Re: [c-nsp] cisco interface shutdown detection, how is possible?

2013-01-05 Thread Sander Steffann
Hi,

 I was wondering how Cisco routers could detect the directly connected
 interface at the other end is shutdown!
 
 there are two general possibility on my point of view:
 1- the other device is sending special information before shutting down the
 interface.
 2- there are some method of polling which is done periodically and based on
 the answer, the router detect the interface is up or no!

Neither. The router just sees the power or light disappear on the interface...
Sander


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] cisco interface shutdown detection, how is possible?

2013-01-05 Thread Saku Ytti
On (2013-01-05 15:14 +0330), h bagade wrote:

 I was wondering how Cisco routers could detect the directly connected
 interface at the other end is shutdown!

If it is truly directly connected, it should go down in both ends at RTT/2
delay.
Maybe you've disabled autonegotiation which may break this?

Interestingly enough, ethernet standard allows autonegotiation to send type
of 'dying gasp' when operationally shutdown. I.e. far-end device could
differentiate link-loss due to link-cut/HW issue and link-loss due to
intentional shutdown of remote end.
Someone I know checked specs of particular common broadcom chip and this
feature is supported in HW. For some reason router vendors are not
supporting it in software. I personally would love to see in syslog special
line if we detected linkdown due to remote end shutdown.

-- 
  ++ytti
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ASR-100x intro

2013-01-05 Thread Robert Hass
On Sat, Jan 5, 2013 at 1:32 PM, Charles Sprickman sp...@bway.net wrote:

 We're doing lots of ethernet aggregation - both metro-e services and DSL/EoC 
 (delivered over GigE, one vlan per customer, no PPPoe - straight bridging).  
 The people on the other end of these circuits are all customers, we're not an 
 enterprise with branch offices, so many features like IPSEC are totally 
 useless at this point.

We migrated to MX80 for IP/BGP customers aggregation. Main reason :
Pricing and capability to handle 10-20G of customer without issue
which costs a lot more in case of ASR 1K. MX80 sucks in terms of
routing-engine performance, but for customers BGP sessions we simply
are using bird route-servers to off load poor MX80 RE.

You can probably also look at ASR 9001 - it's will be very very good
box for ethernet aggregation and can handle a lot of traffic - much
more than small ASR 1K. Do anyone have experiences with performance of
ASR 9001 CPU (BGP convergence etc) as it's PPC based not Intel Xeon
like big ASR 9K.

Rob

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ASR-100x intro

2013-01-05 Thread Jon Lewis

On Sat, 5 Jan 2013, Charles Sprickman wrote:

We're tentatively shopping around, and I'm looking for that sort of 
information on the ASR lineup.  The 1002 and 1002-X look very 
interesting on paper, but I'm not finding much about what folks in a 
small service provider role have to say about them.  We're at the point 
where everything is ethernet now, so our 7206 with an NPE-G2 is feeling 
pretty silly.  Some of the ASR stuff seems to be in the used channel 
already, which is nice (I'd rather have two used than one new, FWIW).


For an ethernet-only operation, the 6500/sup720-3bxl delivers considerable 
packet forwarding/$ (lots of parts in the used channel).  Its biggest 
weaknesses would likely be netflow (having to do sampled if you're doing 
hundreds of mbit/s or more) and the question of what cisco chooses to do 
hardware-wise with tcam on future supervisors.  The 3bxl is limited to 1M 
ipv4 routes or (N ipv4 + (1M-N)/2 ipv6) N100 routes.  Even the 
Sup2T-XL hasn't increased this limitation.  If they choose not to address 
this in the next couple of years, the 6500 will become unsuitable for use 
where full BGP routing is necessary.  They might choose to do this to 
force orgs using the 6500 as routers to buy ASRs (or Juniper gear)...or 
maybe the next Sup will support a few million FIB TCAM slots.


L3 Forwarding Resources
 FIB TCAM usage: TotalUsed   %Used
  72 bits (IPv4, MPLS, EoM) 622592  434995 70%
 144 bits (IP mcast, IPv6)  212992   11744  6%

I may have to adjust the ipv4/ipv6 split [again] (which unfortunately 
requires a reboot), to squeeze a little more IPv4 capacity out of it 
assuming v6 growth continues slowly.


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ASR-100x intro

2013-01-05 Thread Charles Sprickman

On Jan 5, 2013, at 6:54 AM, Robert Hass wrote:

 On Sat, Jan 5, 2013 at 12:09 PM, Charles Sprickman sp...@bway.net wrote:
 We're tentatively shopping around, and I'm looking for that sort of 
 information on the ASR lineup.  The 1002 and 1002-X look very interesting on 
 paper, but I'm not finding much about what folks in a small service provider 
 role have to say about them.  We're at the point where everything is 
 ethernet now, so our 7206 with an NPE-G2 is feeling pretty silly.  Some of 
 the ASR stuff seems to be in the used channel already, which is nice (I'd 
 rather have two used than one new, FWIW).
 
 Look also at ASR 1001 not only 1002/1002-X.
 
 ASR 1k is very good platform but quite expensive if you need to pass a
 lot of traffic.
 What features you're using ? BRAS ? IPESC ? MPLS PE ? ISP PE ? NHRP ?

Right now and for the foreseeable future we don't need anything fancy, with one 
exception, which I'll save for last.

We're doing lots of ethernet aggregation - both metro-e services and DSL/EoC 
(delivered over GigE, one vlan per customer, no PPPoe - straight bridging).  
The people on the other end of these circuits are all customers, we're not an 
enterprise with branch offices, so many features like IPSEC are totally useless 
at this point.

On the core side (we are really too small to think about having core vs. edge 
gear) we will likely never go beyond 3 transit providers with full BGP feeds, 
and as our traffic ramps up some more, there are probably a handful of private 
peering opportunities.  IPv6 support is a necessity.

