Re: [c-nsp] Netconf (over SSHv2) in SXI

2009-02-03 Thread Phil Mayers

On Tue, Feb 03, 2009 at 07:11:13AM +, Jeffrey Ollie wrote:

This piqued my interest, so I whipped up a quick program to do some
testing.  I've attached the resulting program, which when run against
my 6500 running 12.2(33)SXI produces a copy of the running config.

Some things I observed:


Yep, those match my observations.


The script is in Python, and you'll need the Paramiko (SSHv2) and lxml


I used Twisted  a Nevow web UI, but seems python is popular ;o)


?xml version='1.0' encoding='UTF-8'?
rpc-reply xmlns=urn:ietf:params:netconf:base:1.0 message-id=101
 data
   cli-config-data-block!


Yeah - note that the cli-config-data-block element is not namespaced 
here. I suspect the netconf XML parser/generator is just broken in SXI.  
I'm going to bug TAC later today - it's either a software or docs bug.

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Channelized OC3 for 7206VXR

2009-02-03 Thread Marcus.Gerdon
Hi,

the PA-MC-STM1 can be configured for SDH or Sonet framing on the controller, 
below which the TUG structure (don't know how's that called in Sonet) is 
configured. As far as I know (only done SDH for some time) when switching to 
Sonet we're in OCx world.

I've no installed PA at hand without links conencted so maybe someone can 
simply try what can be configured when in Sonet mode ?

regards,

Marcus
 

 -Ursprüngliche Nachricht-
 Von: cisco-nsp-boun...@puck.nether.net 
 [mailto:cisco-nsp-boun...@puck.nether.net] Im Auftrag von Gert Doering
 Gesendet: Montag, 2. Februar 2009 18:47
 An: Justin M. Streiner
 Cc: cisco-nsp@puck.nether.net
 Betreff: Re: [c-nsp] Channelized OC3 for 7206VXR
 
 Hi,
 
 On Mon, Feb 02, 2009 at 11:29:42AM -0500, Justin M. Streiner wrote:
  That particular card does not support channelized 
 operation.  It's also 
  end-of-life.  I'm not aware of a channelized OC3 port 
 adapter for the 7200 
  series.
 
 For whatever reason, there is a channelized STM-1 which goes 
 down to E1,
 but no channelized OC3 indeed.
 
 gert
 -- 
 USENET is *not* the non-clickable part of WWW!

 //www.muc.de/~gert/
 Gert Doering - Munich, Germany 
 g...@greenie.muc.de
 fax: +49-89-35655025
 g...@net.informatik.tu-muenchen.de
 
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Initiating Connections to VPN Clients

2009-02-03 Thread Allan Eising
On Tue, Feb 3, 2009 at 3:54 AM, Aaron Riemer arie...@wesenergy.com.au wrote:
 Hi guys,

 I am trying to work out why I cannot initiate connections to our VPN
 clients. ICMP seems to be okay and I can see that there is nothing in
 the log indicating the connections are denied. What could I be missing
 here? Connections inbound from the VPN clients work flawlessly.

 Thanks for any suggestions,

 Aaron.


 LEGAL DISCLAIMER: This message contains confidential information and is 
 intended only for the individual named. If you are not the named addressee 
 you should not disseminate, distribute or copy this e-mail. Please notify the 
 sender immediately by e-mail if you have received this e-mail by mistake and 
 delete this e-mail from your system. If you are not the intended recipient 
 you are notified that disclosing, copying, distributing or taking any action 
 in reliance on the contents of this information is strictly prohibited.
 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/


How is the server part of your vpn configured? Do you use dynamic maps?
Could you post the relevant configuration here?

Regards,

Allan
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] How secure are VLANs and VRFs?

2009-02-03 Thread nasir.shaikh
Hi,
I am looking for some studies/papers to convince my customer (and
myself) that VLANs can be as secure as physical segments and VRFs also
provide a secure segregation of traffic. A few years back I came across
a post referring to a document on the FBI or the NSA site stating that
VLANs were deemed just as secure as physical wires. 
 
I am sure that there are Service Providers offering an Internet VRF over
their MPLS cloud or enterprises with unfiltered Internet vrf on a
campus. How do you convince a customer about the security of a vrf?

Any references will be appreciated 

Nasir Shaikh 
CCIE #15845 | Senior Consultant | BT | Global Professional Services | E:
nasir.sha...@bt.com | http://HYPERLINK
http://www.bt.com/consultingwww.bt.com/consulting


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] ASA 5520 Remote Access VPN

2009-02-03 Thread Eimantas Zdanevičius

Hi all,

I have configured vpn on asa 5520 (software version 7.2). vpnclient 
connect to asa and says everything is ok. But i cannot ping any computer 
in inside network.


