Re: [c-nsp] L2 over L3 scenario

2015-10-23 Thread Ge Moua
+1 for holistically thinking about the MTU issues (as the L2TPv3 headers 
shrinks the size of the payload of a std 1500 mtu, worse yet if you add 
ipsec on top of that for a "secure pseudowire" type setup)


Overlay features akin to VxLAN and eVPN were not mature at the time, but 
I would at least consider that now if feasible.


Contact me off-list I can provide topology diagrams for real-world 
deployments re: L2TPv3 (with and without IPsec).



Regards,
Ge Moua
moua0...@umn.edu

U of MN Alumnus
--

On 10/23/2015 05:30 AM, John Kougoulos wrote:

Hi,

On Fri, Oct 23, 2015 at 10:37 AM, james list <jameslis...@gmail.com> wrote:


I’d like to share experience, receive suggestions if any, alternatives if
any, recommendations, scalability numbers if any, etc.



Make sure to handle the MTU appropriately or your routers will start
fragmenting packets

Regards,
John.
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

Re: [c-nsp] Divide large PVST domain?

2014-07-10 Thread Ge Moua
I've seen good MST practice where the vlans per mst region/area are 
accounted for ahead of time to mitigate what you stated here.


ie, assign vlans by odd / even grouping for 2 mst regions (or more mst 
regions if desired by some other preferred method).


Regards,
Ge Moua
University of Minnesota Alumnus
moua0...@umn.edu
--

On 07/09/2014 11:14 AM, Victor Sudakov wrote:

Am I correct to assume that every time I need to move a vlan from one
MST instance to another, my whole MST domain will fall apart until the
MST reconfiguration is complete on all the switches?

Somehow I don't like this idea.


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] IOS: catch 22 when enabling new bgp neighbors

2014-06-20 Thread Ge Moua


method_1:
a. upload config_snippet to flash: (via method of choice tftp, 
sneaker-net via flash2, etc)

b. copy flash:/config_snippet.txt system:running.config

method_2:
b. copy tftp://ip_addr/config_snippet.txt system:running.config

I prefer method_1 as this mitigate dependencies on network 
connectivity.  However, both methods assume config syntax valid and QA'd 
(as error msgs will manifest to std_output, so avoid garbage in, garbage 
out scenario).



Regards,
Ge Moua
University of Minnesota Alumnus
moua0...@umn.edu
--

On 06/20/2014 09:39 AM, Lukas Tribus wrote:

copy'n'pasting from notepad is not
enough in that situation (somehow, the terminal slows down when pasting
the config to some 2 - 3 chars per second)


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] How to prevent https facebook from the cisco router 1841

2013-11-14 Thread Ge Moua

+1
dansguardian

Regards,
Ge Moua
moua0...@umn.edu
University of Minnesota Alumnus
--
 


On 11/13/13, 9:58 PM, mohamed nagy wrote:

archive athttp://puck.nether.net/pipermail/cisco-nsp/


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] How to prevent https facebook from the cisco router 1841

2013-11-14 Thread Ge Moua

+1
dansguardian

Regards,
Ge Moua
moua0...@umn.edu
University of Minnesota Alumnus
--
 


On 11/13/13, 9:58 PM, mohamed nagy wrote:

Hello ,

i need to prevent users to open Facebook https traffic from my router cisco
1841

i can put it as ip but is there any thing else because the ip way not
efficient

What is the best scenario for that ??
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] BGP Question

2013-10-22 Thread Ge Moua

inject map ?

--
Regards,
Ge Moua
Univ of Minn Alumnus
--

On 10/22/2013 10:28 AM, M K wrote:

Hi allI have a prefix that is originated let us say in AS 300 and the route is 
installed in the routing table normallyR1 (the router that receives the route) 
has an iBGP relation with R2Can I influence the origin of this prefix and 
advertise it to R2 ?
Thanks


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] PIM BiDir on Nexus

2013-06-20 Thread Ge Moua

Colin, thx for the feedback.

--
Regards,
Ge Moua
Univ of Minn Alumnus
--


On 06/19/2013 06:36 PM, Colin Whittaker wrote:

This was all M108 and M132 cards.

We were doing both pim bidir and pim-sm.

The fib bugs were rare enough but we had enough scale that even at
something like 1 in 1000 error rates ment that we saw it frequently.

Thankfully we turned off multicast about 6 months ago so only the
unicast bugs to deal with.

The FIB bugs all relate to a fundamental defect in the n7k software
architecture in that the sup never validates that the linecards have
received the updates sent to the them so I would expect the f2 to have
similar issues.
In addition to the multicast issues we have seen unicast fib
inconsistency and interface mtus not matching.

Colin

On Wed, Jun 19, 2013 at 05:16:32PM -0500, Ge Moua wrote:

Colin-
Thx for the feedback.  I'm looking at the the F2 cards on nx-7k; are you
doing this on the older M-series cards?  Also are you also doing
specifically BiDir PIM?  Standard PIM (SM specifically for use-case in
question here) seems to work but without some minor hiccups on the newer
F2 cards.  Thx again.

:-)

--
Regards,
Ge Moua
Univ of Minn Alumnus
--


On 06/19/2013 04:35 PM, Colin Whittaker wrote:

It works pretty well on n7k.

The multicast code is prone to a class of bugs on the 7k where the fibs
on the line cards get out of sync with the rib/mrib on the sup.

We had multiple instances of routers blackholing traffic after topology
changes because linecards had missing routes.
reloading the line card would fix it but it was always a bugger to find
the affected cards.

colin


On Wed, Jun 19, 2013 at 12:04:25PM -0500, Ge Moua wrote:

c-nsp folks:
Anyone out there looking to do PIM BiDir on Nexus?  There appears to be
some limitations with PIM BiDir on the nx-7k but the nx-6k may be a
viable option (albeit the hw arch between the nx-7k   nx-6k are not
exactly apples-for-apples).  I'd appreciate opinion/feedback from others
here.  Thanks in advance.


--
Regards,
Ge Moua
Univ of Minn Alumnus
--


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] PIM BiDir on Nexus

2013-06-19 Thread Ge Moua

c-nsp folks:
Anyone out there looking to do PIM BiDir on Nexus?  There appears to be 
some limitations with PIM BiDir on the nx-7k but the nx-6k may be a 
viable option (albeit the hw arch between the nx-7k  nx-6k are not 
exactly apples-for-apples).  I'd appreciate opinion/feedback from others 
here.  Thanks in advance.



--
Regards,
Ge Moua
Univ of Minn Alumnus
--


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] PIM BiDir on Nexus

2013-06-19 Thread Ge Moua

Colin-
Thx for the feedback.  I'm looking at the the F2 cards on nx-7k; are you 
doing this on the older M-series cards?  Also are you also doing 
specifically BiDir PIM?  Standard PIM (SM specifically for use-case in 
question here) seems to work but without some minor hiccups on the newer 
F2 cards.  Thx again.


:-)

--
Regards,
Ge Moua
Univ of Minn Alumnus
--


On 06/19/2013 04:35 PM, Colin Whittaker wrote:

It works pretty well on n7k.

The multicast code is prone to a class of bugs on the 7k where the fibs
on the line cards get out of sync with the rib/mrib on the sup.

We had multiple instances of routers blackholing traffic after topology
changes because linecards had missing routes.
reloading the line card would fix it but it was always a bugger to find
the affected cards.

colin


On Wed, Jun 19, 2013 at 12:04:25PM -0500, Ge Moua wrote:

c-nsp folks:
Anyone out there looking to do PIM BiDir on Nexus?  There appears to be
some limitations with PIM BiDir on the nx-7k but the nx-6k may be a
viable option (albeit the hw arch between the nx-7k  nx-6k are not
exactly apples-for-apples).  I'd appreciate opinion/feedback from others
here.  Thanks in advance.


--
Regards,
Ge Moua
Univ of Minn Alumnus
--


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] InfoBlox

2013-04-24 Thread Ge Moua

+2 for isc dhpcd  bind (sorry for being off-topic though).

--
Regards,
Ge Moua
moua0...@umn.edu

Univ of Minn Alumnus
--

On 4/24/13 1:12 PM, a.l.m.bu...@lboro.ac.uk wrote:

Hi,

My thoughts are that this group is very knowledgeable about all networking
topics and it makes sense to me

this group works because its a forum dedicated to a particular vendor
and specific remit. the SnR is pretty good and you get answers because
its a specific group FOR that purpose.   if you want to ask questions
about InfoBlox then visit/use an InfoBlox forumas its a commercial
product you could even ask them - have you got a maintenance contract?

offtopic personal view if thats how they've decided to engineer their kit
then so be it...if you want to do things on different interfaces then just
install your own Linux box and put your own copy of ISC DHCPD and BIND onto
it - then you can do whatever you want with whatever interfaces you've got..
(and no, c-nsp isnt here for when theres issues with that, use a Linux or ISC
mailing list ;-) )

now, back on topic, I'm using AAA/dot1X with multi-host but recent cisco
docs seem to suggest multi-auth is the way to go when theres a VOIP handset
present - any views?

alan
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] EIGRP as industry standard ?

2013-03-14 Thread Ge Moua

It was interesting to see an IETF doc about EIGRP:
http://tools.ietf.org/html/draft-savage-eigrp-00

I’m wondering if Cisco may be releasing this to the wider Internet 
community for possible industry standards consideration. While 
technically classified by Cisco as a distance-vector protocol, there are 
hybrid features of EIGRP that makes it attractive over traditional 
link-state IGPs like OSPF  IS-IS (which I'm a big fan of). However, 
what’s not so attractive is the proprietary nature (tied to Cisco) and 
lack of support on other big name vendor equipment. Maybe Cisco is 
looking to change this in the horizon.


I'd be interested to know what other ppl way smarter than me thinks. 
Thanks for your feedback.


--
Regards,
Ge Moua
Univ of Minn Alumnus
--





___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ip tcp adjust-mss

2013-02-11 Thread Ge Moua
This comes in handy when one jams a bunch of headers together but then 
constraints payload size which would result in frag/defrag and may lead 
to decreased throughput/performance.


ex: use case I think of would be user facing before encaps into maybe 
something like gnarly like gre inside ipsec facing Internet (where MTU 
can not be controlled is likely to be assumed = 1500 ).


--
Regards,
Ge Moua
Univ of Minn Alumnus
--


On 02/11/2013 01:56 PM, Eric A Louie wrote:

I just put in this command on my upstream interfaces to help my mpls network
pass traffic - that is, my effort to eliminate fragmentation in my backbone.

Is anyone else using this method of mtu control?  I need some support - my CEO
is asking why I have to do this, and who else does it, and is it a common
practice, etc, so I'm looking for evidence, more than just The Cisco TAC told
me to do it.

thanks

  Much appreciated, Eric
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ip tcp adjust-mss

2013-02-11 Thread Ge Moua
For UDP, one would have to do something like touch the end-hosts and 
adjust mtu size on the ip_stack itself.  Not very scalable and may 
require too much touch-points (also would be somewhat permanent).


Some client vpn shims do this to end-hosts after installations of said 
software.


--
Regards,
Ge Moua
Univ of Minn Alumnus
--


On 02/11/2013 02:25 PM, Peter Rathlev wrote:

TCP MSS adjusting only works for TCP and probably puts an extra load on
the CPU of the router.

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ASA5510 in transparent with multiple subnets

2012-12-01 Thread Ge Moua

You should be able to do transparent mode, multiple interfaces.

--
Regards,
Ge Moua
moua0...@umn.edu

Univ of Minn Alumnus
--

On 11/30/12 5:33 PM, Lee Starnes wrote:

Hello everyone,

I was looking through documentation for the ASA5510 as we have a client who
is running one in transparent mode. They need to add an additional IP block
to their network and from what I am able to gather, it looks like you can
not add a second /28 to their network configuration. Am I reading this
correctly?

Thanks,

-Lee
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Linux BGP tool

2012-11-06 Thread Ge Moua

+1 for Quagga on *BSD

You mentioned Linux and there is port for that too.

--
Regards,
Ge Moua
Univ of Minn Alumnus
--


On 11/06/2012 01:11 AM, CiscoNSP_list CiscoNSP_list wrote:





Hi Guys,


Looking for a linux bgp utility to inject full bgp tables into our Lab Cisco 
ASR1000 (To simulate real-world peering taking multiple full tables)


Any suggestions?

Cheers.

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Overflows During Microbursts on Cisco Switch

2012-10-30 Thread Ge Moua

+1 for:
* get a reasonable switch

maybe something like a 2960-X (or higher) will provide for deeper 
buffers during micro-burst use case.


--
Regards,
Ge Moua
Univ of Minn Alumnus
--


On 10/30/2012 08:46 AM, Gert Doering wrote:

Hi,

On Tue, Oct 30, 2012 at 04:01:45PM +0300, Righa Shake wrote:

I would like to get to understand how I can solve a problem of buffer
overflows during microbursts on a 2960 Cisco Switch.

- turn off mls qos
- increase egress bandwidth (2x or 4x GE channel)
- get a reasonable switch

gert


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] DHCP NAT router limitations

2012-05-31 Thread Ge Moua
Those Cisco ISR-G1 mostly punt NAT ( DHCP) functionality to CPU as such 
you may have scalability issues for the NATs for CPU resource usage.  
I've seen ASA5550 do 65k NAT connections with minimal CPU load (I'm 
sure the lower ASA models can achieve similar results depending on how 
much memory on board).


I'd concur that throughput of ~ 100Mbps without NAT can be easily done 
by these ISR-G1 models.


--
Regards,
Ge Moua

Univ of Minn Alumnus
--


On 05/31/2012 06:39 AM, Rens wrote:

Where do you get that info that a 1841  2811 can't do this?

They do fine average Internet traffic @ 50Mbps

I got 2811's doing 100Mbps



Indeed my wifi setup can cope with 2K connections



From: aled.w.mor...@googlemail.com [mailto:aled.w.mor...@googlemail.com] On
Behalf Of Aled Morris
Sent: woensdag 30 mei 2012 17:09
To: Rens
Cc: cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] DHCP  NAT router limitations



On 30 May 2012 11:17, Rensr...@autempspourmoi.be  wrote:

For a one day wifi event I'm looking which kind of router can be used to
deliver DHCP  NAT for 1000-2000 simultaneous users

Total WAN capacity will be +- 50Mbps

Would a 1841 or a 2811 be able to handle all this NAT/DHCP?


Neither of these would cope with 50Mbps even without the NAT.

If you are purely Ethernet then the cheapest Cisco solution would be an
ASA5505

I assume you've already got a wifi setup that can cope with 2,000
connections.

Aled


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Internet inside a VRF?

2012-03-13 Thread Ge Moua

In RE networks, separation of commodity Internet-1 and Internet-2 traffic.

--
Regards,
Ge Moua

University of Minnesota Alumnus
Email: moua0...@umn.edu
--


On 3/13/12 8:17 PM, Jose Madrid wrote:

I would like to understand why you guys would do this? What is the
reasoning behind this? Super granular control? Cant this level of
granularity be achieved with route-maps?

Sent from my iPhone

On Mar 13, 2012, at 8:27 PM, Dan Armstrongd...@beanfield.com  wrote:


We have all our Internet peers and customers inside a VRF currently, and our 
Cisco SE thinks we're stark raving mad, and should redesign and put everything 
back in the global table.


This is all on ASR 9Ks and 7600s.





On 2012-03-13, at 8:12 PM, Pshem Kowalczyk wrote:


Hi,

On 14 March 2012 11:59, Dan Armstrongd...@beanfield.com  wrote:

I know this topic has been discussed a million times, but just wanted to get an 
updated opinion on how people are feeling about this:


In a service provider network, how do people feel about putting the big 
Internet routing table, all their peers and customers inside a VRF?  Keep the 
global table for just infrastructure links…

In my previous role we've done just that. One internet VRF for all
transit functions, separate vrfs for peering and customers and
import-export statements to tie them all together. All done on ASR1k
(mainly 1006, but a few of 1002 as well).

kind regards
Pshem


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] TACACS vs RADIUS

2012-02-29 Thread Ge Moua

+1 Radiator

--
Regards,
Ge Moua

University of Minnesota Alumnus
Email: moua0...@umn.edu
--


On 2/29/12 2:05 AM, Oscar Zovo wrote:

Have you heard of Radiator (http://www.open.com.au/radiator/index.html)?
Its a RADIUS server with support for TACACS,
The good with Radiator is that it supports a wide range of authentication
methods and is very flexible for authentication and authorization schemas.
You can use the same rules for RADIUS and retain the authorization and
accounting facilities provided by TACACS.

Best Regards,
Zovo

On Tue, Feb 28, 2012 at 4:17 AM, Jason 'XenoPhage' Frisvold
xenoph...@godshell.com  wrote:


On Feb 27, 2012, at 8:25 PM, Nick Hilliard wrote:

www.shrubbery.net/tac_plus/

Cisco wrote the original version but hasn't contributed anything for some
years.  One great feature of this daemon is that it doesn't have a GUI,

and

that it's fully configuration file based.

Obviously if you don't like it, you should use something else.

Actually, that's what we're using now and it works great.  I was looking
elsewhere because we have RADIUS which we need, and we have LDAP, which we
need..  Mayhaps we can have tac_plus talk to LDAP?  Though I haven't seen a
way to do that as of yet ...


Nick

---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
---
Any sufficiently advanced magic is indistinguishable from technology.
- Niven's Inverse of Clarke's Third Law




___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] dot1Q trunk, not point-to-point

2012-02-28 Thread Ge Moua

re: VTP

I've seen where if VTP frames arrive as out-of-order, then they get 
discarded/dropped (albeit not with the specific implementation you are 
looking at).


--
Regards,
Ge Moua

University of Minnesota Alumnus
Email: moua0...@umn.edu
--


On 2/28/12 8:26 AM, Victor Sudakov wrote:

Phil Mayers wrote:

Is it required that a 802.1Q trunk is a point-to-point link between
exactly two switches? What if I have several switches with trunk ports
connected to a shared medium, should I expect problems?

No. It should work fine.

Any possible problems with VTP and DTP?


