://www.cisco.com/en/US/tech/tk827/tk369/technologies_white_paper09186a00
800d6979.shtml#t3


Luan Nguyen
Chesapeake NetCraftsmen, LLC.
www.NetCraftsmen.net

(blog) http://ccie-security.blogspot.com/
(e) [EMAIL PROTECTED]
(aim/yahoo): luancnc



-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Derick Winkworth
Sent: Friday, October 31, 2008 11:52 AM
To: Rodney Dunn
Cc: cisco-nsp@puck.nether.net
Subject: [c-nsp] Order-of-operations question about adjust-mss and
crypto...

If you apply the ip tcp adjust-mss command on an interface that has a
crypto statement on it...

Does it perform the MSS adjustment on outbound packets before they are
encrypted?  
Does it perform the MSS adjustment on inbound packets after they are
decrypted?

I know that this is typically placed on a tunnel interface or, for instance,
on an ethernet interface of a remote VPN site or something... but I have a
case where we have many GET encryped sub-interfaces (each in their own VRF)
which are the only logical IP interfaces on the box.  The backside is MPLS
so there is no place to put the statement there...  so I was just going to
apply it to the interfaces where the crypto maps are.. not sure if this will
work.

I'll probably have to lab it up I'm guessing.

Derick
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ME Switch Managment over Trunk Interfaces?

2008-10-31 Thread Marko Milivojevic
On Fri, Oct 31, 2008 at 17:06, cp [EMAIL PROTECTED] wrote:
 I'm new to Cisco ME switches, so please bare with my basic question. I
 am having a difficult time trying to manage the device over trunk
 interface. It doesn't work.  My management IP lives on a vlan interface.
 Below is my configuration.  I tried vlan1 without luck too. Do I really
 have to burn a port for management? I'm probably missing something
 simple. Any assistance is appreciated.

Could you be a little bit more specific as to what exactly does not work?

Some questions:

* Did you create VLAN 106?
* Did you enable Vlan interface (no shut)?
* Do you have a route back to your management station?
* Is the device on the other end configured to accept tagged frames?

--
Marko
CCIE #18427 (SP)
My network blog: http://cisco.markom.info/
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] VRF question

2008-10-31 Thread Eric Van Tol
Hi all,
Not sure if this is possible, but in an ME3400, can you create a route in the 
global configuration with a next hop in a VRF?

Thanks,
evt
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] IOS and Calea Feature Set

2008-10-31 Thread Daniel Chapman


The Lawful Intercept feature uses SNMP V3 and MIBs like ciscoIpTapMIB and 
ciscoTap2MIB.  You setup a group and a view including these mibs and intiate 
the intercept from your mediation/sniffer device.  It can be tricky if you 
are doing PPP, because you specify the IP to tap.  Your configuration could 
include setting up a AAA group and allowing the mediation device to receive 
accounting records to determine end-user IP addresses.  The median device 
needs to be able to act as a RADIUS server so it isn't marked Dead by the 
AAA processes in the router.


Dan




- Original Message - 
From: Forrest W Christian [EMAIL PROTECTED]

To: cisco-nsp@puck.nether.net
Sent: Thursday, October 30, 2008 2:10 PM
Subject: [c-nsp] IOS and Calea Feature Set


I'm working on improving my CALEA compliance here.   One of the big things 
I need to handle is better extraction of frames out of several cisco 
routers we have scattered around our network.
Today, we handle our CALEA requests by using a span/mirroring port on a 
switch plugged into a CALEA collection device which conforms to the WISPA 
CALEA standard.   That way, we can capture all of the internet and most of 
the on-network traffic, but not quite 100% since traffic which never 
leaves the border router doesn't ever exit the border router so it can't 
be captured for Law Enforcement.


It looks like the IP Traffic Export would allow me to basically use the 
tools we already have in place for this.   But, I also am looking at the 
CALEA features in the later IOS'es.   Unfortunately, the documentation is 
written in CALEA-speak, which makes for confusing reading, especially when 
you are trying to figure out what pieces you need to make this work.


I'm curious if someone on-list  has gotten the CALEA features to work in a 
Broadband provider setting, and if so, if they could perhaps point me in 
the right direction as far as what pieces we need (aka specific products 
instead of functions) other than the Cisco router w/CALEA features?


-forrest
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/ 


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Multiple RTR trackers

2008-10-31 Thread Arie Vayner (avayner)
Paul,

Did you try attaching the track 2 policy to a static route?

Arie 

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Paul Stewart
Sent: Friday, October 31, 2008 17:38 PM
To: cisco-nsp@puck.nether.net
Subject: [c-nsp] Multiple RTR trackers

Hi there..

