Hello,
I have a corporate network with 6500s as core and 3560s as access, IP phones
and a lot of other routers and PIXs.
I need to have a full detailed network documentation and mapping of topology
because we have such a big network a no documentation which always slows our
troubleshooting.
I
Maybe not the best way but it has worked for me in the past.
Enable CDP on all your network devices (Just for a little whlie).
Now logon to each record the CDP neighbor detail output
Pick a router/switch say core-1
How many CDP neighbors?
Which ports are they connected to?
Draw these
On Oct 28, 2007, at 3:27 PM, Roger Oliver wrote:
I'm very interested to hear what others do.
PacketDesign RouteExplorer does good visualizations based upon BGP
and IGP, and Narus InSight Manager does visualization based upon
BGP. There are also tools like lanmap, which watch packets via
On 28.10.2007 08:30 Sami Joseph wrote
Hello,
I have a corporate network with 6500s as core and 3560s as access, IP phones
and a lot of other routers and PIXs.
I need to have a full detailed network documentation and mapping of topology
because we have such a big network a no
I use show cdp neighbors we i can and drawout the design in a very detailed
visio (34x44 ANSI) or larger works for most of my discoveries. Takes a while
but its worth it in the end.
From: [EMAIL PROTECTED] [EMAIL PROTECTED] On Behalf Of Sami Joseph
can use also a 3560
matthew zeier wrote:
I made need a (cost effective) bgp-capable router for a remote
deployment which would only need to announce -1- route and take in a
default route from -1- provider. Also needs to push 100Mbps of traffic.
A 3750 (EMI) can do this fine, right?
On Oct 28, 2007, at 6:22 PM, Sami Joseph wrote:
Is there a way around that?
I'd look at routing, ARP, CAM, CEF. I wouldn't recommend
portscanning, as a) you don't know what to scan, b) you might cause
problems, and c) you may have devices with no IP addresses at all.
For open-source
Which brings us to a question:
What is the difference between IP accounting and IP CEF accounting?
Thanks,
On 10/24/07, Salman Zahid [EMAIL PROTECTED] wrote:
Ip accounting is not supported on platforms that do forwarding in hardware
and you cannot install a netflow card on a 4948 either
On Sat, 2007-10-27 at 18:02 +0300, Tassos Chatzithomaoglou wrote:
One ugly way to do it would be to create an eem applet on both routers which
would do the following:
1) watch for syslog messages STANDBY Active-xxx and then decrease
the metric of these
redistributed connected routes
Adrian Chadd wrote:
You might find the cheapest option is the 8 port 3560 but I don't know
if it speaks BGP.
Privided You'll buy appropriate licence, yes it does - it runs exactly
the same software and licenses that are on the bigger 3560 versions.
Look here (table 7):
Hello,
If a PIX with this configuration for routing:
ip route 10.20.43.0 255.255.255.0 192.168.10.5 200
ip route 10.20.0.0 255.255.0.0192.168.10.9 1
and has an OSPF process where it learns a route via reverse route
injection from a VPN conectrator to go to 10.20.43.0 thorgh
The most specific path would be chosen.
ip route 10.20.43.0 255.255.255.0 192.168.10.5 200
prefix length comes before metrics/AD/etc.
--
Regards,
Jason Plank
CCIE #16560
e: [EMAIL PROTECTED]
-- Original message --
From: Jonathan Soler (Europe) [EMAIL
To make it even uglier, you can configure (using eem again) pbr under the
upstream interface to send
all these requests to the appropriate router, bypassing the connected routes.
--
Tassos
Phil Mayers wrote on 28/10/2007 2:27 μμ:
On Sat, 2007-10-27 at 18:02 +0300, Tassos Chatzithomaoglou
Sami Joseph wrote on Sunday, October 28, 2007 1:16 PM:
Which brings us to a question:
What is the difference between IP accounting and IP CEF accounting?
General answer: CEF on certain platforms maintains counters within the
FIB entry which counts the traffic towards this particular prefix.
At 10:39 PM 10/26/2007 -0500, Justin Shore wrote:
Ian Cox wrote:
What exactly do you mean by not route traffic? HSRP on the standby
does not route traffic for the HSRP vmac, it drops the traffic on
the floor. If it did not do this when you have a unicast flood
packet both switches would
Dale Shaw wrote:
Hi all,
On 10/28/07, Christopher E. Brown [EMAIL PROTECTED] wrote:
5 min later, the MAC entry times out, but the ARP entries are there for
another 4hr 55min... Now we have our layer2 network with no target for
that MAC and flooding everywhere.
(3hr 55min?)