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] IPSEC Remote access to MPLS VPN

2012-02-21 Thread Ge Moua

See below for exemplar for vrf-aware ra-vpn on IOS:

!! c7206vxr / npe-g1 / vam2+
!
ip vrf VRF-LITE_RA-VPN
 description (VRF Lite) RA-VPN to (MPLS VRF) RA-VPN for remote access 
vpn applications

 rd 200:1000

aaa authorization network aaa-list local group 
AAA-AUTHORIZATION_GROUP-LIST_LOCAL

aaa authentication login AAA-AUTHENTICATION_LIST_LOCAL local

ip local pool IP-POOL_RA-VPN 192.168.50.177 192.168.50.188

access-list 100 remark ## [START] Extended ACL 100 ##
access-list 100 remark ## Facilitate Split-Tunneling for Remote Access 
IPSec Clients to RA-VRF VRF ##
access-list 100 remark ## Match Egress Traffic Sourced from RA-VPN VRF 
 Enable Crypto Encryption ##
access-list 100 remark ## Bypass Crypto for Non-matching Egress Traffic 
 Punt to Clear-Text ##

access-list 100 permit ip 172.16.48.0 0.0.15.255 any
access-list 100 permit ip 172.16.1.0 0.0.1.255 any
access-list 100 remark ## [END] Extended ACL 100 ##

crypto isakmp client configuration group CRYPTO-GROUP_RA-VPN-CENTSEC
 key removed.
 dns ip_addr_1 ip_addr_2
 domain domain_suffix
 pool IP-POOL_RA-VPN
 acl 100
 netmask 255.255.255.248

crypto isakmp profile ISAKMP-PROFILE_RA-VPN
   description ## Crypto ISAKMP Profile (VRF-Aware IPSec) * RA IPSec 
VPN to RA-VPN VRF ##

   vrf RA-VPN
   match identity group CRYPTO-GROUP_RA-VPN
   !
   client authentication list AAA-AUTHENTICATION_LIST_LOCAL
   isakmp authorization list AAA-AUTHORIZATION_GROUP-LIST_LOCAL
   !
   client configuration address initiate
   client configuration address respond

crypto dynamic-map CRYPTO-DYNAMIC-MAP_RA-VPN 1
 set transform-set TRANSFORM-SET_3DES-SHA
 set isakmp-profile ISAKMP-PROFILE_RA-VPN
 reverse-route

crypto map CRYPTO-MAP_RA-VPN 1 ipsec-isakmp dynamic 
CRYPTO-DYNAMIC-MAP_RA-VPN


!
interface GigabitEthernet0/1.791
 description VRF-aware IPSec front-door VRF termination
 encapsulation dot1Q 791
 ip vrf forwarding RA-VPN
 ip address ip_addr subnet_mask
 ip flow ingress
 logging event subif-link-status
 snmp trap link-status
 standby delay reload 120
 standby version 2
 standby 791 ip hsrp_vip
 standby 791 preempt
 standby 791 name HA-FVRF_RA-VPN
 standby 791 track GigabitEthernet0/2.3565
 crypto map CRYPTO-MAP_RA-VPN redundancy HA-FVRF_RA-VPN
 !
 no shut

interface GigabitEthernet0/2.3565
 description VRF-aware IPSec inside VRF decryption
 encapsulation dot1Q 3565
 ip vrf forwarding RA-VPN
 ip address ip_addr subnet_mask
 ip flow ingress
 logging event subif-link-status
 snmp trap link-status
 standby delay reload 120
 standby version 2
 standby 3565 ip hsrp_vip
 standby 3565 preempt
 standby 3565 name HA-IVRF_RA-VPN
 standby 3565 track GigabitEthernet0/1.791
 !
 no shut

!! route  return path to orginating ipsec clients from front-door VRF 
RA-VPN !!

!
ip route vrf RA-VPN 0.0.0.0 0.0.0.0 fvrf_next_hop name Dest: Default 
Route * Next-Hop: node_name * Descr: (VRF-Lite) RA-VPN to (MPLS VRF) 
'RA-VPN'

!
!! route to inside VRF RA-VPN !!
ip route vrf RA-VPN 172.16.48.0 255.255.240.0 192.168.140.118 name 
Dest: /20 CIDR Summary Route * Next-Hop: node_name * Descr: 'RA-VPN' 
MPLS VRF
ip route vrf RA-VPN 172.16.0.0 255.255.254.0 192.168.140.118 name Dest: 
/23 CIDR Summary Route * Next-Hop: node_name * Descr: 'RA-VPN' MPLS VRF



--
Regards,
Ge Moua

University of Minnesota Alumnus
Email: moua0...@umn.edu
--


On 2/15/12 3:21 AM, Ge Moua wrote:

+ hw_platforms
* 7206 vxr / npe-g1 / vam2+
* 18xx ISR / 28xx ISR / 28xx ISR2
+ sw
* 12.4 (x) T
* 15.x (x) T

The only significant problem we ran into was for the use case of RRI 
there was a bug that didn't populate the next-hop correctly and this 
had to be manually specified; hopefully cisco has fixed this by now:
http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetailsbugId=CSCtg41606 



Give me some time to scrub the configs and I'll send them off-line to you.

--
Regards,
Ge Moua

University of Minnesota Alumnus
Email:moua0...@umn.edu
--

On 2/15/12 3:07 AM, ar wrote:

Hi Ge.

Thanks for your response.
What platform did you use? 7200 also?
Can you share your template?
I'll try the following:
-site to site
- remote access using vpn client software (Cisco/microsoft)
- SSL VPN if possible


*From:* Ge Moua moua0...@gmail.com
*To:* ar_...@yahoo.com
*Sent:* Wednesday, February 15, 2012 12:52 AM
*Subject:* Re: [c-nsp] IPSEC Remote access to MPLS VPN

We did all of the requirements you mentioned at the Univ of Minn.

As you mentioned, the documentation is out there but not nicely in 
one area of Cisco CCO land.


You're looking down the right path with vrf-aware IPSec.  We 
experimented with both flavors:

* full blown mpls/bgp/vrf (6VPE / 4VPE)
* vrf-lite

In the end we thought doing the vrf-lite option then mapping these to 
6VPE / 4VPE mpls-bgp provided the best options for functionality  
config flexibility:

* well defined front-door vrf to inside-vrf mapping (native ip)
* native ip termination

Re: [c-nsp] IPSEC Remote access to MPLS VPN

2012-02-15 Thread Ge Moua

We did all of the requirements you mentioned at the Univ of Minn.

As you mentioned, the documentation is out there but not nicely in one
area of Cisco CCO land.

You're looking down the right path with vrf-aware IPSec.  We
experimented with both flavors:
* full blown mpls/bgp/vrf (6VPE / 4VPE)
* vrf-lite

In the end we thought doing the vrf-lite option then mapping these to
6VPE / 4VPE mpls-bgp provided the best options for functionality 
config flexibility:
* well defined front-door vrf to inside-vrf mapping (native ip)
* native ip termination for front-door vrf (vs. 6vpe / 4vpe will be
ldp/mpls at front-door vrf  limited to default table unless you start
dealing with complexity of route-leaking RD/RT; violated KISS in my
opinion).

Contact me off-list and I'll share config exemplars for what you are
looking for.

--
Regards,
Ge Moua

University of Minnesota Alumnus
Email: moua0...@umn.edu
--


On 2/15/12 2:09 AM, ar wrote:

Hi Guys.

I would like to setup a remote access IPSEC/SSL VPN then maps to MPLS VPN/VRFs.
I'm thinking of using 7206VXR as the concentrator/PE for this.
Remote clients will use cisco/microsoft vpn clients.
Site-to-site vpn will be supported too.


Anyone has good documentation for configuration?
I'm reading vrf-aware ipsec but it seems to lack more configurations options.

Any comments?

thanks
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] IPSEC Remote access to MPLS VPN

2012-02-15 Thread Ge Moua

+ hw_platforms
* 7206 vxr / npe-g1 / vam2+
* 18xx ISR / 28xx ISR / 28xx ISR2
+ sw
* 12.4 (x) T
* 15.x (x) T

The only significant problem we ran into was for the use case of RRI 
there was a bug that didn't populate the next-hop correctly and this had 
to be manually specified; hopefully cisco has fixed this by now:
http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetailsbugId=CSCtg41606 



Give me some time to scrub the configs and I'll send them off-line to you.

--
Regards,
Ge Moua

University of Minnesota Alumnus
Email: moua0...@umn.edu
--


On 2/15/12 3:07 AM, ar wrote:

Hi Ge.

Thanks for your response.
What platform did you use? 7200 also?
Can you share your template?
I'll try the following:
-site to site
- remote access using vpn client software (Cisco/microsoft)
- SSL VPN if possible


*From:* Ge Moua moua0...@gmail.com
*To:* ar_...@yahoo.com
*Sent:* Wednesday, February 15, 2012 12:52 AM
*Subject:* Re: [c-nsp] IPSEC Remote access to MPLS VPN

We did all of the requirements you mentioned at the Univ of Minn.

As you mentioned, the documentation is out there but not nicely in one 
area of Cisco CCO land.


You're looking down the right path with vrf-aware IPSec.  We 
experimented with both flavors:

* full blown mpls/bgp/vrf (6VPE / 4VPE)
* vrf-lite

In the end we thought doing the vrf-lite option then mapping these to 
6VPE / 4VPE mpls-bgp provided the best options for functionality  
config flexibility:

* well defined front-door vrf to inside-vrf mapping (native ip)
* native ip termination for front-door vrf (vs. 6vpe / 4vpe will be 
ldp/mpls at front-door vrf  limited to default table unless you start 
dealing with complexity of route-leaking RD/RT; violated KISS in my 
opinion).


Contact me off-list and I'll share config exemplars for what you are 
looking for.


--
Regards,
Ge Moua

University of Minnesota Alumnus
Email: moua0...@umn.edu mailto:moua0...@umn.edu
--


On 2/15/12 2:09 AM, ar wrote:
 Hi Guys.

 I would like to setup a remote access IPSEC/SSL VPN then maps to 
MPLS VPN/VRFs.

 I'm thinking of using 7206VXR as the concentrator/PE for this.
 Remote clients will use cisco/microsoft vpn clients.
 Site-to-site vpn will be supported too.


 Anyone has good documentation for configuration?
 I'm reading vrf-aware ipsec but it seems to lack more configurations 
options.


 Any comments?

 thanks
 ___
 cisco-nsp mailing list cisco-nsp@puck.nether.net 
mailto:cisco-nsp@puck.nether.net

 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/



___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] private use for 4byte ASN

2012-02-15 Thread Ge Moua
Does anyone know if there is a RFC standard that define private use of 
(32bit) 4byte ASN?  I was hoping that since 4byte ASN allows for a much 
larger range then the same would be for best-practice use of private ASN 
as well.


--
Regards,
Ge Moua
moua0...@umn.edu
--


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] private use for 4byte ASN

2012-02-15 Thread Ge Moua

Hi
David K-
Your the second person who's told me that; thanks.

For a large organization with a few thousand branch sites (using BGP for 
internal inter-connectivity and without the need to advertise the 
AS_Path to the pubic Internet), I was thinking it be nice designate a 
private ASN per site.


Of course this count would exceed that of what 2byte / 16 bit ASN would 
prescribe per RFC-1930.  I was hoping that maybe the use of 4byte / 
32bit ASN would provide an expanded range of private ASN to meet this 
requirement.


I was hoping to avoid BGP trickery such AS-overide and the like.

Thanks again for the feedback.

--
Regards,
Ge Moua

University of Minnesota Alumnus
Email: moua0...@umn.edu
--


On 2/15/12 5:16 PM, Daniel Kratz wrote:

Hi Ge Moua,

IANA did not allocate 4bytes AS to private use[1].  Probably they 
considered that the range between 64512 ~ 65534 from 16bits ASN is enough.
The 32bits ASN is easy to get/justify than 16bits ASN... Same thinking 
is valid to get an IPV6 CIDR.


[]'s
Kratz


[1] - IANA Autonomous System Numbers
http://www.iana.org/assignments/as-numbers/as-numbers.xml

2012/2/15 Ge Moua moua0...@umn.edu mailto:moua0...@umn.edu

Does anyone know if there is a RFC standard that define private
use of (32bit) 4byte ASN?  I was hoping that since 4byte ASN
allows for a much larger range then the same would be for
best-practice use of private ASN as well.

--
Regards,
Ge Moua
moua0...@umn.edu mailto:moua0...@umn.edu
--


___
cisco-nsp mailing list cisco-nsp@puck.nether.net
mailto:cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/




--
Any fool can know. The point is to understand.
Albert Einstein

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] EoMPLS ?s

2011-10-13 Thread Ge Moua
Once upon a time, we too did this between two sites about 90 miles apart 
with:

* a transport in the middle with a partner/service provider doing MPLS CsC
* on the edge sites with EoMPLS

lesson learned:
* as previously mentioned already, do as large MTU as possible for all 
transit links

* large MTU at the core

we had a situation where we forgot to enable jumbo frame one of the core 
transit links  needless to say traffic traversing that path was being 
dropped if pkt size was greater than that specify MTU (which was just 
the default of 1500); fix was to enable jumbo frame there too then all 
was working


MPLS is pretty unforgiving in that area (also as previously mentioned)

--
Regards,
Ge Moua
Univ of Minn Alumnus
--


On 10/12/11 3:02 PM, Arie Vayner (avayner) wrote:

Jason,

There is no fragmentation in MPLS. Either you can forward the packet, or
it is dropped.
You need to either have a larger MTU on the core (usually the way it is
implemented today), or reduce MTU at both sides.
As this is a L2 link, you can't use things like MSS adjust etc...

Arie

-Original Message-
From: cisco-nsp-boun...@puck.nether.net
[mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of Jason LeBlanc
Sent: Wednesday, October 12, 2011 20:53
To: cisco-nsp@puck.nether.net
Subject: [c-nsp] EoMPLS ?s

We're considering using EoMPLS port mode to bridge two datacenters
together temporarily for a move using sup720-3BXL on both ends with 6724
blades, probably 2 or 4 gig links, possibly 10g if I can get them to buy
the HW.  The question I have primarily is with regard to MTU.  I have
heard there are issues with ensuring both sides match, not much concern
there.  But the network between the two facilities may be lower than the
1518 bytes, causing fragmentation.  I know this gets punted to the RP,
and is going to be a problem.  Is there any work around?

Thanks,
Jason
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] EoMPLS ?s

2011-10-13 Thread Ge Moua
In the past, we've used hw engines like the Cisco PXF (NSE-1xx) on the 
73xx router platforms to do hw-based L2TPv3 processing; otherwise L2TPv3 
in CPU is very resource intensive.


One can also consider doing something like MPLSoGRE/ATOM, then allow for 
the L3/GRE headers to do frag/defrag where needed (for 1500 MTU links).  
Throughput may be a concern here as frag/defrag typically punted to CPU 
(unless there are ASICS now that can do that which I'm not aware of).  
There are platforms that handle GRE processing in hw, but not 
necessarily fragmentation for the large payload inside the GRE pkts.


I've been told by Cisco TAC that one should do some baseline testing 
then see if performance related to chosen transport/signaling 
methodology is sufficient base on needs.


Also on more than one occasion, Cisco TAC has recommended a MPLS 
transport variation for extending L2 nets in-lieu of doing L2 over 
native IP like L2TPv3 (assuming one already have a MPLS core); 
justification was something about more SMEs for MPLS vs L2TPv3.


Good luck.

--
Regards,
Ge Moua
Univ of Minn Alumnus
--


On 10/13/11 11:00 AM, Jason LeBlanc wrote:
I may not be able to use this option then as I have no control of MTU 
between the sites, and I am assuming it is 1500 bytes.  No room for 
MPLS headers.  Not sure I can get the throughput with L2TPv3 unless 
this can be done in HW on some platform.


On 10/13/2011 09:19 AM, Ge Moua wrote:
Once upon a time, we too did this between two sites about 90 miles 
apart with:
* a transport in the middle with a partner/service provider doing 
MPLS CsC

* on the edge sites with EoMPLS

lesson learned:
* as previously mentioned already, do as large MTU as possible for 
all transit links

* large MTU at the core

we had a situation where we forgot to enable jumbo frame one of the 
core transit links  needless to say traffic traversing that path was 
being dropped if pkt size was greater than that specify MTU (which 
was just the default of 1500); fix was to enable jumbo frame there 
too then all was working


MPLS is pretty unforgiving in that area (also as previously mentioned)

--
Regards,
Ge Moua
Univ of Minn Alumnus
--


On 10/12/11 3:02 PM, Arie Vayner (avayner) wrote:

Jason,

There is no fragmentation in MPLS. Either you can forward the 
packet, or

it is dropped.
You need to either have a larger MTU on the core (usually the way it is
implemented today), or reduce MTU at both sides.
As this is a L2 link, you can't use things like MSS adjust etc...

Arie

-Original Message-
From: cisco-nsp-boun...@puck.nether.net
[mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of Jason LeBlanc
Sent: Wednesday, October 12, 2011 20:53
To: cisco-nsp@puck.nether.net
Subject: [c-nsp] EoMPLS ?s

We're considering using EoMPLS port mode to bridge two datacenters
together temporarily for a move using sup720-3BXL on both ends with 
6724
blades, probably 2 or 4 gig links, possibly 10g if I can get them to 
buy

the HW.  The question I have primarily is with regard to MTU.  I have
heard there are issues with ensuring both sides match, not much concern
there.  But the network between the two facilities may be lower than 
the

1518 bytes, causing fragmentation.  I know this gets punted to the RP,
and is going to be a problem.  Is there any work around?

Thanks,
Jason
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Open Source netflow recommendations

2011-05-18 Thread Ge Moua
If vendors start playing games with license fees per feature (to pad their
revenues), then one either conform or work-around them.  If this pertains to
netflow, I've done something like the following in the past:
* span traffic to pkt collector
* on pkt collector, run something like fprobe to convert raw pkt to flow
format
* export flow to said flow collector

This man-in-the-middle approach may be somewhat silly to bypass licensed
netflow feature, and could be moot if one needed another license to do
spans.

Regards,
Ge Moua



On Wed, May 18, 2011 at 8:13 AM, Justin M. Streiner strei...@cluebyfour.org
 wrote:

 On Tue, 17 May 2011, Lee Starnes wrote:

  Does anyone have any recommendations for an open source netflow solution?
 If
 there is nothing out there, what is recommended in the non-open source
 world? Are there any to absolutely stay away from?


 The answer to that question would depend on what you want to do with the
 Netflow data you collect.  If you're mainly interested in generating graphs
 and top-talker reports, NFSen/NFDump is a very usable option.

 If you're looking for something that does more than that, then you're
 getting into the realm of commercial applications.

 Another increasingly important question is if you want or need Netflow
 v9/v10 (IPFIX) support, to get Netflow data for IPv6 traffic.  This becomes
 important, not only in terms of gauging the capabilities of your Netflow
 collection/analysis setup, but also determining features and pricing for new
 router hardware/software/licensing.  Both Cisco and Juniper are moving
 toward a model where certain features need to be individually licensed and
 activated, or additional hardware needs to be purchased (Juniper's
 Multiservices PICs/MPCs for the M/MX platforms comes to mind).

 jms

 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] FWSM upgrade

2011-03-31 Thread Ge Moua

i agree with tony here.

if you are somewhat paranoid; then take the compact flash and do:
dd to snapshot image
dd snapshot image to another compact flash with same capacity

if anything goes wrong with the upgrade then you have an exact replica 
of the previous f/s, ios, etc.


the fwsm is some linux derivative with a vanilla boot partition  ext 
filesystem


i've done this before and this works well.