asa is working in router mode, single context. No nat on inside or 
outside interface


hostname(config)# interface ethernet0
hostname(config-if)# ip address 10.10.4.200 255.255.0.0
hostname(config-if)# nameif outside
hostname(config-if)# no shutdown
hostname(config)# interface ethernet1
hostname(config-if)# ip address 10.10.1.200 255.255.0.0
hostname(config-if)# nameif inside
hostname(config-if)# no shutdown
hostname(config)# isakmp policy 1 authentication pre-share
hostname(config)# isakmp policy 1 encryption 3des
hostname(config)# isakmp policy 1 hash sha
hostname(config)# isakmp policy 1 group 2
hostname(config)# isakmp policy 1 lifetime 43200
hostname(config)# isakmp enable outside
hostname(config)# ip local pool testpool 192.168.0.10-192.168.0.15
hostname(config)# username testuser password 12345678
hostname(config)# crypto ipsec transform-set FirstSet esp-3des esp-md5-hmac
hostname(config)# tunnel-group testgroup type ipsec-ra
hostname(config)# tunnel-group testgroup general-attributes
hostname(config-general)# address-pool testpool
hostname(config)# tunnel-group testgroup ipsec-attributes
hostname(config-ipsec)# pre-shared-key 44kkaol59636jnfx
hostname(config)# crypto dynamic-map dyn1 1 set transform-set FirstSet
hostname(config)# crypto dynamic-map dyn1 1 set reverse-route
hostname(config)# crypto map mymap 1 ipsec-isakmp dynamic dyn1
hostname(config)# crypto map mymap interface outside

Thanks

Eimantas
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ASA 5520 Remote Access VPN

2009-02-03 Thread Eimantas Zdanevičius

Peter Rathlev wrote:

...

What does the log say? Where's the ACLs for the interfaces? Are you sure
the firewall isn't denying the traffic as it does default?

Regards,
Peter
  
Its hard to find anything in log, because this is a production firewall 
and there is a lot of messages in syslog.
if i'm greeping on ip addresses vpnclient  real address or  vpn address  
in syslog i cant find anything wrong.
on outside interface i have acl which accepts pings from any source to 
inside interface computers. and i can ping from any computer from 
outside to any computer on inside. Even in ASDM real time logging i 
can't see any message about dropping packets from vpn tunnel.



___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ASA 5520 Remote Access VPN

2009-02-03 Thread Engelhard Labiro
 hostname(config)# ip local pool testpool 192.168.0.10-192.168.0.15

I guess this is a routing problem, since you assign 192.168.0.x to vpn
client which is located on different segment with PIX's own interface.
The pix must response to arp  request for 192.168.0.10 to 15 on behalf
of the vpn client. This is can be done with proxy arp setting on the
inside interface of the PIX... I forgot the command.
Or if you have a router in PIX's inside I/F, just create a route to
192.168.0.x pointing back
to your PIX's inside I/F.

HTH
Engel
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] A little confusion: OSPF and iBGP

2009-02-03 Thread Steve Bertrand
Hi everyone,

I've got a couple of questions regarding the use of iBGP and OSPF.

I've got:

rtrA - connected to Internet, and routes some prefixes of my /21 (and v6
/32) to the infrastructure/servers

rtrB - private eBGP peering with another company, and connects some
multihome clients with eBGP (they use space from our /21 and advertise
back to us with private AS). Also has numerous prefixes from our /21 on
the client facing sides. For these clients, our edge is their default
gateway for the prefix

rtrC - connects the multihomed clients secondary connection with a lower
eBGP preference, and also has a few prefixes from the /21 for other
access clients

Currently, I use OSPF to share the loopback interface IPs, and use iBGP
for the rest.

For the prefixes at the client access edge that are put in place
statically, I advertise them to the other internal peers via iBGP. Would
it be best to leave it this way, or to put this address space into the
IGP instead, and have BGP only announce the actual eBGP learnt routes?

Also, should all of my routers have a pull-up route for the entire /21,
or just for the prefixes that they house?

Thanks,

Steve
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ASA 5520 Remote Access VPN

2009-02-03 Thread Sigurbjörn Birkir Lárusson
If you're connecting through a natted host to the VPN you might try adding

crypto isakmp nat-traversal 30

I have a fairly similar setup to yours which works just fine.

BR,
Sibbi III



On 3.2.2009 14:33, Eimantas Zdanevičius eiman...@occ.lt wrote:

 Engelhard Labiro wrote:
 hostname(config)# ip local pool testpool 192.168.0.10-192.168.0.15
 
 
 I guess this is a routing problem, since you assign 192.168.0.x to vpn
 client which is located on different segment with PIX's own interface.
 The pix must response to arp  request for 192.168.0.10 to 15 on behalf
 of the vpn client. This is can be done with proxy arp setting on the
 inside interface of the PIX... I forgot the command.
 Or if you have a router in PIX's inside I/F, just create a route to
 192.168.0.x pointing back
 to your PIX's inside I/F.
 
 HTH
 Engel
   
 When client connects to the asa, asa automaticaly adds a route:
 S192.168.0.10 255.255.255.255 [1/0] via default_gw, outside
 
 Eimantas
 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ASA 5520 Remote Access VPN

2009-02-03 Thread Eimantas Zdanevičius

Sigurbjörn Birkir Lárusson wrote:

If you're connecting through a natted host to the VPN you might try adding

crypto isakmp nat-traversal 30

I have a fairly similar setup to yours which works just fine.
  

This solved the problem, thanks!

Another problem is that client sets default gateway to tunnel.
How can i configure only some networks to go trough tunnel?


Eimantas
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] Multicast grooming

2009-02-03 Thread Frank Bulk
How many entries can be made with the ip igmp snooping vlan static on a
2960G?

I'm thinking of bringing in two GigE's of video and then grooming them with
that feature down to one GigE.  

Besides entries, is this feature implemented in hardware or software, such
that there might be scalability concerns, too?

Regards,

Frank

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] core OSPF configurations

2009-02-03 Thread Pete Templin

Brian Spade wrote:


What is the best way to configure OSPF to inject all 50+ SVIs into the
routing domain?

