Re: [c-nsp] config example xconnent between ASR9K and 6500
It is a matter of managing labels on the devices that terminate the attachment circuits. You don't need to manage the P routers in between. Coming from a Smart Edge world years ago we did static PWs. When we migrated to ASR9Ks static labeling was the only way I could interopt with the Smart Edges until years later I figured out how to do dynamic PWs. On Sep 15, 2017 10:37 PM, "Aaron Gould"wrote: > Oh ok I think I see what you mean. So if you configure a PW with a static > label, then does that mean you have to handle the pw on the next hop device > or otherwise statically map the lsp at every hop along the way ? > > > > I’ve always done end to end dynamic pw’s… so I’m very familiar with mtu > drama, soft (control plane) and hard (fwd’ing plane). > > > > -Aaron > > > ___ cisco-nsp mailing list cisco-nsp@puck.nether.net https://puck.nether.net/mailman/listinfo/cisco-nsp archive at http://puck.nether.net/pipermail/cisco-nsp/
Re: [c-nsp] config example xconnent between ASR9K and 6500
Oh ok I think I see what you mean. So if you configure a PW with a static label, then does that mean you have to handle the pw on the next hop device or otherwise statically map the lsp at every hop along the way ? I’ve always done end to end dynamic pw’s… so I’m very familiar with mtu drama, soft (control plane) and hard (fwd’ing plane). -Aaron ___ cisco-nsp mailing list cisco-nsp@puck.nether.net https://puck.nether.net/mailman/listinfo/cisco-nsp archive at http://puck.nether.net/pipermail/cisco-nsp/
Re: [c-nsp] config example xconnent between ASR9K and 6500
If you use a static label MTUs should not matter. If you do not use a static label aka Dynamic PW then both segments will not come up unless MTUs match. On Sep 15, 2017 10:31 PM, "Aaron Gould"wrote: > Thanks Curtis, Are you saying that mtu’s only matter if you force a static > mpls label ? > > > > -Aaron > ___ cisco-nsp mailing list cisco-nsp@puck.nether.net https://puck.nether.net/mailman/listinfo/cisco-nsp archive at http://puck.nether.net/pipermail/cisco-nsp/
Re: [c-nsp] config example xconnent between ASR9K and 6500
Thanks Curtis, Are you saying that mtu’s only matter if you force a static mpls label ? -Aaron ___ cisco-nsp mailing list cisco-nsp@puck.nether.net https://puck.nether.net/mailman/listinfo/cisco-nsp archive at http://puck.nether.net/pipermail/cisco-nsp/
Re: [c-nsp] config example xconnent between ASR9K and 6500
Unless you force a static label, then MTUs don't matter :) On Sep 15, 2017 10:11 PM, "Aaron Gould"wrote: > > I put the MTU show command below, because we all know how much MTU is a > gotcha in MPLS L2VPN's... > > ** > > 9k... > > interface Loopback0 > ipv4 address 10.101.0.15 255.255.255.255 > > interface TenGigE0/0/0/1.103 l2transport > description eline - company-a > encapsulation dot1q 2995 > rewrite ingress tag pop 1 symmetric > mtu 1518 > l2protocol cpsv tunnel > > l2vpn > xconnect group eline > p2p company-a >interface TenGigE0/0/0/1.103 >neighbor ipv4 10.101.44.2 pw-id 2995 > > verify > > sh l2v xcon group eline xc-name company-a > sh l2v xcon group eline xc-name company-a detail > sh l2v xcon group eline xc-name company-a detail | in MTU > > ** > > Sorry I don't have a 6500, but if 6500 is like a IOS-based ME3600 > then > > interface Loopback0 > ip address 10.101.44.2 255.255.255.255 > > interface GigabitEthernet0/5 > description eline - company-a > switchport trunk allowed vlan none > switchport mode trunk > load-interval 30 > service instance 1 ethernet > encapsulation default > l2protocol tunnel > xconnect 10.101.0.15 2995 encapsulation mpls >mtu 1500 > > verify... > > sh xcon int g0/5 > sh mpls l2 vc interface g0/5 > sh mpls l2 vc interface g0/5 detail > sh mpls l2 vc interface g0/5 detail | in MTU > > > - Aaron Gould > > ___ > cisco-nsp mailing list cisco-nsp@puck.nether.net > https://puck.nether.net/mailman/listinfo/cisco-nsp > archive at http://puck.nether.net/pipermail/cisco-nsp/ > ___ cisco-nsp mailing list cisco-nsp@puck.nether.net https://puck.nether.net/mailman/listinfo/cisco-nsp archive at http://puck.nether.net/pipermail/cisco-nsp/
Re: [c-nsp] config example xconnent between ASR9K and 6500