The one area where I would like to be more high touch is in traffic shaping 
and QoS.  Often times we'll have a metro-ethernet customer who wants 50Mb/s and 
our metro-e provider can only provide an unthrottled 100Mb/s connection.  The 
brute-force shaping I can do on the NPE-G2 is not very nice, and it tends to 
kill VoIP.  Customers tend to balk at installing any substantial CPE that could 
do shaping on their end.  Any gear that offered a drop-dead easy way of saying 
cap traffic on this vlan to X Mb/s but reserve and prioritize Y Mb/s for VoIP 
would add serious value.  How exactly one would accomplish that for 
customer-bound traffic where you don't know if DSCP values have been stripped 
upstream, well that's tough, although our VoIP provider has offered to setup a 
private peering connection, so being able to prioritize anything headed to or 
from their port would be nice.

All I know is that every time we've lurched towards just being a dumb pipe, 
there's always one or two customers where we'd have a sale if we could 
accommodate their scenario where they need a more high-touch solution.

Thanks,

Charles

 Rob


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ASR-100x intro

2013-01-05 Thread Robert Hass
On Sat, Jan 5, 2013 at 2:17 PM, Jon Lewis jle...@lewis.org wrote:
 For an ethernet-only operation, the 6500/sup720-3bxl delivers considerable
 packet forwarding/$ (lots of parts in the used channel).  Its biggest
 weaknesses would likely be netflow (having to do sampled if you're doing

You can add weaknesses in QoS area. No HQoS on LAN cards.

Rob
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ASR-100x intro

2013-01-05 Thread Nick Hilliard
On 05/01/2013 13:17, Jon Lewis wrote:
 Even the Sup2T-XL hasn't increased this limitation.

arguably, it's exacerbated the problem of upgrading - the sup2t native line
cards use distributed forwarding while the older cards use centralised
forwarding.  So when it comes time to upgrade due to tcam limitations, you
need to upgrade components on all the line cards too = much more
expensive.  I'm not complaining about this - it's just the cost of higher
performance networking.  But it is an issue that needs to be understood.

Nick

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ASR-100x intro

2013-01-05 Thread Lukasz Bromirski

On Jan 5, 2013, at 3:38 PM, Robert Hass robh...@gmail.com wrote:

 On Sat, Jan 5, 2013 at 2:17 PM, Jon Lewis jle...@lewis.org wrote:
 For an ethernet-only operation, the 6500/sup720-3bxl delivers considerable
 packet forwarding/$ (lots of parts in the used channel).  Its biggest
 weaknesses would likely be netflow (having to do sampled if you're doing
 
 You can add weaknesses in QoS area. No HQoS on LAN cards.

6500 is LAN/DC services switch, there's no need for HQoS in that
scenario usually. MX80 is a router and doesn't offer HQoS, which is
a worse problem. With Sup2T in 6500 you can pack a pretty good QoS
capabilities, it lifts the uRPF restrictions of previous generations,
and adds Flexible NetFlow along with good scalability for ACLs and
NetFlow cache to the portfolio of tools you can use. It also offers
truly routed approach to dealing with VLANs, as you have BDs and
LFIs to flexibly map/remap VLANs, and terminate L3 where do you want.

For scenarios where ASR1k doesn't scale for price/performance reasons,
use ASR9001.

-- 
There's no sense in being precise when |   Łukasz Bromirski
 you don't know what you're talking |  jid:lbromir...@jabber.org
 about.   John von Neumann |http://lukasz.bromirski.net

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

Re: [c-nsp] ASR-100x intro

2013-01-05 Thread magno
Lukasz,

Modular MX80 (and smaller brothersX5/10/40) does offer 3 levels of  hqos
with full shaping, priority propagation, CIR/PIR (only PIR at IF level) and
a lot of other features. Also ingress shaping si supported.
As I work for Juniper, I have no direct experience with ASRs just wanted to
point out MX 80 does supporto hqos.

My 2 cents.

Max
Il giorno 05/gen/2013 19:15, Lukasz Bromirski luk...@bromirski.net ha
scritto:


 On Jan 5, 2013, at 3:38 PM, Robert Hass robh...@gmail.com wrote:

  On Sat, Jan 5, 2013 at 2:17 PM, Jon Lewis jle...@lewis.org wrote:
  For an ethernet-only operation, the 6500/sup720-3bxl delivers
 considerable
  packet forwarding/$ (lots of parts in the used channel).  Its biggest
  weaknesses would likely be netflow (having to do sampled if you're doing
 
  You can add weaknesses in QoS area. No HQoS on LAN cards.

 6500 is LAN/DC services switch, there's no need for HQoS in that
 scenario usually. MX80 is a router and doesn't offer HQoS, which is
 a worse problem. With Sup2T in 6500 you can pack a pretty good QoS
 capabilities, it lifts the uRPF restrictions of previous generations,
 and adds Flexible NetFlow along with good scalability for ACLs and
 NetFlow cache to the portfolio of tools you can use. It also offers
 truly routed approach to dealing with VLANs, as you have BDs and
 LFIs to flexibly map/remap VLANs, and terminate L3 where do you want.

 For scenarios where ASR1k doesn't scale for price/performance reasons,
 use ASR9001.

 --
 There's no sense in being precise when |   Łukasz Bromirski
  you don't know what you're talking |  jid:lbromir...@jabber.org
  about.   John von Neumann |http://lukasz.bromirski.net

 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

Re: [c-nsp] Power Supply 2 ouput has dropped

2013-01-05 Thread Justin M. Streiner

On Sat, 5 Jan 2013, Farooq Razzaque wrote:

As you can see from the errors that it is showing 'AC low' (sh 
environment switch 1 status power-supply 2) when the power is dropped to 
26721.20W and after sometime the power is adjusting back to desired 
Watts (5771.64W) and showing 'AC High'.


I m getting these errors very frequently with the time differene of seconds.

As per your below comments, you mean to say that one input of power 
supply 2 is being affected when the below error (Power supply 2 input 
has changed. Power capacity adjusted to 2671.20W) is generated and when 
this input gets the desired power then the system shows the messages 
(Power supply 2 input has changed. Power capacity adjusted to 
5771.64W). Am i write..


There are three possibilities that I see:

1. A software bug could cause the error condition you mentioned.  I 
haven't looked through Cisco's bug search tool to find a matching bug, 
but it is possible.


