Hi,
On Mon, Mar 10, 2008 at 04:26:07PM -0700, carl wrote:
Can a 6500 with a sup720-3BXL receive full BGP routes if the line cards have
DFC3A's?
No.
gert
--
USENET is *not* the non-clickable part of WWW!
//www.muc.de/~gert/
Gert
Hi Rodney,
Ahmad Cheikh Moussa schrieb:
Looks like:
CSCsi93916
Externally found severe defect: Open (O)
Alignment Error/ Traceback with IP NAT.
that isn't fixed yet.
The bug is fixed, but I can not find the IOS to download.
Fixed-In
12.4(19.8)T
Where can I download it ?
Regards,
Troy Beisigl ha scritto:
Mar 8 08:19:51: %FIB-2-FIBDOWN: CEF has been disabled due to a low memory
condition.
It can be re-enabled by configuring ip cef [distributed]
What about sh ip cef summ ?
Hi,
Gianluca
___
cisco-nsp mailing list
Hi Richard,
[snip default-originate]
I've had this happen on many different versions of SRA, SRB,
and SRC, and I've heard reports of similar from several other
people. According to release notes its been fixed a few
times, but it seems to keep coming back. :)
Yeah, I have seen at least one bug
It was just fixed.
You will have to wait for a CCO image to pick it up.
Rodney
On Tue, Mar 11, 2008 at 09:00:13AM +0100, Ahmad Cheikh Moussa wrote:
Hi Rodney,
Ahmad Cheikh Moussa schrieb:
Looks like:
CSCsi93916
Externally found severe defect: Open (O)
Alignment Error/ Traceback
http://www.techworld.com/security/news/index.cfm?RSSNewsID=11665
Following the lead of Microsoft and Oracle, Cisco Systems will start
releasing security patches for some of its products on a schedule.
...
The first of these scheduled updates will occur on Wednesday, 26 March,
and Cisco will
Hi!
Does anybody know when 12.2(33)SXH2 is due?
I'd like to test upgrade procedures in the lab, but unfortunatly I
only have 12.2(33)SXH1 to play with. The plain 12.2(33)SXH release is
unusable..
Thanks
/Fredrik
___
cisco-nsp mailing list
At 08:43 AM 3/11/2008, you wrote:
http://www.techworld.com/security/news/index.cfm?RSSNewsID=11665
Following the lead of Microsoft and Oracle, Cisco Systems will
start releasing security patches for some of its products on a schedule.
...
The first of these scheduled updates will occur on
So we need to wait 6 months for security patches if an exploit which
may affect us is discovered on the fourth Thursday of September?
That's crazy! Let Enterprise customers wait if they want, I want my
security patches ASAP so we can test them for a few days then deploy
network wide. Does
Jason Gurtz wrote:
So we need to wait 6 months for security patches if an exploit which
may affect us is discovered on the fourth Thursday of September?
That's crazy! Let Enterprise customers wait if they want, I want my
security patches ASAP so we can test them for a few days then deploy
On Tue, Mar 11, 2008 at 1:41 PM, Fredrik Jacobsson
[EMAIL PROTECTED] wrote:
I'd like to test upgrade procedures in the lab, but unfortunatly I
only have 12.2(33)SXH1 to play with. The plain 12.2(33)SXH release is
unusable..
And what is wrong with SXH1 ? We're using this release now days
Robert Hass wrote:
On Tue, Mar 11, 2008 at 1:41 PM, Fredrik Jacobsson
[EMAIL PROTECTED] wrote:
I'd like to test upgrade procedures in the lab, but unfortunatly I
only have 12.2(33)SXH1 to play with. The plain 12.2(33)SXH release is
unusable..
And what is wrong with SXH1 ? We're using
Thanks for pointing out the obvious :)
Cheers.
/Fredrik
2008/3/11, Phil Mayers [EMAIL PROTECTED]:
Robert Hass wrote:
On Tue, Mar 11, 2008 at 1:41 PM, Fredrik Jacobsson
[EMAIL PROTECTED] wrote:
I'd like to test upgrade procedures in the lab, but unfortunatly I
only have 12.2(33)SXH1
Hi
We'd like to check our Control Planes resistance to DDoS attacks.
We mainly want to check this on our 7200VXRs, 6500 and 7600 where
CoPP is deployed.
Is any good tool to simulate DDoS network ? We have few test servers
which can be used as 'enemies'. Tool can be for Windows/Linux/*BSD or
even
Actually, I know who did this and they're on the list
last I knew, so there is a chance for your feedback to be read.