--
Regards,
Ge Moua

Network Design Engineer
University of Minnesota | OIT - NTS
--


On 3/31/11 3:05 PM, Tony Varriale wrote:


I would save my config, load the software then reload.  3.1x to 3.2x 
isn't anything big.  If you are already on 3.1 you have the correct 
maintenance software.


http://www.cisco.com/en/US/docs/security/fwsm/fwsm31/upgrade/guide/fwsm31up.html#wp2070189 



tv 

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ME6524 dying

2011-03-15 Thread Ge Moua
we've got similar boxes at a few large remote sites doing similar 
functionality as yours, and these run pretty rock solid with the 
exception of running into a few IOS bugs here  there:


sh inv
NAME: ME-C6524GS-8S, DESCR: Cisco Systems Catalyst 6500 1.5 RU 
virtual Chassis System

PID: ME-C6524GS-8S , VID: V03, SN: CAT1203C01Y


--
Regards,
Ge Moua

Network Design Engineer
University of Minnesota | OIT - NTS
--


On 3/15/11 9:38 AM, Bernhard Schmidt wrote:

Hi,

we have a ME6524-GT series in a remote location that keeps dying on us
every couple of weeks. Symptoms are:

* All routing protocols and LLDP time out on our side
* Physically the box looks fine, Status LED and even the link LEDs are
   still green
   - I cannot really say something about the physical link status, since
 the link in question does not forward link-state to our side
* Console is dead, no reaction at all
   - we do not have any OOB equipment on location yet, so I cannot tell
 whether it emitted a dying gasp
* CPU, Memory, all look normal up to five minutes before the crash
* remote syslog is enabled, nothing visible in it
* no crashdump on any file system
* looks fine after power cycle, no warnings anywhere

The box is not doing much at all, OSPFv2/v3, MPLS LDP and BGP towards
our core and one partial transit, maybe 4000 prefixes, 200 Mbps of
traffic.

Up to now we have been running 12.2(33)SXI5 Adv.IP non-modular, I have
now downgraded to SXI4.

This is my first Cisco ever that isn't even accessible on the console
anymore when it crashes. Has anyone seen something similar?

Best Regards,
Bernhard

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Leaking global into VRF

2011-03-11 Thread Ge Moua

some of these issues are addressed in previous post; search for:
*VRF and STATIC ROUTE to GLOBAL*

--
Regards,
Ge Moua

Network Design Engineer
University of Minnesota | OIT - NTS
--


On 3/11/11 4:40 AM, Anrey Teslenko wrote:

Hello.
We have same issue, which you discussed here.
How we can configure route back to the VRF if routes inside it getting
through eBGP?

According this
http://www.cisco.com/en/US/tech/tk436/tk832/technologies_configuration_example09186a0080231a3e.shtml
we can do that only for static routes.

How do Dynamic Route leaking from VRF to Global?

Thanks for advise


2010/11/9 Harold Ritterhrit...@cisco.com


Jason,

Remember that the traffic will be forwarded according to the global routing
table, so you do not need a label unless you have a BGP free core. Does the
destination have a route back to the VRF route though?

Regards

Le 2010-11-09 à 08:45, Jason Lixfeld a écrit :


On 2010-11-09, at 1:18 AM, Oliver Boehmer (oboehmer) wrote:


Jason,


I'm trying to lab up a scenario where I can leak routes from the

global

table into a VRF, but I'm running up against an issue and I'm hoping

someone

here can point out where I might be misstepping.

My P router is also my peering router.  That is, in addition to it's P
duties, it also speaks eBGP to another autonomous system.  I want to

take

the eBGP learned prefixes and import them into a VRF.  This part seems

to

work, but the issue is that the adjacent PE doesn't seem to see the

prefix

that has been imported.  The PE sees the global entry, but it doesn't

see

the prefix in the vpnv4 AF for the VRF in question.

This looks expected as a PE router (your peering router) importing a
prefix from another VRF (or from global in your case) into a VRF never
exports this prefix from the importing VRF into vpnv4. So in your case,
you need the import ipv4 unicast map VRF-IMPORT on all PE routers
needing the prefix.

Interesting.  I was of the belief that MPBGP would take care of

announcing these prefixes once leaked into a VRF AF.  Have I misunderstood
the extent of MPBGP here, or is there another way to do it that uses (MP)BGP
in some way?

Until then, I've set import ipv4 ... on all the PEs down the line, and

while the prefix is now seen inside the VRF on all the devices I expect it
to, my packets still don't seem to be getting to where I want them to go.
  That is, they seem to be going nowhere.  I think one reason why is because
no routers inside my network have a label associated with the eBGP prefix
I'm trying to reach:

P1#show ip route vrf INTERNET 7.7.7.7

Routing Table: INTERNET
Routing entry for 7.7.7.7/32
  Known via bgp , distance 20, metric 0
  Tag 1, type external
  Last update from 7.0.0.1 00:02:38 ago
  Routing Descriptor Blocks:
  * 7.0.0.1 (default), from 7.0.0.1, 00:02:38 ago
  Route metric is 0, traffic share count is 1
  AS Hops 1
  Route tag 1
  MPLS label: none
P1#

And if this is potentially the root cause, how to get a label on this

prefix isn't clear to me.  This is an eBGP prefix from an outside AS.  They
have no knowledge that their announcements are ultimately going to end up in
a VRF once they get over to us.  I only mention that incase it turns out to
be part of the problem.

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Harold Ritter
Directeur Technique/Technical Leader
Advanced Services Central Engineering
CCIE 4168 (RS, SP)

har...@cisco.com
Téléphone: 514 847 6856

Les Systèmes Cisco
1800 McGill College
Suite 700
Montréal, Québec H3A 3J6
Canada









___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Searching for cheap IPv6 NAT-PT Cisco-device

2011-02-25 Thread Ge Moua
what about the option of doing a 6to4 relay; we do this with some 
low-end c2621xm routers and these work just fine


--
Regards,
Ge Moua

Network Design Engineer
University of Minnesota | OIT - NTS
--


On 2/25/11 7:17 AM, Andreas Mueller wrote:


Hello,

I would like to connect IPv4-only devices like printers to an 
IPv6-only Network and I thought about doing this with NAT-PT on a 
cisco-device. To play around with NAT-PT and do some tests I need a 
cheap device.
According to the cisco document Implementing NAT-PT for IPv6 
(http://www.cisco.com/en/US/docs/ios/ipv6/configuration/guide/ip6-nat_trnsln_ps6350_TSD_Products_Configuration_Guide_Chapter.html)
I need IOS 12.4(2)T if I want to use all the available features. What 
is the cheapest cisco-device with at least two or better four fast 
ethernet ports running IOS 12.4(2)T to evaluate, if configuring NAT-PT 
is a solution for my problem ?


greetings and thanks for help,

Andreas


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] 6509 IPv6 OSPF Auth

2011-02-18 Thread Ge Moua
I agree with Nick's well written point.  That is why I like a link-state 
IGP like IS-IS where one does have the option of running IPv6 with 
authentication and not have to worry about different versions of said 
dynamic routing protocol, but this is clearly deviating from the initial 
question/issue.


--
Regards,
Ge Moua

Network Design Engineer
University of Minnesota | OIT - NTS
--


On 2/18/11 12:36 PM, Nick Hilliard wrote:

On 18/02/2011 17:51, Justin Krejci wrote:

Yeah... I guess no one would ever use IPv6 with OSPF until IPv6 feature
sets are completely matured on all platforms of every major vendor. Or
maybe no vendor should release any v6 support until every feature was
100% v6 enabled.


I don't think that was the problem.  The IETF wonks saw MD5 
authentication on OSPFv2 as a dirty hack, rather than as a quick and 
easy means of providing a 99.99% solution to OSPF authentication.  
Instead, they wanted a 100% solution, and in their opinion IPsec was 
the way to do this because it provided a cryptographically sound 
framework for authentication and encryption services.  So they 
mandated that there should be no MD5 authentication for OSPFv3, just 
IPsec.


As hooking anything into IPsec tends to be difficult (there is no 
standardised API, and it's a pretty gargantuan framework), ospfv3 
authentication is not implemented on many platforms.


Perfection is the enemy of good enough.

Nick

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] VTP war stories (was Re: EoMPLS or VPLS loop prevention/storm control)

2011-02-09 Thread Ge Moua
thanks, Ivan for the correction; that was a good read by the way; so to 
clarify what we do on our end:
* (in addition to setting edge  distribution switched to vtp client 
or transparent mode) one should also delete the vlan db (akin to doing):

del flash:/vlan.dat



--
Regards,
Ge Moua

Network Design Engineer
University of Minnesota | OIT - NTS
--


On 02/09/2011 06:01 PM, Ivan wrote:

It is not always as well known, but client mode will not prevent usurping
the vtp domains  This article covers things in a bit more detail -
http://www.networkworld.com/community/node/19931

Ivan


I'd agree that vtp can cause major problems if not deployed with caution
  mechanisms to mitigate disasters.  we have a huge lan infrastructure
here with over 65,000 edge ports.  what we do is divide the
campus/enterprise into 18 vtp domains so if there is a layer2 or vtp
meltdown this doesn't affect all of campus; also the core switch (in
this case 6509 w/sup720-3bxl) per vtp domain is the sole designated vtp
server mode device (this is important) as well as the root bridge
(fine-tune stp cost to do so); all others are in client mode or
transparent.  for edge or distribution switches, it also important to
change default server mode to client (or transparent) -- again this is
important to avoid usurping the vtp domains. vtp comes in handy when
dealing with large amount of ports and one doesn't want to hand
configure vlan to port mapping manually; however as already mention all
of this is not without risks.

when our current network was deployed intially about 7 years ago, we had
periodic spanning-tree meltdown per vtp domain, but never to all 18 vtp
domain at the same time; root cause was typical offenders:
* misbehaving gear that seized control as root bridge
* dumb hub connecting multiple vlans
* etc.

over the years, cisco ios has had many vtp/stp/layer-2 bugs worked out;
and I'd say one doesn't see as much issues in this area as was in the
past; but caution is always a good thing.


--
Regards,
Ge Moua

Network Design Engineer
University of Minnesota | OIT - NTS
--


On 2/9/11 4:28 PM, Paul Wozney wrote:

I've seen VTP fail spectacularly.

A customer was using it on about 30 switches distributed to about 10-15
wiring closets.  They had a temp student come in who wanted to learn
about
networking, so the student copied the core switch configuration and
deployed
it on a lab switch.  The student decided to wipe the VLANs from this lab
switch and start from scratch.

When the lab switch was connected to the production network, its VTP
instance had the correct VTP password (as it was copied from the core
switch), but it had none of the VLANs required for the correct operation
of
the network, and of course it had the higher revision number.

It was an innocent mistake, but it ended up to be a very bad day for
everyone involved and we've never used VTP for any other customer since
that
day.

---
Paul Wozney
Network Consultant
phone: +1 604-629-9975
toll free: +1 866-748-0516
email: p...@wozney.ca
web: http://wozney.ca



On Wed, Feb 9, 2011 at 14:10, Martin Barryma...@supine.com   wrote:


$quoted_author = Nick Hilliard ;

Also, don't use VTP unless you like living dangerously.

Nick, that sounds like you have a good war story or three. Care to
share?

Can't say I've blown anything up with VTP ... yet.  :-)

cheers
Marty
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/




___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Multiple VRFs over site-to-site VPN? Possible?

2011-02-03 Thread Ge Moua
If there were ISR on both end then I'd just do vrf-aware IPSec and plumb 
L2TPv3 inside of this to transport the vlan; of course this doesn't 
answer the original question of doing this with ASA


--
Regards,
Ge Moua
Network Design Engineer

University of Minnesota | OIT - NTS
--


On 02/03/2011 04:26 AM, John Kougoulos wrote:


I believe that you can use ASA for the IPsec part and create GRE 
tunnels between the PE and CE (one for each VRF). You would need 
though something like ISR on both ends or switches that support GRE in 
hardware, so 3560/3750 should change.


Regards,
John

On Tue, 1 Feb 2011, Jeff Kell wrote:

Ran across a new requirement where we would like to extend our campus 
standard multi-VRF

routed building out to a remote site over the public Internet.

Absent the ideal MPLS or multiple-vlan Metro-E, can you do this 
site-to-site over a pair

of ASAs?

Ideally it would be something along the lines of:

VRF A vlan 123--
VRF B vlan 456--(terminating on --- Site ASA  Campus ASA  
Campus PE (VRF A/B/C)

VRF C vlan 789--  3560/3750 CE)

Perhaps in simpler terms, bringing the 3 VRF vlans across the wire 
onto similar VRF

vlans on the campus side.

On-campus we just run a dot1Q trunk with a vlan for each VRF from CE 
to PE.


Can you trunk them into the ASA and do separate tunnels over the 
public IP endpoints,

dropping them on separate vlans on the other end?

Without meshing the routing / crossing the streams with respect to 
the VRFs?



___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Multiple VRFs over site-to-site VPN? Possible?

2011-02-01 Thread Ge Moua
we are doing a similar setup with l2tpv3 inside vrf-aware ipsec (on 
IOS); my preference would be to do this w EoMPLS/Atom (again on IOS) 
which also maintains the vlan/mpls vrf integrity; of course this doesn't 
answer your question about do this on the asa; i'd be interested too in 
knowing how you'd solve this with an ASA setup (as a mental exercise).


--
Regards,
Ge Moua
Network Design Engineer

University of Minnesota | OIT - NTS
--


On 2/1/11 5:20 PM, Jeff Kell wrote:

Ran across a new requirement where we would like to extend our campus standard 
multi-VRF
routed building out to a remote site over the public Internet.

Absent the ideal MPLS or multiple-vlan Metro-E, can you do this site-to-site 
over a pair
of ASAs?

Ideally it would be something along the lines of:

VRF A vlan 123--
VRF B vlan 456--(terminating on ---  Site ASA   Campus ASA   Campus 
PE (VRF A/B/C)
VRF C vlan 789--   3560/3750 CE)

Perhaps in simpler terms, bringing the 3 VRF vlans across the wire onto similar 
VRF
vlans on the campus side.

On-campus we just run a dot1Q trunk with a vlan for each VRF from CE to PE.

Can you trunk them into the ASA and do separate tunnels over the public IP 
endpoints,
dropping them on separate vlans on the other end?

Without meshing the routing / crossing the streams with respect to the VRFs?

Jeff

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] FWSM Port-channel shutdown

2011-01-26 Thread Ge Moua
we saw similar behavior for some of the early batches of the fwsm back 
in 04/05; i'd suggest rma these back to cisco; unofficial word was that 
there may have been bad capacitor issues.


--
Regards,
Ge Moua
Network Design Engineer

University of Minnesota | OIT - NTS
--


On 1/26/11 1:06 AM, Andrew Harris wrote:

Hi,

I have an issue in which when a new FWSM is inserted into one of our
6500s the internal Port-channel is immediately put into the admin down
status.

It is a 6509-E chassis running 12.2(18)SXF4 and the FWSM is running
3.1(3) in slot 3.

We have two other FWSM in slot 4 and 6 respectively, running fine.

We have other 6500s running SXF4 with a FWSM in slot 3 so I don't
think it is a placement issue.

Even if I boot into the maintenance partition it still immediately
shuts down the etherchannel.

I am sure I am missing something really basic, but any pointers would
be appreciated!

Thanks

Andy
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] EoMPLS on 7401ASR

2011-01-19 Thread Ge Moua

arie, thank you for the explanation.

I have seen the PXF engine on the 7304/nse-100 cause out-of-order packet 
for L2 protocols like VTP (and disabling PXF did remedied this), however 
I was told that by TAC this was a bad idea.  What we ended doing was use 
VTP transparent mode (so VTP updates are not neeed) and enabling PXF.


Thanks again.

--
Regards,
Ge Moua

Network Design Engineer
University of Minnesota | OIT - NTS
2218 University Ave SE
--


On 01/19/2011 02:00 PM, Arie Vayner (avayner) wrote:

The comment for disabling PXF was meant specifically for 7401, as I am
quite sure there are no PXF enhancements for the AToM functionality on
this platform (it is an old end of life box).
The 7304 is a different animal, and you should not consider this comment
relevant (I am not really sure what is implemented on 7304 in PXF, but
again - a different kind of animal)

Arie

-Original Message-
From: Ge Moua [mailto:moua0...@umn.edu]
Sent: Wednesday, January 19, 2011 20:29
To: Arie Vayner (avayner); cisco_nsp
Subject: Re: [c-nsp] EoMPLS on 7401ASR

the comment about
disable PXF when testing

I thought the PXF engine was suppose to allow more cef-like switching
for things like xconnect pseudowires.  Is it generally a bad idea to
disable this?  I'm asking because we have 7304 w/NSE-100 engines (with
PXF enabled).

Any feedback would be appreciated.

--
Regards,
Ge Moua

Network Design Engineer
University of Minnesota | OIT - NTS
2218 University Ave SE
--


On 01/19/2011 12:02 PM, Arie Vayner (avayner) wrote:

Jeroen,

The 7400 has reached Last Day of Support on December 2009, so I do not
really believe it is on any support contract with Cisco...


http://www.cisco.com/en/US/prod/collateral/routers/ps354/prod_end-of-lif

e_notice0900aecd8010d319.html

Anyway, I can see on the download tool that 12.4(15)T is available for
this platform. I am quite sure it would have at least basic AToM
functionality (not 100% sure)...

Don't forget to disable PXF when testing...

Arie

-Original Message-
From: cisco-nsp-boun...@puck.nether.net
[mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of Jeroen van

Ingen

Sent: Wednesday, January 19, 2011 18:35
To: cisco-nsp@puck.nether.net
Subject: [c-nsp] EoMPLS on 7401ASR

Hi,

I've been experimenting with AToM (mainly EoMPLS) in a lab situation

and

I'd like to make my test network a bit larger, but the only extra
hardware that I have available are old 7400 boxen (7401ASR).

Now according to the Software Advisor and the docs on AToM, the 7400
should support this feature starting from IOS 12.2(14)S. However the
images that Software Advisor lists can't be downloaded.

I understand that it this old stuff might be full of bugs (considering
the track record of 7400/PXF and the age of this image), but does

anyone

happen to have a compatible IOS image in their archives? Preferably
c7400-k91p-mz.12.2-14.S8 but I guess any c7400-*12.2*.S* will do.

By the way, our 7400 are still under a maintenance contract, but the
distributor is having a hard time getting this image (TAC couldn't

find

it for them, if I understood correctly). Since the reach of this list

is

much greater I was hoping that someone would happen to have this image
in their archives...