2. The power supply is malfunctioning and needs to be replaced.

3. There is an electrical problem that is affecting one of the circuits 
that is feeding power to your switch.


If you have a spare power supply, try replacing the power supply that is 
reporting the errors, since that would be the least impact to your users. 
If the errors go away, you know you have a bad power supply.  If you have 
a support contract with Cisco that allows for hardware replacement, you 
can open a case with the TAC and have them send you a replacement power 
supply.


If Cisco doesn't feel the power supply itself is bad, then a software bug 
could be the culprit.  The TAC could recommend a new IOS version if there 
is a bug, and the bug has been fixed.


If so, it's also possible, but probably less likely that you lost one 
of the two  hot legs on the affected input


Can you please re-explain the below as i could not understand .


A leg is a conductor (wire, etc) that carries electrical current.  In 
the United States and Canada, a 3-wire circuit capable of carrying the 208 
or 240 volts needed to energize a 6,000 watt AC power supply would have 
two legs, and a ground connection.


I made the statement above assuming that you are located in the the United 
States or Canada.  If you are in another country, their power delivery 
could operate differently (different frequency, voltages for 'end user' 
equipment, maximum allowed current draw, how and where systems are 
grounded (or earthed) etc), and my original statement might not apply.
In any event, you would be best advised to refer any electrical testing to 
a qualified electrician, for safety reasons.


What does hot legs means. Is it the power cords that plugs into the two 
input connections of power supply.  Do we need  to turn off the power 
supply 2 and take out the two power cords from the power supply for the 
below testing.


See above for my definition of a 'leg'.  You would need to unplug the 
power cords to do this testing.  The purpose of the testing would be to 
verify that both of the circuits that feeding the inputs on the power 
supply are providing the correct voltage on each leg.  If they are not, 
your power supply will not be able to operate at its maximum capacity.


If you have a voltage tester (or an electrician who has one) you can 
test if you're getting ~120V from each of the hot legs to ground, and 
~208/240V from leg to leg.  If you are, and you're testing from the 
inlet at the end of the cord that plugs into the  power supply, then the 
circuit and cord are good, and you'll likely need  to replace the power 
supply.


Also please can you let me know what does (It turned out that one input 
on the power  supply had gone bad) means ...


In the case I mentioned in my original post (see below), I had a 6000 watt 
power supply with a configuration similar to yours.  I tested both of the 
circuits that provided power to the unit, and they were operating 
correctly.  I then replaced the power supply with another one that I had 
on hand, and the problem went away, so in my case, the power supply was 
bad.


I've seen this before, with a 6000 watt  AC power supply in a 6509.  It 
turned out that one input on the power  supply had gone bad.


Can we check with the command that which input out of the 2 input of 
power supply is having issue ..


I don't think any of the CLI commands will tell you which input is having 
the problem, but the lights on the front of the power supply will.  If 
an INPUT light is brightly lit, it should be receiving power at the right 
voltage.  If the light is dimly lit, it is receiving less power than is 
needed.


jms
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] cisco interface shutdown detection, how is possible?

2013-01-05 Thread Jay Hennigan
On 1/5/13 3:44 AM, h bagade wrote:
 Hi all,
 
 I was wondering how Cisco routers could detect the directly connected
 interface at the other end is shutdown!
 
 there are two general possibility on my point of view:
 1- the other device is sending special information before shutting down the
 interface.
 2- there are some method of polling which is done periodically and based on
 the answer, the router detect the interface is up or no!

Some of this depends on the layer 2 protocol (Ethernet vs. DS-3 for
example) but in most cases there isn't any detectable difference between
the remote end being administratively shut down and a failure of the
interconnecting medium.

The exception is that in some metro ethernet scenarios you can use OAM
to capture dying-gasp, error disable, or shutdown events.  It isn't a
periodic poll, but rather like a one-time Going down now!, your
scenario 1.

 As Cisco router is not able to detect the interface shutdown on the other
 side when connected to some other device, not Cisco like unix systems, it
 seems, it has some sort of protocol for detection which is number 2 of
 above guesses!

The router will absolutely detect the lack of line protocol and carrier
and flag the link as down but this would be the case whether the remote
side is administratively shut down or the cable is just unplugged.

 could you please help me on this? Or provide me a scenario witch I could
 find out if any packet is transmitted between Cisco routers to inform the
 interface shutdown!

See:
http://www.cisco.com/en/US/docs/switches/metro/me3400/software/release/12.2_46_se/configuration/guide/swoam.pdf

--
Jay Hennigan - CCIE #7880 - Network Engineering - j...@impulse.net
Impulse Internet Service  -  http://www.impulse.net/
Your local telephone and internet company - 805 884-6323 - WB6RDV
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ASR-100x intro

2013-01-05 Thread Robert Hass
 6500 is LAN/DC services switch, there's no need for HQoS in that
 scenario usually. MX80 is a router and doesn't offer HQoS, which is
 a worse problem. With Sup2T in 6500 you can pack a pretty good QoS
 capabilities, it lifts the uRPF restrictions of previous generations,

Lukasz,
MX80 has HQoS but on MIC ports (not on chassis ports). I don't know
how much MX80 you deployed but we have 10+ running and don't regret
switching to multivendor network (6500+7600+MX80+MX240).

Rob
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ASR-100x intro

2013-01-05 Thread Scott Pettit
You sound like a similar situation to us.  We purchased an ASR1001 in
August 2012 and have been extremely happy with it.

Advice from my experience:

* You can buy them in bundles which are considerably cheaper than buying a
base ASR1001 and adding all the licensing, so we purchased the broadband
bundle which included a 4000 subscriber license (for ISG/BRAS features).
We upgraded it from the base 4GB to 8GB of RAM as we needed to be able to
hold a couple of BGP feeds.  The ASR1001 ships with 2.5G throughput and
you can upgrade it to 5G throughput if/when required.