Would you configure network statements for all SVI networks and passive the
interfaces?
Would you configure OSPF on the uplink interfaces only and redistributed
connected to create type-5 externals?


If it were me, the SVIs would be announced into BGP, so that my OSPF 
world stayed small and clean.


That said, remember that the network statement(s) only have to match, 
through wildcard math, the _IP addresses_ of the interfaces to be 
included in OSPF.  If you run a single area, 'network 0.0.0.0 
255.255.255.255 area 0' is all you need.  Flipside, if you want to lock 
down OSPF to the point that shifting an interface within a subnet causes 
OSPF to drop so you can catch the culprit in the act, 'network 
10.20.30.254 0.0.0.0 area 0' matches exactly that one address (but the 
interface's correct netmask is used when inserting the route into OSPF).


pt
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] reacheability issue in MEL link

2009-02-03 Thread Ahmed Mohamed
but this is an MCS (Mission Critical Site) solution,

i.e. we ordered the same circuit from the same carrier to implement the
solution in aother location for resilliency , and it works fine

P.S. : at some point i had 8% success rate of 100 pings , but after that all
dead

i told the carrier i want to have the packets transferred with dot1q
encapsulation, and they replied that they are providing a transparent
environment, reagardless the two ends are access or trunk

On Tue, Feb 3, 2009 at 10:06 AM, Tom Storey t...@snnap.net wrote:

 Are you sure that the two ports that face your metro ethernet provider are
 actually trunks?

 In my experience, carriers will only present access ports to end users,
 where end users are yourself and your customer.

 This means that you do not setup trunking or sub-interfaces on any of your
 and your customers equipment, you configure access ports aswell.

 It means that you can have a lot of 1:1 patching from your ethernet
 provider to your aggregation switch, but it helps your carrier protect
 their network from certain types of misconfiguration - i.e. they cant
 accidentaly trunk someone elses VLAN down to you.

  Hello,
 
  this is a real life problem still occuring, and have no idea what may be
  causing it ..
 
  we are providing an internet direct service to our customer vial MEL
  (Metro
  Ethernet Link)
 
  CE (CS-7206 VXR) fe2/0.36 --Etherlink(local
  carrier) WS-3759G-24TS--PE(CS-7000)
 
  the solution is providied using a carrier to link the customer CE to an
  aggregated switch, using Metro Ethernet
  configuring vlan 36 and using dot1q encapsulation
  then from the aggregating switch to the PE router using also
 encapsulation
  dot1q for vlan36
 
  all interfaces are up-up , and still ping fails !!
 
  i tried everything, resetting ports, switches, reconfigure interfaces
  ..etc.
  still no joy
 
  any idea what could be causing the problem ?
 
  
  CE:
  -
  interface FastEthernet2/0.36
   bandwidth 61440
   encapsulation dot1Q 36
   ip address 57.78.2.6 255.255.255.252
  
  Agg. switch:
  --
  interface GigabitEthernet1/0/9
   switchport trunk encapsulation dot1q
   switchport trunk native vlan 3109
   switchport trunk allowed vlan 36,3109
   switchport mode trunk
   switchport nonegotiate
   duplex full
   speed 100
   mls qos trust cos
   spanning-tree bpdufilter enable
  
  PE:
  --
   interface FastEthernet5/1/1.36
   bandwidth 61440
   encapsulation dot1Q 36
   ip address 57.78.2.5 255.255.255.252
   no ip redirects
   no ip proxy-arp
   no ip route-cache
   no cdp enable
  
  bmil305#sh int FastEthernet5/1/1.36
  FastEthernet5/1/1.36 is up, line protocol is up 
  Hardware is cyBus FastEthernet Interface, address is 0003.fe91.b8a9 (bia
  0003.fe91.b8a9)
Internet address is 57.78.2.5/30
MTU 1500 bytes, BW 61440 Kbit, DLY 100 usec,
   reliability 255/255, txload 1/255, rxload 1/255
Encapsulation 802.1Q Virtual LAN, Vlan ID  36.
ARP type: ARPA, ARP Timeout 04:00:00
  
  pmil2534#sh int Fa2/0.36
  FastEthernet2/0.36 is up, line protocol is up  
Hardware is i82543 (Livengood), address is 0022.be8b.1038 (bia
  0022.be8b.1038)
Description: --- To bmil305 - FE5/1/1.5
Internet address is 57.78.2.6/30
MTU 1500 bytes, BW 61440 Kbit, DLY 100 usec,
   reliability 255/255, txload 1/255, rxload 1/255
Encapsulation 802.1Q Virtual LAN, Vlan ID  36.
  
  ping pe to CE fails:
  
  bmil305#ping 57.78.2.6   ,
  Type escape sequence to abort.
  Sending 5, 100-byte ICMP Echos to 57.78.2.6, timeout is 2 seconds:
  .
  Success rate is 0 percent (0/5)
  
  PE to internet (google) successfully:
  --
  bmil305#ping 216.239.59.147 source fast 5/1/1.36 repeat 100 size 500
  Type escape sequence to abort.
  Sending 100, 500-byte ICMP Echos to 216.239.59.147, timeout is 2 seconds:
  Packet sent with a source address of 57.78.2.5
  !!
  !!
  Success rate is 100 percent (100/100), round-trip min/avg/max = 36/40/112
  ms
  