I'm trying to get multiple RTR trackers running on a 7206VXR-NPE2G:

track 1 rtr 1 reachability
!
track 2 rtr 2 reachability

ip sla 1
 icmp-echo xxx.xxx.xxx.116
 timeout 3000
ip sla schedule 1 life forever start-time now ip sla 2  icmp-echo
xxx.xxx.xxx.198  timeout 3000 ip sla schedule 2 life forever start-time
now

The first one works great:

Oct 22 07:04:30: %TRACKING-5-STATE: 1 rtr 1 reachability Down-Up Oct 26
19:29:33: %TRACKING-5-STATE: 1 rtr 1 reachability Up-Down Oct 26
19:30:34: %TRACKING-5-STATE: 1 rtr 1 reachability Down-Up Oct 28
16:54:38: %TRACKING-5-STATE: 1 rtr 1 reachability Up-Down Oct 28
16:55:34: %TRACKING-5-STATE: 1 rtr 1 reachability Down-Up

The second one doesn't work at all can't figure out if I'm missing
something obvious ;)


What I'm using this for is to setup static routes based on reachability
...
long story as to why..

ip route xxx.xxx.xxx.0 255.255.255.240 xxx.xxx.xxx.116 track 1

Any clues? 

Thanks,

Paul



___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ME Switch Managment over Trunk Interfaces?

2008-10-31 Thread cp
Thanks for replying.  I'm trying to pass any(icmp at the moment) traffic
from a vlan interface through the trunk port via /30.  It's a /30 so no
return route needed.  Yes, I created vlan 106. Yes I shut / no shut
vlan106 interface. Yes, the device on the other side accepts tagged
frames. 

Other traffic such as non vlan interface traffic passes fine. There
isn't an arp or mac-address table entry for the remote IP of the /30,
which leaves me to believe traffic is being block by ME's overall
uni/eni/nni port-type design. Anyone  else have a similar experience?
When I switch the port from trunk to access mode and only test the vlan
106 it works fine.

-Chip

.
 


-Original Message-
From: Marko Milivojevic [mailto:[EMAIL PROTECTED] 
Sent: Friday, October 31, 2008 2:40 PM
To: cp
Cc: cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] ME Switch Managment over Trunk Interfaces?

On Fri, Oct 31, 2008 at 17:06, cp [EMAIL PROTECTED] wrote:
 I'm new to Cisco ME switches, so please bare with my basic question. I
 am having a difficult time trying to manage the device over trunk
 interface. It doesn't work.  My management IP lives on a vlan
interface.
 Below is my configuration.  I tried vlan1 without luck too. Do I
really
 have to burn a port for management? I'm probably missing something
 simple. Any assistance is appreciated.

Could you be a little bit more specific as to what exactly does not
work?

Some questions:

* Did you create VLAN 106?
* Did you enable Vlan interface (no shut)?
* Do you have a route back to your management station?
* Is the device on the other end configured to accept tagged frames?

--
Marko
CCIE #18427 (SP)
My network blog: http://cisco.markom.info/
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ME Switch Managment over Trunk Interfaces?

2008-10-31 Thread Marko Milivojevic
On the other device, do you have a native vlan configured? What device is it?

On Fri, Oct 31, 2008 at 19:16, cp [EMAIL PROTECTED] wrote:
 Thanks for replying.  I'm trying to pass any(icmp at the moment) traffic
 from a vlan interface through the trunk port via /30.  It's a /30 so no
 return route needed.  Yes, I created vlan 106. Yes I shut / no shut
 vlan106 interface. Yes, the device on the other side accepts tagged
 frames.

 Other traffic such as non vlan interface traffic passes fine. There
 isn't an arp or mac-address table entry for the remote IP of the /30,
 which leaves me to believe traffic is being block by ME's overall
 uni/eni/nni port-type design. Anyone  else have a similar experience?
 When I switch the port from trunk to access mode and only test the vlan
 106 it works fine.

 -Chip

 .



 -Original Message-
 From: Marko Milivojevic [mailto:[EMAIL PROTECTED]
 Sent: Friday, October 31, 2008 2:40 PM
 To: cp
 Cc: cisco-nsp@puck.nether.net
 Subject: Re: [c-nsp] ME Switch Managment over Trunk Interfaces?

 On Fri, Oct 31, 2008 at 17:06, cp [EMAIL PROTECTED] wrote:
 I'm new to Cisco ME switches, so please bare with my basic question. I
 am having a difficult time trying to manage the device over trunk
 interface. It doesn't work.  My management IP lives on a vlan
 interface.
 Below is my configuration.  I tried vlan1 without luck too. Do I
 really
 have to burn a port for management? I'm probably missing something
 simple. Any assistance is appreciated.

 Could you be a little bit more specific as to what exactly does not
 work?