* Re your question about the new IOS - it's essentially identical to the
standard IOS.  The only difference is the ASR runs linux and IOS runs as a
daemon on linux.  All the functions are the same except a few features for
service providers that exclusively run on IOS XE as opposed to standard
IOS.  I have learnt not to bother with implementing IOS redundancy on the
ASR1001 - it is possible to configure it so two copies of IOS are running
at once and you can upgrade your standby IOS to a newer version, reload
that then cutover to the upgraded IOS with a few milliseconds
interruption. The downside is it gulps up half your RAM which you need for
multiple BGP tables.

Further on the above point, we've had IOS crash once due to an SSH bug, it
reboots very quickly as it's a daemon so there is no waiting for normal
hardware boot up.  All we noticed was a 30 second interruption and by the
time I was looking into what was going on, everything was back again.
Needless to say that bug has been logged.

* Re total cost, for our bundle we paid approx. $25k USD, plus approx. $8k
per annum USD for 24x7x2 on-site.  We spent a lot of time thinking about
whether to buy two ASR's and 8x5xNBD support or a single ASR with 24x7x2.
Knowing where the Cisco parts in our city are, we decided we could afford
to wait 2 hours in a worst case scenario.

* Your query on QoS/shaping - it's pretty easy using either rate-limit
directly on the sub interface pointing towards the customer, or via policy
maps.  You can do exactly what you describe for cap traffic on this vlan
to X Mb/s but reserve and prioritize Y Mb/s for VoIP with a policy map.
You'd create two class maps, one that classifies the VoIP traffic (by ACL,
listing the IP's of your SIP SBC's), priority xMbit, then dump the rest in
a non-prioritised queue.

* IPv6 all works fine, our customers are all dual stacked.

* If you aren't using PPPoE, the ASR can authenticate based on VLAN, so
even your MetroE customers can still be authenticated.  I know lots of
providers just configure the a /30 and a rate-limit and leave the customer
to it - we authenticate still based on the port so that we can hook in
with our billing platform easily.  One scenario we've implemented with our
ASR (using ISG) is when a customer's account goes overdue, they get an
email giving them 5 days notice.  After 5 days their HTTP/HTTPS traffic is
automatically redirected to a payment page and upon processing a credit
card payment their internet access is back on immediately.  We went with
this scenario as it doesn't break their VoIP (which bad debtors use as an
excuse - If I can't call emergency services, you can't cut me off!).

* Having the ISG (on ASR) has been invaluable to us.  Another solution
we've implemented is DNS redirection for IPv4 and IPv6.  Customers
configuring Open DNS/Google DNS started to become a real headache as it
completely ruins the performance of anything on CDN e.g. We'd see someone
configure Open DNS then call us complaining that Apple Update/Windows
Update is slow because their Akamai traffic was now coming out of Japan
(we're in New Zealand).  So using ISG we transparently redirect all DNS
queries to our DNS resolvers.  Customers can still use Open DNS/Google DNS
and it works, but all the responses come from our DNS servers.  We haven't
had a single support call regarding CDN issues since.

Bottom line for us is the ASR is a swiss army knife that I haven't gotten
close to digesting all the documentation to see what else we can do with
it.

Thanks,

-Scott

-- 






On 6/01/13 1:32 AM, Charles Sprickman sp...@bway.net wrote:


On Jan 5, 2013, at 6:54 AM, Robert Hass wrote:

 On Sat, Jan 5, 2013 at 12:09 PM, Charles Sprickman sp...@bway.net
wrote:
 We're tentatively shopping around, and I'm looking for that sort of
information on the ASR lineup.  The 1002 and 1002-X look very
interesting on paper, but I'm not finding much about what folks in a
small service provider role have to say about them.  We're at the point
where everything is ethernet now, so our 7206 with an NPE-G2 is feeling
pretty silly.  Some of the ASR stuff seems to be in the used channel
already, which is nice (I'd rather have two used than one new, FWIW).

Right now and for the foreseeable future we don't need anything fancy,
with one exception, which I'll save for last.

We're doing lots of ethernet aggregation - both metro-e services and
DSL/EoC 

Re: [c-nsp] ASR-100x intro

2013-01-05 Thread Robert Hass
 * You can buy them in bundles which are considerably cheaper than buying a
 base ASR1001 and adding all the licensing, so we purchased the broadband
 bundle which included a 4000 subscriber license (for ISG/BRAS features).
 We upgraded it from the base 4GB to 8GB of RAM as we needed to be able to
 hold a couple of BGP feeds.  The ASR1001 ships with 2.5G throughput and
 you can upgrade it to 5G throughput if/when required.

Do I need to upgrade throughput to 5G to have 1M FIB instead of 512K ?

Docs says:

ESP2.5 - FIB 512K
ESP5 - FIB 1M

Rob
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] l2vpn vpls w/bgp autodiscovery - me3600x to asr9k

2013-01-05 Thread Aaron
This is my first time trying to get l2vpn vpls w/bgp autodiscovery to
work.please help if you know a simply scenario config that you could share
to make it work with ios xr on one side and me3600x ios vanilla on the other
side.

 

Trying to get it up between 3 PE nodes where I will run vpls between all 3.
2 are me3600's and 1 is asr9k.  I would like the asr9k to be
route-reflector.

 

I tried and tried first just to get it up between asr9k and one me3600
first..initially l2vpn address family bgp neighbor session came up and
stayed up.this was ONLY after putting in the bgp neighbor and AF configs
under bgp.

 

BUT, once I added some l2vpn, vfi stuff on asr9k OR l2 vfi xyz auto, vpn-id
stuff on me3600, it all fell apart.

 

It went through a few iterations of trying various things..during that time
I saw several errors on either side.. Here are some of them incase they look
familiar to you. 

 

Thanks, Aaron

 

 

Config.

 

Asr9k.

 

router bgp 64512

bgp router-id 10.101.0.254

bgp cluster-id 10

address-family l2vpn vpls-vpws

!

neighbor-group my-rr-clients

  remote-as 64512

  update-source Loopback0

  address-family l2vpn vpls-vpws

   route-reflector-client

  !

!

neighbor 10.101.12.251

  use neighbor-group my-rr-clients

!

neighbor 10.101.12.253

  use neighbor-group my-rr-clients

!

