[c-nsp] Firepower Threat Defense Geolocation DB

2024-03-26 Thread Jon Lewis via cisco-nsp
I've been going back and forth with cisco support for 2 weeks on this and 
gotten nowhere.  Does anyone know of a way to verify (and update if 
needed) Cisco's IP Geo data for the FTD platform?  I've been trying to get 
support to let me download the DB files from


https://software.cisco.com/download/home/286322194/type/286321931/release/GeoDB

but as I don't have the appropriate service contract, that seems to not be 
happening.


We have an IP block (57.135/16) that is former RIPE space.  We've had some 
IP Geo issues with it, but thought those were behind us.  Recently, we've 
run into IP Geo based filtering/redirection issues with this space.  The 
first was a network that admitted it was an issue with their FTD blocking 
our traffic & needing an update.  So, I assume the latest IP Geo data from 
cisco has 57.135/16 correctly listed as ARIN/US, but I'd like to be sure 
of that and also look back at past versions of the DB to see how far 
behind someone needs to be to have it listed as RIPE/EU space.


--
 Jon Lewis, MCP :)  |  I route
 Blue Stream Fiber, Sr. Neteng  |  therefore you are
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Cisco Nexus 3k Route Selection\Packet Forwarding Debugging

2023-04-03 Thread Jon Lewis via cisco-nsp

On Mon, 3 Apr 2023, Mike Hammett via cisco-nsp wrote:


We have a Nexus 3064 that is setup with partial BGP tables and is routing based 
on that.


I've done a show ip bgp for an IP of interest and it has an expected next hop 
IP. I show ip arp on that next hop IP and it has the expected interface.


However, sFlows show the packets leaving on a different interface, the one that 
would carry the default route for routes not otherwise known.


If the next hop IP is expected and the ARP of that next hop IP is expected, why 
are packets leaving out an unexpected interface?


Flowspec rules?  Policy routing?  Bugs? :)

--
 Jon Lewis, MCP :)   |  I route
 StackPath, Sr. Neteng   |  therefore you are
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] An attribute with less priority than local preference for choosing a best path.

2022-06-03 Thread Jon Lewis

On Fri, 3 Jun 2022, Drew Weaver wrote:


Hello,

We have a few edge routers with multiple connections to multiple geographically 
diverse locations from the same AS number (for example we have a router that 
connects to Lumen in both Cleveland and Cincinnati).

Since the routes from both peers have mostly the same AS PATHs all of the 
traffic was going through one of the connections.

In order to control that I was using:

if community matches-any LUMEN-CLEVE then
   set local-preference 150
 endif

Makes perfect sense that any route tagged with a community in the list 
LUMEN-CLEVE would be preferred regardless of the AS-PATH.

My question is what is considered the right attribute to modify that won't 
override the AS-PATH length?

Would it be better to adjust MED?


Yep.  That's what we use to nudge traffic when everything else ties.  Make 
sure you also have consistent origin though...you may need to look at 
setting origin on all routes received from transits/peers to the same 
value to keep individual drains from winning due to their setting origin 
igp.


--
 Jon Lewis, MCP :)   |  I route
 StackPath, Sr. Neteng   |  therefore you are
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Ode to the old days

2016-12-08 Thread Jon Lewis

On Thu, 8 Dec 2016, Howard Jones wrote:


The good old days of absolutely shocking software testing...
e.g. the Ascend Max software build that never released IPs from the assigned 
client IP pool - 200 user connections later, the helpdesk goes crazy. Or the 
awesome Nortel Baystack bugs where pressing the "wrong" key in the "wrong" 
menu would just crash the whole stack. Both in GA firmware. Nortel had a 
whole selection of similar issues in their errata.


Reminds me of a bit of consulting I did way back on a SCO Unix server. 
Being used to Linux, and curious what was in the /etc/hosts file, I 
half-typed/half-tab completed "cat /etc/host" and hit enter, not noticing 
that it'd stopped short of the s.  The system immediately crashed / locked 
up.  Realizing, what I'd done, (on SCO, /etc/host is a binary), I expected 
crap in my terminal...but not that the system should crash from that. 
It's owner called SCO support, explained what happened, and was told it 
was a known bug...and "would you like to buy the update that fixes it?" 
WTF?!?


------
 Jon Lewis, MCP :)   |  I route
 |  therefore you are
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] BGP Regex to allow ISP customers

2016-10-17 Thread Jon Lewis

On Mon, 17 Oct 2016, Nick Cutting wrote:


Thank you for your answer.

The problem is I do not know the ASN's of the ISP's customers.
Robert - I am afraid that this particular ISP does not have a community for 
this, nor can they send me just their customer routes.


Since you don't know the ISP's customer ASN's, if they're a small enough 
ISP (few to no peers, and just a couple of transits), you could do an 
as-path ACL like

deny _100_transitA_
deny _100_transitB_
deny _100_peer1_
etc., ending with
permit _100_

It's not really clear what you're trying to accomplish though.  If you 
just want customer routes from them, why not ask them to only send 
customer routes?  The obvious answer to which, I suppose, is that if they 
don't have communities that would indicate which routes are customer 
routes, they're probably incapable of making that route advertisement 
decision on their end.


--
 Jon Lewis, MCP :)   |  I route
 |  therefore you are
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] SUP720's memory, looking at options..

2016-07-04 Thread Jon Lewis

On Mon, 4 Jul 2016, Howard Leadmon wrote:


 I knew with the 720-3BXL's I was running, that eventually the TCAM would
become an issue, but it seemed like I still had a little bit of breathing
room left.   Then I saw the chatter here about the RAM on the RP exhausting
before the TCAM, so went peeking at the switch after reading an earlier
thread. Sure enough, though TCAM was starting to get full, to my
surprise when I looked at memory, it was at 92%, so even closer than the
TCAM by far to exhaustion.

I know I can't just up the RAM on the board, so that now leads me to wonder
what are reasonable options to resolve this before it becomes a very real
and big problem.   First let me say, compared to many here we are small
guys, we have a limited budget, and our 6509 has served us well for a great
many years, I think it's about to pass the 5yr uptime mark.   We have 2-3
full feeds as uptime is important, and we also peer at the Equinix IX, so
have a bunch of additional peering sessions.


Some of the software versions for the 6500 have had BGP related memory 
leaks, and if you've got an uptime of 5yrs, that means you're not exactly 
running recent code, and have had a lot of time for memory to get 
misplaced.  I no longer have access to a 6500 with full feeds, so I don't 
know if 3 full feeds + an IX should be running you out of memory.  An 
upgrade/reboot might be worth a try though.  I'd stay in whatever major 
version you're in though...not try jumping to a much later version that 
might be even more memory hungry.


--
 Jon Lewis, MCP :)   |  I route
 |  therefore you are
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Cisco 6506E 4Byte ASN IOS Support

2016-04-07 Thread Jon Lewis

On Thu, 7 Apr 2016, Jason Berenson wrote:


Greetings,

We're currently running a handful of 6506E's in our network for edge routers. 
We're running this IOS:


s72033-advipservicesk9_wan-mz.122-18.SXF6.bin

I need to upgrade it to support 4Byte ASN's.  We're running some basic 
BGP/OSPF with 10G interfaces and full tables.  If anyone has any 
recommendations on which IOS to upgrade to I'd greatly appreciate it.


Looking for stability over everything and 4Byte ASN support.


s72033-advipservicesk9_wan-mz.122-33.SXI8.bin

Good luck with the reboots.  You are aware of the "bad memory" issue you 
might run into causing cards working today to not make it through a 
reload?


------
 Jon Lewis, MCP :)   |  I route
 |  therefore you are
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] C6509 Fabric Switch Capacity

2016-01-13 Thread Jon Lewis

On Wed, 13 Jan 2016, Nick Hilliard wrote:


Alireza Soltanian wrote:

My questions are is What will happen if we exceed capacity(Egress or
Ingress) in Channel#0 of Slot#2? Will device use Capacity of Channel#1?


no - the traffic will be dropped.

slot 2 looks like a 6708 card.  There's been a reasonable amount of
discussion in the past on cisco-nsp about oversubscription on this and
other 10G line cards on the c6500/c7600 platform.  Overall, the platform
isn't good at handling 10G.


That's a little harsh.  It handles 10G fine...you just have to carefully 
plan your port layout if you use the [oversubscribed] 8-port cards and 
have some links that you expect/want to carry line-rate traffic. 
cisco.com has documentation online that will tell you which ports share 
capacity (and should not both be used by high traffic links).


--
 Jon Lewis, MCP :)   |  I route
 |  therefore you are
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Upgrading Catalyst 6500 from 720-3B to 720-3BXL

2015-04-28 Thread Jon Lewis

On Tue, 28 Apr 2015, [utf-8] Fernando García Fernández wrote:


Hello all

Iÿÿve tried to google the solution to one doubt I have, but couldnÿÿt find it.

Iÿÿm going to upgrade a Catalyst 6509 from a 720-3B to a new 720-3BXL so we can 
use it for BGP routing with full Internet route table.

The procedure Iÿÿm designing is:

- create a CF for the 720-3BXL with the same IOS of the 720-3B

- Insert the 720-3BXL y the second slot of the 6500

- activate redundancy:
conf t
redundancy
mode sso
end
show redundancy

- switch processing to 720-3BXL

redundancy force-switchover

- disable redundancy

conf t
redundancy
mode none
end

- remove 720-3B

Iÿÿm almost sure that a 720-3B and a 720-3BXL can coexist in a chassis. Is 
correct?

Also is the procedure correct?


Even if this worked, you'd still end up having to reboot.

In order to put full routes on the 3BXL, you're going to have to manually 
tune the v4/v6 mls cef maximum-routes split (which requires a reboot to 
take affect).


According to 
http://www.cisco.com/c/en/us/support/docs/switches/catalyst-6500-series-switches/107258-C6K-PFC-DFC-CFC.html

your plan is not going to work.

Q. Can the Supervisors with different PFC versions form redundancy?

A. You cannot use one type of PFC3 (PFC3BXL, PFC3B, or PFC3A) on one 
supervisor engine and a different type on the other supervisor engine for 
redundancy. You must use identical policy feature cards for redundancy.


--
 Jon Lewis, MCP :)   |  I route
 |  therefore you are
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] BGP dram confusion

2015-03-11 Thread Jon Lewis

On Wed, 11 Mar 2015, Erik Klaassen wrote:


Hi all,

We use a 7600 with a sup720xl and we receive 3 full bgp tables, some partial 
transit and some peering.
According to sh bgp sum bgp is using:
ipv4 ~250MB
ipv6 ~30MB

But the 1GB dram is almost full.

sh memory summary
 Head Total(b)  Used(b)   Free(b)   Lowest(b) Largest(b)
Processor 46ABB9D0 894682672 785658748 109023924 54382492 48475720


Sh proc mem shows the bgp proces is using a lot more memory the ~300MB

PID TTY  Allocated  FreedHoldingGetbufsRetbufs Process
496   0  799340392  180557004  517282488  0  0 BGP Router

how does this come and is this normal? I was expecting i could use some more 
full tables on this router.


Cisco never could count :)
You have about 104mb free, what's more worrying is the memory 
fragmentation such that your largest contiguous block of free memory is 
46mb.  I wouldn't add any more full views to that router.  It's time to 
start thinking about what's going to replace the 7600.


--
 Jon Lewis, MCP :)   |  I route
 |  therefore you are
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] BGP Max-Prefix - Notification Data Decode Options ?

2015-03-10 Thread Jon Lewis

On Tue, 10 Mar 2015, Mark Tinka wrote:




On 10/Mar/15 19:24, Nick Hilliard wrote:

then, your provider is lying.


Well, the provider may not be lying about their max-prefix range, whatever 
that means. But certainly, the OP wants to start considering other providers.


I've seen people get confused as to what the values following 
maximum-prefix mean, so it's possible the person the OP talked to was a 
jr. NOC worker and misread the config thinking the warning % threshold was 
the top end value for the max-prefixes.


--
 Jon Lewis, MCP :)   |  I route
 |  therefore you are
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ios aaa

2015-03-01 Thread Jon Lewis
Flip the local group radius order and it'll do what you're looking 
for.  i.e. check the local db first (allowing non-radius users in) and if 
not found in the local db, radius is tried.  Keep in mind, there are some 
additional config hoops to jump through to get radius auth working for 
console logins.  So, test your config...don't just assume it'll work and 
find out at the worst time that it doesn't quite.


On Sun, 1 Mar 2015, John Brown wrote:


Hi Thomas,
Thats what I have, but it doesn't ever fail over to the local user on
the box.  Hence my confusion

On Sun, Mar 1, 2015 at 7:55 AM, Thomas Toquothty tltoquot...@gmail.com wrote:

aaa authentication login NAME group radius local

This is how we have ours and it will roll over to local if connectivity is
down or whatever reason.

On Sat, Feb 28, 2015 at 9:24 PM John Brown j...@citylinkfiber.com wrote:


Hi,

I'm trying to have our cisco boxes use two different methods for
authentication.

Radius and local.

At present we have Radius working nicely.

What  I would like to do is also have local username function.

So that if the user is NOT in radius, but IS on the device locally it
will authenticate and let that user on.

In addition, if radius is dead, the local username will allow a person on.

This would be via  serial console, or ssh, or telnet (for those few
devices we have left that don't support ssh)

I haven't found anything that is clear and makes sense.  I'm hoping
someone has a cut and paste, or a pointer to a working setup.  If this
is possible.

thanks
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/



--
 Jon Lewis, MCP :)   |  I route
 |  therefore you are
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ios aaa

2015-03-01 Thread Jon Lewis
Multiple brands document it that way, but the coders weren't listening. 
As mentioned, I encourage anyone doing this to test thoroughly, but on 
Brocade and Cisco, my experience has been that local group radius will 
work contrary to the docs.  I just hope they never fix this glitch...or 
fix it in the docs rather than in the code.