Regards,

Jeroen van Ingen
ICT Service Centre
University of Twente, P.O.Box 217, 7500 AE Enschede, The Netherlands


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] 1841 DHCP CONFIGURATION and NAT NOT WORKING

2010-11-03 Thread Ge Moua
I don´t see your nat ¨outside¨ reference; see below for a working config 
on one of our routers that is doing what you are looking for:


ip dhcp excluded-address 10.2.10.254
!
ip dhcp pool INSIDE
   network 10.2.10.0 255.255.255.0
   domain-name comcastbusiness.net
   dns-server 68.87.77.130 68.87.72.130
   default-router 10.2.10.254
   lease 7
!


interface FastEthernet0/0
 description VoicePerfTuning-RR-01-Fa-0-0 * Simulate SIP though NAT 
behind SOHO

 ip address 173.11.44.235 255.255.255.240
 ip access-group EXT-ACL_BASIC-PROTECTION in
 ip nat outside
 ip virtual-reassembly
 duplex auto
 speed auto

interface FastEthernet0/1
 description VoicePerfTuning-RR-01-Fa-0-1 * Connect to SIP phone clients
 ip address 10.2.10.254 255.255.255.0
 ip nat inside
 ip virtual-reassembly
 duplex auto
 speed auto


ip route 0.0.0.0 0.0.0.0 173.11.44.238 name Default via Comcast 
Business Class Internet


ip nat inside source list 10 interface FastEthernet0/0 overload





--
Regards,
Ge Moua

Network Design Engineer
University of Minnesota | OIT - NTS
--


On 11/03/2010 09:04 AM, Rocker Feller wrote:

Hi,

I have done dhcp and nat before, But it does not work on an 1841.

What have I missed out.

The lease is given but the NAT does not work.

I do not see the dhcp ip on arp. but see it on the lease pool-

Please help

ip dhcp excluded-address
192.168.1.254

!

ip dhcp pool grm


network 192.168.1.0
255.255.255.0

dns-server x.x.x.x  x.x.x.x


default-router 192.168.1.254

interface FastEthernet0/1
  description Link to LAN
  ip address 192.168.1.254 255.255.255.252
  ip nat inside
  ip virtual-reassembly
  duplex auto
  speed auto



ip nat inside source list 2 interface FastEthernet0/0 overload
ip route 0.0.0.0 0.0.0.0 y.y.y.y
!
access-list 2 permit 192.168.1.0 0.0.0.255


Thanks
Rocker.
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] BGP support on the new ASA5585-X

2010-10-29 Thread Ge Moua
we too have a need for Cisco firewalls to speak BGP, especially at some 
our smaller mpls vrf borders; we get around this by running the Cisco 
firewall in transparent mode (layer-2 mode) which allows for the bgp 
sessions to be built without any layer 3 boundary on the firewall to 
prohibit bgp sessions.


of course this doesn't address the need for bgp on the cisco firewall 
but does provide a work-around for the lack of.


i too am would like to see bgp on cisco firewalls

--
Regards,
Ge Moua
Network Design Engineer

University of Minnesota | OIT - NTS
--



sth...@nethelp.no wrote:

At this moment we know that ASA5585-X does not support BGP.
  

I'm sure it doesn't.  Routers are routers, firewalls are firewalls.



There are several firewall platforms that support BGP - and this can
actually be quite useful. Fortigate is one of them.

Steinar Haug, Nethelp consulting, sth...@nethelp.no
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
  

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] LNS alternative to 7200?

2010-10-15 Thread Ge Moua
 viable and cost-effective approach; any ideas if this package would 
support L2TPv3? or if there is another open-source package that would do 
L2TPv3?


--
Regards,
Ge Moua
Network Design Engineer

University of Minnesota | OIT - NTS
--


On 10/15/10 8:44 AM, Tom Devries wrote:

The CPU was way too high and we off-loaded
the LNS function to an open-source platform called L2TPNS running on a
couple of HP DL380 linux machines.

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] 2821 NAT Limitations

2010-10-14 Thread Ge Moua

 Rodney, thanks for the correction and feedback.

Is it true then that the ASR1K platform could achieve the same amount of 
NAT throughput without severe resource exhaustion much like the ASA?  If 
so the this would be a viable option for the OP as route-map features 
would also be available on said router platform.


--
Regards,
Ge Moua
Network Design Engineer

University of Minnesota | OIT - NTS
--


On 10/14/10 4:47 AM, Rodney Dunn wrote:

In the spirit of technical accuracy.

NAT is a more complex feature than it appears on the surface. In 
regards to the process switch portion. NAT today for normal http 
traffic is CEF switched, even the SYN's, along with the payload data.

The FIN/RST's are punted to tear the translations down.

As for the 2821 specifically, NAT is no different there (assuming same 
code version) than it is on a 72xx for example. Only difference is CPU 
power and memory (depending on the difference).


Therefore, scale is a directly related to those two factors on the 
platform. And port ranges if you do overload.


The main factors to watch from a scale are:

CPU
Memory
NAT pool allocation
Input Queue drops on interfaces (set them to the max)

Good NAT'ing. :)

For an IOS device the ASR1k is the leader today. It does ALL NAT'ing 
(even ALG) in the *hardware* forwarding path.


Rodney



On 10/13/10 5:40 PM, Ge Moua wrote:

forgot to mention that I'm fairly certain that many NAT sessions that
you require will overun the 2800 which process switch that function (no
good).

--
Regards,
Ge Moua
Network Design Engineer

University of Minnesota | OIT - NTS
--


On 10/13/10 4:38 PM, Ge Moua wrote:

we do upwards of 75,000 NAT sessions on an asa-5550 with no problems;
bad thing here for you is that you'll also need a router platform to
do the route maps

not sure if you can split the functions, but if so then this might
work for you.

--
Regards,
Ge Moua
Network Design Engineer

University of Minnesota | OIT - NTS
--


On 10/13/10 4:11 PM, Dan Letkeman wrote:

Hi,

Wondering if anyone has some experience with the NAT limitations on a
2821 router? I have about 1500 users, which about half of them are on
the internet at one time, but we have a proxy web filter appliance
that all of the clients connect to that does a website lookup, and
check before it lets the client access the page, so it creates a
separate entry for every page requested. This doubles the NAT entries
in the router.

Would 40,000 - 60,000 NAT translation entries be too much for a 2821?
It's not doing much else except NAT and a couple of route-maps.

If so would device would be recommended that could handle this amount
of translations?

Thanks,
Dan.
___
cisco-nsp mailing list cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] 2821 NAT Limitations

2010-10-13 Thread Ge Moua
 forgot to mention that I'm fairly certain that many NAT sessions that 
you require will overun the 2800 which process switch that function (no 
good).


--
Regards,
Ge Moua
Network Design Engineer

University of Minnesota | OIT - NTS
--


On 10/13/10 4:38 PM, Ge Moua wrote:
 we do upwards of 75,000 NAT sessions on an asa-5550 with no problems; 
bad thing here for you is that you'll also need a router platform to 
do the route maps


not sure if you can split the functions, but if so then this might 
work for you.


--
Regards,
Ge Moua
Network Design Engineer

University of Minnesota | OIT - NTS
--


On 10/13/10 4:11 PM, Dan Letkeman wrote:

Hi,

Wondering if anyone has some experience with the NAT limitations on a
2821 router?  I have about 1500 users, which about half of them are on
the internet at one time, but we have a proxy web filter appliance
that all of the clients connect to that does a website lookup, and
check before it lets the client access the page, so it creates a
separate entry for every page requested.  This doubles the NAT entries
in the router.

Would 40,000 - 60,000 NAT translation entries be too much for a 2821?
It's not doing much else except NAT and a couple of route-maps.

If so would device would be recommended that could handle this amount
of translations?

Thanks,
Dan.
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] High CPU util on a 2811 with two ipsec tunnels

2010-10-07 Thread Ge Moua

 James G-
What do you see when you do:
sh ip tra

--
Regards,
Ge Moua
Network Design Engineer

University of Minnesota | OIT - NTS
--


On 10/7/10 1:45 PM, Lasher, Donn wrote:

In my experience, two things hammer the CPU for IPSEC tunnels:

1. mGRE is not accelerated by the hardware.
2. Fragmenting Packets, lower MTU/MSS, CPU driven.

Pretty common to see 2811's out of CPU with 10-11M of IPSEC payload in a
tunnel, in my experience.



-Original Message-
From: cisco-nsp-boun...@puck.nether.net
[mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of James Graebner
[VPNtranet]
Sent: Thursday, October 07, 2010 10:32 AM
To: cisco-nsp@puck.nether.net
Subject: [c-nsp] High CPU util on a 2811 with two ipsec tunnels

I have a 2811 w/ AIM module terminating two 10m ipsec tunnels that is
nearly always above 80% and often above 95% cpu util during the day.
Buffers show no significant number of misses.  sh int switching shows
that 100% of the outbound encrypted packets are being process switched.

IOS C2800NM-ADVIPSERVICESK9-M), Version 12.4(15)T1.  Why would this
traffic not be fast switched?


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] netflow tools

2010-09-19 Thread Ge Moua

 flowscan by Dave Plonka can do this.


--
Regards,
Ge Moua
Network Design Engineer

University of Minnesota | OIT - NTS
2218 University Ave SE
Minneapolis, MN 55414-3029
Email: moua0...@umn.edu | Office: 612.626.2779
--


On 9/19/10 6:01 PM, Sharlon R. Carty wrote:

Hello,



Anyone know of any netflow collector tools that can filter the data based on
ASN? The majority tools I have tried filter based on IP address, IP group,
domain name etc.

Looking for something that can show me x amount of traffic from asn124 and
so on etc



___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] 7606 config issue !!!

2010-08-10 Thread Ge Moua
 we just upgrade one of our core 6509 / 3bxl to this code a few days 
ago and so far no problem; you're probably looking for feedback on the 
the 7600 platform though.


--
Regards,
Ge Moua
Network Design Engineer

University of Minnesota | OIT - NTS
--


On 8/10/10 4:28 PM, David Hughes wrote:

On 23/07/2010, at 9:45 AM, Jared Mauch wrote:


Cisco has posted sxi4a.



Has anyone identified any early issues with sxi4a ?



Thanks

David
...
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] FWSM and IPv6

2010-06-24 Thread Ge Moua
I've heard rumors from our Cisco acct SE that FWSMv2 will do IPv6 in Hw; 
right now with transparent mode one can pass IP protocol type 41 but can 
not actually write any IPv6 ACLs.


--
Regards,
Ge Moua
Network Design Engineer

University of Minnesota | OIT - NTS
--


On 6/24/10 11:09 AM, Benjamin Lovell wrote:
Did a quick search and found that IPv6 packet are still processed by 
the CPU not the ASICs on the FWSM. Also only works in routed, not 
transparent mode. I don't know any hard numbers for forwarding 
performance for the CPU but I would guess it's unacceptably low.


As for software versus architecture limitation, it's tough to say. I 
would guess architectural limitation but either way I doubt it will 
change as FWSM is near the end of it's life cycle for new feature 
development.


-Ben

On Jun 24, 2010, at 7:59 AM, Matthew Melbourne wrote:


Are there any real-world data available for the performance of the
FWSM when using IPv6 (actually multi-tenant IPv6 and IPv4). A
Networkers' presentation I saw suggested that IPv6 forwarding was
punted to the CPU rather than performed in hardware; is this still the
case and is it an architectural issue which cannot be addressed
through software?

Cheers,

Matt

--
Matthew Melbourne
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Leaking VRF routes

2010-05-18 Thread Ge Moua
I've got IOS code snippet for doing this on a 7206vxr with npe-g1; 
contact me off list if you are interested in seeing this.


--
Regards,
Ge Moua
Network Design Engineer

University of Minnesota | OIT - NTS
--


On 5/18/10 1:40 AM, Peter Rathlev wrote:

On Mon, 2010-05-17 at 22:46 -0500, Dave Weis wrote:
   

I am doing VRF lite on a 7200 to place PPPoA/PPPoE users into a VRF.
 

You can leak fine just with VRF-Lite, if that's what you're after. You
need to enable BGP though.

   

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Leaking VRF routes

2010-05-18 Thread Ge Moua
There were a few requests for this, so I'm just going to post this to 
the distro-list.  This was done about a year and half ago, but I recall 
that this was a working config snippet:
* the idea at the time was to terminate a L2L IPSec tunnel in a given 
VRF A

* using VRF-aware IPSec, drop the decrypted traffic to VRF B
* one had to export the RD
* also had to run BGP (this was already mentioned in a previous thread)

In the end we decided not to go with this config and just terminate the 
IPSec tunnel in the global table, as the global table already had the 
hooks into the other custom VRF by default.


- Ge



!
ip vrf FVRF-L2L_NTS-TEST
 description VRF Lite * (VRF-Aware IPSec) Front-Door VRF to (MPLS VRF) 
tc * Encrypted Data Transport for L-2-L IPSec (Single Customer) NTS Test

 rd 217:599
 route-target export 217:1001
 route-target export 217:599
!



!
ip vrf IVRF-L2L_tc
 description VRF Lite * (VRF-Aware IPSec) Inside VRF to (MPLS VRF) tc 
* Decrypted Data Transport for L-2-L IPSec (VRF Wide) UofMn - Twin 
Cities General Campus

 rd 217:1001
 route-target import 217:599
!



!
router bgp 65535
 no synchronization
 bgp log-neighbor-changes
 no auto-summary
 !
 address-family ipv4 vrf FVRF-L2L_NTS-TEST
  redistribute static
  no synchronization
 exit-address-family
!


ip route vrf FVRF-L2L_NTS-TEST 134.84.4.232 255.255.255.248 134.84.4.222 
name ROUTE-LEAK-TO-IVRF-VIA-BGP-REDIST



!
no ip access-list extended CRYPTO-ACL_NTS-TEST
!
ip access-list extended CRYPTO-ACL_NTS-TEST
 remark ## [START] Extended ACL CRYPTO-ACL_NTS-TEST ##
 remark ## Crypto ACL * IPSec Interesting Traffic Between L-2-L IPSec 
End-Points NTS Test ##

permit ip any 134.84.4.232 0.0.0.7
 remark ## [END] Extended ACL CRYPTO-ACL_NTS-TEST ##


crypto map CRYPTO-MAP_NTS-TEST 1 ipsec-isakmp
 no reverse-route static




--

Regards,
Ge Moua
Network Design Engineer

University of Minnesota | OIT - NTS
--


On 5/18/10 8:15 AM, Ge Moua wrote:
I've got IOS code snippet for doing this on a 7206vxr with npe-g1; 
contact me off list if you are interested in seeing this.


--
Regards,
Ge Moua
Network Design Engineer

University of Minnesota | OIT - NTS
--


On 5/18/10 1:40 AM, Peter Rathlev wrote:

On Mon, 2010-05-17 at 22:46 -0500, Dave Weis wrote:

I am doing VRF lite on a 7200 to place PPPoA/PPPoE users into a VRF.

You can leak fine just with VRF-Lite, if that's what you're after. You
need to enable BGP though.


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ftp fixup on firewall service module

2010-05-05 Thread Ge Moua
yes, I've seen these on our fwsms on 3.x code; the current 4.x code 
seems to have fix this.


--
Regards,
Ge Moua
Network Design Engineer

University of Minnesota | OIT - NTS
--


On 5/5/10 12:20 PM, B wrote:

I don't think passive mode (from inside to outside) requires fixup. Both
channels are outbound initiated. Does the control connection get
established? Perhaps it's something else...

On Wed, May 5, 2010 at 7:29 AM, Mishka, Jasonjason.mis...@utoledo.eduwrote:

   

A you ftping on the default port, 21?  If not, it won't work (unless you
specify otherwise, I believe).  The inspection engine needs to see the
data channel port negotiation.

There was also a ftp related bug prior to 3.1(10) for session
termination but this doesn't sounds like it.  Bug check out CSCsi27512
just in case.

Jason



-Original Message-
From: cisco-nsp-boun...@puck.nether.net
[mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of Arne Larsen /
Region Nordjylland
Sent: Wednesday, May 05, 2010 6:04 AM
To: 'cisco-nsp@puck.nether.net'
Subject: [c-nsp] ftp fixup on firewall service module

Hi all.

I'm having some problems with a client connecting to a ftp server.
The client uses passive mode, shouldn't the fixup in the service module
take care of the data channel.
I can se anything being dropped in firewall, but then again I don't s
really se any traffic on the data channel.

/Arne
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

 

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
   

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] VPN over Comcast

2010-04-27 Thread Ge Moua
we are extending l2 pseudowire over ipsec tunnels through comcast 
business class internet and this seems to work mostly stable for us; I'm 
not sure if the sla for residential cable would incur more outage or 
not; albeit we are in the minneapolis mkt and not chicago.


--
Regards,
Ge Moua
Network Design Engineer

University of Minnesota | OIT - NTS


On 4/27/10 12:42 PM, Michael Malitsky wrote:

I will probably be laughed at, but I'll ask just in case.

We are having particularly bad luck trying to run VPN tunnels over
Comcast cable in the Chicago area.  The symptoms are basically complete
loss of connectivity (lasting minutes to sometimes hours), or sometimes
flapping for a period of time.  More often than not, a reboot of the
cable modem is required.  The most interesting ones involve the
following: a PIX or ASA configured as an EZvpn client, connecting to a
3000 concentrator, authentication over RADIUS.  When I go to look at the
RADIUS logs, I see connections from the same box with small intervals.
Timeout is 8 hours, so theoretically I should see 3 connections in a
24-hr period.  In some cases, I see dozens, in the most egregious cases,
thousands over a 24-hour period.  I am taking that as an indicator of a
really unstable Comcast circuit.  We have not had this problem with any
other ISP, anywhere in the country.
I am pretty much down to telling customers to find another provider...

Any thoughts or ideas on the matter will be appreciated.

PS.  To be fair (?) to Comcast, this is not a ubiquitous problem.  It
affects about 25% of the installations I get to see.

Sincerely,
Michael Malitsky



___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
   

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] STP in L2TPv3

2010-03-15 Thread Ge Moua
I saw this across a few router platforms; so I'm guessing in may me 
embedded in the base IOS code:

* 7200
* 1800
* 2600

--
Regards,
Ge Moua
Network Design Engineer

University of Minnesota | OIT - NTS
2218 University Ave SE
Minneapolis, MN 55414-3029
Email: moua0...@umn.edu | Office: 612.626.2779
--



On 3/15/10 9:26 AM, Chris Flav wrote:
Was your issue on the 800 series specifically or using L2TPv3 on any 
hardware platform?

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] STP in L2TPv3

2010-03-12 Thread Ge Moua
I had a case open with Cisco on this same issue pending for 6 months or 
so then I finally closed the ticket;  what I saw was basically the STP 
pkts was arriving out-of-order due to fragmentation; the remote end 
never get STP updates as such.


I've been meaning to test this with EoMPLS over GRE to see if STP 
behaves the same way; one funny thing I did see though that if I turned 
off the PXF engine on the head-end, then STP gets transmiitted then 
frrag/defrag properly; down side is that PXF engine provides for 
enhanced throughput of L2TPv3 (which is very CPU intensive if process 
switched); in the end Cisco TAC advised us to run VTP domain in 
transparent mode so as not to pass STP pkts; that's what we are doing now.


If I get around to testing STP updates on EoMPLS over GRE then I'll post 
my results on this distro list; good luck.



--
Regards,
Ge Moua
Network Design Engineer

University of Minnesota | OIT - NTS
2218 University Ave SE
Minneapolis, MN 55414-3029
Email: moua0...@umn.edu | Office: 612.626.2779
--



Chris Flav wrote:
I am having a devil 
of a time getting spanning-tree packets to work over a functional L2TPv3 
tunnel.  I can see arp, cdp, SSDP, and all sorts of other garbage traffic over 
the link, DHCP works, Internet, the works.
 