 

l2vpn

bridge group mytestvpls

  bridge-domain mytestvpls

   vfi mytestvpls

vpn-id 99

autodiscovery bgp

 rd 64512:99

 route-target 88:99

 signaling-protocol bgp

  ve-id 10

 

me3600..

 

router bgp 64512

bgp router-id 10.101.12.251

bgp log-neighbor-changes

no bgp default ipv4-unicast

neighbor 10.101.0.254 remote-as 64512

neighbor 10.101.0.254 update-source Loopback0

!

address-family ipv4

exit-address-family

!

address-family l2vpn vpls

  neighbor 10.101.0.254 activate

  neighbor 10.101.0.254 send-community extended

exit-address-family

-ME3600-test#

 

 

RP/0/RSP0/CPU0:-9k-test1#sh bgp l2vpn vpls neighbors 10.101.12.251 | be
malform

Sat Jan  5 15:50:02.948 CST

Total malformed UPDATE 490

  Last malformed UPDATE 00:00:11

  Error subcode 10, attribute code 0, action reset session

  Malformed UPDATE: 88 bytes

   

00580200 4140 01010240 02008004

0400 00400504 0064 C0101000

02FC 6300 0AFC 6380

0E160019 41040A65 0CFB0060 FC00

0063 0A650CFB

 

 

RP/0/RSP0/CPU0:Jan  5 15:12:49.069 : bgp[1047]: [iord]: Received OPEN from
10.101.12.251, version 4, holdtime 180 secs

RP/0/RSP0/CPU0:Jan  5 15:12:49.069 : bgp[1047]: [iord]: OPEN from
10.101.12.251 has optional parameter type: 2 (Capability) len: 6

RP/0/RSP0/CPU0:Jan  5 15:12:49.069 : bgp[1047]: [iord]: OPEN from
10.101.12.251 has MULTIPROTOCOL_EXTENSION capability for afi/safi: 25/65

RP/0/RSP0/CPU0:Jan  5 15:12:49.069 : bgp[1047]: [iord]: OPEN from
10.101.12.251 has optional parameter type: 2 (Capability) len: 2

RP/0/RSP0/CPU0:Jan  5 15:12:49.070 : bgp[1047]: [iord]: OPEN from
10.101.12.251 has ROUTE-REFRESH capability(old) for all address-families

RP/0/RSP0/CPU0:Jan  5 15:12:49.070 : bgp[1047]: [iord]: OPEN from
10.101.12.251 has optional parameter type: 2 (Capability) len: 2

RP/0/RSP0/CPU0:Jan  5 15:12:49.070 : bgp[1047]: [iord]: OPEN from
10.101.12.251 has ROUTE-REFRESH capability for all address-families

RP/0/RSP0/CPU0:Jan  5 15:12:49.070 : bgp[1047]: [iord]: OPEN from
10.101.12.251 has optional parameter type: 2 (Capability) len: 2

RP/0/RSP0/CPU0:Jan  5 15:12:49.070 : bgp[1047]: [iord]: OPEN from
10.101.12.251 has unrecognized capability code: 70, length 0 (ignored)

RP/0/RSP0/CPU0:Jan  5 15:12:49.070 : bgp[1047]: [iord]: OPEN from
10.101.12.251 has optional parameter type: 2 (Capability) len: 6

RP/0/RSP0/CPU0:Jan  5 15:12:49.070 : bgp[1047]: [iord]: OPEN from
10.101.12.251 has 4-byte AS capability with AS 64512

RP/0/RSP0/CPU0:Jan  5 15:12:49.071 : bgp[1047]: [iord]:
bgp_io_read_schedule_updgrp: NO updgrp scheduled after Open processing:
nbr=10.101.12.251, nbrfl=0x08314000

RP/0/RSP0/CPU0:Jan  5 15:12:49.071 : bgp[1047]: [iord]: 10.101.12.251 went
from Connect to OpenSent

RP/0/RSP0/CPU0:Jan  5 15:12:49.071 : bgp[1047]: [iord]: Sending OPEN to
10.101.12.251, version 4, my as: 64512, holdtime 180 seconds

RP/0/RSP0/CPU0:Jan  5 15:12:49.071 : bgp[1047]: [iord]: 10.101.12.251 went
from OpenSent to OpenConfirm

RP/0/RSP0/CPU0:Jan  5 15:12:49.072 : bgp[1047]: [iowt]: 10.101.12.251 send
message type 1, length (incl. header) 53

RP/0/RSP0/CPU0:Jan  5 15:12:49.072 : bgp[1047]: [iowt]: Send message dump
for 10.101.12.251:

RP/0/RSP0/CPU0:Jan  5 15:12:49.072 : bgp[1047]: [iowt]:    
   

RP/0/RSP0/CPU0:Jan  5 15:12:49.072 : bgp[1047]: [iowt]: 0035 0104 fc00 00b4
0a65 00fe 1802 0601

RP/0/RSP0/CPU0:Jan  5 15:12:49.072 : bgp[1047]: [iowt]: 0400 1900 4102 0280
0002 0202 0002 0641

RP/0/RSP0/CPU0:Jan  5 15:12:49.072 : bgp[1047]: [iowt]: 0400 00fc 00

RP/0/RSP0/CPU0:Jan  5 15:12:49.073 

[c-nsp] Memory upgrade for ASR1001 - 3rd party

2013-01-05 Thread Robert Hass
I want extend ASR1001 memory to 8GB or best 16GB but at low possible
cost - so 3rd party modules ;)

I'm looking for tested part-numbers/vendors for memory chips in ASR 1001.

Thanks
Rob
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ASR-100x intro

2013-01-05 Thread Scott Pettit
Hmm, perhaps I was incorrect - the old ESP2.5 appears to have been made
End of Sale since July 2012.  I just checked our ASR and it's showing 5G
throughput.

#show platform hardware throughput level
The current throughput level is 500 kb/s


We ordered in June but it didn't ship until August so that'd make sense.

-Scott


On 6/01/13 11:05 AM, Robert Hass robh...@gmail.com wrote:

The ASR1001 ships with 2.5G throughput and
 you can upgrade it to 5G throughput if/when required.