On Sun, 1 Mar 2015, Clint Wade wrote:


Counter to how I've always understood it, if you put local first it will
never attempt to use RADIUS. It's Sunday morning I'm way too lazy to lab
this up. Again this list is IF AVAILABLE not if-authenticated.

http://www.cisco.com/c/en/us/support/docs/security-vpn/terminal-access-controller-access-control-system-tacacs-/10384-security.html#login_auth

Configuring Authentication

The Cisco IOS software uses the first method listed to authenticate users.
If that method fails to respond (indicated by an ERROR), the Cisco IOS
software selects the next authentication method listed in the method list.
This process continues until there is successful communication with a
listed authentication method, or all methods defined in the method list are
exhausted.

It is important to note that the Cisco IOS software attempts authentication
with the next listed authentication method only when there is no response
from the previous method. If authentication fails at any point in this
cycle, meaning that the AAA server or local username database responds by
denying the user access (indicated by a FAIL), the authentication process
stops and no other authentication methods are attempted



~ One option you have assuming this a shared local account is to create the
account on the RADIUS server as well as local. Would only make sense for
shared accounts, depending on your security posture this may not be allowed.


On Sun, Mar 1, 2015 at 11:22 AM, Jon Lewis jle...@lewis.org wrote:


Flip the local group radius order and it'll do what you're looking
for.  i.e. check the local db first (allowing non-radius users in) and if
not found in the local db, radius is tried.  Keep in mind, there are some
additional config hoops to jump through to get radius auth working for
console logins.  So, test your config...don't just assume it'll work and
find out at the worst time that it doesn't quite.


On Sun, 1 Mar 2015, John Brown wrote:

 Hi Thomas,

Thats what I have, but it doesn't ever fail over to the local user on
the box.  Hence my confusion

On Sun, Mar 1, 2015 at 7:55 AM, Thomas Toquothty tltoquot...@gmail.com
wrote:


aaa authentication login NAME group radius local

This is how we have ours and it will roll over to local if connectivity
is
down or whatever reason.

On Sat, Feb 28, 2015 at 9:24 PM John Brown j...@citylinkfiber.com
wrote:



Hi,

I'm trying to have our cisco boxes use two different methods for
authentication.

Radius and local.

At present we have Radius working nicely.

What  I would like to do is also have local username function.

So that if the user is NOT in radius, but IS on the device locally it
will authenticate and let that user on.

In addition, if radius is dead, the local username will allow a person
on.

This would be via  serial console, or ssh, or telnet (for those few
devices we have left that don't support ssh)

I haven't found anything that is clear and makes sense.  I'm hoping
someone has a cut and paste, or a pointer to a working setup.  If this
is possible.

thanks
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


___

cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/



--
 Jon Lewis, MCP :)   |  I route
 |  therefore you are
_ http://www.lewis.org/~jlewis/pgp for PGP public key_

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/





--
 Jon Lewis, MCP :)   |  I route
 |  therefore you are
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] BGP route filtering question about upstreams

2014-10-07 Thread Jon Lewis

On Tue, 7 Oct 2014, Andrew (Andy) Ashley wrote:


I¹m hoping someone can provide a bit of insight here with a BGP route
filtering scenario:

AS100 is an end-customer stub AS, multi-homed to upstreams AS200 and AS300.
AS200 also buys transit from AS300, amongst others.

AS100 does not want AS300 to learn its routes from AS200, since that can
cause redundancy issues (2 supposedly diverse upstreams effectively become
1).
AS100 still wants to receive a full table from AS200 (but not routes that
transit AS300).


AS200 might have BGP communities you can use to tell them not to share 
routes with AS300.  If not, there's always as-path poisoning.



It should be possible for AS200 to tag prefixes learned from AS300 at
ingress, then implement a policy to filter these tagged prefixes on outbound
announcements to AS100.
But, how can AS100 still receive a full table from AS200 with such filtering
in place?


Short of AS200 doing some pretty serious router separation games (i.e. not 
going to happen just for one customer requesting it), they can't.  A BGP 
router can only share its best path for each route.  If AS200's best paths 
to certain prefixes are via AS300, and you don't want those routes from 
AS200, you can't have AS200 send you their second best routes.  Even if 
that were an option, once you used those routes, how would you expect 
AS200's router to know that you wanted them to use the 2nd best path 
rather than their best path (via AS300)?  This isn't really an issue, 
since if you learn a route from AS200 and from AS300, and AS200's path is 
via AS300, that will likely be your secondary path automatically due to 
the longer as-path...unless you've applied other policy that forces a 
different best path selection.


--
 Jon Lewis, MCP :)   |  I route
 |  therefore you are
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Moving a BGP session to different interface

2014-09-28 Thread Jon Lewis

On Sun, 28 Sep 2014, Nick Hilliard wrote:


On 25/09/2014 18:19, Randy wrote:

I'm tasked with moving a BGP session on a 6500 from a 1GE to a 10GE
interface (live environment).   BGP session details are staying the same.
The BGP peer IPs (both v4 and v6) are assigned directly to the existing 1GE
interface (no SVI, ect).

Is it as simple/possible as configure the new interface with the same IP's
but in a shutdown state, move the x-connect, shut the old interface and
unshut the new interface?   Or will IOS block me from doing this (two
interfaces with the same IP) -- in other words, the IPs will need to be
removed from the old interface first?


yes, they will need to removed.


Thanks for any advise or tips on keeping downtime / CLI work to a minimum :)


if BGP uses the address defined on an interface that you need to migrate,
you will have downtime on that bgp session.  Standard best practice is to
block all inbound and outbound prefixes on the session, then gracefully
shut down the session, then migrate the interfaces, then bring bgp back up
again.  If this is an ebgp session, you will briefly lose connectivity due
to your upstreams' non-zero MRAIs, so you will need to do this in a
scheduled maintenance window.


Wouldn't even better practice be to use new IPs on the new interface, 
get the interface up, establish BGP (verify at both ends that routes are 
sent/received/accepted), then shut the old session and relinquish the old 
interface IPs?  Done carefully, there should be no downtime.


--
 Jon Lewis, MCP :)   |  I route
 |  therefore you are
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] Cisco'€™s Commitment to Customers

2014-06-30 Thread Jon Lewis
I'm currently dealing with TAC on the failure of a WS-6708 that I believe 
is connected with the defective memory component issue talked about here:


http://blogs.cisco.com/news/ciscos-commitment-to-customers/

i.e. it was working fine...the router was rebooted, after which, the card 
no longer passes boot-up diagnostics.


This passage:

 Despite many of these products being out of warranty, Cisco has decided
 to take a charge of $655m related to the expected cost of managing these
 issues. We are taking this action to support our customers and partners.
 This charge was excluded from our non-GAAP financials, as we do not
 believe it is reflective of ongoing business and operating results.

implies to me that Cisco plans to replace such cards regardless of 
smartnet coverage.  I thought I was about to get a replacement shipped out 
when the TAC rep sent this:


 I couldn't find any valid contract for RMA based on serial number of
 module 8, can you please provide contract number for the RMA so that I
 can proceed further.

So, what's the real deal with these time-bomb cards?  Will cisco replace 
them as they fail, or only if they're covered by a current smartnet 
contract?  If the latter, what was the point of the blog post?


In the comments and responses to comments, Curtis has been evasive when 
asked what cisco will do for people with affected products and no smartnet 
coverage.


I've got a number of 6500s that need reloads to change the v4/v6 routing 
split, and after seeing a 6708 fail in each of the last two 6500s I've 
reloaded, I'm not feeling really good about proceeding.


--
 Jon Lewis, MCP :)   |  I route
 |  therefore you are
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Cisco'€™s Commitment to Customers

2014-06-30 Thread Jon Lewis

On Mon, 30 Jun 2014, Antonio Soares wrote:


You need to have spares before doing any major changes to your network. 
Virtually all Cisco Products are affected by this issue:

http://www.cisco.com/web/about/doing_business/memory.html#~field

The problem is that if you order via RMA several similar parts, you may get 
this:


We have spares.  The difficulties are

1) gear is geographically spread out quite a bit...so we're apparently 
going to have to ship spares to each site before doing the reloads.


2) most of our spares are parts pulled from service when other routers 
were decommissioned.  Due to the nature of this type of failure, we don't 
know for sure that those spares are any good.  I'm going to have to have 
someone test each spare card, and then hope that the testing power-up 
wasn't its final successful one.


And, since 6708s still cost / are still worth some $, I figured if cisco 
is willing to replace defective ones, doing so, and getting some reliable 
spares in exchange for the dead ones, beats the heck out of scrapping 
them.


--
 Jon Lewis, MCP :)   |  I route
 |  therefore you are
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] RAM thing

2014-02-17 Thread Jon Lewis

Does anyone know if this affects the 6708 10gb cards for the 6500 series?

--
 Jon Lewis, MCP :)   |  I route
 |  therefore you are
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Sup2T-XL vs Sup720BXL FIB TCAM

2013-11-05 Thread Jon Lewis
Your paste formatting got all screwy, but it looks like the Sup2TXL claims 
it can do both 1M v4 routes _and_ half a million v6 routes simultaneously. 
I've heard that from others, but also read the specs to be the same as the 
3BXL.  I wonder if anyone from cisco can shed some light on this?


On the Sup2T-XL, had you done any mls cef maximum-routes tuning?  The page 
below both states that the PFC4XL has no more FIB capacity than the 
PFC3XL, and that the default split on the PFC4XL is 512k IPv4 routes. 
This doesn't appear consistent with what you're seeing.


http://www.cisco.com/en/US/prod/collateral/switches/ps5718/ps708/white_paper_c11-676346.html

The FIB in the PFC4 contains 256 K entries, while the FIB in the PFC4XL 
contains 1 million entries. These are the same as their PFC3x forwarding 
engine counterparts. The FIB in the PFC4 contains prefix entries for IPv4 
and IPv6 global address, IPv4 and IPv6 multicast addresses and MPLS label 
entries. There is a level of partitioning that exists to ensure there is 
always some space available for different types of forwarding entries. 
There is some flexibility from a user configuration standpoint that allows 
these partition boundaries to be changed to accommodate more of one type 
of forwarding entry. For example, in the PFC4XL, the default setting 
provides for 512 K IPv4 entries, and this can be increased through 
configuration control to support up to 1 M entries if required.


On Tue, 5 Nov 2013, Christian Schmit wrote:



Today I tested a Sup2T-XL and a Sup720BXL in the lab with full bgp feeds for 
ipv4 and ipv6.
To my understanding the hardware capacity for the FIB TCAM is the same for 
Sup720-BXL and Sup2T-XL.
Sup2T-XL output of sh platform hardware capacity:CAT6500-RC2TXL#sh platform 
hardware capacity | begin L3 Forwarding Resources
L3 Forwarding Resources  FIB TCAM usage: 
Total   Used %Used   72 bits (IPv4, MPLS, EoM)  
   1048576  465980   44%  144 bits (IP mcast, IPv6) 
524288   14903  3%  288 bits (IPv6 mcast)   
262144   11%
 detail:  ProtocolUsed   %Used  
 IPv4  465978   44% 
  MPLS1  1% 
  EoM  1  1%
  IPv614894  3% 
  IPv4 mcast 9  1%  
 IPv6 mcast 1  1%
Adjacency usage: TotalUsed   %Used  
  1048576   32018   
   3%

Sup720BXL output of sh platform hardware capacity: (FIB TCAM partitioned with mls 
cef maximum-routes ip 768)
CAT6500-RC720BXL#sh platform hardware capacity | begin L3 Forwarding Resources

L3 Forwarding Resources
FIB TCAM usage:  TotalUsed   
%Used
 72 bits (IPv4, MPLS, EoM)   802816  467348 58%
144 bits (IP mcast, IPv6)   122880   14970 
12%

detail:  ProtocolUsed   %Used
 IPv4   467338   58%
 MPLS 9  1%
 EoM   1  1%

 IPv6   14963 
12%
 IPv4 mcast   4  1%
 IPv6 mcast   3  1%

   Adjacency usage: TotalUsed   %Used
   10485761481  
1%

The release notes say:

-XL mode:

· IPv4 and MPLS: Up to 1,007,000 routes
· IPv4 multicast and IPv6 unicast and multicast: Up to 503,000 routes

These are the theoretical maximum numbers of routes for the supported protocols 
(the maximums are not supported simultaneously):

The above output of the Sup2T-XL seems to say that the Sup2T-XL has a larger 
FIB TCAM (2M) than the Sup720-BXL.

Christian


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/



--
 Jon Lewis, MCP :)   |  I route
 |  therefore you are
_ http://www.lewis.org/~jlewis/pgp for PGP public key_

[c-nsp] 6500 IOS recommendation?

2013-10-21 Thread Jon Lewis

I noticed in email from cisco today:


END-OF-LIFE NOTIFICATIONS

Cisco IOS Software Release 12.2(33)SXJ - Cisco has announced the 
end-of-sale and end-of-life dates for the Cisco IOS Software Release 
12.2(33)SXJ. Customers are encouraged to migrate to the Cisco IOS Software 
Release 15.1(2)SY.


http://www.cisco.com/en/US/prod/collateral/switches/ps5718/ps708/end-of-life-notice-c51-729742.html

SXI is similarly affected (earlier dates).

Are people actually upgrading to 15.1SSY, or just running late 12.2(33)SXI 
or SXJ until these boxes run out of resources?