  ___
  cisco-nsp mailing list  cisco-nsp@puck.nether.net
  https://puck.nether.net/mailman/listinfo/cisco-nsp
  archive at http://puck.nether.net/pipermail/cisco-nsp/
 




Re: [c-nsp] ASA 5520 Remote Access VPN

2009-02-03 Thread Sigurbjörn Birkir Lárusson
Something along these lines if you wanted to just send 10.10.53.0/24 and
10.10.54.0/24 through the VPN tunnel

tunnel-group testgroup general-attributes
default-group-policy testpolicy

group-policy testpolicy internal
group-policy testpolicy attributes
split-tunnel-policy tunnelspecified
split-tunnel-network-list value TunnelList

access-list TunnelList standard permit 10.10.53.0 255.255.255.0
access-list TunnelList standard permit 10.10.54.0 255.255.255.0

BR,
Sibbi


On 3.2.2009 15:22, Eimantas Zdanevičius eiman...@occ.lt wrote:

 Sigurbjörn Birkir Lárusson wrote:
 If you're connecting through a natted host to the VPN you might try adding
 
 crypto isakmp nat-traversal 30
 
 I have a fairly similar setup to yours which works just fine.
   
 This solved the problem, thanks!
 
 Another problem is that client sets default gateway to tunnel.
 How can i configure only some networks to go trough tunnel?
 
 
 Eimantas

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] VPN PIX 6.x Translation issue

2009-02-03 Thread Tom Sutherland
have you tried global (outside) 0 interface ?


-Original Message-
From: William wil...@gmail.com
To: cisco-nsp@puck.nether.net cisco-nsp@puck.nether.net
Subject: [c-nsp] VPN PIX 6.x Translation issue
Date: Mon, 2 Feb 2009 10:57:05 -0500

Hi folks!

I currently have a PIX firewall running 6 code, the firewall has 3
interfaces, inside, outside and inside2.

At the moment I can VPN and communicate to all the hosts on the
inside, what I'd like to do is also be able to communicate with the
hosts on inside2, the security levels are:

outside: 0
inside: 100
inside2: 90

When I try to speak to inside2 hosts, I get the following error:

%PIX-3-305005: No translation group found for icmp src
outside:10.10.199.3 dst inside2:192.168.0.1 (type 8, code 0)

I'm very confused as to where I should be putting global/nat
statements... so far my setup consists of:


nat (inside) 0 access-list inside_outbound_nat0_acl
nat (inside) 1 10.10.200.0 255.255.255.0 0 0
nat (inside2) 0 access-list office_outbound_nat0_acl
nat (inside2) 1 192.168.0.0 255.255.255.0 0 0
global (outside) 1 interface

This lets both inside and inside2 hosts contact the internet via int
outside, and no nat stuff that needs to traverse VPN tunnels...

If anyone can assist/educate me on getting this working I would
appreciate it very much!

Cheers,

W
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ASA 5520 Remote Access VPN

2009-02-03 Thread Eimantas Zdanevičius

Engelhard Labiro wrote:

hostname(config)# ip local pool testpool 192.168.0.10-192.168.0.15



I guess this is a routing problem, since you assign 192.168.0.x to vpn
client which is located on different segment with PIX's own interface.
The pix must response to arp  request for 192.168.0.10 to 15 on behalf
of the vpn client. This is can be done with proxy arp setting on the
inside interface of the PIX... I forgot the command.
Or if you have a router in PIX's inside I/F, just create a route to
192.168.0.x pointing back
to your PIX's inside I/F.

HTH
Engel
  

When client connects to the asa, asa automaticaly adds a route:
S192.168.0.10 255.255.255.255 [1/0] via default_gw, outside

Eimantas
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ASA 5520 Remote Access VPN

2009-02-03 Thread Eimantas Zdanevičius

Alasdair Gow wrote:

Hi,

It looks like eth0 and eth1 are on the same network.
they need to be on separate networks IIRC.

Cheers,
Ally
  

sorry about my mistake. interfaces are on diferent networks
maske are 255.255.255.0
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Netconf (over SSHv2) in SXI

2009-02-03 Thread Ross Vandegrift
On Tue, Feb 03, 2009 at 08:10:18AM +, Phil Mayers wrote:
 On Tue, Feb 03, 2009 at 07:11:13AM +, Jeffrey Ollie wrote:
 This piqued my interest, so I whipped up a quick program to do some
 testing.  I've attached the resulting program, which when run against
 my 6500 running 12.2(33)SXI produces a copy of the running config.
 
 Some things I observed:
 
 Yep, those match my observations.
 
 The script is in Python, and you'll need the Paramiko (SSHv2) and lxml
 
 I used Twisted  a Nevow web UI, but seems python is popular ;o)

FWIW, I've been working on NETCONF software in python for JUNOS (see a
recent j-nsp thread about my frustrations...) and have the beginnings
of a library for generating and parsing NETCONF documents in Python
with lxml.

It's got all JUNOS centric stuff, so it won't be too much help as-is,
but if you're interested let me know.

 rpc-reply xmlns=urn:ietf:params:netconf:base:1.0 message-id=101
  data
cli-config-data-block!
 
 Yeah - note that the cli-config-data-block element is not namespaced 
 here. I suspect the netconf XML parser/generator is just broken in SXI.  
 I'm going to bug TAC later today - it's either a software or docs bug.