Do I need to upgrade throughput to 5G to have 1M FIB instead of 512K ?

Docs says:

ESP2.5 - FIB 512K
ESP5 - FIB 1M



___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] l2vpn vpls w/bgp autodiscovery - me3600x to asr9k

2013-01-05 Thread Pete Lumbis
I think you need to add the prefix-length-size 2 command when doing VPLS
Autodiscovery between IOS and XR boxes.

http://www.cisco.com/en/US/docs/ios/iproute_bgp/command/reference/irg_bgp4.html#wp1154099

Try that and see if it help.



On Sat, Jan 5, 2013 at 5:50 PM, Aaron aar...@gvtc.com wrote:

 This is my first time trying to get l2vpn vpls w/bgp autodiscovery to
 work.please help if you know a simply scenario config that you could share
 to make it work with ios xr on one side and me3600x ios vanilla on the
 other
 side.



 Trying to get it up between 3 PE nodes where I will run vpls between all 3.
 2 are me3600's and 1 is asr9k.  I would like the asr9k to be
 route-reflector.



 I tried and tried first just to get it up between asr9k and one me3600
 first..initially l2vpn address family bgp neighbor session came up and
 stayed up.this was ONLY after putting in the bgp neighbor and AF configs
 under bgp.



 BUT, once I added some l2vpn, vfi stuff on asr9k OR l2 vfi xyz auto, vpn-id
 stuff on me3600, it all fell apart.



 It went through a few iterations of trying various things..during that time
 I saw several errors on either side.. Here are some of them incase they
 look
 familiar to you.



 Thanks, Aaron





 Config.



 Asr9k.



 router bgp 64512

 bgp router-id 10.101.0.254

 bgp cluster-id 10

 address-family l2vpn vpls-vpws

 !

 neighbor-group my-rr-clients

   remote-as 64512

   update-source Loopback0

   address-family l2vpn vpls-vpws

route-reflector-client

   !

 !

 neighbor 10.101.12.251

   use neighbor-group my-rr-clients

 !

 neighbor 10.101.12.253

   use neighbor-group my-rr-clients

 !



 l2vpn

 bridge group mytestvpls

   bridge-domain mytestvpls

vfi mytestvpls

 vpn-id 99

 autodiscovery bgp

  rd 64512:99

  route-target 88:99

  signaling-protocol bgp

   ve-id 10



 me3600..



 router bgp 64512

 bgp router-id 10.101.12.251

 bgp log-neighbor-changes

 no bgp default ipv4-unicast

 neighbor 10.101.0.254 remote-as 64512

 neighbor 10.101.0.254 update-source Loopback0

 !

 address-family ipv4

 exit-address-family

 !

 address-family l2vpn vpls

   neighbor 10.101.0.254 activate

   neighbor 10.101.0.254 send-community extended

 exit-address-family

 -ME3600-test#





 RP/0/RSP0/CPU0:-9k-test1#sh bgp l2vpn vpls neighbors 10.101.12.251 | be
 malform

 Sat Jan  5 15:50:02.948 CST

 Total malformed UPDATE 490

   Last malformed UPDATE 00:00:11

   Error subcode 10, attribute code 0, action reset session

   Malformed UPDATE: 88 bytes

    

 00580200 4140 01010240 02008004

 0400 00400504 0064 C0101000

 02FC 6300 0AFC 6380

 0E160019 41040A65 0CFB0060 FC00

 0063 0A650CFB





 RP/0/RSP0/CPU0:Jan  5 15:12:49.069 : bgp[1047]: [iord]: Received OPEN from
 10.101.12.251, version 4, holdtime 180 secs

 RP/0/RSP0/CPU0:Jan  5 15:12:49.069 : bgp[1047]: [iord]: OPEN from
 10.101.12.251 has optional parameter type: 2 (Capability) len: 6

 RP/0/RSP0/CPU0:Jan  5 15:12:49.069 : bgp[1047]: [iord]: OPEN from
 10.101.12.251 has MULTIPROTOCOL_EXTENSION capability for afi/safi: 25/65

 RP/0/RSP0/CPU0:Jan  5 15:12:49.069 : bgp[1047]: [iord]: OPEN from
 10.101.12.251 has optional parameter type: 2 (Capability) len: 2

 RP/0/RSP0/CPU0:Jan  5 15:12:49.070 : bgp[1047]: [iord]: OPEN from
 10.101.12.251 has ROUTE-REFRESH capability(old) for all address-families

 RP/0/RSP0/CPU0:Jan  5 15:12:49.070 : bgp[1047]: [iord]: OPEN from
 10.101.12.251 has optional parameter type: 2 (Capability) len: 2

 RP/0/RSP0/CPU0:Jan  5 15:12:49.070 : bgp[1047]: [iord]: OPEN from
 10.101.12.251 has ROUTE-REFRESH capability for all address-families

 RP/0/RSP0/CPU0:Jan  5 15:12:49.070 : bgp[1047]: [iord]: OPEN from
 10.101.12.251 has optional parameter type: 2 (Capability) len: 2

 RP/0/RSP0/CPU0:Jan  5 15:12:49.070 : bgp[1047]: [iord]: OPEN from
 10.101.12.251 has unrecognized capability code: 70, length 0 (ignored)

 RP/0/RSP0/CPU0:Jan  5 15:12:49.070 : bgp[1047]: [iord]: OPEN from
 10.101.12.251 has optional parameter type: 2 (Capability) len: 6

 RP/0/RSP0/CPU0:Jan  5 15:12:49.070 : bgp[1047]: [iord]: OPEN from
 10.101.12.251 has 4-byte AS capability with AS 64512

 RP/0/RSP0/CPU0:Jan  5 15:12:49.071 : bgp[1047]: [iord]:
 bgp_io_read_schedule_updgrp: NO updgrp scheduled after Open processing:
 nbr=10.101.12.251, nbrfl=0x08314000

 RP/0/RSP0/CPU0:Jan  5 15:12:49.071 : bgp[1047]: [iord]: 10.101.12.251 went
 from Connect to OpenSent