--
 Jon Lewis, MCP :)   |  I route
 |  therefore you are
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] SC to LC converter

2013-10-14 Thread Jon Lewis

On Mon, 14 Oct 2013, Kenny Kant wrote:


I have an older multi-mode fiber connection coming into our 7206VXR /
NPE-G1 with a SC end.  We are moving this fiber to a new router which
requires a LC/SFP.  Due to some other challenges I cannot have this cable
re-run.Can I get some recommendations for SC to LC conversion?  Any web
links to what you have used in the past one be greatly appreciated.


SC/LC patch cable and SC/SC coupler.  If you have the parts/tools to 
terminate your own fiber, you can make your own SC/LC jumper...but it's 
cheaper to just order them pre-made.


http://www.fibercables.com/products/0-2m-0-66ft-multimode-duplex-fiber-optic-cable-62-5-125-lc-to-sc.html
http://www.fibercables.com/products/fiber-optic-adapter-sc-to-sc-multimode-duplex.html

--
 Jon Lewis, MCP :)   |  I route
 |  therefore you are
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] SC to LC converter

2013-10-14 Thread Jon Lewis
That'd do.  The first fiber supplier I checked didn't have that in 
appropriate fiber.


On Tue, 15 Oct 2013, Andrew Miehs wrote:


Why not just

http://www.amazon.com/gp/aw/d/B002DG18MI ?

But honestly - I would install a patch panel on either end and run proper fixed 
installation type fibre.

Sent from a mobile device


On 15 Oct 2013, at 10:01, Jon Lewis jle...@lewis.org wrote:


On Mon, 14 Oct 2013, Kenny Kant wrote:

I have an older multi-mode fiber connection coming into our 7206VXR /
NPE-G1 with a SC end.  We are moving this fiber to a new router which
requires a LC/SFP.  Due to some other challenges I cannot have this cable
re-run.Can I get some recommendations for SC to LC conversion?  Any web
links to what you have used in the past one be greatly appreciated.


SC/LC patch cable and SC/SC coupler.  If you have the parts/tools to terminate 
your own fiber, you can make your own SC/LC jumper...but it's cheaper to just 
order them pre-made.

http://www.fibercables.com/products/0-2m-0-66ft-multimode-duplex-fiber-optic-cable-62-5-125-lc-to-sc.html
http://www.fibercables.com/products/fiber-optic-adapter-sc-to-sc-multimode-duplex.html

--
Jon Lewis, MCP :)   |  I route
|  therefore you are
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/




--
 Jon Lewis, MCP :)   |  I route
 |  therefore you are
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] old 6509 trying to drive me insane :-)

2013-09-16 Thread Jon Lewis

On Mon, 16 Sep 2013, Joe Pruett wrote:


so, i'm hoping someone here can provide one of the following:

1. old 7.1 rommon image i can flash


I suspect cat6000-sup2-rm2.7-1-1.srec is what you're looking for.
I also suspect nobody but cisco can legally provide it to you.
OTOH, I bet if you looked for it, you'd find that file somewhere online.

--
 Jon Lewis, MCP :)   |  I route
 |  therefore you are
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] 6500 real world (sampled) netflow

2013-09-03 Thread Jon Lewis

On Sun, 1 Sep 2013, Dobbins, Roland wrote:


On Sep 1, 2013, at 7:57 AM, Randy wrote:

It would only be used for detecting inbound UDP floods and other high 
PPS anomalies so there is no need for full flows or even much details, 
just ip src/dst.


It's useless for this or any other application because of the 
limitations of the EARL7.  NetFlow isn't useful on 6500s until you get 
to Sup2T/DFC4.


Having used it exactly for that, I disagree and am curious why you say 
it's useless.  It can be hard to quantify exactly what the numbers mean 
(translating sampled flow data to mbit/s), but it can certainly tell you 
which IP or IPs are the source or destination of unusual traffic volumes, 
which is the first step in mitigating inbound or outbound DoS traffic.


--
 Jon Lewis, MCP :)   |  I route
 |  therefore you are
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] 6500 real world (sampled) netflow

2013-09-03 Thread Jon Lewis

On Mon, 2 Sep 2013, Dobbins, Roland wrote:


On Sep 3, 2013, at 4:34 AM, Jon Lewis wrote:


Having used it exactly for that, I disagree and am curious why you say
it's useless.


Because in any Internet-facing environment with any kind of traffic 
diversity, it's non-deterministically skewed.


So, in a network environment of any scale, you can't actually know 
whether or not a given source or destination is sending/receiving 
unusual volumes of traffic, as you don't know what is usual.


Maybe if you're talking about using it in an IDS sort of way, I'd agree, 
but for detecting the sort of huge scale anomoly found in DoS attacks, no. 
At least for a smaller network that normally deals with traffic on the 
order a gbit/s or so, the Sup720's netflow data definitely is useful for 
DoS traffic characterization/investigation.  I haven't looked at netflow 
from one doing tens or hundreds of gbit/s.


I think your employer is clouding your vision.

Sure, netflow from a Sup720 isn't great, but if it's what you've got, it 
can be used and relied upon.  Maybe it doesn't play well with Arbor's 
products, but that only makes it useless to Arbor.


--
 Jon Lewis, MCP :)   |  I route
 |  therefore you are
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] 6500, 7600 or ASR

2013-08-30 Thread Jon Lewis

On Fri, 30 Aug 2013, Rolf Hanßen wrote:


Hello,

just for my interest: what amount of routes are we discussing ?

show platform hardware capacity:
L3 Forwarding Resources
FIB TCAM usage: TotalUsed
%Used
 72 bits (IPv4, MPLS, EoM) 1048576  460874
44%
144 bits (IP mcast, IPv6)  524288   14178
3%
288 bits (IPv6 mcast)  262144   1
1%

Do you expect to have more than 1M IPv4 / 512k IPv6 routes or is there
some other limitation I do not see ?


Is that a Sup-2T with PFC4XL?  Everything I'd read about it said it had 
the same FIB as the PFC3XL.  i.e.


http://www.cisco.com/en/US/prod/collateral/switches/ps5718/ps708/white_paper_c11-676346.html

The FIB in the PFC4 contains 256 K entries, while the FIB in the PFC4XL 
contains 1 million entries. These are the same as their PFC3x forwarding 
engine counterparts. The FIB in the PFC4 contains prefix entries for IPv4 
and IPv6 global address, IPv4 and IPv6 multicast addresses and MPLS label 
entries. There is a level of partitioning that exists to ensure there is 
always some space available for different types of forwarding entries. 
There is some flexibility from a user configuration standpoint that allows 
these partition boundaries to be changed to accommodate more of one type 
of forwarding entry. For example, in the PFC4XL, the default setting 
provides for 512 K IPv4 entries, and this can be increased through 
configuration control to support up to 1 M entries if required.


--
 Jon Lewis, MCP :)   |  I route
 |  therefore you are
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Tx Queue for 7609 WS67xx cards

2013-08-30 Thread Jon Lewis

On Fri, 30 Aug 2013, Victor Lyapunov wrote:


Hello all

Got a question about queuing functionality in WS67xx cards. We have a
typical 7609 setup with TenG uplink and GigE downlink interfaces.

During the day we see an increase in packet drops on the GigE downlink
interfaces. The average bandwidth is kept around 750Mbps but I suppose
short bursts may result in dropped packets. Is there any way to improve
this behavior? (e.g increase output buffer?)


Have you touched ip spd queue max-threshold and ip spd queue 
min-threshold?  Some investigating I was doing recently suggested you 
might want to greatly increase these from the defaults.


--
 Jon Lewis, MCP :)   |  I route
 |  therefore you are
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] source for supported 3rd party CF for sup-720

2013-08-29 Thread Jon Lewis
A number of years ago, there were a couple of threads about use of 3rd 
party CF cards in Sup-7203bxl.  I know that I was able to use 1gb and 2gb 
cards without issue, 4gb cards had cosmetic (integer overflow) issues in 
displaying size / free space.  A that time, someone responded that some 
cards in the 1-2gb range didn't work, and the theory was they were too new 
a type (higher speed) of card and were unrecognized as CF by the sup.


I now have a need for a handful of CFs for some Sup-7203bxl's, and =2gb 
CF aren't as common as they were several years ago.  I'd like to order 
half a dozen or so, but I'd hate to end up with a stack of cards too new 
for the Sup-7203bxl and have them fail to be usable.


Has anyone shopped for these recently, and can suggest a brand / model 
that's still offered, reasonably priced, and can be formatted and used to 
boot a Sup720-3bxl?


--
 Jon Lewis, MCP :)   |  I route
 |  therefore you are
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] 6500, 7600 or ASR

2013-08-29 Thread Jon Lewis

On Thu, 29 Aug 2013, chip wrote:


Let's all also remember the TCAM limitations on the 7600/Sup2T platform.
With the BGP table growing like it is, you'll need to carve up IPv4/IPv6
TCAM allocation and could likely run out in the not-so-distant future.
IMHO, unless something amazing happens for the 7600/Supervisor platform,
this thing is dead as a DFZ BGP router and people should be looking
elsewhere moving forward.  Both ASR lines (1k/9k) offer much better
router capabilities and growth paths.  The 6500/7600 platform has had a
helluva run, but I believe its time has passed.


The TCAM limitation will kill the 6500/7600 platform for BGP router use 
_unless_ cisco comes out with a new PFC and DFCs that raises the limit.  I 
still wonder what they were thinking with the Sup2T and why it didn't get 
any more routing slots than the Sup720-3BXL.  This platform is the 
cheapest way to get lots of gigabit (or even 10 gigabit) ports and line 
rate performance in a BGP capable router...but sometime in the next couple 
of years, the current Sups and DFCs probably won't handle a full table. 
More TCAM and faster CPUs could keep the 6500 series viable for a long 
time.


I haven't followed the thread closely enough to know if netflow was ever 
elaborated.  The 6500 does netflow.  Whether the netflow it does is 
sufficient for the OPs needs is the question.


--
 Jon Lewis, MCP :)   |  I route
 |  therefore you are
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Cisco 6500 mounting with cables

2013-07-21 Thread Jon Lewis

On Sun, 21 Jul 2013, Aled Morris wrote:


On 21 July 2013 19:42, Gert Doering g...@greenie.muc.de wrote:


Hi,

On Sun, Jul 21, 2013 at 05:17:15PM +0100, Aled Morris wrote:

It's interesting that even the Cat 6500 family now has a fabric

extender

option for distributing switching capability into smaller/more localised
wiring closets.


It has?  I missed that, could you point me to more details?



http://www.cisco.com/en/US/products/ps13198/index.html

This solution connects Cisco Catalyst 6800ia access switches to Cisco
Catalyst 6500 or 6800 Series core switches. The entire configuration works
as a single extended switch with a single management domain.


That must be pissing off the Nexus unit.

--
 Jon Lewis, MCP :)   |  I route
 |  therefore you are
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Cisco 6500 mounting with cables

2013-07-08 Thread Jon Lewis

On Mon, 8 Jul 2013, chris stand wrote:


Does anyone mount 6500s directly under the patch panels ?  If you do, do
the cables run to the left and right and would you share a photo or two ?


I've run cables in from both sides.  You can get cable management bars 
that rack mount on top of the 6500 chassis rack ears.  These are literally 
a steel bar with 2 radiused 90* bends, the ends of which are welded to 
rack ears.  Mounting these in front of the line cards, you can then use 
velcro to secure the cables on their way to the line card ports.


--
 Jon Lewis, MCP :)   |  I route
 |  therefore you are
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Drawing Tool

2013-06-20 Thread Jon Lewis

On Thu, 20 Jun 2013, M K wrote:


What other options we have to draw network diagrams other than visio and edraw 
max ?


Depends on how fancy you want the diagrams to look.

For Linux (free), there's Dia.
For OSX (not free), there's Omnigraffle.

--
 Jon Lewis, MCP :)   |  I route
 |  therefore you are
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] 7600 Sup720-3BXL Showing Max CEF table of 256K

2013-04-29 Thread Jon Lewis
You have non-XL DFC line cards...so the system falls back to the best 
operating mode your worst card can do.


On Mon, 29 Apr 2013, Dan Benson wrote:


Good day all,

As we all know, the Sup720 has it's limitations with regards to it's ability to 
handle large routing tables.

Looking today, I was surprised to see that two of my Sup720-3BXLs are showing 
that I only have a MAX cef ability of 239K when all the docs I read show they 
should be defaulting to 512K.

Did I get screwed on hacked together SUPs or do I have a line card effecting my 
ability to scale my CEF table? IOS version limitation?  Info pasted below.

Thanks for the insight as always.

db





ISO version:

c7600s72033-advipservicesk9-mz.151-1.S1

Show mod:

Mod Ports Card Type  Model  Serial No.
--- - -- -- ---
 1   48  CEF720 48 port 10/100/1000mb Ethernet  WS-X6748-GE-TX
 4   20  7600 ES+   7600-ES+20G3C
 62  Supervisor Engine 720 (Active) WS-SUP720-3BXL


Mod  Sub-Module  Model  Serial   Hw Status
 --- -- --- --- ---
 1  Centralized Forwarding Card WS-F6700-CFC   #  4.1Ok
 4  7600 ES+ DFC LITE   7600-ES+3C  #1.1Ok
 4  7600 ES+ 20xGE SFP  7600-ES+20G #1.1Ok
 6  Policy Feature Card 3   WS-F6K-PFC3BXL  #1.11   Ok
 6  MSFC3 Daughterboard WS-SUP720   #5.1Ok

Mod  Online Diag Status
 ---
 1  Pass
 4  Pass
 6  Pass


sho mls cef maximum-routes

FIB TCAM maximum routes :
===
Current :-
---
IPv4 + MPLS - 192k (default)
IPv6 + IP Multicast - 32k (default)




___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/



--
 Jon Lewis, MCP :)   |  I route
 |  therefore you are
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Route map matching, tags and community question

2013-04-22 Thread Jon Lewis

On Mon, 22 Apr 2013, Gert Doering wrote:


Hi,

On Mon, Apr 22, 2013 at 04:25:11PM -0400, David Hubbard wrote:

route-map upstream-one permit 10
 set community 1:123


set community 1:123 additive


OTOH, if you're having them RTBH an IP, do you really care about any of 
the other community tags to do various TE stuff?  For each neighbor that 
supports RTBH, the output route-map for that neighbor should have as its 
first permit entry, a check for your internal blackhole community with a 
set community for whatever that neighbor needs for RTBH.