However, if I 
connect a catalyst switch on each end and send STP, I do not see the 
spanning-tree packets on the remote end of the link.
 
I am using Cisco 
800-series routers (cheating by reversing the Fe4 and Vlan1 ports) and as 
stated, the L2TPv3 tunnel is reliable and functional, with the exception of 
STP.  Is there something fundamental I am missing?  See below 
configs;
 
 
SiteA:

==
l2tp-class 
l2-dyn

 authentication
 hostname MTL
 password 7 
071B29495E08

 cookie size 8
!
!
pseudowire-class 
pw-dynamic

 encapsulation l2tpv3
 protocol l2tpv3 l2-dyn
 ip local 
interface Vlan1

!
!
!
interface FastEthernet4
 no ip 
address

 duplex auto
 speed auto
 no cdp enable
 xconnect 66.xxx.xxx.xxx 1 
encapsulation l2tpv3 pw-class pw-dynamic

!
interface 
Vlan1

 ip address 66.xxx.xxx.xxx 255.255.255.192
 no ip 
proxy-arp
 
 
show l2tun session 
all
 
L2TP Session 
Information Total tunnels 1 sessions 1
 
Session id 61551 is 
up, tunnel id 735

  Remote session id is 21103, remote tunnel id 25982
  
Locally initiated session

Call serial number is 241411
Remote tunnel 
name is SHE

  Internet address is 66.xxx.xxx.21
Local tunnel name is 
MTL

  Internet address is 66.xxx.xxx.195
IP protocol 115
  Session is 
L2TP signaled

  Session state is established, time since change 00:09:59
  
DF bit off, ToS reflect disabled, ToS value 0, TTL value 255
  UDP checksums 
are disabled

  Session cookie information:
local cookie, size 8 bytes, 
value CB 2A 48 48 59 BA 49 A5
remote cookie, size 8 bytes, value 0D F2 0A 
CF 7A ED 2A B4

  FS cached header information:
encap size = 32 
bytes

4514  FF73347F 429E81C3
42818015 526F 
0DF20ACF 7AED2AB4
 
1327 Packets 
sent, 12 received

119801 Bytes sent, 1295 received
  Last clearing of 
counters never

  Counters, ignoring last clear:
1327 Packets sent, 12 
received

119801 Bytes sent, 1295 received
Receive packets 
dropped:

  out-of-order: 0
  total:
0

Send packets dropped:
  exceeded session MTU: 0
  
total:0

  Sequencing is off
  Conditional debugging is 
disabled

  Unique ID is 1
Session Layer 2 circuit, type is Ethernet, name 
is FastEthernet4

  Session vcid is 1
  Circuit state is UP
Local 
circuit state is UP

Remote circuit state is UP
 
 
 
 
 
 
SiteB:

=
 
l2tp-class 
l2-dyn

 authentication
 hostname SHE
 password 7 14031A0E1C0
 cookie 
size 8

!
!
pseudowire-class 
pw-dynamic

 encapsulation l2tpv3
 protocol l2tpv3 l2-dyn
 ip local 
interface Vlan1

!
!
interface 
FastEthernet4

 no ip address
 duplex auto
 speed auto
 no cdp 
enable
 xconnect 66.xxx.xxx.195 1 encapsulation l2tpv3 pw-class 
pw-dynamic

!
interface 
Vlan1

 ip address 66.xxx.xxx.21 255.255.255.0
 no ip 
proxy-arp
 
show l2tun session 
all
 
L2TP Session 
Information Total tunnels 1 sessions 1
 
Session id 21103 is 
up, tunnel id 25982

  Remote session id is 61551, remote tunnel id 735
  
Remotely initiated session

Call serial number is 15905
Remote tunnel name 
is MTL

  Internet address is 66.xxx.xxx.195
Local tunnel name is SHE
  
Internet address is 66.xxx.xxx.21

IP protocol 115
  Session is L2TP 
signaled

  Session state is established, time since change 00:12:43
  DF 
bit off, ToS reflect disabled, ToS value 0, TTL value 255
  UDP checksums are 
disabled

  Session cookie information:
local cookie, size 8 bytes, 
value 0D F2 0A CF 7A ED 2A B4
remote cookie, size 8 bytes, value CB 2A 48 
48 59 BA 49 A5

  FS cached header information:
encap size = 32 
bytes

4514  FF73347F 42818015
429E81C3 F06F 
CB2A4848 59BA49A5
 
14 Packets sent, 
1607

Re: [c-nsp] Network-to-network connection - MPLS / non-MPLS

2010-02-18 Thread Ge Moua

* EoMPLS over GRE
* L2TPv3

--
Regards,
Ge Moua
Network Design Engineer

University of Minnesota | OIT - NTS
--



Mike wrote:

What options are available for establishing network-to-network connections
between an MPLS network and a native IP network that has no current MPLS
capability?

The scenario I have is a single POP ISP (non-MPLS) that is desirous of
establishing a connection to a larger MPLS-based ISP.  The idea being the
ability sell circuits off the larger network's footprint and back-haul the
traffic to the smaller network, thereby extending the physical reach of the
smaller ISP.

I know this can be done using a IP aggregation type setup, but are there
other options available, particularly something that would provide
visibility at the lower layers for troubleshooting isolation purposes?


Thanks,

Mike
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
  

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] OT - Infoblox vs. Bluecat

2010-01-15 Thread Ge Moua

We are using infoblox over here; works pretty well.

Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Church, Charles wrote:

I apologize for this being fairly OT for a Cisco list, but I figured someone on 
here has touched some DNS gear before.  Anyone work with Infoblox and Bluecat, 
and run across a significant reason to choose one over another?  I've googled, 
but most articles are 5 years or more old.  Off-line responses encouraged.  The 
planned use is for govt, so full access to the kernel is nice for 
hardening/verification.  Also need TSIG, DNSSEC, and IPv6 support, which they 
both claim to have, as they're both based on recent bind.  Secure mgmt such as 
SNMPv3, SSHv2, and SSL would be nice.

Thanks in advance,

Chuck

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
  

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Cisco VPN and 64 bit Windows

2009-12-09 Thread Ge Moua

this one is free:
www.shrewsoft.com


Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Jonathan Charles wrote:

The short answer is... no.

Cisco said they will never release a 64-bit version of their VPN Client.

However, Anyconnect has a 64-bit variant, however, this requires a
separate license for the ASA...

There is a third-party VPN client for 64-bit that works fine:

http://www.ncp-e.com/en.html



Jonathan

On Wed, Dec 9, 2009 at 9:20 AM, Marc Haber mh+cisco-...@zugschlus.de wrote:
  

Hi,

at a number of customer sites, we run a VPN service for mobile users.
Since we usually are not in charge of the firewall that is in place
there, we have the following construction


 Internet
 |
 -- 
 |Firewall|-|VPN Router|
 -- 
 |
 internal network

The VPN router is usually an 1841, and the mobile users have the
standard Cisco VPN client for IPSEC (the one with the nice .pcf
files and which is currently shipping as version 5.0.04.0300). This
works just fine, and we would really like to stay with this setup for
some time.

Unfortunately, Cisco seems to have decided to not ship the standard
VPN client for 64 bit Windows variants, which are increasingly often
used out in the wild. They refer to the AnyConnect VPN Client which,
to my knowledge, can only connect to an ASA and not to an IOS device.

Can anybody here tell me whether there will be a possibility available
to connect from 64 bit Windows to an IOS device? Any hints will be
appreciated.

Greetings
Marc

--
-
Marc Haber | I don't trust Computers. They | Mailadresse im Header
Mannheim, Germany  |  lose things.Winona Ryder | Fon: *49 621 72739834
Nordisch by Nature |  How to make an American Quilt | Fax: *49 3221 2323190
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/



___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
  

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] BDF over port-channels?

2009-11-17 Thread Ge Moua

we've got some p2p routed ports over here

!
interface Port-channel1
description [removed]
mtu 4470
ip address 192.168.11.105 255.255.255.252
no negotiation auto
snmp trap link-status
hold-queue 150 in
!


Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Arie Vayner (avayner) wrote:

Just out of curiosity, what are the port-channel on the 7200/7600 is used for?
Is it a point to point routed port, or with L2 VLANs switched on top of it?

Arie

-Original Message-
From: cisco-nsp-boun...@puck.nether.net 
[mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of luismi
Sent: Tuesday, November 17, 2009 19:11
To: Gert Doering
Cc: cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] BDF over port-channels?

I was just curious, because I would like to deploy BFD but I saw those
messages on my routers because the port-channels configurations and I
would like to know if it was supported in other train or something
similar.

El mar, 17-11-2009 a las 15:12 +0100, Gert Doering escribió:
  

Hi,

On Tue, Nov 17, 2009 at 01:20:58PM +0100, luismi wrote:


I wrote it in a previous email but here is again :D

7200 npe-g2 and 7600 rsp720-pfc3
  

These are very very *VERY* different platforms...



I am using 12.2SRC but it is not supported there an I would like to know
if it is supported in another train.
  

... so it might very well be supported on one of them, and not on the
other...

Just for the record - my assumption was wrong.  I just tried to configure
BFD on a 6500 with SXF and SXH3a, and neither even permits me to enter
the bfd commands on the port-channel interfaces.  Physical interfaces 
only.


(Which makes some sort of sense, *iff* the BFD-handling is done in the 
line card - where it belongs, to be independent of whatever load the 
main CPU is having.  OTOH, I don't think normal 6500 LAN cards are smart

enough to run BFD locally.  So whatever...)

gert




___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
  

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] What's the value of ASA/FWSM TCP state bypass?

2009-11-10 Thread Ge Moua
I've always been leery of this feature; I've consider using it in the 
past to troubleshoot badly written apps that mucks up tcp 3-way 
handshakes/4-way teardowns; I can see this as a quick  dirty mechanism 
to bypass the stateful inspection engine without taking the firewall 
logically out of the data path; I'd be careful with using this feature 
without serious consideration of consequences; I also don't like the 
fact that it changes the default stateful inspection behavior.


I'd also be interested to hear what other folks think about this..

Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Peter Rathlev wrote:
On Tue, 2009-11-10 at 10:44 -0600, James Slepicka wrote: 
  

Just keep in mind that traffic through the firewalls usually* needs to
be symmetric.  Be sure to account for that in your design.

* 
https://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/conns_tcpstatebypass.html



I've read about this, but I fail to see what the point is. If the
firewall doesn't do stateful inspection, then why use a firewall? Why
not just a router/switch with L4 ACLs?

What am I missing?

  

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Linux VPN client suggestion?

2009-11-03 Thread Ge Moua



yum install vpnc

you may need to epel repo for his.


Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Scott Granados wrote:

Hi all,
I'm running presently Cisco ASA 5520 hardware with the Cisco VPN 
client to provide remote users access to network resources.  I have 
one user who is interested in a client for Linux (specifically CentOS) 
and not sure what to suggest.  Does anyone have any good pointers for 
a good client that I can point him to?


Any pointers would be appreciated.

Thank you
Scott


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] how to make ASA vrf-aware / remote-access client VPN

2009-11-02 Thread Ge Moua

C-NSP Wizards:
Our Cisco account team seems to be touting the ASA appliance (in a 
cluster configuration) as the preferred solution for remote access 
client vpn (IPSec  SSL); as such my question then is:


Is it possible to make an ASA be vrf-aware?

I will use vrf-aware IOS terminology to describe my goals:
* teminate remote access vpn client traffic on outside interface 
(front-door vrf)
* re-direct decrypted traffic to inside interface (inside vrf) 
towards enterprise apps


I tried to use the group-policy vlan mapping feature on only achieved 
some success to redirect traffic out different

egress vlans/interface.

Here are my findings why the vlan-mapping feature on the Cisco ASA will 
not work in our environment (I stand by this unless Cisco have other 
means that I do know of that will achieve vrf-aware connectivity from 
the ASA):

* vlan map can re-direct traffic out egress vlan (only at layer 2)
* layer 3 routes still needed from the ASA for outbound traffic to 
egress vlan

+ asa only allowed one default route in routed, single mode
   * if this is to work for vrf-aware client vpn connection, I'm 
thinking a default route per egress vlan will be needed; I was not able 
to do this
* vlan mapping does work, but only for simple routing environments; not 
really geared for multiple VRFs that get connected to a MPLS backbone 
and border with BGP  OSPF inter-related workings


So I proceeded to consider a design that assume that the ASA will only 
do remote access termination and leave the vrf-awarness 
(vrf-enabled) capabilities to the underlying network; this is what I 
came up with:


vpn_host_1 == IP_Cloud == ASA_VPN-Pool-A == PBR_BlackBox == VRF_A
vpn_host_2 == IP_Cloud == ASA_VPN-Pool-B == PBR_BlackBox == VRF_B

* ASA strictly doing remote access ipsec/ssl client vpn termination; 
btw, this really simplifies the ASA config significantly

* ASA has ingress for client vpn termination  egress for decrypted traffic
* decrypted traffic handled by black box (in this case catalyst-3750 
running router code) that does policy based routing based on source IP 
of client vpn ip pools


pros:
* ASA relegated to doing only client vpn termination
* simplified config per components
* PBR moved to another box to facilitate vrf-aware client vpn
+ simple routing on the ASA
   * one default route
   * no dynamic routing required

cons:
* more equipment needed in addition to ASA
* downstream failure may not trigger a VPN cluster member to be down (as 
it should in my opinion); what is needed is something like BFD 
(bi-directional forward detect) or some form of more intelligent route 
tracking (this may yet be possible; I've got to think more about this)

* overall design complexity increase because vrf-enabled moved off ASA

At minimum, I think this design will work for our needs; this design 
assumes additional complex components that I like to avoid if possible 
(PBR on a black box device).


Let me know what folks think; I'd really appreciate any ideas or feedback.

** Note
Iif the ASA wias truly VRF-aware like it's IOS brethren then all of this 
extra complexity may be minimized.


Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] how to make ASA vrf-aware / remote-access client VPN

2009-11-02 Thread Ge Moua
I did some throughput testing with iperf while connected as an ipsec 
clinets and seemed to get over +  120 Mbs easily; I too was interested 
in how far I can push the pbr on the 3750.


Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Ryan West wrote:

Ge,

Just wanted to add one more thing.

  

* decrypted traffic handled by black box (in this case catalyst-
3750



I've had very poor performance using the 3750 for PBR functions, have you tried 
to push any load through it?

-ryan

  

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] 3560/3750 policy routing

2009-11-02 Thread Ge Moua
 Note that PBR on these platforms is very limited in supported 
route-map match options, e.g. per cco:


I concur; I can't seem to do anything beyond some basic match  set; the 
IOS complained when I tried som SET commands with VRF parameters.  I 
suppose this is really a switch platform and not a true router platform.



Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Daniska, Tomas wrote:

-Original Message-
From: cisco-nsp-boun...@puck.nether.net [mailto:cisco-nsp-
boun...@puck.nether.net] On Behalf Of Peter Rathlev
Sent: Tuesday, November 03, 2009 12:01 AM
To: Ryan West
Cc: cisco-nsp
Subject: Re: [c-nsp] 3560/3750 policy routing


It has been running IOS 12.2(50)SE1 IP Services all its life (some
months).

When we started using it I was a little nervous if it would cope (and
posted on this list about it too) but it performs splendidly for us.




I second this, 12.2(50)SE3, doing some PBR-based VoIP spliting to
different SBCs, all done in HW.


Note that PBR on these platforms is very limited in supported route-map
match options, e.g. per cco:


When configuring match criteria in a route map, follow these guidelines:

-Do not match ACLs that permit packets destined for a local address. PBR
would forward these packets, which could cause ping or Telnet failure or
route protocol flapping.

-Do not match ACLs with deny ACEs. Packets that match a deny ACE are
sent to the CPU, which could cause high CPU utilization.


Did your matching ACLs meet the no-deny requirement?


--

deejay

 


__ Informacia od ESET NOD32 Antivirus, verzia databazy 4565
(20091102) __

Tuto spravu preveril ESET NOD32 Antivirus.

http://www.eset.sk
 
___

cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
  

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Bonded T1 Circuits

2009-10-20 Thread Ge Moua

something like this should work (got it off one of production router):

interface Serial0/0/0
mtu 4470
no ip address
encapsulation ppp
ppp multilink
ppp multilink group 1

interface Serial0/1/0
mtu 4470
no ip address
encapsulation ppp
ppp multilink
ppp multilink group 1

interface Multilink1
mtu 4470
ip address 192.168.11.205 255.255.255.252
ppp multilink
ppp multilink group 1
ppp multilink fragment disable




Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Dominic wrote on 10/20/2009 10:05 AM:

Hi Everyone:

Two questions:

1. I need to bond two T1 circuits. Does anyone have a working sample 
config? The POP end is a 7206VXR with NPE-G2 and the PA-MC-2T3-EC 
Card, and the customer end is a Cisco 1841.
2. Also need to bond as many as 4 T1s.  Would that be pushing it, and 
what would generally be the cleanest way to do it?



Dominic

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] monitoring switch stacks

2009-10-14 Thread Ge Moua

Dale Carder-
Are you guys also monitoring queue drops on the interfaces too; if so 
can you forward me the OID?


Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Dale W. Carder wrote:


On Oct 14, 2009, at 1:19 PM, Alan Buxey wrote:


just wondered what folk did out there to monitor switch stacks
(eg stackwise+ switch stacks like 3750e, 2975gs etc (not the older
gigastack ones) ) - using the basic methods such as ICMP will
only show the presence of connectivity to the stack but not the
actual health of the stack - eg one member is missing.  I'm looking
at maybe SNMP but support for MIBS in stacks seems somewhat poor


They show up fine, at least on recent code.  On earlier
versions of code (2 years ago or so), it was very buggy
and was not reliable.

We monitor the following.  There have been occasions when
the switch stack ports fail and this caught it.

Cheers,
Dale

IF-MIB::ifDescr.5365 = STRING: StackPort1
IF-MIB::ifDescr.5366 = STRING: StackSub-St1-1
IF-MIB::ifDescr.5367 = STRING: StackSub-St1-2
IF-MIB::ifDescr.5368 = STRING: StackPort2
IF-MIB::ifDescr.5369 = STRING: StackSub-St2-1
IF-MIB::ifDescr.5370 = STRING: StackSub-St2-2
IF-MIB::ifDescr.5371 = STRING: StackPort3
IF-MIB::ifDescr.5372 = STRING: StackSub-St3-1
IF-MIB::ifDescr.5373 = STRING: StackSub-St3-2

IF-MIB::ifOperStatus.5365 = INTEGER: up(1)
IF-MIB::ifOperStatus.5366 = INTEGER: up(1)
IF-MIB::ifOperStatus.5367 = INTEGER: up(1)
IF-MIB::ifOperStatus.5368 = INTEGER: up(1)
IF-MIB::ifOperStatus.5369 = INTEGER: up(1)
IF-MIB::ifOperStatus.5370 = INTEGER: up(1)
IF-MIB::ifOperStatus.5371 = INTEGER: up(1)
IF-MIB::ifOperStatus.5372 = INTEGER: up(1)
IF-MIB::ifOperStatus.5373 = INTEGER: up(1)

CISCO-STACKWISE-MIB::cswSwitchState.1001 = INTEGER: ready(4)
CISCO-STACKWISE-MIB::cswSwitchState.2001 = INTEGER: ready(4)
CISCO-STACKWISE-MIB::cswSwitchState.3001 = INTEGER: ready(4)

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] monitoring switch stacks

2009-10-14 Thread Ge Moua
Dale, are you guys monitoring queue drops on the edge switches like a 
Cisco 3750?  If so, I'm thinking the OID will be slightly different?  
Thanks for the reply !


Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services




Dale W. Carder wrote:


Hey Ge!

We monitor for input queue drops on 6500's with this oid:

.1.3.6.1.4.1.9.9.276.1.1.1.1.10

Our alert for the NOC is drops  100/sec results in a
major alarm.  Usually it's something stupid happening on
a given vlan that needs to be beat down.  For SVI's, this
goes hand in hand with punts causing cpu exhaustion on
these wimpy RP's.

I've thought about watching output queue drops, but am not
sure how to how to differentiate normal from abnormal.

Dale


On Oct 14, 2009, at 1:59 PM, Ge Moua wrote:


Dale Carder-
Are you guys also monitoring queue drops on the interfaces too; if so 
can you forward me the OID?


Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Dale W. Carder wrote:


On Oct 14, 2009, at 1:19 PM, Alan Buxey wrote:


just wondered what folk did out there to monitor switch stacks
(eg stackwise+ switch stacks like 3750e, 2975gs etc (not the older
gigastack ones) ) - using the basic methods such as ICMP will
only show the presence of connectivity to the stack but not the
actual health of the stack - eg one member is missing.  I'm looking
at maybe SNMP but support for MIBS in stacks seems somewhat poor


They show up fine, at least on recent code.  On earlier
versions of code (2 years ago or so), it was very buggy
and was not reliable.

We monitor the following.  There have been occasions when
the switch stack ports fail and this caught it.

Cheers,
Dale

IF-MIB::ifDescr.5365 = STRING: StackPort1
IF-MIB::ifDescr.5366 = STRING: StackSub-St1-1
IF-MIB::ifDescr.5367 = STRING: StackSub-St1-2
IF-MIB::ifDescr.5368 = STRING: StackPort2
IF-MIB::ifDescr.5369 = STRING: StackSub-St2-1
IF-MIB::ifDescr.5370 = STRING: StackSub-St2-2
IF-MIB::ifDescr.5371 = STRING: StackPort3
IF-MIB::ifDescr.5372 = STRING: StackSub-St3-1
IF-MIB::ifDescr.5373 = STRING: StackSub-St3-2

IF-MIB::ifOperStatus.5365 = INTEGER: up(1)
IF-MIB::ifOperStatus.5366 = INTEGER: up(1)
IF-MIB::ifOperStatus.5367 = INTEGER: up(1)
IF-MIB::ifOperStatus.5368 = INTEGER: up(1)
IF-MIB::ifOperStatus.5369 = INTEGER: up(1)
IF-MIB::ifOperStatus.5370 = INTEGER: up(1)
IF-MIB::ifOperStatus.5371 = INTEGER: up(1)
IF-MIB::ifOperStatus.5372 = INTEGER: up(1)
IF-MIB::ifOperStatus.5373 = INTEGER: up(1)

CISCO-STACKWISE-MIB::cswSwitchState.1001 = INTEGER: ready(4)
CISCO-STACKWISE-MIB::cswSwitchState.2001 = INTEGER: ready(4)
CISCO-STACKWISE-MIB::cswSwitchState.3001 = INTEGER: ready(4)

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/



___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ASA Firewalls placement in the network!

2009-10-12 Thread Ge Moua
yes, but the whole point of public NTP services is to allow any IPv4 to 
do NTP sync.


Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Adrian Minta wrote:

Ge Moua wrote:
The worst thing you can do is put a stateful firewall in front of a 

busy DNS server - every single packet creating new state will bring
most hardware-based firewalls to their knees, because session churn
is usually handled at much lower packet rate as pure packet throughput
for existing state...


I concur and have battle scar to attest for this; we tried to put a 
stateful firewall in front of our public NTP server (which also 
happen to be our DNS servers) and the firewall tipped over within 5 
minutes; state tables got exhausted quick.

Is there a way to disable sessions for specific port or IP ?

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ASA Firewalls placement in the network!

2009-10-12 Thread Ge Moua

Joel M Snyder -
 If you do the job right, from a security point of view, you can 
certainly put a fine firewall in front of a very busy DNS server.  (and 
when I say very busy I'm talking 10K queries a second, which is to say 
about 20Mbit/second sustained round-the-clock load, for less than $10K)


what you recommend for this?  Some of my colleague have suggested a 
redundant open-bsd cluster (with plenty of RAM b/c memory is cheap these 
days) with PF; I can see a scalable home grown solution that can address 
the exhausted state table issue; I'm just wondering if cheap fast CPU 
will be on par (performance and throughput wise) with fast ASIC like the 
big box vendor uses on their firewall products.


What do you think?



Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Joel M Snyder wrote:

 The worst thing you can do is put a stateful firewall in
 front of a
 busy DNS server

Well, as a security guy (rather than as a network guy), I would 
respectfully disagree.


First of all, if your firewall is underspecified or underrated, then 
yes, you'll have problems.   Secondly, if your firewall is 
misconfigured  or mistuned, then yes, you'll have problems.  Of 
course, both of these things are true of the network itself as 
everyone on this list knows very well.


If you do the job right, from a security point of view, you can 
certainly put a fine firewall in front of a very busy DNS server.  
(and when I say very busy I'm talking 10K queries a second, which is 
to say about 20Mbit/second sustained round-the-clock load, for less 
than $10K)


So then the question comes: well, what's the point?  I think that a 
lot of the folks on this list feel that throwing an ACL in front of a 
box is effectively the same, from a security point of view, as a 
firewall and a hell of a lot cheaper.


If you have a lousy firewall (i.e., one that is doing nothing more 
than keeping a UDP session open), yes, absolutely.  However, good 
firewalls are doing a lot more than that.


You may remember last year's the Internet is falling and only Dan 
Kaminsky can explain it flap around DNS.  Well, a lot of the 
discussion around this bug/problem/issue ignored the truth that a good 
firewall prevented the attack directly, by knowing enough 'deep packet 
smarts' around the DNS protocol that the attack scenario was 
effectively blocked (hey, that's why we have a session table in the 
first place!). Similarly, a well-configured firewall would have per-IP 
rate limits in it, which would have been a second line of defense.


Now, if you put in a piece-o-crap firewall that is misconfigured, too 
slow, doesn't have a big enough session table, and doesn't do anything 
more than your average reflexive access control list, then you're 
right on: rip that junk out and go bareback.


But if you do it right, there is value to be provided by a firewall.

jms



___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ASA Firewalls placement in the network!

2009-10-11 Thread Ge Moua
The worst thing you can do is put a stateful firewall in front of a 

busy DNS server - every single packet creating new state will bring
most hardware-based firewalls to their knees, because session churn
is usually handled at much lower packet rate as pure packet throughput
for existing state...


I concur and have battle scar to attest for this; we tried to put a 
stateful firewall in front of our public NTP server (which also happen 
to be our DNS servers) and the firewall tipped over within 5 minutes; 
state tables got exhausted quick.


- Ge

Univ of Mn







Gert Doering wrote:

Hi,

On Fri, Oct 09, 2009 at 10:06:49PM -0500, Brian Johnson wrote:
  

So are you actually saying that DPI is a bad thing relative to server
protection? What makes this a bad idea? In what way does it make them
more vulnerable to attacks?



Well, the point of a well-maintained server is that it is *open* to
the world - if you want a web server to be visible by the world, then
there isn't much you can do, besides open HTTP to it.  And other
services should not be running in the first place.

So, if you put a fiewall in front of a well-maintained server, all you 
add is extra state table handling with all the problems it brings 
- state table overflow (=new connections getting dropped), state getting 
desynchronized with the server, firewall CPU exploding long before the

server is hitting any load boundaries, and worst of all, weaknesses in
the firewall products that can be used to crash the firewall, DoSing
the server.

The worst thing you can do is put a stateful firewall in front of a 
busy DNS server - every single packet creating new state will bring

most hardware-based firewalls to their knees, because session churn
is usually handled at much lower packet rate as pure packet throughput
for existing state...


Now, for a typical office network, things look different, because you
don't have that stringent control over the machines behind the firewall
(so you never know who installed what application on their machine), and
the typical direction for connection setup is different (outbound 
connection = state handling is needed for the return packets).



Your example of crafted packets that crash the server but can be handled
by the firewall brings up the interesting question why one would upgrade
the firewall (to recognize this packet), but not the server (to be not
vulnerable to the bad packet in the first place)... - and *that* is 
what I meant by well-maintained server in the first paragraph.


Now, if your servers are not hardened enough, I'm happy to sell you a 
firewall to put in front of it - but it won't do zilch against the next 
buggy PHP application that will be used to exploit the server via 
perfectly nice HTTP requests - no crafted packets, just bad applications...



(I'm also one of those people that think the claim NAT will improve
your security was true 10 years ago, but wont't help at all for
todays security issues - browser exploits, e-mail viruses, etc.)

gert

  



___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Monitoring HTTP / url access @10gig

2009-10-05 Thread Ge Moua
We beta tested the GigaMon platform and for the most part it does what 
it claims it can do; basically takes a span feed and fans it out for 
analysis; in the end it was just too $$pricey$$ ( ~$100K USD); seems 
like the target mkt are carriers and large service providers.


Our OITSecurity group has been looking at NetOptics as a less expensive 
alternative:

http://www.network-taps.eu/home/home.php

Does basically the same as the Gigamon but not nearly as expensive 
(~$50K USD); albeit with less bells and whistles.


I forgot to mention that our focus is on IPS/IDS and these 10-gig feeds 
are to our IPS/IDS home grown clusters.


Good luck.


Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Phil Mayers wrote:
We currently monitor web access from our campus with a VACL capture, 
picked up by a server-class machine with a 10gig port. Hardware is 
sup720, and our internet links are 10gig, doing well over 1gbit/sec.


For various reasons this solution is unsatisfactory; the VACL doesn't 
work well and doesn't support IPv6, SPAN sessions are limited and 
policy routing to a web cache is exactly what we don't want to do. 
What other solutions can people recommend?


I see that GigaMon make an interesting (and expensive looking) product:

http://www.gigamon.com/gigavue-420.php

...which claims to be able to tap a 10gig link, filter the traffic 
then direct it to a 1gig port. This could be interesting for a number 
of reasons.


Other suggestions welcome.
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Monitoring HTTP / url access @10gig

2009-10-05 Thread Ge Moua
I'm a bit surprise you were not able to match on IPv6 addresses; will 
something like this get any IPv6 traffic at all?


ipv6 access-list IPv6-Sample-ACL
permit ipv6 any any

To answer your question:

current:
* Vlan based SPANs, with edge feed on dot.1q trunk; this allows for 
poor man granularity by vlan (permit all  not as good as VACL)
* IDS are open-bsd running snort with extensive ruleset for matching 
attack signatures


not-so-distant-future (which will buy as a few years):
* net-optics

In my opinion all of this is analogous to  an  arms race where at some 
point traffic volume over-runs current method or technology used then 
the whole design needs to be re-visited again; but then again IT is 
somewhat like that by nature.


Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services
2218 University Ave SE | Minneapolis, MN 55414-3029
Office: 612.626.2779 | Pager: 612.648.0103 | Fax: 612.626.1818



Phil Mayers wrote:

Ge Moua wrote:
We beta tested the GigaMon platform and for the most part it does 
what it claims it can do; basically takes a span feed and fans it 
out for analysis; in the end it was just too $$pricey$$ ( ~$100K 
USD); seems like the target mkt are carriers and large service 
providers.


Our OITSecurity group has been looking at NetOptics as a less 
expensive alternative:

http://www.network-taps.eu/home/home.php

Does basically the same as the Gigamon but not nearly as expensive 
(~$50K USD); albeit with less bells and whistles.


Which specific products are you using, if you don't mind my asking?

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Monitoring HTTP / url access @10gig

2009-10-05 Thread Ge Moua

What code are you running on the Sup720 (3bxl ? I assume) ??

Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Phil Mayers wrote:

Ge Moua wrote:
I'm a bit surprise you were not able to match on IPv6 addresses; will 
something like this get any IPv6 traffic at all?


It's complicated, but seemingly the 6500 won't VACL-capture IPv6 
traffic which it's also routing. It could be a bug, but as I say we've 
had other problems with VACL capture (e.g. it just stopped working one 
day with no config changes, then started back up a week later with no 
explanation) so we're keen to move away from it.




___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] SUP720 - 12.2(18)SXF17

2009-10-02 Thread Ge Moua
not a on Sup720 but deployed this with a Sup32 recently; still working 
with Cisco TAC on Norton Ghost muliticast causing OSPF to reset.


Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Drew Weaver wrote:

Anyone deployed this monster yet? Have any wacky issues that were unexpected?

-Drew

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
  

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Graph packet loss , delay , BER

2009-10-01 Thread Ge Moua

smokeping

Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Oliver Boehmer (oboehmer) wrote:

Mohammad Khalil  wrote on Thursday, October 01, 2009 09:26:

  

hey all

i want to be able to graph the packet loss between 2 routers or even
between a router and a remote site as well as BER or delay , can i do
that ? 
what is the best method to calculate this  ?



I would set up an IP-SLA probe on the router(s) to measure the
latency/etc., and I would expect there are mrtg/cacti scripts around
which are able to graph this data (using SNMP)...
check out www.cisco.com/go/ipsla for more info on ip-sla..

oli
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
  

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] EoMPLS v L2TPv3

2009-09-26 Thread Ge Moua

David Freeman-
We do have a native MPLS backbone and one of our provider does procide 
MPLS CsC about 24 of our remote sites.
For about 12 of our other sites, the service providers only offer native 
IP services.


Any reasons why you have a distaste for MPLSoGRE?

The Cisco TAC has actually told me they have more expertise and 
experience with MPLSoGRE and has suggested the move away from L2TPv3.


Thanks for your feedback.

Regards,
Ge Moua
University of Minnesota



david.freedman at uk
Sep 25, 2009, 9:56 AM
Post #7 of 10 (18 views)
Permalink
  
Re: EoMPLS v L2TPv3 Remove Highlighting [In reply to]

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

I think the choice is simple.

If you have a native MPLS backbone, use EoMPLS.

If you don't, then don't, use L2TPv3, please don't do MPLSoGRE,
it is more trouble than it is worth.

That said, can you not build out a native MPLS network? does your
provider not give you the ability to do this?

Dave.


David Freedman-
Do you have a preference of one over the other?  I've been thinking 
about the option of replacing our L2TPv3 deployment with EoMPLS (ie, 
Cisco's ATOM model).


We are using Cisco 7203 with NSE engine for L2TPv3 acceleration; but 
I'm not a big fan of this platform; we have 3bxl-sup720/cat6k at the 
core that can do MPLS in hardware; I was just thinking of using GRE to 
encapsulate the MPLS packet over to the spoke sites (thereby bypassing 
the need to do MPLS end-to-end); this would allow EoMPLS over service 
providers' native IP infrastructure.


Feedback?



Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



David Freedman wrote:

Wow, this is actually a tricky question, so I'll jot down some points
for you to think about from the top of my head (and anybody, please feel
free to correct these if they are wrong, they may be out of date)

EoMPLS:

 - Requires end-to-end MPLS LSP
 - Does not support path fragmentation (need wider MTU end-to-end)
 - Hardware support good
 - OAM available
 - Closer ties with MPLS-TE
 - some vendors have attachment circuit interworking
 - some hardware vendors may not be happy about attachment circuit MTU
mismatch


L2TPv3:

 - Only requires IP (but has some rudimentary security (Cookie))
 - Path Can be encrypted by IPSEC (this is actually a moot point, even
in a world where stuff like draft-raggarwa-mpls-ipsec wasn't
implemented, you can still encrypt the payloads of both technologies)
 - Not well supported in hardware, lots of restrictions
 - interworking support in hardware poor
 - lack of proper OAM



Dave.


Michael Robson wrote:
 
What is the added benefit of running an EoMPLS pseudowire across an 
MPLS

cloud over an L2TPv3 tunnel over the same cloud?


Michael



___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
  




___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] EoMPLS v L2TPv3

2009-09-25 Thread Ge Moua

David Freedman-
Do you have a preference of one over the other?  I've been thinking 
about the option of replacing our L2TPv3 deployment with EoMPLS (ie, 
Cisco's ATOM model).


We are using Cisco 7203 with NSE engine for L2TPv3 acceleration; but I'm 
not a big fan of this platform; we have 3bxl-sup720/cat6k at the core 
that can do MPLS in hardware; I was just thinking of using GRE to 
encapsulate the MPLS packet over to the spoke sites (thereby bypassing 
the need to do MPLS end-to-end); this would allow EoMPLS over service 
providers' native IP infrastructure.


Feedback?



Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



David Freedman wrote:

Wow, this is actually a tricky question, so I'll jot down some points
for you to think about from the top of my head (and anybody, please feel
free to correct these if they are wrong, they may be out of date)

EoMPLS:

 - Requires end-to-end MPLS LSP
 - Does not support path fragmentation (need wider MTU end-to-end)
 - Hardware support good
 - OAM available
 - Closer ties with MPLS-TE
 - some vendors have attachment circuit interworking
 - some hardware vendors may not be happy about attachment circuit MTU
mismatch


L2TPv3:

 - Only requires IP (but has some rudimentary security (Cookie))
 - Path Can be encrypted by IPSEC (this is actually a moot point, even
in a world where stuff like draft-raggarwa-mpls-ipsec wasn't
implemented, you can still encrypt the payloads of both technologies)
 - Not well supported in hardware, lots of restrictions
 - interworking support in hardware poor
 - lack of proper OAM



Dave.


Michael Robson wrote:
  

What is the added benefit of running an EoMPLS pseudowire across an MPLS
cloud over an L2TPv3 tunnel over the same cloud?


Michael



___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
  

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] EoMPLS v L2TPv3

2009-09-25 Thread Ge Moua

Gert-
what about the 3cxl; we have some of those on hand too.

Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Gert Doering wrote:

Hi,

On Fri, Sep 25, 2009 at 11:49:47AM -0500, Ge Moua wrote:
  
We are using Cisco 7203 with NSE engine for L2TPv3 acceleration; but I'm 
not a big fan of this platform; we have 3bxl-sup720/cat6k at the core 
that can do MPLS in hardware; I was just thinking of using GRE to 
encapsulate the MPLS packet over to the spoke sites (thereby bypassing 
the need to do MPLS end-to-end); this would allow EoMPLS over service 
providers' native IP infrastructure.