 RP/0/RSP0/CPU0:Jan  5 15:12:49.071 : bgp[1047]: [iord]: Sending OPEN to
 10.101.12.251, version 4, my as: 64512, holdtime 180 seconds

 RP/0/RSP0/CPU0:Jan  5 15:12:49.071 : bgp[1047]: [iord]: 10.101.12.251 went
 from OpenSent to OpenConfirm

 RP/0/RSP0/CPU0:Jan  5 15:12:49.072 : bgp[1047]: [iowt]: 10.101.12.251 send
 message type 1, length (incl. header) 53

 RP/0/RSP0/CPU0:Jan  5 15:12:49.072 : bgp[1047]: [iowt]: Send message dump
 for 10.101.12.251:

 

Re: [c-nsp] l2vpn vpls w/bgp autodiscovery - me3600x to asr9k

2013-01-05 Thread Aaron
 

You're right on that Pete.  Thanks, I just got that seconds before you told
me from a link I was reading.

 

That stabilized neighbor session, now I'm trying to get ce's to see each
other.

 

They aren't currently.

 

On me3600 I'm seeing. unkn Invalid Segment

 

sv-b-ME3600-test#sh xcon all

Legend:XC ST=Xconnect State  S1=Segment1 State  S2=Segment2 State

  UP=Up   DN=DownAD=Admin Down  IA=Inactive

  SB=Standby  HS=Hot Standby RV=Recovering  NH=No Hardware

 

XC ST  Segment 1 S1 Segment 2
S2

--+-+--+
-+--

UP pri   ac Vl100:100(Eth VLAN)  UP  vfi vpls1
UP

-- pri  vfi vpls1UP unkn Invalid Segment
--

UP pri   bd 100  UP  vfi vpls1
UP

 

 

.and no prefix rcv'd.

 

sv-b-ME3600-test#sh bgp l2v vpl al su | be Neighb

NeighborV   AS MsgRcvd MsgSent   TblVer  InQ OutQ Up/Down
State/PfxRcd

10.101.0.254464512  33  37200 00:29:00
0

 

..on 9k I see prefix rcv'd.

 

RP/0/RSP0/CPU0:sv-b-9k-test1#sh bgp l2 vpls su | be Nei

Sat Jan  5 21:59:20.848 CST

NeighborSpkAS MsgRcvd MsgSent   TblVer  InQ OutQ  Up/Down
St/PfxRcd

10.101.12.251 0 6451223821793600 00:29:30
1

 

RP/0/RSP0/CPU0:sv-b-9k-test1#sh bgp l2 vpls

Sat Jan  5 21:59:42.536 CST

BGP router identifier 10.101.0.254, local AS number 64512

BGP generic scan interval 60 secs

BGP table state: Active

Table ID: 0x0   RD version: 3889240856

BGP main routing table version 6

BGP scan interval 60 secs

 

Status codes: s suppressed, d damped, h history, * valid,  best

  i - internal, r RIB-failure, S stale

Origin codes: i - IGP, e - EGP, ? - incomplete

   NetworkNext HopRcvd Label  Local Label

Route Distinguisher: 64512:100

*i10.101.12.251/32   10.101.12.251   nolabel nolabel

Route Distinguisher: 10.101.0.254:32768 (default for vrf gr1:bd1)

* 10:10/32   0.0.0.0 nolabel 16180

 

 

Aaron

 

 

 

 

 

From: Pete Lumbis [mailto:alum...@gmail.com] 
Sent: Saturday, January 05, 2013 9:38 PM
To: Aaron
Cc: cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] l2vpn vpls w/bgp autodiscovery - me3600x to asr9k

 

I think you need to add the prefix-length-size 2 command when doing VPLS
Autodiscovery between IOS and XR boxes. 

 

http://www.cisco.com/en/US/docs/ios/iproute_bgp/command/reference/irg_bgp4.h
tml#wp1154099

 

Try that and see if it help.

 

 

On Sat, Jan 5, 2013 at 5:50 PM, Aaron aar...@gvtc.com wrote:

This is my first time trying to get l2vpn vpls w/bgp autodiscovery to
work.please help if you know a simply scenario config that you could share
to make it work with ios xr on one side and me3600x ios vanilla on the other
side.



Trying to get it up between 3 PE nodes where I will run vpls between all 3.
2 are me3600's and 1 is asr9k.  I would like the asr9k to be
route-reflector.



I tried and tried first just to get it up between asr9k and one me3600
first..initially l2vpn address family bgp neighbor session came up and
stayed up.this was ONLY after putting in the bgp neighbor and AF configs
under bgp.



BUT, once I added some l2vpn, vfi stuff on asr9k OR l2 vfi xyz auto, vpn-id
stuff on me3600, it all fell apart.



It went through a few iterations of trying various things..during that time
I saw several errors on either side.. Here are some of them incase they look
familiar to you.



Thanks, Aaron





Config.



Asr9k.



router bgp 64512

bgp router-id 10.101.0.254

bgp cluster-id 10

address-family l2vpn vpls-vpws

!

neighbor-group my-rr-clients

  remote-as 64512

  update-source Loopback0

  address-family l2vpn vpls-vpws

   route-reflector-client

  !

!

neighbor 10.101.12.251

  use neighbor-group my-rr-clients

!

neighbor 10.101.12.253

  use neighbor-group my-rr-clients

!



l2vpn

bridge group mytestvpls

  bridge-domain mytestvpls

   vfi mytestvpls

vpn-id 99

autodiscovery bgp

 rd 64512:99

 route-target 88:99

 signaling-protocol bgp

  ve-id 10



me3600..



router bgp 64512

bgp router-id 10.101.12.251

bgp log-neighbor-changes

no bgp default ipv4-unicast

neighbor 10.101.0.254 remote-as 64512

neighbor 10.101.0.254 update-source Loopback0

!

address-family ipv4

exit-address-family

!