Yes,
On Sun, 2007-10-28 at 17:50 +0200, Tassos Chatzithomaoglou wrote:
To make it even uglier, you can configure (using eem again) pbr under the
upstream interface to send
all these requests to the appropriate router, bypassing the connected routes.
There are lots of things I could do, that for
On Sat, 2007-10-27 at 14:12 -0800, Christopher E. Brown wrote:
Phil Mayers wrote:
On Fri, 2007-10-26 at 12:10 -0800, Christopher E. Brown wrote:
Phil Mayers wrote:
On Fri, 2007-10-26 at 13:08 -0500, Justin Shore wrote:
Phil Mayers wrote:
Is there a HSRP option to tell the standby router
Hi,
I am looking for guidance from you guys on what is the best way/tool/process
to do it from your experience?
NetDISCO is always a good tool for this sort of job. but if you cant
SNMP or CDP then things become more interesting.
alan
___
cisco-nsp
The simple low overhead fix would be to have the HSRP master send a
*single* extra packet every X seconds. Just one gratuitous ARP every
200 seconds would solve the whole issue.
See my other email; in our network (6500/sup720) the HSRP master *DOES*
send frequent packets with the vmac as a
This topic never fails to amaze me, that there are people who will build a
network of size and not document it. (I'm not faulting you, I've just seen
it happen a lot.)
I've built toolsets that do this, only to have people actively refuse to
use them. I don't get it.
- billn
On Sun, 28 Oct
On Sun, 28 Oct 2007, [EMAIL PROTECTED] wrote:
Hi,
I am looking for guidance from you guys on what is the best way/tool/process
to do it from your experience?
NetDISCO is always a good tool for this sort of job. but if you cant
SNMP or CDP then things become more interesting.
Have also a
Correlate ARP cache to bridge tables. You can do it from your core
switches as a start. It's THE best way for finding anything talking on
your network.
- billn
On Sun, 28 Oct 2007, Sami Joseph wrote:
Hi Roland,
Thanks.
The point is i dont really know all the devices we have, so i cant
The most important reason for putting them on the RX side is that you
are protecting that which needs to be protected - the receiver in
your optics. This way you know that you're not going to potentially
blow the receiver in your optics by plugging in too large a signal
because you
Look at LAN surveyor from Solarwinds..
If you have $
jim
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Sami Joseph
Sent: Sunday, October 28, 2007 3:31 AM
To: cisco-nsp@puck.nether.net
Subject: [c-nsp] Network Topology Mapping
Hello,
I have a corporate
Bill Nash wrote:
Correlate ARP cache to bridge tables. You can do it from your core
switches as a start. It's THE best way for finding anything talking on
your network.
That is exactly what I did, after a lot of pinging and checking the ARP
cache I created our network weather map.. :)
From joe and stephen's nanog tutorial
(http://www.nanog.org/mtg-0210/abley.html):
ftp://ftp.isc.org/isc/toolmakers/mktop.tar.gz
ftp://ftp.isc.org/isc/toolmakers/top2dot.tar.gz
I'm a big fan of forcing provisioning/operational acceptance through
the same system that creates/is part of your
Is this a newer version or are you talking about experience in the past? Back
in the day CW was a complete piece of crap but like many other things, it is
much better than it was. I hated it as well but I like it now. much improved...
demo a new version.
--
Regards,
Jason Plank
CCIE #16560
e:
Phil Mayers wrote:
The simple low overhead fix would be to have the HSRP master send a
*single* extra packet every X seconds. Just one gratuitous ARP every
200 seconds would solve the whole issue.
See my other email; in our network (6500/sup720) the HSRP master *DOES*
send frequent packets
Hi All,
Is there a way you can have CISCO routers,switches to proactively detect
that your link is degdrading the actual bandwidth its supposed to have?
for example, within a period of 24hours. given a 2MB leased line link. How
can you analyze that the bandwdith has degraded with reference to the
it seems that there might be an snmp value somewhere that tracks the
number of times a call is rejected due to no more lines available. i've
googled around and tried delving into the snmp browser at cisco but
haven't found the right place yet. any quick pointers for me?
Greetings,
I've recently come across a case whereby an 877 router running 12.4(4)T7 I was
looking at had:
interface Dialer0
ip address negotiated
interface Vlan1
ip address 203.123.155.233 255.255.255.248
However the Dialer was being assigned the address 203.123.155.233 by the
remote
Hi,
Can some one tell me the best (or good enough) tool for WLAN survey. I have
seen many tools available but not sure which one is best as per user
friendliness and accurate enough. Pls guide me if any one has worked on any
of wireless survey tool.
Regards
Vikas Sharma
33 matches
Mail list logo