Hey that's great. :)
I think it's a challenge coming with any system that is
perfect. The issue here is balance. This strikes a balance in
favor of expecting a
Jason Gurtz wrote:
I think it's a challenge coming with any system that is
perfect. The issue here is balance. This strikes a balance in
favor of expecting a level of uptime from your ISPs. If they
were rebooting once a month you might not be very happy.
As another person noted,
Ian MacKinnon wrote:
Pete Templin wrote:
Think of this at a higher level: you have to patch, so now you get to
plan your maintenance windows.
not getting at you here Pete, but why do you have to patch?
Cisco release software all the time that fixes bugs (and introduces new
features),
On Tue, 2008-03-11 at 00:01 +, tt tt wrote:
Having run out of steam on the 7206xr + NPE-G1/G2 platform and an
increasing requirement for Gig ports we are looking at upgrading to
7600'/RSP720-3CXL or SUP720-3BXL. We don't have any immediate
requirements for MPLS so I would like to avoid
Hi Guys,
I have installed Cisco 3845 in network for termination of some
WIRELESS(P2P)/Ethernet customers. I am running Cisco IOS
(C3845-ADVIPSERVICESK9-M), Version 12.3(14)T7, RELEASE SOFTWARE (fc2) in
router. In Cisco 3845 I have installed one NME-X-23ES-1G-P: in slot 4 and
one NME-16ES-1G-P
Hello all,
I have been looking to purchase a ME-3400-24TS-A. I usually purchase my
equipment from CDW; however, I tried placing an order with them for this
item, but they don't have one in stock. It would be a drop ship direct from
cisco, but they said they checked with cisco and it wouldn't be
Greetings,
We have a few 7206's running OSPF/BGP for routing. All of the routers
are fine except for one - I noticed a few times in the past week where
OSPF/BGP flapped and came back right away.
I checked CPU and noticed it peaked in the past hour but that doesn't
really correlate to the
Hello Folks -
Clay Kossmeyer here from the Cisco PSIRT.
I can see there's a lot of interest around the changes in our
vulnerability disclosure policy, and I'd like to direct you to the
following section of the announcement that can be found here on
Cisco's website:
Does anybody know the steps required to get an MLPPP bundle running
between a Cisco (2600) and a Tasman router? I added the two Tasman T1's
to the bundle and created the multilink interface on the Cisco (I have
probably 10 other mlppp bundles working with cisco-cisco and they work
fine). The
Hi,
Please could I get the confirmation of your collective experience?
We have a group of three older Catalysts at a customer site that
apparently reboot all together (within a second) and for no reason every
10-15 days or so.
On each switch, for show version it shows:
System returned to
At 11:14 PM 3/6/2008 +0800, Edwin Lok wrote:
Hi Tim,
How about the egress policing on a 7600-SIP-400 and SPA-2X1GE-V2 combo?
Ingress and Egress policing on FlexWAN, Enhanced
FlexWAN, 7600-SIP-200, and 7600-SIP-400 is
performed the line card by the processors of vary
types (CPU/NPU depends on
On Wed, Mar 05, 2008 at 10:21:54AM -0500, Justin M. Streiner wrote:
I don't know if it's an absolute requirement anymore, but I still do it
because it's a good idea. I'd think if the router is doing forwarding
and ACL processing in software, tuning your ACLs is still a very good
idea.
Doesn't seem like it could be anything else. I'd throw a decent UPS on
one of the 3 switches, see if that one stays up while the other 2 go
down. If it's an intelligent UPS, it can probably log and maybe you'll
see exactly what happened (total outage, voltage sag, power surge, etc).
Chuck
By not making the update available until the 6 month mark has been met,
service providers are not able to choose their own update cycle. Rather, by
restricting the updates to every 6 months, Cisco has reduced the update
cycle to, at most, once every 6 months. So this reduces flexibility for the
From what I hear, Cisco will still be releasing bug fixes as they are
fixed, and security vulnerabilities are still tracked as bugs, though
they may not be explicitly called out as Vulnerabilities. You might want
to consider utilizing modular IOS and rolling in bug fixes regularly.
Chances
Hi.
Two tools you should definately check out if you haven't already are Hping
and yersinia. Hping is a tool for crafting packets, you specify TCP or UDP
and port number etc and how often you want to send packets, good for testing
ACL's and CoPP-policies. Yersinia is a tool for flooding CDP and
30 matches
Mail list logo