I put the MTU show command below, because we all know how much MTU is a gotcha in MPLS L2VPN's... ** 9k... interface Loopback0 ipv4 address 10.101.0.15 255.255.255.255 interface TenGigE0/0/0/1.103 l2transport description eline - company-a encapsulation dot1q 2995 rewrite ingress tag pop 1 symmetric mtu 1518 l2protocol cpsv tunnel l2vpn xconnect group eline p2p company-a interface TenGigE0/0/0/1.103 neighbor ipv4 10.101.44.2 pw-id 2995 verify sh l2v xcon group eline xc-name company-a sh l2v xcon group eline xc-name company-a detail sh l2v xcon group eline xc-name company-a detail | in MTU ** Sorry I don't have a 6500, but if 6500 is like a IOS-based ME3600 then interface Loopback0 ip address 10.101.44.2 255.255.255.255 interface GigabitEthernet0/5 description eline - company-a switchport trunk allowed vlan none switchport mode trunk load-interval 30 service instance 1 ethernet encapsulation default l2protocol tunnel xconnect 10.101.0.15 2995 encapsulation mpls mtu 1500 verify... sh xcon int g0/5 sh mpls l2 vc interface g0/5 sh mpls l2 vc interface g0/5 detail sh mpls l2 vc interface g0/5 detail | in MTU - Aaron Gould ___ cisco-nsp mailing list cisco-nsp@puck.nether.net https://puck.nether.net/mailman/listinfo/cisco-nsp archive at http://puck.nether.net/pipermail/cisco-nsp/
Re: [c-nsp] ISIS/BFD Monitoring
Kiwi syslogd or maybe splunk -Aaron ___ cisco-nsp mailing list cisco-nsp@puck.nether.net https://puck.nether.net/mailman/listinfo/cisco-nsp archive at http://puck.nether.net/pipermail/cisco-nsp/
[c-nsp] config example xconnent between ASR9K and 6500
Hi, any body has a configuration of a xconnect between two cisco devices ASR9K and 6500 with WS-SUP720-3B. thnks to every one that can help me !!! -- ___ cisco-nsp mailing list cisco-nsp@puck.nether.net https://puck.nether.net/mailman/listinfo/cisco-nsp archive at http://puck.nether.net/pipermail/cisco-nsp/
Re: [c-nsp] ASR 9k Multicast commands
On 9/15/17 12:33 AM, Mikael Abrahamsson wrote: On Thu, 14 Sep 2017, Harry Hambi - Atos wrote: HI All, Logged onto a ASR9k and trying to find commands to show me the following : BSR router "show pim bsr", there are multiple commands under that. Where pim is enabled. "show pim interface" ... assuming you have the mcast PIE installed, of course. ___ cisco-nsp mailing list cisco-nsp@puck.nether.net https://puck.nether.net/mailman/listinfo/cisco-nsp archive at http://puck.nether.net/pipermail/cisco-nsp/
Re: [c-nsp] ISIS/BFD Monitoring
RouteExplorer is a nice tool (Commercial, from Packet Design) On 15 Sep 2017 10:50 am, "Alex K."wrote: > Hello everyone, > > A customer of mine, ran into interesting problem - his monitoring software > unable to provide him with a meaningful alert, in case a link goes down. > > As an ISP, they have lots of links, they run ISIS/BFD on all of them but, > as it regularly happens with carriers, layer 2 never actually goes down > (apart from SDH and dark fiber links, but those are few). > > I tested their equipment (mainly Cisco gear) and all it generates, is a > trap wich basically say - "ISIS sission 657843347853325524854 went down". > > What they looking for, is a monitoring system, which on the scenario above, > is able to provide the NOC team with a meaningful alert, such as: "ISIS > status on interface changed to down. Please notify > the network team". > > Any suggestions and sharing of personal experience will be appreciated. > > Thank you. > ___ > cisco-nsp mailing list cisco-nsp@puck.nether.net > https://puck.nether.net/mailman/listinfo/cisco-nsp > archive at http://puck.nether.net/pipermail/cisco-nsp/ > ___ cisco-nsp mailing list cisco-nsp@puck.nether.net https://puck.nether.net/mailman/listinfo/cisco-nsp archive at http://puck.nether.net/pipermail/cisco-nsp/
[c-nsp] ISIS/BFD Monitoring
Hello everyone, A customer of mine, ran into interesting problem - his monitoring software unable to provide him with a meaningful alert, in case a link goes down. As an ISP, they have lots of links, they run ISIS/BFD on all of them but, as it regularly happens with carriers, layer 2 never actually goes down (apart from SDH and dark fiber links, but those are few). I tested their equipment (mainly Cisco gear) and all it generates, is a trap wich basically say - "ISIS sission 657843347853325524854 went down". What they looking for, is a monitoring system, which on the scenario above, is able to provide the NOC team with a meaningful alert, such as: "ISIS status on interface changed to down. Please notify the network team". Any suggestions and sharing of personal experience will be appreciated. Thank you. ___ cisco-nsp mailing list cisco-nsp@puck.nether.net https://puck.nether.net/mailman/listinfo/cisco-nsp archive at http://puck.nether.net/pipermail/cisco-nsp/