--
 Jon Lewis, MCP :)   |  I route
 |  therefore you are
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] UP Link / http://www.spamhaus.org/

2013-04-16 Thread Jon Lewis

On Tue, 16 Apr 2013, Ahmed Hilmy wrote:


Dear Friends,

I am advertising some prefixes that are belong to my end user to one of my
UP Links.
They said, these prefixes listed in CBL/XBL as a Spam IPs at this Website :
http://www.spamhaus.org/

So what does it mean ? i think there is no nee to block them as long as i
am Transit circuit ? Would you please clarify this issue


CBL/XBL suggests IPs in those prefixes are infected with spam sending bot 
software.  You should contact your end user and have them deal with their 
infected systems.


--
 Jon Lewis, MCP :)   |  I route
 |  therefore you are
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] DNS amplification

2013-03-18 Thread Jon Lewis

On Mon, 18 Mar 2013, Phil Mayers wrote:


On 03/18/2013 02:25 AM, Dobbins, Roland wrote:


On Mar 18, 2013, at 1:40 AM, Jon Lewis wrote:


Cisco SNMP counters count packets before they're dropped by
QoS...so all those dropped packets still count if you're billing
by the byte.


Same for NetFlow, except on crippled pre-Sup2T/DFC4 6500s/7600s and
pre-Sup7 4500s.


I'm not hugely sure what QoS has to do with BCP 38, but ACL- and RPF-dropped 
flows have output interface of 0 on sup720, IME.


Not sure what I was thinking when I typed that.  Either brain fart or 
assumption.  I suspect like 'over service-policy dropped packets', ACL/rpf 
dropped packets still increment the interface/snmp counters...so for 
billing purposes, all packets count...whether they're forwarded or 
dropped.


--
 Jon Lewis, MCP :)   |  I route
 |  therefore you are
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] DNS amplification

2013-03-17 Thread Jon Lewis

On Sun, 17 Mar 2013, Gert Doering wrote:


To play the devil's advocate - if I bill my customers by the GByte on
their port, I don't mind if it's spoofed or not... traffic is traffic,
they pay for it, I transport it...


Cisco SNMP counters count packets before they're dropped by QoS...so all 
those dropped packets still count if you're billing by the byte.


--
 Jon Lewis, MCP :)   |  I route
 |  therefore you are
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] DNS amplification

2013-03-16 Thread Jon Lewis

On Sat, 16 Mar 2013, Robert Joosten wrote:


Hi,


Can anyone provide insight into how to defeat DNS amplification attacks?

Restrict resolvers to your customer networks.


And deploy RPF


uRPF / BCP38 is really the only solution.  Even if we did close all the 
open recursion DNS servers (which is a good idea), the attackers would 
just shift to another protocol/service that provides amplification of 
traffic and can be aimed via spoofed source address packets.  Going after 
DNS is playing whack-a-mole.  DNS is the hip one right now.  It's not the 
only one available.


Many networks will say but our gear doesn't do uRPF, and maintaining an 
ACL on every customer port is too hard / doesn't scale.


Consider an alternative solution.  On a typical small ISP / small service 
provider network, if you were to ACL every customer (because your gear 
won't do uRPF), you might need hundreds or even thousands of ACLs. 
However, if you were to put output filters on your transit connections, 
allowing traffic sourced from all IP networks valid inside your network, 
you might find that all you need is a single ACL of a handful to several 
dozen entries.  Having one ACL to maintain that only needs changing if you 
get a new IP allocation or add/remove a customer who has their own IPs 
really isn't all that difficult.  As far at the rest of the internet is 
concerned, this solves the issue of spoofed IP packets leaving your 
network.


--
 Jon Lewis, MCP :)   |  I route
 |  therefore you are
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] DNS amplification

2013-03-16 Thread Jon Lewis

uRPF stops your network from initiating such attacks.

Closing down your open recursive DNS servers stops you from being used / 
participating in the attacks.


Other than having infinite bandwidth capacity, there's not much you can do 
to defend against being attacked by a DNS amplification attack.


On Sat, 16 Mar 2013, Laurent Geyer wrote:


Curious, how does uRPF help under this scenario? Although the source address is 
spoofed, the target is stil valid destination address.
ÿÿ
Laurent

On Sat, Mar 16, 2013 at 6:38 PM, David Rothera david.roth...@gmail.com
wrote:


Depends on whether you want to defeat being the person being attacked or
the person being tricked into being the person doing the amplification
attack.
For stopping being attacked without taking services from your upstream
provider the only thing you can do really is police DNS traffic as uRPF
isn't going to be of much help as it will generally be coming from the
correct ingress interface.
As far as stopping being the attacker as others have said use uRPF and
limit your resolvers to only allow access from hosts within your own AS.
David
On Saturday, March 16, 2013, harbor235 wrote:

Can anyone provide insight into how to defeat DNS amplification attacks?


thanks,

Mike
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net javascript:;
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


--
David Rothera
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/



--
 Jon Lewis, MCP :)   |  I route
 |  therefore you are
_ http://www.lewis.org/~jlewis/pgp for PGP public key
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

Re: [c-nsp] BGP route won't advertise

2013-02-28 Thread Jon Lewis

On Thu, 28 Feb 2013, Jerry Bacon wrote:


On 2/27/2013 7:45 PM, Jon Lewis wrote:

On Wed, 27 Feb 2013, Jay Hennigan wrote:


You could simplify that to:

ip as-path access-list 10 deny _11xx1_
ip as-path access-list 10 permit .*   - Dangerous outbound to transit
connections.


Or simplify things more by using prefix filters / route-maps on the 
customer BGP sessions to deny/accept+tag routes with communities that tell 
the rest of your network what to do with the routes (i.e. whether a route 
gets advertised to your transit providers, etc.).  That ends up being much 
saner as you have smaller filters in more places rather than monster 
filters at the border where you'll lose track of why things are there.




I do have filters on the customer BGP sessions, but I have to disallow his AS 
from my upstreams, or I become a transit for those routes.


So this is a BGP peering...but you're not providing transit?  We have a 
cummunity string for that.  The above advice still stands.


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] HSRP/VRRP/GLBP Dual Stack on Cat6500/Sup720 3BXL?

2013-02-28 Thread Jon Lewis

On Thu, 28 Feb 2013 vinny_abe...@dell.com wrote:


Hello,

Is there dual stack support in any redundancy protocol (HSRP/VRRP/GLBP) 
on the Catalyst 6500 with a Sup720 3BXL? If so, which protocols are 
supported and beginning in what IOS releases?


I haven't utilized it in v6, but SXI appears to have v6 capable HSRP and 
GLBP.  VRRP doesn't appear to have any v6 support.


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] BGP route won't advertise

2013-02-27 Thread Jon Lewis

On Wed, 27 Feb 2013, Jay Hennigan wrote:


On 2/27/13 4:07 PM, Jerry Bacon wrote:


I've tried with and without next-hop-self on R3, it doesn't seem to make
any difference.



ip as-path access-list 10 permit ^11xx1
ip as-path access-list 10 deny _11xx1_
ip as-path access-list 10 permit .*


You could simplify that to:

ip as-path access-list 10 deny _11xx1_
ip as-path access-list 10 permit .*   - Dangerous outbound to transit
connections.


Or simplify things more by using prefix filters / route-maps on the 
customer BGP sessions to deny/accept+tag routes with communities that tell 
the rest of your network what to do with the routes (i.e. whether a route 
gets advertised to your transit providers, etc.).  That ends up being much 
saner as you have smaller filters in more places rather than monster 
filters at the border where you'll lose track of why things are there.


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Next step-up from 7206VXR

2013-02-20 Thread Jon Lewis

On Wed, 20 Feb 2013, Pete Lumbis wrote:


There are two pieces: control plane processing power and TCAM.

Sup720 CPU can't really keep up with the average churn of the internet
anymore. RSP720's and Sup2T CPUs can still keep up.


I'm using Sup720s, and not seeing that.


Both RSP720-3CXL and Sup2T-XL can support 1 million routes*


The Sup720 can do 1 million routes too.  Can you point out where cisco 
says the implementation is any different between the Sup720, RSP720, and 
Sup2T that makes the latter capable of handling more v4/v6 routes than the 
former.  Everything I've seen says the FIB TCAM space has not been 
improved.


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Next step-up from 7206VXR

2013-02-19 Thread Jon Lewis

On Tue, 19 Feb 2013, Eric A Louie wrote:


I've run out of port capacity on my 7206VXR and need to go to the next router
or put in another 7206VXR side-by-side.

Any recommendations on what to use if I were to replace my existing 7206VXR with
another chassis?  (it's limited to 5 GB interfaces, and we need 7 or 8)


You've got to say more about what the router is doing and what you need 
from it.  If it's routing for 8 1gb ethernets and doing full BGP routes, 
and nothing special, then a 6500 is an attractive option bang for your 
buck-wise.  They're made for ethernet and comparitively cheap to keep 
adding ports to.


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Next step-up from 7206VXR

2013-02-19 Thread Jon Lewis
The Sup720-3bxl (and Sup2T and RSP720) will run out of tcam before 
the churn of [a couple of] full feeds makes them non-viable.


We're getting close to a repeat of 2008, where lots of 6500s (those still 
running Sup2s) were inching up against their maximum supported routes when 
dealing with full views.  Sometime in the next year or so, the default 
IPv4/IPv6 split on the best Sups you can get today are going run out of 
IPv4 FIB TCAM.  Some will tune (or already have tuned) the split to buy 
another year or so, others will do so only after some head scratching when 
their 6500s fall over.


The question is, will cisco release a bigger FIB TCAM sup for the 6500, or 
will they allow this product line to end its useful life as a full 
view internet router in order to push people into ASRs or competitors' 
products?


 On Tue, 19 Feb 2013, Pete Lumbis wrote:


Both Sup2t and RSP720 (to a lesser extent but still much better than
Sup720) can handle the churn of full feeds.


On Tue, Feb 19, 2013 at 5:10 PM, Tony Varriale tvarri...@comcast.netwrote:


On 2/19/2013 2:57 PM, Jon Lewis wrote:


On Tue, 19 Feb 2013, Eric A Louie wrote:

 I've run out of port capacity on my 7206VXR and need to go to the next

router
or put in another 7206VXR side-by-side.

Any recommendations on what to use if I were to replace my existing
7206VXR with
another chassis?  (it's limited to 5 GB interfaces, and we need 7 or 8)



You've got to say more about what the router is doing and what you need
from it.  If it's routing for 8 1gb ethernets and doing full BGP routes,
and nothing special, then a 6500 is an attractive option bang for your
buck-wise.  They're made for ethernet and comparitively cheap to keep
adding ports to.

 Except when said 6500 sup CPU is asked to do BGP intensive stuff :)


tv


__**_
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/**mailman/listinfo/cisco-nsphttps://puck.nether.net/mailman/listinfo/cisco-nsp
archive at 
http://puck.nether.net/**pipermail/cisco-nsp/http://puck.nether.net/pipermail/cisco-nsp/


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/



--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] Mixing sampled and non-sampled netflow on sup720

2013-02-16 Thread Jon Lewis
Is it a known/expected issue on the 6500 series with Sup720-3bxl that 
with a config in which some interfaces have mls netflow sampling and 
some do not, no netflow data is exported for the interfaces that do not 
have sampling enabled?  I recently discovered this in 122-33.SXI.  Adding 
mls netflow sampling to the interfaces where it was missing got the 
netflow data exporting as expected.


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Migrating small distribution network to support IPv6

2013-02-11 Thread Jon Lewis

On Mon, 11 Feb 2013, Bill Jones wrote:

It's a straightforward setup: two 7204s (NPE-G2) connected to two 
gigabit upstreams, with a collection of several 3550s doing a 
combination of layer 2 and 3 with a lot of tenants and ethernet 
customers having their upload speeds rate-limited depending on the 
negotiation...average tenant would get 10 mbps upload, but some are tech 
businesses who can push some decent bandwidth (enough to require gige). 
The routers are running 12.4(24)T. It's my understanding that to support 
the existing network configuration, I would need to replace the switch 
infrastructure to support IPv6 properly (hardware layer3 forwarding).


AFAIK, the 3550s don't do IPv6 at all, so the only way they'd be useful in 
a dual-stack network would be as layer 2 switches trunking all L3 traffic 
back to the 7204s.  Doing your rate-limiting/policing/shaping up at the 
routers is undesireable since it allows any one customer to flood the 
layer 2 network with up to their port speed of traffic.


However, I remember reading that on the switches in the upgrade path 
from the 3550, you couldn't do rate-limiting, or at least do it as well 
as the 3550...I'm foggy on the details, I remember finding this out when


The 3560 series does shaping in a totally different way than the 3550's 
policing, and you'll have to look at it and see if you can live with the 
lack of granularity its capable of providing.