Feedback?



PFC3b cannot do MPLS-over-GRE

(... at least not without the help of a SIP or ES line card)

gert
  

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Cisco SSL VPN?

2009-08-21 Thread Ge Moua

We've used this free IPSec 64-bit Windows client for the Cisco VPN:
http://www.shrew.net/

Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Eric Girard wrote:

Something relatively recent that makes the lack of 64-bit support much more 
palatable is the new Essentials license.  It needs 8.2 code, but for short 
money it gives you AnyConnect client only SSL VPN support for the max number of 
tunnels supported by the box.  It restores the cost/benefit of the old IPSec 
client.

Beyond that, to add to what Justin said, nothing fancy, it pretty much works, 
similar to the old IPSec client.  I tend to stay away from the clientless and 
Java client stuff, just stick to the AnyConnect.

Eric

-Original Message-
From: cisco-nsp-boun...@puck.nether.net 
[mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of Justin M. Streiner
Sent: Friday, August 21, 2009 4:22 PM
To: cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] Cisco SSL VPN?

On Fri, 21 Aug 2009, Charles Mills wrote:

  

Anyone currently (successfully) using the SSL VPN on an ASA box (5520 or above)?

I'm in uncharted territory with this feature and not sure if it is
worth going down this route.



I've deployed it for a client and it seems to work pretty well, though as
far as I know they're not doing anything terribly exotic.

One important gotcha:
The SSL VPN connections are licensed independently from IPSEC connections.
The base license allows for only two concurrent connections at least on
the smaller ASAs, so you might need to purchase a license upgrade if you
want to roll it out on a larger scale.  If you do a show version on the
ASA, the number of WebVPN peers is the number you need to know.

Cisco has made it clear that they're moving in this direction, as they
don't seem to be putting much new development effort into the IPSEC client
- it doesn't support 64-bit OSen, and I doubt they'll spin many cycles
testing Windows 7, etc...  They seem to want people to move to the
AnyConnect (SSL VPN) model.

jms
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
  

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Open Source Substitute for Cisco's Secure ACS?

2009-08-13 Thread Ge Moua

Yep, RADIATOR is great; we use it over here :-)

Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Scott McGrath wrote:
Not so much - we use ACS for TACACS services and proxy the TACACS via 
RADIUS for some application but Cisco ACS is now an appliance and on 
the close order of 8K + SmartNet so you are looking at 20K $US for a 
new solution.


RADIATOR is open-source but not 'free' it has 200+ authenticators and 
interfaces to billing systems built in and a basic license and support 
for 1 yr is under $2000 US


Nothing wrong with FreeRADIUS it's just you need to 'roll your own' 
for a lot of stuff,  If your time is worth nothing or it's a hobby or 
experimental setup FreeRADIUS may be the better choice. But if you 
want someting with AD, LDAP, Kerberos, Unix, NTLM, SQL  etc built in 
and ready to go  RADIATOR is your tool.


- Scott

Alan Buxey wrote:

Hi,
 
Radiator RADIUS server.   There are multiple versions of this 
software and support is available for a reasonable fee  runs on 
Windows/Solaris/Linux



with fear of pouring petrol onto a RADIUS flamewar I'd say if
the original post aint got funding for ACS then free open source is
pushing the answer to FreeRADIUS.
alan
  


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] pseudowire over ip/mpls

2009-08-11 Thread Ge Moua
Been doing that for a few years over here; works fairly good (although 
ds-z ckts are pricey).


Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Mike wrote:

Hello,

This may not be a strictly cisco question, but does anyone here have
good operational experience with pseudowire (t1 and ds3) carried over
ip/mpls?  I'm just interested in real world experiences and deployment
scenarios that have went live. I previously posted to the nanog list
without success.

Thank you.


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
  

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Linux Com Driver to Modem on Cisco Terminal Server

2009-08-10 Thread Ge Moua

I like minicom.

Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Gregory Boehnlein wrote:

Hello,
Received a request from a client that needs to access a modem on a
Cisco router from standard serial applications on a Linux box. These are for
standard applications that do modem control (I.E. ATDT1X etc..) and
not PPP.

There used to be a few piece of software out there that did it, but
I can't seem to find any of them. Anyone have any solutions for this?

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
  

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] tcam exhaustion for netflow vacl capture for cat6500

2009-08-06 Thread Ge Moua

on 6500 with 3bxl sup720:

will concurrent use of ( 10K) netflow exports  ( 10Gb/s) vacl
caputure exhaust tcam more quickly than each by itself?

how do I monitor this?
how do I check status?





Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ASA Multiple Context Mode

2009-07-19 Thread Ge Moua
I've done IOS based WebVPN with multiple VRFs (vrf-lite in this case); 
this is somewhat analogous to the ASA w/ multiple context; I know you 
mentioned how to do this on the ASA which I don't believe is possible.


Our Cisco Acct SE mentioned vlan mapping where you terminate the 
webvpn/ipsec tunnel on one interface but then funnel the designated 
traffic per customer to different downstream vlan or interfaces; 
essentially this allows you to have multiple customer group in one 
context; i've seen docs on cisco cco that mentions this as well; good luck.



Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Ryan West wrote:

Clue,

I am pretty sure that it doesn't support SSL VPN's either.  All NetPro 
discussions show the same results.  Assuming you are support multiple customers 
and want to give them access to their firewall, or whatever you reason for 
choosing multiple context may be, you should use another ASA pair in 
Active/Standby to provide VPN termination services.  You may have to mess 
around with RRI, but you should be able to pull off customer segregation using 
VLANs.

-ryan

-Original Message-
From: cisco-nsp-boun...@puck.nether.net 
[mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of Clue Store
Sent: Sunday, July 19, 2009 2:14 PM
To: cisco-nsp@puck.nether.net
Subject: [c-nsp] ASA Multiple Context Mode

Hi All,


As I understand that the ASA in multiple context mode does not support
VPN's, does this also inclue SSL VPN's?? Someone has mentioned that it
turns off IPSEC engine in this mode, but I have not been able to find
anywhere where it says SSL VPN's are not supported. If it doesn't support
SSL VPN, what are other folks doing for VPN's in this situation where
multiple contexts are being used??

TIA,
Clue
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
  

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] SA-VAM NPE-200

2009-07-15 Thread Ge Moua
I've done this before; this will work but Cisco will not give you 
support if there are issues;also the VAM combo with this router engine 
results in very llittle throughput; not worth it IMHO.


Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services




Kris Amy wrote:

Hi,

Just wondering if this combination works. The documentation says a NPE225 is 
required however i'm wondering if that is just a warning or an actual 
requirement...

--
Kind Regards,
Kris Amy
Enterprise IP
Phone: 07 3123 5510
National: 1300 347 287
Fax: 1300 347 329
Direct: 07 3123 5511
Email:  
kris@eip.net.auoutbind://2-FC347F44727AD040BF1A93E9A3DC68310700065EB17B7262634485BBBA18AFE92E3E0007A2A2A7EE065EB17B7262634485BBBA18AFE92E3E0007D22B1035/kris@eip.net.au

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
  

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] multiple vlans on a port

2009-07-13 Thread Ge Moua
Yes, I've done this on a few Xen boxes myself; contact me off-line and I 
can send you my install notes.


Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Cord MacLeod wrote:
I realize this is impossible, at least I have read it is on an access 
port.  So if I sent up a trunk port with the machine, does the machine 
need to speak 802.1q as well?


interface GigabitEthernet0/15
 switchport access vlan 120
 switchport trunk native vlan 120
 switchport trunk allowed vlan 100,120,231,321
 switchport mode trunk
end

The purpose of this is that the machine in a Linux machine running 
Xen, so the cloud will decide what machines and vlans it needs to spin 
up at what time.  Meaning this port will need access to these vlans.  
This being the case, will I need to configure the Linux machine for 
802.1q trunking as well?  I found this article that seemed to suggest, 
yes, but I wanted a second opinion.  
http://www.linuxjournal.com/article/7268


Thanks for your help.
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] L2TPv3 and VLANs

2009-06-18 Thread Ge Moua


 How do I make this happen on the HQ router?

Each l2tp tunnel will have its own vc:  sh l2tun all

You obviously have thoughts this all out as your logic for how it will 
and should work is sound.


We are doing a very similar setup over here at the UofMn and this is 
working well for us.



Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Ziv Leyes wrote:

Hi,
I'm trying to make sure this following scenario can work.
3 remote sites, one is the HQ which has a switch that handles 2 vlans, let's 
say vlan 10 and vlan 20.
The other two branches needs to be connected to the HQ and have a flat LAN 
between them and the HQ, but each branch to it's own vlan, branch 1 to vlan 10 
and branch 2 to vlan 20. They must NOT see each other's traffic.
Every site has a switch and a router (C2801 I think) Is it possible to do?
If yes, then I was thinking about L2TPv3, but in this case I'd need to make two 
different xconnections between HQ--Branch 1 and HQ--Branch 2.
How do I make this happen on the HQ router? I was thinking to bring the vlans 
via a trunk from the switch and then finishing them on sub-interfaces with 
dot1q and then xconnecting the sob-interface to each l2tp tunnel to each 
respective branch. Is it correct or there is a better way?

Will this work?

Thanks in advance for your help
Ziv


 
 


This footnote confirms that this email message has been scanned by
PineApp Mail-SeCure for the presence of malicious code, vandals  computer 
viruses.


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
  

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] L2TPv3 and VLANs

2009-06-18 Thread Ge Moua
Yep, ran into  that to; on the upstream layer-3 hop from hosts do 
something like tcp-mss adjust 1300 which will ensure tcp packets haver 
enough head-room for l2tpv3 headers.  With UDP traffic, this get more 
tricky; I haven't done this yet but one can adjust max segment size on 
end-station hosts to something like 1300 (which of course would affect 
all protocol types); there are open source tools to do this, but 
downside is that all the end-station hosts need to touched for 
consistency; i suppose I'm too lazy : - (


Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Paul Stewart wrote:

How did you deal with MTU issues from l2tpv3?  In our testing we would see
packets drop instead of fragmenting where they should... I've been meaning
to followup on this as we have some great l2tpv3 deployments waiting in the
wings...

Paul


-Original Message-
From: cisco-nsp-boun...@puck.nether.net
[mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of Ge Moua
Sent: Thursday, June 18, 2009 10:44 AM
To: Ziv Leyes
Cc: cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] L2TPv3 and VLANs


  How do I make this happen on the HQ router?

Each l2tp tunnel will have its own vc:  sh l2tun all

You obviously have thoughts this all out as your logic for how it will 
and should work is sound.


We are doing a very similar setup over here at the UofMn and this is 
working well for us.



Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Ziv Leyes wrote:
  

Hi,
I'm trying to make sure this following scenario can work.
3 remote sites, one is the HQ which has a switch that handles 2 vlans,


let's say vlan 10 and vlan 20.
  

The other two branches needs to be connected to the HQ and have a flat LAN


between them and the HQ, but each branch to it's own vlan, branch 1 to vlan
10 and branch 2 to vlan 20. They must NOT see each other's traffic.
  

Every site has a switch and a router (C2801 I think) Is it possible to do?
If yes, then I was thinking about L2TPv3, but in this case I'd need to


make two different xconnections between HQ--Branch 1 and HQ--Branch 2.
  

How do I make this happen on the HQ router? I was thinking to bring the


vlans via a trunk from the switch and then finishing them on sub-interfaces
with dot1q and then xconnecting the sob-interface to each l2tp tunnel to
each respective branch. Is it correct or there is a better way?
  

Will this work?

Thanks in advance for your help
Ziv


 
 





  

This footnote confirms that this email message has been scanned by
PineApp Mail-SeCure for the presence of malicious code, vandals  computer


viruses.
  



  

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
  


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

  

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] L2TPv3 and VLANs

2009-06-18 Thread Ge Moua
Ive also seen out-of-order packets get discarded (essentially 
dropped); if fragmentation is clean and in correct order, L2TPv3 as 
implemeted by Cisco seems  to work better; we've open a case with Cisco 
about this re: VTP traffic and their response essentially was to do 
nothing about it and not use VTP (so we are now using VTP transparent 
mode with no VTP updates) and thus no VTP being transmitted over the 
l2tpv3 pseudowire.


I've been meaning to do pseudowire testing using AToM/EoMPLS tunnled 
inside of GRE to see if this works better; Cisco TAC seems to be more 
recpetive in supporting MPLS issues rather than L2TPv3 over native IP.


Let me know if you run into different conclusions as I've been 
struggling with this issue for a few years now.


Good luck.

Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Ge Moua wrote:
Yep, ran into  that to; on the upstream layer-3 hop from hosts do 
something like tcp-mss adjust 1300 which will ensure tcp packets 
haver enough head-room for l2tpv3 headers.  With UDP traffic, this get 
more tricky; I haven't done this yet but one can adjust max segment 
size on end-station hosts to something like 1300 (which of course 
would affect all protocol types); there are open source tools to do 
this, but downside is that all the end-station hosts need to touched 
for consistency; i suppose I'm too lazy : - (


Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Paul Stewart wrote:
How did you deal with MTU issues from l2tpv3?  In our testing we 
would see
packets drop instead of fragmenting where they should... I've been 
meaning
to followup on this as we have some great l2tpv3 deployments waiting 
in the

wings...

Paul


-Original Message-
From: cisco-nsp-boun...@puck.nether.net
[mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of Ge Moua
Sent: Thursday, June 18, 2009 10:44 AM
To: Ziv Leyes
Cc: cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] L2TPv3 and VLANs


  How do I make this happen on the HQ router?

Each l2tp tunnel will have its own vc:  sh l2tun all

You obviously have thoughts this all out as your logic for how it 
will and should work is sound.


We are doing a very similar setup over here at the UofMn and this is 
working well for us.



Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Ziv Leyes wrote:
 

Hi,
I'm trying to make sure this following scenario can work.
3 remote sites, one is the HQ which has a switch that handles 2 vlans,


let's say vlan 10 and vlan 20.
 
The other two branches needs to be connected to the HQ and have a 
flat LAN

between them and the HQ, but each branch to it's own vlan, branch 1 
to vlan

10 and branch 2 to vlan 20. They must NOT see each other's traffic.
 
Every site has a switch and a router (C2801 I think) Is it possible 
to do?

If yes, then I was thinking about L2TPv3, but in this case I'd need to


make two different xconnections between HQ--Branch 1 and HQ--Branch 2.
 

How do I make this happen on the HQ router? I was thinking to bring the

vlans via a trunk from the switch and then finishing them on 
sub-interfaces

with dot1q and then xconnecting the sob-interface to each l2tp tunnel to
each respective branch. Is it correct or there is a better way?
 

Will this work?

Thanks in advance for your help
Ziv


 
 


 



 

This footnote confirms that this email message has been scanned by
PineApp Mail-SeCure for the presence of malicious code, vandals  
computer


viruses.
  
 



 

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
  

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

  



___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] L2TPv3 and VLANs

2009-06-18 Thread Ge Moua
RTP, video streaming, h.323,  the like; nothing really breaks, just 
spongy response if the pipe is saturated.


Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Paul Stewart wrote:

Thanks... we don't want to touch each workstation - would involve way too
much time for our installations...;)

With UDP traffic, does anything normally break that comes to mind on
larger MTU? I can't think of anything hence why I'm asking...

Cheers,

Paul


-Original Message-
From: Ge Moua [mailto:moua0...@umn.edu] 
Sent: June 18, 2009 11:33 AM

To: Paul Stewart
Cc: 'Ziv Leyes'; cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] L2TPv3 and VLANs

Yep, ran into  that to; on the upstream layer-3 hop from hosts do 
something like tcp-mss adjust 1300 which will ensure tcp packets haver 
enough head-room for l2tpv3 headers.  With UDP traffic, this get more 
tricky; I haven't done this yet but one can adjust max segment size on 
end-station hosts to something like 1300 (which of course would affect 
all protocol types); there are open source tools to do this, but 
downside is that all the end-station hosts need to touched for 
consistency; i suppose I'm too lazy : - (


Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Paul Stewart wrote:
  

How did you deal with MTU issues from l2tpv3?  In our testing we would see
packets drop instead of fragmenting where they should... I've been meaning
to followup on this as we have some great l2tpv3 deployments waiting in


the
  

wings...

Paul


-Original Message-
From: cisco-nsp-boun...@puck.nether.net
[mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of Ge Moua
Sent: Thursday, June 18, 2009 10:44 AM
To: Ziv Leyes
Cc: cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] L2TPv3 and VLANs


  How do I make this happen on the HQ router?

Each l2tp tunnel will have its own vc:  sh l2tun all

You obviously have thoughts this all out as your logic for how it will 
and should work is sound.


We are doing a very similar setup over here at the UofMn and this is 
working well for us.



Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Ziv Leyes wrote:
  


Hi,
I'm trying to make sure this following scenario can work.
3 remote sites, one is the HQ which has a switch that handles 2 vlans,

  

let's say vlan 10 and vlan 20.
  


The other two branches needs to be connected to the HQ and have a flat
  

LAN
  

  

between them and the HQ, but each branch to it's own vlan, branch 1 to


vlan
  

10 and branch 2 to vlan 20. They must NOT see each other's traffic.
  


Every site has a switch and a router (C2801 I think) Is it possible to
  

do?
  

If yes, then I was thinking about L2TPv3, but in this case I'd need to

  

make two different xconnections between HQ--Branch 1 and HQ--Branch 2.
  


How do I make this happen on the HQ router? I was thinking to bring the

  

vlans via a trunk from the switch and then finishing them on


sub-interfaces
  

with dot1q and then xconnecting the sob-interface to each l2tp tunnel to
each respective branch. Is it correct or there is a better way?
  


Will this work?

Thanks in advance for your help
Ziv


 
 


  


  


  


This footnote confirms that this email message has been scanned by
PineApp Mail-SeCure for the presence of malicious code, vandals 
  

computer
  

  

viruses.
  




  


  


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
  

  

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

  




  

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Can you apply crypto map to SVI

2009-06-16 Thread Ge Moua
Yes, this should work contigent on hw plaform.  If you do a sh cry 
engine do you see an active crypto engine in sw or hw?  If not then the 
crypto commands will never be invoked even though legal.


Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Andy Saykao wrote:

Hi All,
 
Got a problem with a site-to-site IPSEC vpn implementation where one end

is using SVI.
 
Does any body know if a crypto map can be applied to a SVI to bring up

the IPSEC tunnel? It accepts the command but I can't pass any traffic
to/from it.
 
interface vlan 10

 crypto map MY-MAP
 
Or do you need to apply the crypto map to a physical interface? 
 
I've gotten it working on a sub-interface (eg: interface

GigabitEthernet0/0.11) but can't find any documentation that talks about
applying it to a SVI and whether this will work.
 
Thanks.
 
Andy


This email and any files transmitted with it are confidential and intended
 solely for the use of the individual or entity to whom they are addressed. 
Please notify the sender immediately by email if you have received this 
email by mistake and delete this email from your system. Please note that

 any views or opinions presented in this email are solely those of the
 author and do not necessarily represent those of the organisation. 
Finally, the recipient should check this email and any attachments for 
the presence of viruses. The organisation accepts no liability for any 
damage caused by any virus transmitted by this email.