Well, in an XML sense, it's taken the default namespace provided by
the rpc-reply tag.  So that is urn:ietf:params:netconf:base:1.0:data.
I don't know if there's a data element defined by NETCONF, so I can't
speak to the well-formedness of the above XML, only its validity.

Ross

-- 
Ross Vandegrift
r...@kallisti.us

If the fight gets hot, the songs get hotter.  If the going gets tough,
the songs get tougher.
--Woody Guthrie
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ASA 5520 Remote Access VPN

2009-02-03 Thread Sigurbjörn Birkir Lárusson
Not unless you configure RRI, see

http://www.cisco.com/en/US/products/ps6120/products_configuration_example091
86a00809d07de.shtml

BR,
Sibbi


On 3.2.2009 14:33, Eimantas Zdanevičius eiman...@occ.lt wrote:

 Engelhard Labiro wrote:
 hostname(config)# ip local pool testpool 192.168.0.10-192.168.0.15
 
 
 I guess this is a routing problem, since you assign 192.168.0.x to vpn
 client which is located on different segment with PIX's own interface.
 The pix must response to arp  request for 192.168.0.10 to 15 on behalf
 of the vpn client. This is can be done with proxy arp setting on the
 inside interface of the PIX... I forgot the command.
 Or if you have a router in PIX's inside I/F, just create a route to
 192.168.0.x pointing back
 to your PIX's inside I/F.
 
 HTH
 Engel
   
 When client connects to the asa, asa automaticaly adds a route:
 S192.168.0.10 255.255.255.255 [1/0] via default_gw, outside
 
 Eimantas
 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ASA 5520 Remote Access VPN

2009-02-03 Thread Peter Rathlev
On Tue, 2009-02-03 at 11:12 +0200, Eimantas Zdanevičius wrote:
 I have configured vpn on asa 5520 (software version 7.2). vpnclient 
 connect to asa and says everything is ok. But i cannot ping any computer 
 in inside network.
 
 asa is working in router mode, single context. No nat on inside or 
 outside interface
 
...

What does the log say? Where's the ACLs for the interfaces? Are you sure
the firewall isn't denying the traffic as it does default?

Regards,
Peter

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

Re: [c-nsp] A little confusion: OSPF and iBGP

2009-02-03 Thread Mark Tinka
On Tuesday 03 February 2009 09:31:49 pm Steve Bertrand 
wrote:

 For the prefixes at the client access edge that are put
 in place statically, I advertise them to the other
 internal peers via iBGP. Would it be best to leave it
 this way, or to put this address space into the IGP
 instead, and have BGP only announce the actual eBGP
 learnt routes?

Best to keep your IGP carrying only your Loopbacks, and iBGP 
handling your customer prefixes.

Doing this affords you the filtering capabilities of BGP and 
allows you to operationalize your routing policy better.

 Also, should all of my routers have a pull-up route for
 the entire /21, or just for the prefixes that they house?

Normally, I'd recommend the aggregates be originated by a 
very stable device in the network. We do this using our 
route reflectors, and change the NEXT_HOP attribute of the 
aggregates to point to the Null/Discard interface on all 
peripheral routers.

These edge routers would then be configured to re-announce 
the aggregates to remote eBGP peers (customers, transit 
providers, public/private peers, e.t.c.).

For customer aggregation edge routers, prefixes used to 
assign /30 (/126 for v6, or whatever you use for this 
purpose) point-to-point addresses, as well as assignments 
for their own use on their LAN's, from your own blocks, 
would be included in your iBGP running on these router. 
Typically, we assign whole /24's or more for this purpose, 
and announce a shorter block within our network; keeps our 
iBGP table as small as possible (can't have little /30's or 
/126's running around in your iBGP, now can you :-)).

So far, you seem to be on the right track.

Cheers,

Mark.


signature.asc
Description: This is a digitally signed message part.
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

Re: [c-nsp] A little confusion: OSPF and iBGP

2009-02-03 Thread Steve Bertrand
Mark Tinka wrote:
 On Tuesday 03 February 2009 09:31:49 pm Steve Bertrand 
 wrote:

Thanks for the feedback Mark,

 For customer aggregation edge routers, prefixes used to 
 assign /30 (/126 for v6, or whatever you use for this 
 purpose) point-to-point addresses, as well as assignments 
 for their own use on their LAN's, from your own blocks, 
 would be included in your iBGP running on these router. 
 Typically, we assign whole /24's or more for this purpose, 
 and announce a shorter block within our network; keeps our 
 iBGP table as small as possible (can't have little /30's or 
 /126's running around in your iBGP, now can you :-)).

So far, I seem to be doing ok then, less the ability to aggregate the /30's.

At first, I allocated space for /30's from a reserved space for only
that purpose, and have this reserved space on both the inside, and
outside of the edge routers (and have to have the little /30's floating
around).

That's easy enough to rectify at this point by renumbering my
intra-router links, so thank you for pointing that out :)

Steve
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] Cisco MARS vs. Q1 Qradar - and other vendors

2009-02-03 Thread Dean Perrine
Does anyone have some input on security event correlation systems?

Currently reviewing Cisco MARS vs. Q1 Labs QRadar.

Environment information:
Very large DMVPN, IPS's, FW's, CSM.

Thanks,

==
Dean Perrine
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] VPN PIX 6.x Translation issue

2009-02-03 Thread Peter Rathlev
On Tue, 2009-02-03 at 12:30 -0500, Tom Sutherland wrote:
 have you tried global (outside) 0 interface ?