OTOH, if your network is entirely ethernet, I'd look at whether you 
actually need to be using 7204s and see if something like a 6500 can do 
all you need.  Something like a 6500 with Sup32 might handle things and 
can do more flexible policing (similar to what you're used to on the 
3550s).  Depending on how many ports you need, a 6506 or 6509 with a few 
6148A's might do.


dozen different ports. Funding is limited (the connectivity is looked at 
as a loss leader, the money is in having low vacancy), primarily because 
there is no customer demand for IPv6 yet. I don't want to wait for some 
big potential tenant to require it, and then have to scramble to 
implement it, and potentially do it half-assed. What would what you do 
if this was your network? Thanks,Bill


You could just keep going, business as usual, and for the first few IPv6 
customers, trunk them back to the 7204s, and eventually upgrade to a 
better dual-stack capable network.


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] 6500/Sup720-3BXL FIB TCAM tuning

2013-01-20 Thread Jon Lewis

On Sat, 19 Jan 2013, Pete Templin wrote:

I had a maintenance window this evening to upgrade a router and attempt to 
tune the FIB TCAM to be ready for continued IPv4 growth beyond the 512k 
default on this platform.  I'd apply the commands to tune the FIB TCAM, 
reload, and upon reboot I'd have errors about a FIB Protocol Allocation 
mismatch.  I'd tweak my numbers a bit (random guesses as to why I was 
tripping this error), and re-check status, where I'd see this:


Has anyone successfully tuned this, and if so could you share the software 
version and tunings used? We're running advipservicesk9_wan-mz.122-33.SXJ2 if 
that matters.


#sh mls cef maximum-routes
FIB TCAM maximum routes :
===
Current :-
---
 IPv4- 600k
 MPLS- 8k (default)
 IPv6 + IP Multicast - 208k (default)

That's just with mls cef maximum-routes ip 600 on 122-33.SXI.

--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ASR-100x intro

2013-01-05 Thread Jon Lewis

On Sat, 5 Jan 2013, Charles Sprickman wrote:

We're tentatively shopping around, and I'm looking for that sort of 
information on the ASR lineup.  The 1002 and 1002-X look very 
interesting on paper, but I'm not finding much about what folks in a 
small service provider role have to say about them.  We're at the point 
where everything is ethernet now, so our 7206 with an NPE-G2 is feeling 
pretty silly.  Some of the ASR stuff seems to be in the used channel 
already, which is nice (I'd rather have two used than one new, FWIW).


For an ethernet-only operation, the 6500/sup720-3bxl delivers considerable 
packet forwarding/$ (lots of parts in the used channel).  Its biggest 
weaknesses would likely be netflow (having to do sampled if you're doing 
hundreds of mbit/s or more) and the question of what cisco chooses to do 
hardware-wise with tcam on future supervisors.  The 3bxl is limited to 1M 
ipv4 routes or (N ipv4 + (1M-N)/2 ipv6) N100 routes.  Even the 
Sup2T-XL hasn't increased this limitation.  If they choose not to address 
this in the next couple of years, the 6500 will become unsuitable for use 
where full BGP routing is necessary.  They might choose to do this to 
force orgs using the 6500 as routers to buy ASRs (or Juniper gear)...or 
maybe the next Sup will support a few million FIB TCAM slots.


L3 Forwarding Resources
 FIB TCAM usage: TotalUsed   %Used
  72 bits (IPv4, MPLS, EoM) 622592  434995 70%
 144 bits (IP mcast, IPv6)  212992   11744  6%

I may have to adjust the ipv4/ipv6 split [again] (which unfortunately 
requires a reboot), to squeeze a little more IPv4 capacity out of it 
assuming v6 growth continues slowly.


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] 2651xm packet loss with 200 ft ethernet link

2012-12-29 Thread Jon Lewis

On Fri, 28 Dec 2012, Andy Dills wrote:


However, we were seeing tremendous packet loss. After determining the
errors were coming from this end, and testing and replacing everything in
the path, we finally tried moving the router into the telco handoff room
so we could try to eliminate a lot of variables. With a short patch cable,
it worked fine, no packet loss.

So, we made a 200 ft cable to simulate the issue, and hooked it up to the
router while it sat next to the Level3 handoff...major packet loss again.
We tried the other fastethernet interface on the 2651...same problem.

However, if I take that same cable and terminate it into one of our 7200s,
we get zero packet loss.


You mentioned errors, but didn't say what type.  Were you actually getting 
errors (crc/frame/collisions/etc.) or just packets vanishing on the wire?


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Cisco TAC successfully disappoints again

2012-12-19 Thread Jon Lewis

On Wed, 19 Dec 2012, Joe Maimon wrote:

What exactly does Support mean? I just cannot believe the following fits the 
definition.


Hello Joe,

My name is J*** C and Im the manager of the Routing Protocols team 
within Cisco TAC. Im contacting you on behalf of J*** M* who is the 
owner of this SR.


After reviewing the case notes, I understand that youre hitting a known bug 
and J*** was able to share with you some details of it as it is an internal 
bug. Due to this situation, we can not disclose any additional details as we 
cant go against our policies, what I would like to suggest is in case you 
have an account team, feel free to contact them directly so they can help you 
with this request.


Feel free to contact me in case you have any other concerns, and also please 
let us know how to proceed with this SR.


I'd say it sounds like you've run into a known bug serious enough that 
TAC's been told not to say anything about it other than known bug, 
nothing to see here until cisco gets around to doing an official security 
advisory and has gotten the fix out to all the larger customers they care 
about [more than you].


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] annoying vrrp code changes

2012-12-01 Thread Jon Lewis
I did a long overdue code upgrade on a pair of 6509s today and ran into a 
few unexpected hiccups.  I guess cisco's VRRP implementation in 6500 
122-18.SXD7b was non-RFC compliant.  I had many VLANs with VRRP group 0 
configured.  Under 12.2 SXI (and according to the RFC), the VRID field 
(what I assume IOS calls the VRRP group number) is 1-255.  That was 
obvious and easy to fix.  All the vrrp 0's were rejected by the config 
parser at bootup.


Neither obvious, nor quite as trivial to fix, in the older implementation, 
it was possible to migrate a customer from a single gateway to a VRRP 
gateway without using any more of their IPs by putting the two gateway 
router physical interfaces into a different subnet than the VRRP IP.  i.e.


router1:
int vlan100
 ip address 10.0.0.1/30
 vrrp 1 ip 192.168.0.1
 ...
ip route 192.168.0.0 255.255.255.224 vlan100

router2:
int vlan100
 ip address 10.0.0.2/30
 vrrp 1 ip 192.168.0.1
 ...
ip route 192.168.0.0 255.255.255.224 vlan100

In the SXI implementation, VRRP configured this way doesn't get past 
State Init.  Apparently, if you don't have a VRRP IP in the same subnet 
as the phys interface IP, VRRP won't work.  If you do have a VRRP IP in 
the phys interface subnet, you can also have secondary VRRP IPs outside 
the phys interface subnet, using the above trick of routing the foriegn 
subnet to the interface.  So, the workaround for the above situation is to 
renumber the physical interfaces into at least a /29, create an otherwise 
unnecessary VRRP IP in the /29, and then configure the customer's VRRP 
gateway as a secondary.


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Spanning Tree help sought

2012-11-15 Thread Jon Lewis

On Thu, 15 Nov 2012, Christopher Gray wrote:


On reading your response - and used the links you suggested - I note that I
could just leave everything as default and let STP sort itself out.


You could...but you really should dictate which switches are the root 
bridge and backup root bridge.  Additionally, do not attempt to disable 
STP on any ports unless you really know what you're doing and can 
guarantee that nobody who doesn't will ever be able to plug anything into 
those ports.  Bridge loops are a major PITA, and quickly overload things 
to the point that you may not be able to do anything to troubleshoot other 
than start physically unplugging things until you make it stop.


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] loose uRPF on Sup720/3B

2012-11-14 Thread Jon Lewis

On Wed, 14 Nov 2012, Pete Templin wrote:


On 11/14/12 3:45 AM, Gert Doering wrote:


  ip verify unicast source reachable-via any allow-default



so what is a suppressed verification drop?  And, much more important,
will it still do that in hardware, or will loose-uRPF (via any) punti
it into the software path for some packets?


Brian gave a decent response, but because I'm drinking my morning coffee I 
feel the urge to add another reply for you (since it'll delay my departure 
for work).  A suppressed verification drop is a packet that would have 
dropped  with 'ip verify unicast source reachable-via [any|rx]', but didn't 
drop because you added options (which can be allow-default, allow-self-ping, 
and/or an ACL to punch some additional holes).


So that suggests that the suppressed drops were suppressed by 
allow-default and that Gert doesn't have full routes on this device, which 
is a given since it's a non-XL 3B.


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] custom fiber cables

2012-11-10 Thread Jon Lewis

On Sat, 10 Nov 2012, harbor235 wrote:


Can anyone point me to a reputable custom fiber patch supplier,
looking for an Internet based company with quick response times.


By custom, do you mean you get to specify the exact length rather than 
choose from the common meter increments?


I've bought numerous times from fibercables.com, but I don't know if 
they'll do custom lengths.  Their web site implies that they can/will. 
For that though, we've always just used bulk fiber and done the 
termination in-house.  It's really not that hard to do...but I only just 
looked up and saw how expensive the tool kit is (Corning UniCam Pretium 
Tool Kit).


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] 2900 - 2960 config question

2012-09-21 Thread Jon Lewis

On Fri, 21 Sep 2012, Joseph Mays wrote:


interface FastEthernet0/22
description Trunk to sw2.dist.win.net
duplex full
speed 100
switchport access vlan 22
switchport trunk allowed vlan 1,201-224,1002-1005
switchport mode trunk
no cdp enable

The client on the remote switch, vlan 202, does not work through the new 
switch. On sw2 the uplink port is port 5, the client is on port 6.

I don't know what might be causing this, unless something about the vlan 
database is not created by cutting and pasting the config from the 
2900XL to the 2960.


Did you create the vlans on the 2960?  The vlans allowed on that port 
(other than 1) aren't going to work until/unless the 2960 knows those 
vlans exist.  This info was probably hidden in the vlan database (not 
present in the running/startup config) on the 2900.


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Catalyst 6509 EOS/EOL

2012-09-14 Thread Jon Lewis

On Thu, 13 Sep 2012, Antonio Soares wrote:


Hello group,

The EOS/EOL announcement for the WS-C6509 says that the last Date of Support
is November 30, 2012:


You already can't buy a new support contract on a 6509 chassis.  Cisco 
apparently expects us to junk those and replace them with 6509E chassis.



But in the other hand, the Service Contract Center shows me the date of
31-Dec-2015. Here's an example:


Maybe you can keep renewing an existing contract until 2015?

--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Third-Party support providers for 650x switches ???

2012-07-11 Thread Jon Lewis

On Wed, 11 Jul 2012, Matthew Huff wrote:


We have 4 x 6509 switches, each with 2 x Sup720 cards. In November, they non-E 
chassis go EOSL. At this time we can't justify
upgrading them to the E chassis. Are there any providers that provide past EOSL 
support that anyone would recommend?


What kind of support are you looking for?

--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Shutting down a switch port automatically after a specific time

2012-06-24 Thread Jon Lewis
If you have rancid, you could just use a cron job + clogin to schedule 
logging into the switch and shutting the port.


On Sun, 24 Jun 2012, Arun Vijay wrote:


Dear Alan

Yes.That feature set is not available in 3550.

If possible can u send a sample of the script which you are using to bring
down the port after a certain time.

Thanks
Arun

On Sun, Jun 24, 2012 at 8:07 PM, alan buxey a.l.m.bu...@lboro.ac.uk wrote:


Hi,


I would like to shutdown certain switch ports in my cisco 3550 switch
automatically after a specific time.
I tried configuring Time range with access list.But that only denies the

ip

traffic to the port while the port remains UP.
I need the port to be down and then get the intimation about the port

gone

down in my syslog server through traps,which is not possible through time
range as the port remains in the UP state.


very easy with energywisebut this is 3550 so doesnt have that
featureset for
timers we used to just use extrenal scripts which would use SNMP to
UP/DOWN
a port at certain times

alan


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/



--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] channelized ds3 - make a point to point?

2012-04-18 Thread Jon Lewis

On Wed, 18 Apr 2012, Mike wrote:


On 04/18/2012 07:48 AM, Mike wrote:

Howdy,


I have two ds1's. The end points are two customer locations, while my
noc is in the middle. I was wondering if there is a cisco way to create
a clear channel ds1 connecting these two customer locations as if they
had a telco point to point ds1 between them? I have a 7201 with pa-mc-2t3+.



Sorry for replying to my own post, but I am asking if there's anyway to do in 
the adaptor like a dsx. Otherwise I'd have to bring both ds1's out to a real 
dsx, which is silly.


I don't think the PA-MC-2T3 has any sort of built-in DACS functionality. 
If you have the PA-MC-2T3 though, you probably also have an M13 mux and 
DSX pannel (unless the telco is doing that part for you), so why not cross 
connect the circuits at the DSX rather than run them through the 7201? 
You lose the ability to monitor the circuits...they lose a point of 
failure.


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Setting line encoding, no controller present

2012-04-12 Thread Jon Lewis

You didn't say what you've tried, but you might poke around in:

conf t
int s2/0
service-module t1 ?

and I think you'll find everything you're looking for.

On Thu, 12 Apr 2012, Joseph Mays wrote:


I need to set the t1 controller for the serial interface below to be b8zs 
encoding and clock source internal, but the router does not even recognize the 
controller commands, and I can't find any relevant commands under the serial 
interface config.