address-family l2vpn vpls

  neighbor 10.101.0.254 activate

  neighbor 10.101.0.254 send-community extended

exit-address-family

-ME3600-test#





RP/0/RSP0/CPU0:-9k-test1#sh bgp l2vpn vpls neighbors 10.101.12.251 | be
malform

Sat Jan  5 15:50:02.948 CST

Total malformed UPDATE 490

  Last malformed UPDATE 00:00:11

  Error subcode 10, attribute code 0, action reset session

  Malformed UPDATE: 88 bytes

   

00580200 4140 01010240 02008004

0400 00400504 0064 C0101000

02FC 6300 0AFC 

Re: [c-nsp] l2vpn vpls w/bgp autodiscovery - me3600x to asr9k

2013-01-05 Thread Aaron
Yahoo!  I had to change asr9k to signaling-protocol ldp

(as tshooting goes, I may had superfluous stuff in here by now, so I'll pear
back some later and see what was really needed)


l2vpn
 bridge group gr1
  bridge-domain bd1
   interface GigabitEthernet0/0/0/10.1
   !
   vfi vf1
vpn-id 100
autodiscovery bgp
 rd auto
 route-target 64512:100
 signaling-protocol ldp
 !
!


Me3600 has

l2 vfi vpls1 autodiscovery
 vpn id 100
 rd 10.101.12.251:32768
 route-target export 64512:100
 route-target import 64512:100

Aaron


-Original Message-
From: cisco-nsp-boun...@puck.nether.net
[mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of Aaron
Sent: Saturday, January 05, 2013 9:59 PM
To: 'Pete Lumbis'
Cc: cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] l2vpn vpls w/bgp autodiscovery - me3600x to asr9k

 

You're right on that Pete.  Thanks, I just got that seconds before you told
me from a link I was reading.

 

That stabilized neighbor session, now I'm trying to get ce's to see each
other.

 

They aren't currently.

 

On me3600 I'm seeing. unkn Invalid Segment

 

sv-b-ME3600-test#sh xcon all

Legend:XC ST=Xconnect State  S1=Segment1 State  S2=Segment2 State

  UP=Up   DN=DownAD=Admin Down  IA=Inactive

  SB=Standby  HS=Hot Standby RV=Recovering  NH=No Hardware

 

XC ST  Segment 1 S1 Segment 2
S2

--+-+--+
--+-+--+
-+--

UP pri   ac Vl100:100(Eth VLAN)  UP  vfi vpls1
UP

-- pri  vfi vpls1UP unkn Invalid Segment
--

UP pri   bd 100  UP  vfi vpls1
UP

 

 

.and no prefix rcv'd.

 

sv-b-ME3600-test#sh bgp l2v vpl al su | be Neighb

NeighborV   AS MsgRcvd MsgSent   TblVer  InQ OutQ Up/Down
State/PfxRcd

10.101.0.254464512  33  37200 00:29:00
0

 

..on 9k I see prefix rcv'd.

 

RP/0/RSP0/CPU0:sv-b-9k-test1#sh bgp l2 vpls su | be Nei

Sat Jan  5 21:59:20.848 CST

NeighborSpkAS MsgRcvd MsgSent   TblVer  InQ OutQ  Up/Down
St/PfxRcd

10.101.12.251 0 6451223821793600 00:29:30
1

 

RP/0/RSP0/CPU0:sv-b-9k-test1#sh bgp l2 vpls

Sat Jan  5 21:59:42.536 CST

BGP router identifier 10.101.0.254, local AS number 64512

BGP generic scan interval 60 secs

BGP table state: Active

Table ID: 0x0   RD version: 3889240856

BGP main routing table version 6

BGP scan interval 60 secs

 

Status codes: s suppressed, d damped, h history, * valid,  best

  i - internal, r RIB-failure, S stale

Origin codes: i - IGP, e - EGP, ? - incomplete

   NetworkNext HopRcvd Label  Local Label

Route Distinguisher: 64512:100

*i10.101.12.251/32   10.101.12.251   nolabel nolabel

Route Distinguisher: 10.101.0.254:32768 (default for vrf gr1:bd1)

* 10:10/32   0.0.0.0 nolabel 16180

 

 

Aaron

 

 

 

 

 

From: Pete Lumbis [mailto:alum...@gmail.com]
Sent: Saturday, January 05, 2013 9:38 PM
To: Aaron
Cc: cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] l2vpn vpls w/bgp autodiscovery - me3600x to asr9k

 

I think you need to add the prefix-length-size 2 command when doing VPLS
Autodiscovery between IOS and XR boxes. 

 

http://www.cisco.com/en/US/docs/ios/iproute_bgp/command/reference/irg_bgp4.h
tml#wp1154099

 

Try that and see if it help.

 

 

On Sat, Jan 5, 2013 at 5:50 PM, Aaron aar...@gvtc.com wrote:

This is my first time trying to get l2vpn vpls w/bgp autodiscovery to
work.please help if you know a simply scenario config that you could share
to make it work with ios xr on one side and me3600x ios vanilla on the other
side.



Trying to get it up between 3 PE nodes where I will run vpls between all 3.
2 are me3600's and 1 is asr9k.  I would like the asr9k to be
route-reflector.



I tried and tried first just to get it up between asr9k and one me3600
first..initially l2vpn address family bgp neighbor session came up and
stayed up.this was ONLY after putting in the bgp neighbor and AF configs
under bgp.



BUT, once I added some l2vpn, vfi stuff on asr9k OR l2 vfi xyz auto, vpn-id
stuff on me3600, it all fell apart.



It went through a few iterations of trying various things..during that time
I saw several errors on either side.. Here are some of them incase they look
familiar to you.



Thanks, Aaron





Config.



Asr9k.



router bgp 64512

bgp router-id 10.101.0.254

bgp cluster-id 10

address-family l2vpn vpls-vpws

!

neighbor-group my-rr-clients

  remote-as 64512

  update-source Loopback0

  address-family l2vpn vpls-vpws

   route-reflector-client

  !

!

neighbor 10.101.12.251

  use neighbor-group my-rr-clients

!

neighbor 10.101.12.253

  use neighbor-group my-rr-clients

!



l2vpn

bridge group mytestvpls

  bridge-domain mytestvpls

   vfi mytestvpls

vpn-id 99

autodiscovery bgp

 rd 64512:99