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
  

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Can you apply crypto map to SVI

2009-06-16 Thread Ge Moua
Maybe; I've seen a situation with the me-6524 with the crypto commands 
available but functionality disabled.  What hardware platform are you 
running?


Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Andy Saykao wrote:

Hi Ge,

Yes I see an active crypto engine in software. 


core1#sh cry engine configuration

crypto engine name:  unknown
crypto engine type:  software
 serial number:  00016956
   crypto engine state:  installed
 crypto engine in slot:  N/A
  platform:  Cisco Software Crypto Engine

   Encryption Process Info:
  input queue size:  500
   input queue top:  0
   input queue bot:  0
 input queue count:  0

   Crypto Adjacency Counts:
Lock Count:  0
  Unlock Count:  0
crypto lib version:  17.0.0
 ipsec lib version:  2.0.0

Does this mean that if the crypto map is applied to the SVI that the
IPSEC tunnel should be working (considering my IPSEC config is all
good).

Thanks.

Andy

-Original Message-
From: Ge Moua [mailto:moua0...@umn.edu] 
Sent: Tuesday, 16 June 2009 7:03 PM

To: Andy Saykao
Cc: cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] Can you apply crypto map to SVI

Yes, this should work contigent on hw plaform.  If you do a sh cry
engine do you see an active crypto engine in sw or hw?  If not then the
crypto commands will never be invoked even though legal.

Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Andy Saykao wrote:
  

Hi All,
 
Got a problem with a site-to-site IPSEC vpn implementation where one 
end is using SVI.
 
Does any body know if a crypto map can be applied to a SVI to bring up



  
the IPSEC tunnel? It accepts the command but I can't pass any traffic 
to/from it.
 
interface vlan 10

 crypto map MY-MAP
 
Or do you need to apply the crypto map to a physical interface? 
 
I've gotten it working on a sub-interface (eg: interface
GigabitEthernet0/0.11) but can't find any documentation that talks 
about applying it to a SVI and whether this will work.
 
Thanks.
 
Andy


This email and any files transmitted with it are confidential and 
intended  solely for the use of the individual or entity to whom they


are addressed.
  
Please notify the sender immediately by email if you have received 
this email by mistake and delete this email from your system. Please 
note that  any views or opinions presented in this email are solely 
those of the  author and do not necessarily represent those of the


organisation.
  

Finally, the recipient should check this email and any attachments for



  

the presence of viruses. The organisation accepts no liability for any



  

damage caused by any virus transmitted by this email.

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net 
https://puck.nether.net/mailman/listinfo/cisco-nsp

archive at http://puck.nether.net/pipermail/cisco-nsp/
  



__
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email
__
  

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Can you apply crypto map to SVI

2009-06-16 Thread Ge Moua
I think on the 6500 with Sup720 you may need a IPSec VAM or SPA card for 
IPSec functionality to be active; I wonder if this is the same on the 
7606; you should open a case with Cisco and ask the quesiton.


Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Andy Saykao wrote:

Hi Ge,

This is being implemented on a Cisco 7606 (SUP720) running
12.2(18)SXF16.

Thanks.

Andy 


-Original Message-
From: Ge Moua [mailto:moua0...@umn.edu] 
Sent: Wednesday, 17 June 2009 2:15 PM

To: Andy Saykao
Cc: cisco-nsp@puck.nether.net
Subject: Re: Can you apply crypto map to SVI

Maybe; I've seen a situation with the me-6524 with the crypto commands
available but functionality disabled.  What hardware platform are you
running?

Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Andy Saykao wrote:
  

Hi Ge,

Yes I see an active crypto engine in software. 


core1#sh cry engine configuration

crypto engine name:  unknown
crypto engine type:  software
 serial number:  00016956
   crypto engine state:  installed
 crypto engine in slot:  N/A
  platform:  Cisco Software Crypto Engine

   Encryption Process Info:
  input queue size:  500
   input queue top:  0
   input queue bot:  0
 input queue count:  0

   Crypto Adjacency Counts:
Lock Count:  0
  Unlock Count:  0
crypto lib version:  17.0.0
 ipsec lib version:  2.0.0

Does this mean that if the crypto map is applied to the SVI that the 
IPSEC tunnel should be working (considering my IPSEC config is all 
good).


Thanks.

Andy

-Original Message-
From: Ge Moua [mailto:moua0...@umn.edu]
Sent: Tuesday, 16 June 2009 7:03 PM
To: Andy Saykao
Cc: cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] Can you apply crypto map to SVI

Yes, this should work contigent on hw plaform.  If you do a sh cry 
engine do you see an active crypto engine in sw or hw?  If not then 
the crypto commands will never be invoked even though legal.


Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Andy Saykao wrote:
  


Hi All,
 
Got a problem with a site-to-site IPSEC vpn implementation where one 
end is using SVI.
 
Does any body know if a crypto map can be applied to a SVI to bring 
up

  
  


the IPSEC tunnel? It accepts the command but I can't pass any traffic
  


  

to/from it.
 
interface vlan 10

 crypto map MY-MAP
 
Or do you need to apply the crypto map to a physical interface? 
 
I've gotten it working on a sub-interface (eg: interface
GigabitEthernet0/0.11) but can't find any documentation that talks 
about applying it to a SVI and whether this will work.
 
Thanks.
 
Andy


This email and any files transmitted with it are confidential and 
intended  solely for the use of the individual or entity to whom they

  

are addressed.
  

Please notify the sender immediately by email if you have received 
this email by mistake and delete this email from your system. Please 
note that  any views or opinions presented in this email are solely 
those of the  author and do not necessarily represent those of the

  

organisation.
  

Finally, the recipient should check this email and any attachments 
for

  
  

the presence of viruses. The organisation accepts no liability for 
any

  
  


damage caused by any virus transmitted by this email.

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net 
https://puck.nether.net/mailman/listinfo/cisco-nsp

archive at http://puck.nether.net/pipermail/cisco-nsp/
  

  

__
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
__
  



__
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email
__
  

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Opensource tool to measure Jitter for VoIP

2009-06-08 Thread Ge Moua

smokeping

supports latency metrics out of the box; add plugins for jitter

easy to install (debian based *nix)
apt-get install smokeping



Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Kasper Adel wrote:

Hello,

I'm looking for a way to measure Jitter for a VoIP network and i cant get my
hands on IXIA or any fancy tool like that so i'm asking if anyone used any
open source tool specifically for the matter.

IPerf is an option but i've never used it, so can you guys point me if i can
be used and what are the tests that i can try with it, my skills on *nix and
these tools is similar to my skills with Chinese poetry ;)

Thanks,
Kas
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
  

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] L2TPv3 performance over gig?

2009-06-04 Thread Ge Moua

I've done testing for both:
* no encryption: ~ 980Mb
* encryption ~ 240 Mb

Performance dependent on router platform (in my case 7203 w/ NSE-100)

Encryption was on 7206 w/ NPE-G1  VAM2+

Conclusion, performance limited to hardware used and not layer-1 link speed.



Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Chris Fournier wrote:

Does anyone use L2TPv3 over a gig link, and what is the performance
overhead introduced? I've seen some numbers at the Cisco website, but
these seem to reference encryption versus encapsulation.


Chris

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
  

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] L2TPv3 performance over gig?

2009-06-04 Thread Ge Moua

The (2) scenarios is:
* L2TPv3 vc w/ no ecryption
vs.
* L2TPv3 vc w/ IPSec encryption (encapsulated inside of)

One can also do layer-2 VPN with MPLS, eg, AToM (EoMPLS), but I think 
the initial thread was about L2TPv3 (layer-2 VPN inside native IP).  
Persoanally I like the AToM/EoMPLS (or even VPLS) approach with the 
many-to-many connections flexibility (vs. one-to-one connection 
limitation with L2TPv3).


We have about a half-dozen sites on L2TPv3 but have considered 
AToM/EoMPLS.  Just in case your wondering Cisco TAC has far more 
in-depth expertise w/ MPLS flavors as I've been told; when you run into 
issues.


Good luck.

Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Aaron wrote:

What does that have to do with L2TPv3?

On Thu, Jun 4, 2009 at 11:09, Ge Moua moua0...@umn.edu 
mailto:moua0...@umn.edu wrote:


I've done testing for both:
* no encryption: ~ 980Mb
* encryption ~ 240 Mb

Performance dependent on router platform (in my case 7203 w/ NSE-100)

Encryption was on 7206 w/ NPE-G1  VAM2+

Conclusion, performance limited to hardware used and not layer-1
link speed.



Regards,
Ge Moua | Email: moua0...@umn.edu mailto:moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services




Chris Fournier wrote:

Does anyone use L2TPv3 over a gig link, and what is the
performance
overhead introduced? I've seen some numbers at the Cisco
website, but
these seem to reference encryption versus encapsulation.


Chris

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
mailto:cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
 


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
mailto:cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/



___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] IP Tunneling Question

2009-05-19 Thread Ge Moua
What seems to be gaining popularity is a GRE-like tunnel with IPSec 
encapsulation; Cisco calls this IPSec VTI; caveat is that equipment in 
question may need to be Csico based.


Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Charles Wyble wrote:

All,


I'm looking to setup a VPN with a couple colocation providers who are 
friends of mine, and have some under utilized address space. They are 
supporting some security research I am doing (a darknet/honeynet). [1]


I am exploring different options to utilize that IP space on my lab 
servers.


How do folks typically accomplish IP tunneling? IPSEC tunnels? Do you 
use GRE? What about OpenVPN?


I can easily setup any of the above mentioned approaches as howtos 
abound. Just wondering if there is anything to consider for this 
scenario to reduce overhead and packet molestation as much as possible.


Thanks.

[1] If more information is desired please see my blog at 
http://cnwccxx.blogspot.com/ I'll be posting there on various 
visualization tools and methodologies etc.

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] network simulator

2009-05-18 Thread Ge Moua
If I understand you correctly you prefer a s/w virtual environment (VM) 
that can simulate multiple switches; doing trunking (802.1 ?) and 
switch access ports.  Maybe preferably if this was akin to a Cisco 
switch with its breadth of IOS command; which probably do exist as a 
proprietary tool for in-house Cisco developers.


Well, I've done something similar if not exact to the summary above for 
a training lab for firewall simulation.  Here is my setup:

hw:
* x86 Dual Xeon 2.6 Ghz / 4Gb RAM / 200 Gb HDD

sw:
+ (Virtualization Sw) Xen 3.3.1 running on CentOS 5.3
   + fed (1) 802.1q trunk (with 16 Vlans) from upstream Cisco3750 switch
   * (16) VMs running Ubuntu 9.04 that acts as end hosts per Vlans 
and broadcast domain

   + fed (2) switch access ports
   * (1) for mgmt of Host VM (CentOS 5.3)
   * (1) for another guest VM (Ubuntu 9.04)

The net effect is that the Xen environment acts like a switch if fed 
with 802.1q trunk.  I'm sure there are more elegant ways of doing what 
you ask, but this setup works pretty effectively for my needs.


Good luck.



Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Holemans Wim wrote:

I'm looking for a (free) network simulator that allows me to simulate a
small network (20 switches) with different vlans on it. I want to test
different scenario's : what happens if this switch goes down or that
link goes down, how do the packets flow in each scenario for the
different vlans...

 


Anyone has a good reference to such a product ? Free would be nice but
is no absolute condition.

 


Thanks,

 


Wim Holemans

Netwerkdienst Universiteit Antwerpen

 


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
  

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] L2TPv3 LNS mode

2009-03-18 Thread Ge Moua
One could send this over vanilla crypto IPSec; IPSec is routable.  We 
are doing this over here.


Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Gabor Ivanszky wrote:

Hello,

is there any possibility to route(L3 process) Ethernet encapsulated IP
packets arriving at a Cisco router in a L2TPv3 tunnel?

In other words, is it possible to configure a Cisco box in LNS role in
an Ethernet L2TPv3 setup?

 L2TP Network Server (LNS)

 If a given L2TP session is terminated at the L2TP node and the
 encapsulated network layer (L3) packet processed on a virtual
 interface, we refer to this L2TP node as an L2TP Network Server (RFC3931)

Actually i'd like to implement  (a) LAC-LNS Reference Model:

On one side, the LAC receives traffic
  from an L2 circuit, which it forwards via L2TP across an IP or other
  packet-based network.  On the other side, an LNS logically terminates
  the L2 circuit locally and routes network traffic to the home
  network.  The action of session establishment is driven by the LAC
  (as an incoming call) or the LNS (as an outgoing call).

   +-+  L2  +-++-+
   | |--| LAC |.[ IP ].| LNS |...[home network]
   +-+  +-++-+
   remote
   system
  |-- emulated service --|
 |--- L2 service | (RFC3931)

Practically an Ethernet interface with an xconnect setting on LAC
side, and something like an IP tunnel interface on the LNS side.

The obvious

interface Tunnel1
 tunnel mode l2tpv3

doesn't exist.


cheers,
Gabor
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
  

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Open Source solution to deploy a radius server against Cisco devices?

2009-03-07 Thread Ge Moua
We use Radiator over here to manage over 6,000 cisco devices; works 
pretty good on server class hardware.


Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



luismi wrote:

Hi all,

I am looking for an open source solution to deploy some radius in our
network.
The primary goal is to connect to those radius to provide auth services:
- The VPN Concentrators and vpn accounts (we would move all the vpn
accounts info to the radius)
- Validate ip http auth-proxy users

Radius service should be able to be managed using a web interface.
I don't really mind if there is a proper web interface of if we need to
install webadmin.
It also must support accounting.
And it would be great if it is possible to have the back-end into MySQL.

I was checking FreeRadius and Radiator.
Any other options?
All comments are welcome.

Thanks


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
  

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] OT: TCL Book recommendation for Cisco EEM

2009-03-06 Thread Ge Moua
The monkey book was what I started with.  Very detailed with pretty 
good intro.



http://oreilly.com/catalog/expect/chapter/ch03.html


Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Justin Shore wrote:
Does anyone have any suggestions on a good book on TCL scripting for 
Cisco's EEM?  As a complete TCL novice, a good TCL intro would be 
good.  I can probably use existing EEM examples to learn the 
intricacies of using TCL for Cisco I think, unless someone knows of a 
book that covers that too.


http://www.cisco.com/en/US/docs/ios/netmgmt/configuration/guide/nm_eem_overview.html 



Thanks
 Justin

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] l2tpv3 config - MTU question

2009-02-26 Thread Ge Moua
We've got about a half-dozen sites deployed on this, with about 1000 
user base total, and it's running most fine, caveats:
* watch out for VTP as thiere may be some out of order packets that 
causes VTP convergence to fail; run the CE side in vtp transparent mode 
and add vlan manually
* another trick we've been think about is adjusting MTU on the end 
workstations
* mtu 1472 works fine as defrag/frag will happen on the pe/ce equipment; 
no worries with running high cpu on end-workstation due to frag/defrag 
operations

* clear ip tra  sh ip tra will show frag stat on routers

hope this helps.

Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Paul Stewart wrote:

Thanks - yes, absolutely and I can figure that into the equation.  Been
reading a lot of discussions in archives and Google about this.  I want to
ensure that however/where we deploy this that we can provide a full 1500 MTU
*without* having desktops make MTU adjustments basically at the expense
of fragmentation and CPU (which we can account for).  No matter what I've
tried so far I can't get a ping through our pair of test routers larger than
1472 though yet

This avoids websites being unreachable (Microsoft comes to mind) and other
MTU annoyances we've encountered over time...

Paul


-Original Message-
From: Ge Moua [mailto:moua0...@umn.edu] 
Sent: Thursday, February 26, 2009 11:50 AM

To: Paul Stewart
Cc: cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] l2tpv3 config - MTU question

I was tackling a similar issue over here too, I think it may have to do 
with the fact that l2tpv3 and ethernet headers are taking some of the 
mtu allocation.


Regards,
Ge Moua | Email: moua0...@umn.edu

Network Design Engineer
University of Minnesota | Networking  Telecommunications Services



Paul Stewart wrote:
  

Hi folks.

 


I've setup a pair of 1841's back to back for testing l2tpv3 deployment for


a
  

client..

 


FastE0/0 from each 1841 is connected to one another at 10.0.0.0/24 - each
router has a loopback of 192.168.254.1 and .2  - OSPF is running and am


able
  

to successfully ping each other's loopback with redistributed subnets


etc..
  
 


Configured each router to look like this:

 


pseudowire-class test

 encapsulation l2tpv3

 sequencing both

 ip local interface Loopback0

 


interface FastEthernet0/0

 ip address 10.0.0.2 255.255.255.0

 duplex auto

 speed auto

 


interface FastEthernet0/1

 no ip address

 duplex auto

 speed auto

 no cdp enable

 xconnect 192.168.254.2 1234 pw-class test

 


Have a notebook hooked up to each FastE0/1 port and assigned 172.16.0.1


and
  

.2 on them.  I can ping back and forth proving connectivity etc.

 


My problem/question is how to get a packet of 1500 bytes to transverse the
link - obviously fragmented but that's ok.In the real-world deployment
of this setup we are limited to 1500 MTU in most situations and will


presume
  

no mini-jumbo support anywhere (from a config perspective at least).

 


In my first config I had Path MTU discovery enabled and could only ping up
to 1440 bytes.  With that disabled I can now ping to 1472 but not beyond.



  
 


With Path MTU turned on it looked like this:

 


site2#sh l2tun session all

 


%No active L2F tunnels

 


L2TP Session Information Total tunnels 1 sessions 1

 


Session id 53211 is up, tunnel id 32076

Call serial number is 129330

Remote tunnel name is site1

  Internet address is 192.168.254.1

  Session is L2TP signalled

  Session state is established, time since change 00:26:44

114 Packets sent, 116 received

30446 Bytes sent, 29032 received

  Last clearing of show vpdn counters never

Receive packets dropped:

  out-of-order: 0

  total:0

Send packets dropped:

  exceeded session MTU: 1

  total:1

  Session vcid is 1234

  Session Layer 2 circuit, type is Ethernet, name is FastEthernet0/1

  Circuit state is UP

Remote session id is 22201, remote tunnel id 12358

  Session PMTU enabled, path MTU is 1500 bytes

  DF bit on, ToS reflect disabled, ToS value 0, TTL value 255

  No session cookie information available

  UDP checksums are disabled

  SSS switching enabled

  Sequencing is on

Ns 114, Nr 116, 0 out of order packets received

  Unique ID is 1

 


%No active PPTP tunnels

 

 


Upon looking further I could see the DF bit on which I believe would


explain
  

the 1440 byte limit I hit.  But with that disabled I am puzzled or missing
something as to why I cannot fragment packets up to full 1500?   What I am
missing here?  Do I need to make MTU adjustments towards the FastE0/1
interface to force fragmentation before the l2tpv3 tunnel?

 


Thanks in advance,

 


Paul

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https

  1   2   >