=

gw1.office#show controller serial2/0
Interface Serial2/0
Hardware is Quicc 68360 with Integrated FT1 CSU/DSU module
TX and RX clocks detected.
idb at 0x6416E310, driver data structure at 0x64175A34
WIC interrupt reg = F
SCC Registers:
General [GSMR]=0x2:0x0030, Protocol-specific [PSMR]=0x8
Events [SCCE]=0x, Mask [SCCM]=0x001F, Status [SCCS]=0x0002
Transmit on Demand [TODR]=0x0, Data Sync [DSR]=0x7E7E
Interrupt Registers:
Config [CICR]=0x00C9CF00, Pending [CIPR]=0x
Mask   [CIMR]=0xC000C000, In-srv  [CISR]=0x
SDMA Registers:
[SDSR]=0x00, [SDAR]=0x07A014E0, [SDCR]=0x0772
Command register [CR]=0x600
Port A [PADIR]=0x, [PAPAR]=0x
  [PAODR]=0x, [PADAT]=0xEEFD
Port B [PBDIR]=0x0011FE, [PBPAR]=0x0E
  [PBODR]=0x00, [PBDAT]=0x03EE5C
Port C [PCDIR]=0x000E, [PCPAR]=0x
  [PCSO]=0x0020,  [PCDAT]=0x0FCF, [PCINT]=0x0001
BRGC1 = 0x , BRGC2 = 0x
BRGC3 = 0x , BRGC4 = 0x
Receive Ring
   rmd(3D010420): status 9000 length 2 address 7B99024
   rmd(3D010428): status 9000 length F address 7B9B724
   rmd(3D010430): status 9000 length 2 address 7B9C424
   rmd(3D010438): status 9000 length 10 address 7B9AA24
   rmd(3D010440): status 9000 length 12 address 7B996A4
   rmd(3D010448): status 9000 length 11 address 7B99D24
   rmd(3D010450): status B000 length F address 7B9A3A4
Transmit Ring
   tmd(3D010458): status 5C00 length E address 7A01894
   tmd(3D010460): status 5C00 length E address 7C14B34
   tmd(3D010468): status 5C00 length E address 7A014D4
   tmd(3D010470): status 5C00 length E address 7C161B4
   tmd(3D010478): status 5C00 length E address 7C15DF4
   tmd(3D010480): status 5C00 length E address 7A00AD4
   tmd(3D010488): status 7C00 length E address 7C14634

tx_limited=1(2)

SCC GENERAL PARAMETER RAM (at 0x3D010C00)
Rx BD Base [RBASE]=0x420, Fn Code [RFCR]=0x18
Tx BD Base [TBASE]=0x458, Fn Code [TFCR]=0x18
Max Rx Buff Len [MRBLR]=1548
Rx State [RSTATE]=0x18008240, BD Ptr [RBPTR]=0x440
Tx State [TSTATE]=0x18000348, BD Ptr [TBPTR]=0x458

SCC HDLC PARAMETER RAM (at 0x3D010C38)
CRC Preset [C_PRES]=0x, Mask [C_MASK]=0xF0B8
Errors: CRC [CRCEC]=0, Aborts [ABTSC]=9, Discards [DISFC]=0
Nonmatch Addr Cntr [NMARC]=0
Retry Count [RETRC]=0
Max Frame Length [MFLR]=1608
Rx Int Threshold [RFTHR]=0, Frame Cnt [RFCNT]=65524
User-defined Address ///
User-defined Address Mask 0x


buffer size 1524
QUICC SCC specific errors:
131355 input aborts on receiving flag sequence
0 throttles, 0 enables
0 overruns
0 transmitter underruns
0 transmitter CTS losts
20703 aborted short frames


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/



--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Cisco ASA IPSec VPN Problem

2012-03-20 Thread Jon Lewis

On Tue, 20 Mar 2012, Covalciuc Piotr wrote:


We have the following problem with IPSec Site-to-Site VPN between Cisco ASA.
The VPN establishes (IKE and IPSec phases are passed), but on my end I have
only TX traffic, no RX.


Who controls the other end?  So you're sending traffic via the VPN, but 
not receiving any?



And this problem is only with specific subnet: when we add another subnet
in VPN config, it works.


Can you elaborate on what you mean by add another subnet?


Do you know what else we have to check?


Probably the config at the other end...the one that's receiving your 
traffic but not sending any back.


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Recommended IPv6 Resources

2012-03-13 Thread Jon Lewis

On Tue, 13 Mar 2012, Steve McCrory wrote:


I'm dipping my toe into the world of IPv6 and I'm looking for
recommendations on resources - books, design guides, white papers,
tutorials etc.


It's really not all that different from IPv4 other than much larger 
address space, conservative IP assignment gets flipped around 180*, and 
watch out for things like needing IPv6 ACLs on things like 
router/switch vty lines, and RA / SLAAC automatically enabling IPv6 on 
hosts before they've been configured for it (ACLs).


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] 7600 Owners, failure stats wanted

2012-01-20 Thread Jon Lewis

On Fri, 20 Jan 2012, Blake Dunlap wrote:


Are they more likely to fail the other line cards? It doesn't seem
very common practice to have to of every card in the chassis and
provide customers with a port on two switching modules for example, so
why dual RSPs? Are they *that* much more likely to fail?



You had me until this line. Discrete dual ports is *very* common when
people desire HA and it isn't a multihoming situation.


We do this with single supervisors, and a full redundant identically 
configured chassis.  Customer's who care get a link to each chassis.


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Flow tools

2012-01-18 Thread Jon Lewis

On Wed, 18 Jan 2012, Dobbins, Roland wrote:



On Jan 17, 2012, at 11:23 PM, John Brown wrote:


6506-E Sup720-3BXL.


The NetFlow you get from this box won't be operationally useful - many caveats. 
 Strongly suggest a move to Sup2T and DFC4 (where applicable), if you want good 
NetFlow from 6500s.


That really depends on his definition of operationally useful.  At the 
traffic levels he mentioned, he'll likely have to do sampled netflow, but 
even that is useful for getting an idea of what's going on, identifying 
D?DoS targets/sources, verifying abusive traffic, etc.  Sampled netflow is 
certainly more operationally useful than no netflow.


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Flow tools

2012-01-17 Thread Jon Lewis

On Wed, 18 Jan 2012, John Brown wrote:


Hi Oh Wise List :)

If one was going to start up collecting netflow data for connectivity / peering 
/ traffic engineering reasons, what tools work well these days.

What shops using to look at top source or dest ASN's
Track traffic anomalies (ddos, scans, other fun things)


Oddly enough, the package I've been using for years to collect and work 
with flow data is called flow-tools.



We are needing to track GigE and 10GigE interfaces.  Packet rates are not high 
yet, but want to have something that reasonably scales.


Are you sure whatever platforms you're using can handle and export that 
volume of netflow?


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Loopback IP set to .255 - 6500 responds to ICMP echo-request from wrong interface

2012-01-01 Thread Jon Lewis

On Sun, 1 Jan 2012, Mikael Abrahamsson wrote:


On Sun, 1 Jan 2012, Mohamed Touré wrote:

For security reasons (Smurf attacks ...) IP packets with destination of 
classfull broadcast may be filtered by your upstream security devices if 
any.


There were none of those involved in this.


Having seen IOS versions that refused to forward traffic for .255 
destinations, when the .255 was in the IGP as a /32 (even with ip 
classless in the config), I've since avoided using .0 or .255 addresses. 
It seems classful routing may be dead, but not entirely forgotten.


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

Re: [c-nsp] Cisco 650x sup2 / sup32 configuration - what makes sense?

2011-12-09 Thread Jon Lewis

On Fri, 9 Dec 2011, Jeff Meyers wrote:


I've heard that now multiple times, but a # sh int cap says:

Switch-1#sh int cap mod 5 | i ASIC
 Ports on ASIC: 1-24
 Ports on ASIC: 1-24
[..]


The ports on my WS-X6148A-GE-TX all say
  Ports on ASIC: 1-48

so, hopefully this doesn't mean what it appears to.

--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Cisco 650x sup2 / sup32 configuration - what makes sense?

2011-12-08 Thread Jon Lewis

On Thu, 8 Dec 2011, Gert Doering wrote:


The best choice?  Don't use 6148-GE-TX modules.  They are fundamentally
broken (8 ports share one ASIC with a single-GE uplink, one port that's
full will block out the other 7 ports, ...).  It's even worse if
you use them for 100M links, because a saturated 100M link will eat
all the buffers from the other 7 ports on the same ASIC, causing RTT
jumps on these other ports.


Just to clarify, as I understand it, this (shared buffers) is an issue 
with the 6148-GE-TX, but not with the 6148A-GE-TX, which according to 
cisco documentation has much larger buffers and they're per port, not 
shared by the ports in each 8 port group.  The 6148A-GE-TX is still 8:1 
oversubscribed, so it's a poor choice if you have a need for lots of 
1000baseT ports handling much traffic, but at least it has nice per-port 
buffers.  I suspect if most of the ports are used as 100baseT, and you 
have the occasional 1000baseT port that might carry just a little more 
than 100mbit/s, it should do fine.


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Cisco 650x sup2 / sup32 configuration - what makes sense?

2011-12-08 Thread Jon Lewis

On Thu, 8 Dec 2011, Seth Mattinen wrote:


And the 6148A supports jumbo frames, if that matters. But yeah, it has
2.6MB per port buffers instead of 1MB shared across 8 ports.


It's supposed to have more than that.

https://www.cisco.com/en/US/prod/collateral/switches/ps5718/ps708/prod_white_paper09186a0080131086.html

--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Cisco 650x sup2 / sup32 configuration - what makes sense?

2011-12-08 Thread Jon Lewis

On Thu, 8 Dec 2011, Seth Mattinen wrote:


On 12/8/11 9:38 AM, Jon Lewis wrote:

On Thu, 8 Dec 2011, Seth Mattinen wrote:


And the 6148A supports jumbo frames, if that matters. But yeah, it has
2.6MB per port buffers instead of 1MB shared across 8 ports.


It's supposed to have more than that.

https://www.cisco.com/en/US/prod/collateral/switches/ps5718/ps708/prod_white_paper09186a0080131086.html



Hmm, I normally look at this one:

http://www.cisco.com/en/US/prod/collateral/switches/ps5718/ps708/product_data_sheet0900aecd8017376e.html

Either way it's still per-port.


Interesting.  I wonder which, if either, is correct?

--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] 7600 SVI QoS

2011-11-18 Thread Jon Lewis

On Fri, 18 Nov 2011, Ghassan.khalil wrote:


Interface vlan xx
Ip address 10.10.10.1 255.255.255.248
service-policy in 1M-policy-IN
service-policy out 1M-policy-OUT

the result is that only the outbound policy is working and the traffic is being 
limited to the 1M speed which means I can only control the downlink traffic of 
my customers.
I have another 7606 router in which I tested and the results were the same.


How does the vlan traffic reach the 7600?  If it's coming in on layer two 
switchports, you can do your ingress policing by applying a suitable 
input service-policy on those physical ports.


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] BGP neighbor with more specific prefixes

2011-09-13 Thread Jon Lewis

On Tue, 13 Sep 2011, Justin Krejci wrote:


Cisco Folks,

Internet Transit Providers
Provider 1
Provider 2
Provider 3
Provider 4

We have aggregated prefixes (/19's, /18's etc) currently advertised to
providers 1-3 on a single router. We are bringing on provider 4 but want
to advertise only a few individual /24's within those aggregated
prefixes to provider 4 and then tag them no-export. No other
advertisements to provider 4.


Tag them no-export where?  Are you saying you don't want P4 to propagate 
those /24s outside their AS, or are you saying you want to announce those 
/24s only to P4 and not to P1-3?  Either way, it should be trivial.  You 
should have output route-maps for each provider.  In those route-maps, you 
can do whatever selective process you want for controlling what's 
advertised to that provider.  My recommendation would be use of community 
strings and match community community-list name in the route-maps.



Can it just be done with the network command to include the more
specific /24's and the filter out the more specific /24's with a
prefix-list on our bgp sessions with providers 1-3 and filter out the
aggregated /18's and /19's on our session with provider 4?


That'd work too.  Doing it with communities is just a whole lot more 
flexible and easier to manage down the road.


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] BGP IPv6 OIDs

2011-09-10 Thread Jon Lewis
Is there an OID for SNMP polling the number of ipv6 unicast routes 
received from an ipv6 BGP peer?  i.e. I've been graphing the # of IPv4 
routes received from our transit providers with


.1.3.6.1.4.1.9.9.187.1.2.4.1.1.${peerIP}.1.1

mostly as an indicator of transit provider health.  i.e. if the number 
suddenly goes up or down much, there's probably something wrong.


I'd like to do the same with IPv6 routes, but I haven't found the OID.

--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] BGP IPv6 OIDs

2011-09-10 Thread Jon Lewis

On Sat, 10 Sep 2011, Ryan Rawdon wrote:


By SNMPwalking our BGP speakers I found this OID which I use for graphing 
received v6 prefix counts since earlier this year (on a pair of 7206s running 
12.4.22)
.1.3.6.1.4.1.9.9.187.1.2.4.1.1.[32.1.5.80].2.1

where the part in [ ] somehow identifies the peer - I haven't quite figured out 
how yet.  Here are some other examples but they are at the same OID aside from 
the presumed peer identifier (it is not the peer router ID, I can say that much 
for certain - for example none of the routers below are from 174 but the one 
above actually is):


From what I've read, that [32.1.5.80] is the dotted-quad version of the 
first 32-bits of the 128-bit peer IP...and the kicker is that if you have 
multiple peers in the same /32, the stats for all of them get merged 
together.  Are you peering with Cogent or a cogent customer in 
2001:550::/32 (if I did the math correctly)?