Huh? A global-0? What does that do? Does it explicitly _not_ translate
to the interface address of the outside interface? ;-)

Regards,
Peter


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Cisco MARS vs. Q1 Qradar - and other vendors

2009-02-03 Thread Peter Rathlev
On Tue, 2009-02-03 at 12:20 -0800, Dean Perrine wrote:
 Does anyone have some input on security event correlation systems?
 
 Currently reviewing Cisco MARS vs. Q1 Labs QRadar.

We have a MARS-110 and I must frankly say I'm not impressed. The system
needs a _lot_ of training to be useful and the built in templates aren't
worth much in my eyes. (We've had 10 people take the MARS training
course and even then only a couple of us find it at most marginally
useful.)

My personal conclusion is that a combination of SEC, NFsen and a few
scripts parsing logfiles etc. are an easier, cheaper and better way of
accomplishing event correlations. It's (relatively) easy to do the
visualisations in a similar way to what MARS does by feeding GraphViz
with input from either CDP (L2-topology) or your IGP or BGP
(L3-topology).

Of course this means you have to love using these tools and you need to
have several people on staff with the relevant skills. CS-MARS could be
the right thing as an almost turn key solution.
 
 Environment information:
 Very large DMVPN, IPS's, FW's, CSM.

The integration from CS-MARS towards many other Cisco products would be
the one maybe strong point.

I'd say let the people having to work with it make the decision. :-)

Regards,
Peter


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] Cisco switch FLP

2009-02-03 Thread Pierre Lamy
One of my fellow engineers needs to understand auto-advertise and 
autoneg with regards to Cisco switches.


Can anyone confirm that hard coded speed/duplex settings on a generic 
modern Cisco switch, will not prevent the switch port from sending fast 
link pulses, advertising the switch port's hardcoded speed/duplex 
settings so that the device at the other end, will be able to bring up a 
link if the remote device itself does not send out FLP?


Pierre
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Cisco switch FLP

2009-02-03 Thread Mikael Abrahamsson

On Tue, 3 Feb 2009, Pierre Lamy wrote:

Can anyone confirm that hard coded speed/duplex settings on a generic 
modern Cisco switch, will not prevent the switch port from sending fast 
link pulses, advertising the switch port's hardcoded speed/duplex 
settings so that the device at the other end, will be able to bring up a 
link if the remote device itself does not send out FLP?


Generic behaviour is that if you hard-code both speed and duplex, switch 
stops advertising to the other end using autoneg.


So 100/full fixed at one end and other end set to auto/auto, will result 
in that end thinking it is speaking to a hub that doesn't do autoneg, and 
it'll detect the 100, but will go to 100/half.


There are recent hw from the past 1-2 years that can advertise 
capabilities even when being fixed, but it has to be configured in another 
way.


--
Mikael Abrahamssonemail: swm...@swm.pp.se
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] Ethernet to ATM local connect

2009-02-03 Thread MKS
Hi there

Is there a cisco platform / sw out there that can the following (the
critical part being _second-dot1q_)

interface gig3/1.10
 encapsulation dot1q 10 second-dot1q 2

interface atm2/0/0
 pvc 0/400 l2transport
 encapsulation aal5

connect atm-ethvlan atm2/0/0 0/400 gigabitethernet3/1.10 interworking ethernet

http://www.cisco.com/en/US/docs/ios/12_0s/feature/guide/fslocal.html#wp1096615

Regards
MKS
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] Ring Protocol

2009-02-03 Thread harbor235
I am looking to deploy a Ethernet Ring topology in a campus. The ring is to
connect
multiple buildings via a high speed 10G backbone. Does Cisco offer any
products in this
area? The ONS is too expensive, looking for something smaller that is
Ethernet based.


mike
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] show dsl int atm 0

2009-02-03 Thread Sigurbjörn Birkir Lárusson
Moving the Target Noise Margin or whatever it is called in your DSLAM is a
better plan.  

Interleaving has far more to do with sync stability, i.e. it allows the
router some time to respond to changes in the line quality before loosing
the sync, it also increases latency.  The more interleaving time you allow,
the greater the latency, but then again, better sync stability.

I would use both, interleave at a low setting, and a higher target noise
margin if you're running sensitive services such as IPTV over the line.

4ms interleave + 9dB target noise margin should leave the line relatively
stable.  If you find the maximum sync speed of the line moves below your set
minimum to offer the service when you're at 9dB (the higher the target noise
margin the lower the sync speed), the line probably isn't good enough to
offer the service to begin with.

BR,
Sibbi


On 2.2.2009 09:56, Tim Franklin t...@pelican.org wrote:

 Ziv Leyes wrote:
 
 Setting interleave in the DSLAM will do automatically what I proposed
 before, lowering the speed of the link in order to improve line
 quality.
 
 Be careful with what you mean by speed in this instance.  Interleaving
 typically increases latency, rather than reducing bandwidth.
 
 Regards,
 Tim.
 
 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Cisco switch FLP

2009-02-03 Thread Gert Doering
Hi,

On Tue, Feb 03, 2009 at 04:35:26PM -0500, Pierre Lamy wrote:
 Can anyone confirm that hard coded speed/duplex settings on a generic 
 modern Cisco switch, will not prevent the switch port from sending fast 
 link pulses, advertising the switch port's hardcoded speed/duplex 
 settings so that the device at the other end, will be able to bring up a 
 link if the remote device itself does not send out FLP?