 Some questions:

 * Did you create VLAN 106?
 * Did you enable Vlan interface (no shut)?
 * Do you have a route back to your management station?
 * Is the device on the other end configured to accept tagged frames?

 --
 Marko
 CCIE #18427 (SP)
 My network blog: http://cisco.markom.info/
 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Multiple RTR trackers

2008-10-31 Thread Paul Stewart
Thanks very much

Well.. umm.. yes, I did it on the static route and it didn't work - but
(feeling kinda silly) I did realize that  track 2 rtr 2 reachability was
missing from the actual config :0   Funny how it works just fine now

Ooops... thanks for the reply...  going to crawl under a rock now...;)

Paul


-Original Message-
From: Arie Vayner (avayner) [mailto:[EMAIL PROTECTED] 
Sent: Friday, October 31, 2008 3:16 PM
To: Paul Stewart; cisco-nsp@puck.nether.net
Subject: RE: [c-nsp] Multiple RTR trackers

Paul,

Did you try attaching the track 2 policy to a static route?

Arie 

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Paul Stewart
Sent: Friday, October 31, 2008 17:38 PM
To: cisco-nsp@puck.nether.net
Subject: [c-nsp] Multiple RTR trackers

Hi there..

I'm trying to get multiple RTR trackers running on a 7206VXR-NPE2G:

track 1 rtr 1 reachability
!
track 2 rtr 2 reachability

ip sla 1
 icmp-echo xxx.xxx.xxx.116
 timeout 3000
ip sla schedule 1 life forever start-time now ip sla 2  icmp-echo
xxx.xxx.xxx.198  timeout 3000 ip sla schedule 2 life forever start-time
now

The first one works great:

Oct 22 07:04:30: %TRACKING-5-STATE: 1 rtr 1 reachability Down-Up Oct 26
19:29:33: %TRACKING-5-STATE: 1 rtr 1 reachability Up-Down Oct 26
19:30:34: %TRACKING-5-STATE: 1 rtr 1 reachability Down-Up Oct 28
16:54:38: %TRACKING-5-STATE: 1 rtr 1 reachability Up-Down Oct 28
16:55:34: %TRACKING-5-STATE: 1 rtr 1 reachability Down-Up

The second one doesn't work at all can't figure out if I'm missing
something obvious ;)


What I'm using this for is to setup static routes based on reachability
...
long story as to why..

ip route xxx.xxx.xxx.0 255.255.255.240 xxx.xxx.xxx.116 track 1

Any clues? 

Thanks,

Paul



___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ME Switch Managment over Trunk Interfaces?

2008-10-31 Thread cp
It's a juniper router.



-Original Message-
From: Marko Milivojevic [mailto:[EMAIL PROTECTED] 
Sent: Friday, October 31, 2008 3:32 PM
To: cp
Cc: cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] ME Switch Managment over Trunk Interfaces?

On the other device, do you have a native vlan configured? What device
is it?

On Fri, Oct 31, 2008 at 19:16, cp [EMAIL PROTECTED] wrote:
 Thanks for replying.  I'm trying to pass any(icmp at the moment)
traffic
 from a vlan interface through the trunk port via /30.  It's a /30 so
no
 return route needed.  Yes, I created vlan 106. Yes I shut / no shut
 vlan106 interface. Yes, the device on the other side accepts tagged
 frames.

 Other traffic such as non vlan interface traffic passes fine. There
 isn't an arp or mac-address table entry for the remote IP of the /30,
 which leaves me to believe traffic is being block by ME's overall
 uni/eni/nni port-type design. Anyone  else have a similar experience?
 When I switch the port from trunk to access mode and only test the
vlan
 106 it works fine.

 -Chip

 .



 -Original Message-
 From: Marko Milivojevic [mailto:[EMAIL PROTECTED]
 Sent: Friday, October 31, 2008 2:40 PM
 To: cp
 Cc: cisco-nsp@puck.nether.net
 Subject: Re: [c-nsp] ME Switch Managment over Trunk Interfaces?

 On Fri, Oct 31, 2008 at 17:06, cp [EMAIL PROTECTED] wrote:
 I'm new to Cisco ME switches, so please bare with my basic question.
I
 am having a difficult time trying to manage the device over trunk
 interface. It doesn't work.  My management IP lives on a vlan
 interface.
 Below is my configuration.  I tried vlan1 without luck too. Do I
 really
 have to burn a port for management? I'm probably missing something
 simple. Any assistance is appreciated.

 Could you be a little bit more specific as to what exactly does not
 work?

 Some questions:

 * Did you create VLAN 106?
 * Did you enable Vlan interface (no shut)?
 * Do you have a route back to your management station?
 * Is the device on the other end configured to accept tagged frames?