The odd thing is, that's more or less the same OID I use for v4 peer info, 
but on 12.2(33)SXI, all it shows me is the ipv4 peers.


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] sup2T software release notes have hit

2011-09-05 Thread Jon Lewis

On Mon, 5 Sep 2011, Phil Mayers wrote:

To answer my own question; we just unboxed and loaded our first sup2T today. 
Boot time with no config was ~100 seconds, which is much faster than the 
sup720.


IIRC, the specs for the Sup2T make the same max routes claim as the 
Sup720-3BXL (i.e. 100 IPv4 routes, 50 IPv6 routes, which for the 
3BXL is misleading at best).  Is the IPv4/IPv6 routing split still the 
same on the Sup2T, where you can have 1M IPv4 routes with IPv6 turned off, 
or some split such as:


[from show platform hardware capacity]
L3 Forwarding Resources
 FIB TCAM usage: TotalUsed   %Used
  72 bits (IPv4, MPLS, EoM) 622592  368412 59%
 144 bits (IP mcast, IPv6)  2129927041  3%

As IPv4 runs out, I suspect we're going to see continued, if not 
explosive, IPv4 routing table growth, and I'll be very disappointed if 
cisco didn't engineer the Sup2T to support more routes than all previous 
models.  If not, hopefully there's some more capable PFC/DFC on the way, 
or maybe cisco just wants to eventually stop people from using the 6500 
platform as a full BGP router and sell more ASRs or something.


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] sup2T software release notes have hit

2011-09-05 Thread Jon Lewis

On Mon, 5 Sep 2011, Phil Mayers wrote:


 FIB TCAM usage: TotalUsed   %Used
  72 bits (IPv4, MPLS, EoM) 262144  20  1%
 144 bits (IP mcast, IPv6)  131072   8  1%
 288 bits (IPv6 mcast)   65536   1  1%

This is a non-XL sup2T. So, identical to a non-XL sup720 IIRC. Presumably the 
XLs have the same specs.


That looks bigger than a non-XL sup720 though.  i.e. here's a Sup32

L3 Forwarding Resources
 FIB TCAM usage: TotalUsed   %Used
  72 bits (IPv4, MPLS, EoM) 196608 590  1%
 144 bits (IP mcast, IPv6)   32768  23  1%
[no 288 bit IPv6 multicast...never seen that before]

Your numbers suggest to me that if you had IPv6 totally disabled, that 
thing might handle 768k IPv4 routes.


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] sup2T software release notes have hit

2011-09-05 Thread Jon Lewis

On Mon, 5 Sep 2011, Alan Buxey wrote:


VS-S2T-10G-XL
1024K (IPv4) 512K (IPv6)


Right...but my point was, that's the same specs claim they make for the 
Sup720-3BXL, and it's misleading because at least with the 3BXL, it's 1M 
IPv4 routes [and 0 IPv6] OR 512K IPv6 routes [and 0 IPv4], or some 
compromise of smaller numbers of each, such as the 622592 IPv4 and 212992 
IPv6 I posted.


If they haven't increased the max routes capability of the next generation 
Sup vs the 3BXL, then that's very disappointing.


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] sup2T software release notes have hit

2011-09-05 Thread Jon Lewis

On Mon, 5 Sep 2011, Phil Mayers wrote:


If they haven't increased the max routes capability of the next
generation Sup vs the 3BXL, then that's very disappointing.


This is all quite well documented here:

http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SY/release/notes/ol_20679.html#wp2561330


I couldn't find that the last time I looked for Sup2T specs.  So it seems 
they haven't increased the route capacity...just the traffic forwarding 
capacity.


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] WARNING: Netflow Data Export Hardware assisted NAT not supported on 76xx/65xx on the same interface

2011-08-29 Thread Jon Lewis

On Mon, 29 Aug 2011, Simon Leinen wrote:


In short: Never assume that two features work together until you tried
it in the lab or got credible evidence from somewhere that they do.


I'll add here that just because you configured it in the lab (and didn't 
get any errors from the CLI), don't assume it works until you've actually 
tested it and verified the functionality.  When we first eval'd the 
3550-48 switch, ip verify unicast reverse-path was accepted into the 
interface config for layer 3 interfaces...but it didn't actually do what 
you'd assume it would do [it didn't actually do anything].


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] OSPFv3 authentication

2011-08-25 Thread Jon Lewis
Am I missing something, or is OSPFv3 authentication (provided by ipsec, 
since auth was removed from the protocol) not supported in any release for 
any of cisco's switching platforms?  i.e. 3560, 4900, 6500


Depending on how you search in feature navigator (the same feature appears 
to be there under two different names):


IPv6 Security: IPv6 IPSec to Authenticate OSPFv3 
IPv6 Routing: OSPF for IPv6 (OSPFv3) Authentication Support with IPsec


you get different lists of supported platforms, but both are pretty small 
and lack any of the gear I'm interested in.  Is everyone using/moving to 
ISIS?...or just doing OSPFv3 without authentication?


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] BGP question : What's the best way for filtering outgoing prefixes?

2011-08-19 Thread Jon Lewis

On Fri, 19 Aug 2011, Jay Nakamura wrote:


While testing, I am wondering, is it standard practice to clear my
community strings from routes before going to peer/transit?


Yes.  You never know what special meaning various community strings might 
have to someone else.  You should set community none on routes you receive 
after you've looked at the community strings (if you were interested), and 
before sending routes to another AS unless you meant for them to go out 
with a certain community string.


--
--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] BGP question : What's the best way for filtering outgoingprefixes?

2011-08-18 Thread Jon Lewis

On Thu, 18 Aug 2011, Scott Granados wrote:

Go with option A, community tags are your friend.  It also removes the need 
for any network statements in your config thus reducing the work in the long 
term.


You'll probably still need some network statements in your config at least 
for all your own routes.


The best part about using community tags for BGP filtering are, you only 
have to setup an appropriate route-map/prefix-list on the router servicing 
the BGP customer.  Once you receive/accept their route and tag it on that 
router, the rest of your network knows what to do with it based on the 
community tag.


I was absolutely shocked the last time I helped a customer turn up BGP 
with a (primarily cable) transit provider, and was told that the turnup 
was being held up because it required updating prefix filters on their 
core routers, and they could only do that during a maintenance window and 
they weren't allowed to schedule any maintenance windows because a 
tropical storm was threatening to impact the SE US.


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] multihoming solution over two different ISP's

2011-08-08 Thread Jon Lewis

On Mon, 8 Aug 2011, Aftab Siddiqui wrote:


Asking for the best solution: Yes its via BGP
provided that you have you own Public IP space and ASN otherwise its not
possible with 2 different ISPs. Adding HWIC-2FE would serve the physical
requirement in your scenario.


BGP is the best way to go, and you certainly can multihome with BGP using 
IP space assigned by one of the ISPs.  Lots of AS's do that.


More below...


On Mon, Aug 8, 2011 at 2:28 PM, Martin T m4rtn...@gmail.com wrote:


At the moment I have a following setup:

http://img69.imageshack.us/img69/4227/252530.png

a) Is it somehow possible to automatically switch over to another one
connection in case the primary one fails. For example ping
www.google.com over a period of time and in case it doesn't respond,
automatically switch over to backup connection?

b) Is it somehow possible to have one static IP address while using
the services of two different IPSs?


You can do poor man's multihoming using 2 ISPs (no BGP) by doing 
reachability testing of something or things out on the internet, and 
changing your default gateway when you think the primary connection has 
failed.  You'll have to use NAT/PAT such that when you're going out 
through ISP-A, your outside NAT address is an ISP-A address, and when 
you're going out through ISP-B, your outside NAT address is an ISP-B 
address.  With a bit of policy routing, you can even keep both the ISP-A 
and ISP-B connections up and usable simultaneously.


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Dumb question

2011-08-03 Thread Jon Lewis

On Wed, 3 Aug 2011, Ziv Leyes wrote:


Hi all,
I have the following scenario (excuse my lousy ascii art...)



  ISP1
/
  /
/
RTR1 -iBGP- RTR2
   \
 \
   \
ISP2

For the simplicity of the case, I have two prefixes, 1.1.1.1/24 and 
2.2.2.2/24, I want to advertise prefix 1.1.1.1/24 to ISP1 as best, and 
2.2.2.2/24 to ISP1 with prepends, and the opposite too, prefix 
2.2.2.2/24 to ISP2 as best and prefix 1.1.1.1/24 to ISP1 with prepends.


What I'm trying to do is to set up all in a way that the only place I 
set up my decision is on RTR1 only, and that will be reflected via the 
iBGP to RTR2 about how I want the prefixes to be advertised to my eBGP 
neighbors ISP1 and ISP2 I tried setting communities, but all I got is 
RTR2 to see and match the communities, but based on this, I couldn't get 
the prefixes advertised to the ISPs at all.


What kind of manipulation I need to do in order for the RTR2 after 
matching the communities coming from RTR1, to advertise it to the ISPs 
according to the priorities I've mentioned before?


This should be reasonably simple to do by setting communities on the 
prefixes on RTR1 (assuming RTR1 is exporting these prefixed into BGP...use 
a route-map there to set the communities).  On RTR2, you'll need 
output route-maps for ISP1 and ISP2 that permit / permit and prepend based 
on community strings.


i.e. on RTR1, you'd set multiple community strings on 1.1.1.1/24 and 
2.2.2.2/24, first a string that indicates this is a route you want to 
advertise to the internet in general, then a second string that indicates 
you want some number of prepends when going out ISPx.  In the output 
route-maps on RTR2, you'd check for these prepend community strings first, 
and the general announce to internet string last.


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] 7206VXR 23-inch rack brackets?

2011-07-13 Thread Jon Lewis

On Wed, 13 Jul 2011, Jay Hennigan wrote:


Does Cisco make a rack-mount kit for 7200 routers going into 23-inch
telco racks?  If so can someone provide a part number?

If not, I can use aftermarket filler brackets but I would prefer the
cleaner installation of stock brackets.


Never seen them.  We've always used the 19-23 spacers for the 7206's when 
going into 23 racks.


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Replacing a 7206VXR w/ NPE-G1 with Sup720-3BXL w/ WS-X6408A-GBIC

2011-06-29 Thread Jon Lewis
The supervisor is actually a split brain system...with the MSFC handling 
routing calculations/manipulation and the PFC handling packet switching. 
I expect your new setup will handle things just fine...and at least for 
the moment, a Sup720-3BXL can handle full tables.


One annoyance, probably minor, is that none of cisco's GigE ports for the 
6500 have a whole lot of output buffer, so if you're doing much traffic, 
you will likely see some output drops, but not enough to cause problems.


On Wed, 29 Jun 2011, Chris Evans wrote:


Its all forwarded by the supervisor.  I wouldn't be worried about that too
much.  I'd be more worried about the full internet table being on the 6500.

It will probably be okay but 6500s aren't great high scale routers. They
don't have much CPU power.
On Jun 29, 2011 11:17 AM, matthew.coleman-hamil...@servicebirmingham.co.uk
wrote:

Hi,

Our Internet BGP tier is currently provided by a pair of 7206VXR routers
with NPE-G1s which are getting quite long in the tooth. We've recently
been able to reclaim a pair of Sup720-3BXLs and the associated 6509
chassis'. Its our intention to retire the 7206s and replace them with the
6509s /w Sup720s but we require 6 GigE interfaces per box. We have a pair
of WS-X6408A-GBIC 'classic bus' linecards on the shelf (no spare 65XX or
67XX modules unfortunately) but my question is whether using the
WS-X6408A-GBIC to provide port capacity is a good or bad idea in this
scenario?
I appreciate that using a WS-X6408A-GBIC means that the classic 32Gbps
shared bus will be used (with a max of 15Mpps per system) but in raw
performance numbers this is a significant increase on the 7206VXR/NPE-G1s
~2Gbps backplane and ~1Mpps forwarding rate.
My real concern is that I've found two different Cisco documents that
describe the Forwarding-Engine Architecture differently for classic
linecards.
This link :-


http://www.cisco.com/en/US/prod/collateral/switches/ps5718/ps708/product_data_sheet0900aecd801459a7.html

states that the Supervisor engine CPU makes forwarding decision
and this link:-


http://www.cisco.com/en/US/prod/collateral/switches/ps5718/ps708/product_data_sheet0900aecd8017376e.html

states that Centralized Cisco Express Forwarding engine located on
supervisor policy feature card (PFC) makes forwarding decision
As the 6500 series is a hardware-based platform I'm keen to make use of
hardware-supported features where available and not experience unexpected
issues from high CPU utilisation.
Can anyone confirm exactly how traffic will be forwarded by the
Sup720-3BXL with a WS-X6408A-GBIC in the chassis?
Thanks in advance,
Matthew
___
cisco-nsp mailing list cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/



--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Replacing a 7206VXR w/ NPE-G1 with Sup720-3BXL w/ WS-X6408A-GBIC

2011-06-29 Thread Jon Lewis

On Wed, 29 Jun 2011 matthew.coleman-hamil...@servicebirmingham.co.uk wrote:


Thanks. I had (perhaps foolishly) assumed that moving from an NPE-G1 to a
Sup720-3BXL-based platform would represent an upgrade from the 7206VXR (as
well as having the advantage of bringing our Internet BGP tier in-line
with the rest of our core network from a hardware perspective).

When comparing the NPE-G1 to a Sup720-3BXL for the purposes of being an
internet-facing BGP router am I actually proposing a backwards step?


It may not have as much CPU power as a G1, but it's a switch and was 
designed to switch packets at line rate...lots of them, lots more than a 
VXR can do.  BGP convergence may go a little slower, but the platform will 
forward more traffic (PPS or Mbps) than the VXR.