It will autoneg 100M, but it will usually result in a duplex mismatch.

Don't hardcode ports unless you know for sure that you need it (because
you connect to a Cisco 7200 with PA-FE or the like).

gert

-- 
USENET is *not* the non-clickable part of WWW!
   //www.muc.de/~gert/
Gert Doering - Munich, Germany g...@greenie.muc.de
fax: +49-89-35655025g...@net.informatik.tu-muenchen.de


pgp3YCT7r6dfq.pgp
Description: PGP signature
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

Re: [c-nsp] Ring Protocol

2009-02-03 Thread Rubens Kuhl
A little bird from C whispered me the following:

I'd take a look at the ME-4924-10GE device (REP Supports ~50ms
failover), as well as this you have support for it on the larger devices
like the 7600.

4924 support for REP started in 12.2(44)SG -
http://www.cisco.com/en/US/prod/collateral/switches/ps5718/ps4324/product_bulletin_c25_468227.html

7600 has supported REP since 12.2(33)SRC -
http://www.cisco.com/en/US/docs/ios/lanswitch/configuration/guide/lsw_cfg_rep.html;

I stand corrected.


Rubens

On Tue, Feb 3, 2009 at 10:06 PM, Rubens Kuhl rube...@gmail.com wrote:
 I don't think Cisco currently have an 10G ethernet ring offer. It
 might come up when REP (Resilient Ethernet Protocol) gets implemented
 in the 6500 IOS. It was supposed to be on SXI, but that didn't happen.
 If 2G is enough, ME-3400G-12CS-x with 4 SFP uplinks might do Gigabit
 Etherchannel, perhaps ?

 Outside of Cisco-land, Extreme, Foundry and Force 10 seems to have
 currently shipping solutions.


 Rubens



 On Tue, Feb 3, 2009 at 9:21 PM, harbor235 harbor...@gmail.com wrote:
 I am looking to deploy a Ethernet Ring topology in a campus. The ring is to
 connect
 multiple buildings via a high speed 10G backbone. Does Cisco offer any
 products in this
 area? The ONS is too expensive, looking for something smaller that is
 Ethernet based.


 mike
 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Fast UDLD timers in SXI?

2009-02-03 Thread David Hughes


Yup, that's exactly the situation.  STP will work around some of the  
problem caused by this but if you are presenting an etherchannel over  
multiple xconnects you can't pick up the link failure of part of the  
etherchannel without UDLD.  We did some initial proof of concepts with  
2900s running 2 second timers and it was great.  Imagine the look on  
my face when we found out that 6500s don't have the functionality of a  
$1,000 access switch .


So, is the config option on SXI still 7 seconds at best?


Thanks

David
...


On 03/02/2009, at 7:45 PM, Thomas Dupas wrote:


I assume it's a L2 link (EoMPLS), so BFD won't help much.

We're in the same situation, also stuck with UDLD timers and 2  
parallel EoMPLS xconnects. I can't get the convergence lower then 20  
seconds with the default UDLD, so I'm also hoping for fast UDLD


Best Regards,

Thomas


Van: cisco-nsp-boun...@puck.nether.net [cisco-nsp-boun...@puck.nether.net 
] namens Gert Doering [g...@greenie.muc.de]

Verzonden: dinsdag 3 februari 2009 8:15
Aan: David Hughes
CC: Cisco NSP ((E-mail))'
Onderwerp: Re: [c-nsp] Fast UDLD timers in SXI?

Hi,

On Tue, Feb 03, 2009 at 04:30:50PM +1000, David Hughes wrote:

Can someone verify if 12.2(33)SXI offers fast UDLD timers (i.e. down
to 1 second) or if we are still stuck with the old 7 sec timers.  We
can do 1 sec UDLD on 2900 class switches so I hope we see it in the
premier switching platform some time soon.  We need some way to  
pick
up a link failure at the far end of an EoMPLS xconnect in a  
reasonable

time.


Can you use BFD?

(Yes, this is not answering your question - I don't know the answer  
- but

it might be an alternative approach if this a layer 3 link)

gert
--
USENET is *not* the non-clickable part of WWW!
  //www.muc.de/~gert/
Gert Doering - Munich, Germany g...@greenie.muc.de
fax: +49-89-35655025g...@net.informatik.tu-muenchen.de


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Ring Protocol

2009-02-03 Thread Rubens Kuhl
I don't think Cisco currently have an 10G ethernet ring offer. It
might come up when REP (Resilient Ethernet Protocol) gets implemented
in the 6500 IOS. It was supposed to be on SXI, but that didn't happen.
If 2G is enough, ME-3400G-12CS-x with 4 SFP uplinks might do Gigabit
Etherchannel, perhaps ?

Outside of Cisco-land, Extreme, Foundry and Force 10 seems to have
currently shipping solutions.


Rubens



On Tue, Feb 3, 2009 at 9:21 PM, harbor235 harbor...@gmail.com wrote:
 I am looking to deploy a Ethernet Ring topology in a campus. The ring is to
 connect
 multiple buildings via a high speed 10G backbone. Does Cisco offer any
 products in this
 area? The ONS is too expensive, looking for something smaller that is
 Ethernet based.


 mike
 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Ring Protocol

2009-02-03 Thread harbor235
Thank you for all your replies, that was exactly what I was looking for.

mike

On Tue, Feb 3, 2009 at 7:37 PM, Rubens Kuhl rube...@gmail.com wrote:

 A little bird from C whispered me the following:

 I'd take a look at the ME-4924-10GE device (REP Supports ~50ms
 failover), as well as this you have support for it on the larger devices
 like the 7600.