 --
 Marko
 CCIE #18427 (SP)
 My network blog: http://cisco.markom.info/
 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Lightstream Alternative

2008-10-31 Thread Mateusz Błaszczyk
2008/10/31 Sebastian Ganschow [EMAIL PROTECTED]:

 -Ursprüngliche Nachricht-
 Von: Mateusz B?aszczyk [mailto:[EMAIL PROTECTED]
 I am not sure but it seems to me that some fancy SPA card in c7600
 would do the local switching, wouldn't it?

 I'm not sure.

what i meant by this was mpls xconnect between atm ports...
but I can't find anything about it on cisco...



-- 
-mat
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] [cisco-nsp] Whats up with this?

2008-10-31 Thread Simon Hamilton-Wilkes
Seems weird to me that they're counting down to veterans / remembrance
day, I would hope the marketing dept considered that, but maybe not...
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] [cisco-nsp] Whats up with this?

2008-10-31 Thread Scott Granados
I'm sure the only thing that Cisco Marketing considered as far as veterans 
day was concerned is whether they have it off or not and that's probably 
even a stretch.;)




- Original Message - 
From: Simon Hamilton-Wilkes [EMAIL PROTECTED]

To: cisco-nsp@puck.nether.net
Sent: Friday, October 31, 2008 3:54 PM
Subject: Re: [c-nsp] [cisco-nsp] Whats up with this?



Seems weird to me that they're counting down to veterans / remembrance
day, I would hope the marketing dept considered that, but maybe not...
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/ 


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Whats up with this?

2008-10-31 Thread Church, Charles
Looks like they've built a transporter.  Most likely using the IETF
protocol MoIP.  Matter over IP.

Chuck

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Mike Louis
Sent: Friday, October 31, 2008 6:04 PM
To: cisco-nsp@puck.nether.net
Subject: [c-nsp] Whats up with this?


 
http://www.cisco.com/cdc_content_elements/flash/netsol/sp/getready/index
.html?POSITION=bannerCOUNTRY_SITE=usCAMPAIGN=GetReadyCREATIVE=Corner+
Banner+Ad+go/getreadyREFERRING_SITE=CISCO%2ECOM+INDEX



Note: This message and any attachments is intended solely for the use of
the individual or entity to which it is addressed and may contain
information that is non-public, proprietary, legally privileged,
confidential, and/or exempt from disclosure. If you are not the intended
recipient, you are hereby notified that any use, dissemination,
distribution, or copying of this communication is strictly prohibited.
If you have received this communication in error, please notify the
original sender immediately by telephone or return email and destroy or
delete this message along with any attachments immediately.
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] OSPF fast hellos

2008-10-31 Thread Curtis Doty
And beware the showstopper in 12.2S and 12.4T where BFD causes an NMI 
reset. Doh!


It haunted me for many moons before my stubborness prevailed. And a sharp 
Escalations Engineer at Cisco sleuthed it out and eventually generated bug 
ID CSCek75694 with a fix that is supposed to wind back into the mainline 
trains by EOY.


../C

Yesterday Frank Bulk said:


If you can get BFD support worked into the 3750ME, we wouldn't have to mess
with OSPF fast hellos. =)

Frank

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Rodney Dunn
Sent: Thursday, October 30, 2008 12:30 PM
To: Ben Steele
Cc: cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] OSPF fast hellos

On Thu, Oct 30, 2008 at 08:06:36AM +1030, Ben Steele wrote:

Because I couldn't see bfd support for 3750's, best it can do is UDLD,
otherwise that would be my preferred method.

Are you advising against fast hello's?


No totally.

Have you seen many issues with people

using them?


Yes. They have to be scheduled on the CPU as a process and that is more
variable because IOS is run to completion, except for psuedo preemption
added for BFD.

Even that isn't 100% bullet proof but it's better than OSPF fast hellos
from that perspective.





-Original Message-
From: Rodney Dunn [mailto:[EMAIL PROTECTED]
Sent: Wednesday, 29 October 2008 11:41 PM
To: Ben Steele
Cc: cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] OSPF fast hellos

Why don't you use BFD instead. It's designed with something called
pseudo preemption from an OS scheduler perspective that helps
reduce false positives and the fact that BFD frames are handled
under interrupt and not process scheduled for rx/tx.

Rodney

On Wed, Oct 29, 2008 at 04:09:45PM +1030, Ben Steele wrote:

Anyone currently using this in a fairly demanding environment? Ie

5-10Gbs+

Campus/DC model.



Curious as to whether you've had any/many false dead peers with such a

short

interval, subsecond dead peer detection does sound very temping though.



Cheers



Ben





___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


No virus found in this incoming message.
Checked by AVG - http://www.avg.com
Version: 8.0.175 / Virus Database: 270.8.4/1752 - Release Date: 28/10/2008
10:04 AM

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/



___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/