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] uRPF lacking on ME3600X?

2011-06-14 Thread Jon Lewis

On Tue, 14 Jun 2011, Jeff Kell wrote:


On 6/14/2011 7:04 PM, Waris Sagheer (waris) wrote:

uRPF is currently not supported and it is in the roadmap.


(Slightly off the 3600 topic...)

Does uRPF cut the FIB/TCAM in half on a 6500/Sup720 like it does a Sup2?


No...but it has the annoying issue of only being able to do one flavor of 
uRPF on the whole box.  Any ports configured for it will do whichever type 
is configured last.  So it does reachable via rx or reachable via 
any...pick one.  Don't try using the other.


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] BGP peer/customer routes

2011-05-31 Thread Jon Lewis

On Tue, 31 May 2011, vince anton wrote:


I operate a transit AS (say AS10), and I have a customer (AS 5) who buys
transit from me.

I also peer with AS11 - no transit either way on this, just peering, ie
sending my networks to AS11, and receiving AS11's networks

Now AS5 also becomes a transit customer of AS11, and so on the peering link
with AS11, I now can see the IP Blocks of my customer AS 5

AS Path length, and Localpref sorts out most routing issues here, except for
the case where AS5 advertises a more specific route to AS11, than to me
(AS10).


Maybe the customer doesn't realize you peer with AS11 (and see their more 
specifics via AS11).


Maybe the customer is trying to reduce the amount of traffic on their 
transit connection to you and actually wants you (and everyone else) to 
deliver some of their traffic via AS11.


If you decide to take any action, you should contact the customer first, 
explain why you're unhappy with their routing policy, see if it's 
intentional, and then decide what (if anything) to do about it.


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Catalyst TCAM Question

2011-05-05 Thread Jon Lewis
They should be software switched.  If you're moving much traffic through 
the box, that's not good.  You might want to filter the BGP feeds so 
you're carrying less than the max supported number of routes...though even 
if you filtered on RIR minimums, I'm not sure you'd still be able to fit 
the resulting number of routes into your 196k limit.  I know you could 
several years ago (i.e. 2007), but the global table was 100k routes 
smaller then.


On Thu, 5 May 2011, Bill Blackford wrote:


Platform: 7600/SUP720-B

If a box that can only handle sub 200k IPV4 routes in TCAM receives
two full feeds and as shown below is only 'using' 196305 of them, is
the delta of that 350k dropped or is it then processed in software?
Looking a 'sh route sum' it looks like a full table in the FIB. 'sh fm
sum' shows nothing INACTIVE.

snip
L3 Forwarding Resources
FIB TCAM usage: TotalUsed   %Used
 72 bits (IPv4, MPLS, EoM) 196608  196305100%
144 bits (IP mcast, IPv6)   32768   5  1%

detail:  ProtocolUsed   %Used
 IPv4  196305100%
 MPLS   0  0%
 EoM0  0%

 IPv6   2  1%
 IPv4 mcast 3  1%
 IPv6 mcast 0  0%

   Adjacency usage: TotalUsed   %Used
  1048576 199  1%
/snip

I see this in the logs which was my first clue for asking this question:

snip
%MLSCEF-SP-7-FIB_EXCEPTION: FIB TCAM exception, Some entries will be
software switched
/snip

thank you in advance for any input.

-b



--
Bill Blackford
Network Engineer

Logged into reality and abusing my sudo privileges.
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/



--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Safer DDOS drops

2011-04-08 Thread Jon Lewis

On Fri, 8 Apr 2011, Peter Kranz wrote:


So today one of our customers was being hit with a DDOS attack with the
following signature; basically a bunch of UDP junk of about 5 Gbps in
volume..


At that traffic volume, you're probably better off with RTBH than trying 
to ACL it.  That way the DDoS traffic isn't congesting your transit pipes.


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] NetFlow for billing on 6500/SUP720-3B

2011-04-06 Thread Jon Lewis

On Wed, 6 Apr 2011, Wil Schultz wrote:

Not netflow, but I use cacti to graph all switchports and aggregate 
ports as needed into 95th percentile. Works well and there aren't any 
load concerns on the switchside.


That's the easiest way...but the trouble is, cacti can't ignore local 
traffic (so the customers are only billed for internet traffic).


I'm curious to hear what others have to say, but I suspect the OP is SoL. 
I don't have any experience telling a 6509 to only export certain flows, 
but unless traffic levels are pretty low, I suspect there will be switch 
processor load issues if you do more than some form of sampled netflow, 
and then you really can't bill based on it, because at most you'll be 
seeing like 1.5% of the traffic volume.


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Old catalyst 6k 10/100 RJ45 cards.

2011-03-30 Thread Jon Lewis

On Wed, 30 Mar 2011, Lamar Owen wrote:


Good afternoon list.

I'm trying to find a document describing, concisely, the differences between 
the old 'classic' 6148-RJ45 10/100 48 port card and the 6248-RJ45 and 
6348-RJ45.  None of the usual information sources is being much help; looked 
through Cisco's docs on their ethernet linecards, on the Cisco Cluepon wiki, 
and others.  I seem to remember something crossing this list way back in the 
past, but can't seem to locate in the archives.

Yes, old, slow, bus, etc I know all that, and that that is generic to that 
era of EoL card; I'm just trying to determine what the exact differences are to 
deploy the few I have of each variety in an intelligent fashion.  And if the 
answer is 'there isn't a substantial difference' that's ok; but I'm looking for 
any details, or a pointer to a page listing those details.


Some of what you're looking for is probably here:
http://www.cisco.com/en/US/prod/collateral/switches/ps5718/ps708/product_data_sheet0900aecd8017376e.html

There's no mention of the 6248 there though.

--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] 6500/BGP/full route tables [even more] confusing...

2011-03-26 Thread Jon Lewis

On Sat, 26 Mar 2011, Jeff Kell wrote:


I had a 6509/Sup2 (clearly can't do full tables) for some time, using
various route-maps and filtering tricks to keep the IPv4 routes under
128K (which seems to be the magic number with uRPF enabled).  If that is
exceeded, it generates TCAM overflow errors and essentially the 6500 is
bricked relative to passing traffic.  Under 128K and it's fine.

I intended to upgrade this to something suitable for full routing
tables, and went for a Sup720/PFC3CXL.  A million routes, right?


Not really.  The million routes thing is highly misleading.


Received another WS-X6516-GBIC but with a DFC3A.  Powers up, but
switches everything to PFC3A mode:


If you're not doing that much traffic, is removing the DFC from the 
WS-X6516-GBIC an option?


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] 3550, need some help ugrading software

2011-03-21 Thread Jon Lewis

On Mon, 21 Mar 2011, Renelson Panosky wrote:


I've done a million of this with no problems, for some reasons today i am
hitting a dead end please help.

switch: boot
Loading
flash:c3550-i9q3l2-mz.121-13.EA1a/c3550-i9q3l2-mz.121-13.EA1a.bin...flash:c3550-i9q3l2-mz.121-13.EA1a/c3550-i9q3l2-mz.121-13.EA1a.bin:
no such file or directory


Seems pretty clear, that file's not there.  Perhaps the path is invalid 
and the bin file is really in the root dir of the flash?



switch: boot c3550-ipbasek9-tar.122-44.SE6.tar
Loading
c3550-ipbasek9-tar.122-44.SE6.tar...c3550-ipbasek9-tar.122-44.SE6.tar:
permission denied


Booting a tar file?  Those are supposed to be unpacked by the switch using 
the archive download-sw ... command.


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Prevent DDoS

2011-03-14 Thread Jon Lewis
Even dedicated(expensive) devices aren't going to prevent a DDoS from 
impacting your network.  The most common type of DDoS I've seen is packet 
flooding.  These typically utilize compromised/botted systems on broadband 
or better internet connections or VPS/cloud computing resources with even 
more bandwidth and can be in the several hundred Mbit/s to several Gbit/s 
range.  If you're hit with a DDoS that exceeds your internet capacity, 
then all the router security configs and dedicated DDoS prevention 
filtering devices aren't going to matter.  All you can do for this type of 
attack is react and mitigate it with filtering by your internet 
provider(s).


I recently did a little write-up on one method for this, BGP triggered 
real time blackhole routing.


http://jonsblog.lewis.org/2011/02/05#blackhole

On Mon, 14 Mar 2011, Ziv Leyes wrote:


The only way to _prevent_ DDoS attacks is to get your hands on those that are 
planning to attack you and kick their arse before they run the DDoS.

Once the attack is delivered, the only thing you can do is to mitigate it and 
wait till it's over...
A mix of good configured control-plane policy on your core with uRPF towards 
the outside and a blackhole device is the most feasible way without having to 
buy a dedicated device to protect you

Sorry for putting emphasis on semantics... :-)


-Original Message-
From: cisco-nsp-boun...@puck.nether.net 
[mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of Tseveendorj
Sent: Monday, March 14, 2011 10:36 AM
To: cisco-nsp
Subject: [c-nsp] Prevent DDoS

Hello,

Is there anyway to prevent DDoS attack on Cisco Router?

regards,
Tseveen.
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net 
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/




This footnote confirms that this email message has been scanned by PineApp 
Mail-SeCure for the presence of malicious code, vandals  computer viruses.





The information contained in this e-mail message and its attachments is 
confidential information intended only for the use of the individual or entity 
named above. If the reader of this message is not the intended recipient, you 
are hereby notified that any dissemination, distribution or copying of this 
communication is strictly prohibited. If you have received this communication 
in error, please notify us immediately by replying to the sender, and then 
delete the message from your computer.  Thank you!

 This mail was sent via Mail-SeCure System.






This footnote confirms that this email message has been scanned by
PineApp Mail-SeCure for the presence of malicious code, vandals  computer 
viruses.





___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/



--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] 6500 cef bug?

2011-02-08 Thread Jon Lewis

Anyone ever seen something like this on the 6509 (sup720-3bxl)?

We have a customer advertising a /24 to the 6509.  The /24 is a subnet of 
a shorter network they use elsewhere on the internet.  It's been working 
fine for quite a while.  The bgp session flaps due to the customer router 
rebooting.  When the session comes back up, the 6509 receives the route. 
sh ip ro IP and sh ip bgp IP both show exactly what you'd expect. 
But the 6509 isn't actually using the route.  sh ip cef IP shows the 
entry for the shorter network out on the internet (not the /24 you'd 
expect).


Clearing the bgp session from either end doesn't help.  I finally 
resolved the issue by installing a static route for the /24 on the 6509 
pointed at the BGP peer IP.  That fixed the show ip cef.  Then I went back 
into the config and removed the static route.  Problem is still resolved.


I used to see vaguely similar things on the 7500 platform...but in that 
case, the fix was to flip dcef off/on.  I suppose in this case, we're 
probably long overdue for a reboot/software upgrade.  Still running 
12.2(18)SXD7b.  I'll probably go to one of the 122-33.SXI versions.


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] 3550 layer 3 switch replacement for v6

2010-12-09 Thread Jon Lewis
I need to start looking at replacing 3550-48 switches with something 
comparable that supports ipv6.  I tried using feature navigator, but the 
info it was giving me was so suspect I won't even bother repeating it.  My 
impression from past looks into this issue is that the 3560-48TS (which 
actually went end of sales earlier this year) is a comparable switch to 
the 3550, does ipv6 in hardware, but has far less flexible per port 
policing, which will require a total redesign of our customer port limits.


I'm wondering if there are any major surprises with the 3560 when you 
enable ipv6 routing and ipv6 ospf?  I know doing so cuts the supported 
number of routes in half.  Also, we've kind of been abusing the 3550s, by 
running them with generally most of the ports in layer 3 mode.  The 
recommended number of routed interfaces on a 3550-48 is only 8!  Can we 
get away with running 48 dual-stack layer 3 ports on a 3560-48TS?


Or is there a better switch I should be looking at?  Is the 3560 v2 
appreciably better than the original?  It looks like the only change we'd 
benefit from is lower power consumption.  They run the same software, so 
features should be the same.


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] DS3 Nubie

2010-09-26 Thread Jon Lewis

On Sat, 25 Sep 2010, Christopher J. Wargaski wrote:


  This year I installed a video WAN comprised of several 3845 routers
with the NM-1T3/E3 for point to point DS3s (that is all, nothing
else). The 3845 routers list at $13,000 and the network module at
$8,500. You should do yourself and your firm a favor and look at
business class Ethernet. DS3s are so expensive and sometimes a major
pain in the butt.

  For business class Ethernet, you most major carriers can offer you
something. Typically, fiber is pulled to your NetPOP and a switch is
installed, your hand-off is a switch port. The downside is the cost of
delivering fiber to your building which can often be quite prohibitive
unless you can amortize that cost over a number of years.
(Unfortunately, that may not be possible since the deliverable may not
be considered a product to your accounting department.)


There are other downsides [to metro ethernet] to consider.  Using ethernet 
for long haul, your devices at each end are no longer directly connected, 
but will have a network (the provider's ethernet switches) between them. 
Failures in the network will cause your ends to lose contact with each 
other, while their interfaces remain up/up.


Depending on the speed provisioned by the provider, and the speed of your 
networks, you can run into bursting/packet drops issues when your 
1000baseT traffic hits the 10mbit or 100mbit metro-E.


Also, because your packets are flowing over the provider's switched 
network, they typically ride a specific VLAN.  If (no, when) the provider 
screws up and puts another customer in the same VLAN, very strange things 
will happen, particularly if you're both using the same RFC1918 IPs. 
This is something you generally don't have to worry about with private 
lines.


--
 Jon Lewis, MCP :)   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


  1   2   3   >