 4924 support for REP started in 12.2(44)SG -

 http://www.cisco.com/en/US/prod/collateral/switches/ps5718/ps4324/product_bulletin_c25_468227.html

 7600 has supported REP since 12.2(33)SRC -

 http://www.cisco.com/en/US/docs/ios/lanswitch/configuration/guide/lsw_cfg_rep.html
 

 I stand corrected.


 Rubens

 On Tue, Feb 3, 2009 at 10:06 PM, Rubens Kuhl rube...@gmail.com wrote:
  I don't think Cisco currently have an 10G ethernet ring offer. It
  might come up when REP (Resilient Ethernet Protocol) gets implemented
  in the 6500 IOS. It was supposed to be on SXI, but that didn't happen.
  If 2G is enough, ME-3400G-12CS-x with 4 SFP uplinks might do Gigabit
  Etherchannel, perhaps ?
 
  Outside of Cisco-land, Extreme, Foundry and Force 10 seems to have
  currently shipping solutions.
 
 
  Rubens
 
 
 
  On Tue, Feb 3, 2009 at 9:21 PM, harbor235 harbor...@gmail.com wrote:
  I am looking to deploy a Ethernet Ring topology in a campus. The ring is
 to
  connect
  multiple buildings via a high speed 10G backbone. Does Cisco offer any
  products in this
  area? The ONS is too expensive, looking for something smaller that is
  Ethernet based.
 
 
  mike
  ___
  cisco-nsp mailing list  cisco-nsp@puck.nether.net
  https://puck.nether.net/mailman/listinfo/cisco-nsp
  archive at http://puck.nether.net/pipermail/cisco-nsp/
 
 

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] reacheability issue in MEL link

2009-02-03 Thread Engelhard Labiro
 i told the carrier i want to have the packets transferred with dot1q
 encapsulation, and they replied that they are providing a transparent
 environment, reagardless the two ends are access or trunk

Does your carrier support 802.1QinQ or something alike that is able to
transport your dot1q tag?
http://www.ippacket.org/blog/archives/2004/08/ieee_8021q-in-q.html
just FYI, we have a CE router (7206VXR) with trunking port to provider's PE.
This working without problem here, YMMV.
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] MPLS QoS question about the HOSE model

2009-02-03 Thread Andy Saykao
Hi All,
 
I'm continuing to try and understand QoS a little better in relation to
applying it to our MPLS VPN network but it seems the more I read about
it the more I'm confused. Not to mention the lack of configuration
examples out there.
 
I understand that we can provide two QoS solutions for MPLS VPN
customers.
 
1/ Guaranteed BW at ingress/egress (also known as the HOSE model).
2/ Full QOS deployment with varying class of service based on IPP and/or
DSCP.
 
In relation to solution 1, I'm not really clear about guaranteeing the
bandwidth at the ingress/egress. Is the bandwidth guarantee in regards
to the physical link connecting the CE to the PE? Or are we giving the
customer a guarantee on the PE to P link (which would make more sense to
me)?
 
[ CE ] --- 2M/2M --- [ PE ] --- [ P ]
 
Imagine if the customer had a 2M/2M SHDSL connection into the SP's MPLS
network, are we able to for example guarantee a ICR of 256K and ECR of
512K??? And why would we do this when the customer would expect to be
able to send/receive up to 2M because that's what they're paying for.
 
My thinking is probably flawed, so if anybody could clear up my
misconceptions about the hose model, that would be great!
 
Thanks.
 
Andy

This email and any files transmitted with it are confidential and intended
 solely for the use of the individual or entity to whom they are addressed. 
Please notify the sender immediately by email if you have received this 
email by mistake and delete this email from your system. Please note that
 any views or opinions presented in this email are solely those of the
 author and do not necessarily represent those of the organisation. 
Finally, the recipient should check this email and any attachments for 
the presence of viruses. The organisation accepts no liability for any 
damage caused by any virus transmitted by this email.

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ASA 5520 Remote Access VPN

2009-02-03 Thread Eimantas Zdanevičius

Sigurbjörn Birkir Lárusson wrote:

Something along these lines if you wanted to just send 10.10.53.0/24 and
10.10.54.0/24 through the VPN tunnel

tunnel-group testgroup general-attributes
default-group-policy testpolicy

group-policy testpolicy internal
group-policy testpolicy attributes
split-tunnel-policy tunnelspecified
split-tunnel-network-list value TunnelList

access-list TunnelList standard permit 10.10.53.0 255.255.255.0
access-list TunnelList standard permit 10.10.54.0 255.255.255.0

BR,
Sibbi
  

This perfectly sets routes for specified networks.
But how to disable default gateway setting on vpn client?

If i go to ASA ASDM-Configuration-VPN-Default Tunnel Gateway it says:

To configure default tunnel gateway, go to Static Route.

i have two static routes configured:

Saaa.bbb.ccc.ddd 255.255.255.255 [1/0] via 10.10.1.2, inside
S*  0.0.0.0 0.0.0.0 [1/0] via 10.10.4.254, outside
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/