[c-nsp] Cisco 6509 MSFC boot problem..

2011-08-05 Thread Ambedkar Podeti
Hi, i am having cisco 6509 switch with MFSC card. When i am manually restarting the switch, the boot variable and boot loader of the MSFC card entries are missing and it is going to ROMMON mode. We have to give BOOT command everytime. I have configured the boot variable and bood loader entries in

Re: [c-nsp] Cisco 6509 MSFC boot problem..

2011-08-05 Thread Peter Rathlev
On Fri, 2011-08-05 at 14:43 +0530, Ambedkar Podeti wrote: When i am manually restarting the switch, the boot variable and boot loader of the MSFC card entries are missing and it is going to ROMMON mode. We have to give BOOT command everytime. ... RSM_6509_1#sh boot BOOT variable =

Re: [c-nsp] prefixes in AS-Set

2011-08-05 Thread Gert Doering
Hi, On Fri, Aug 05, 2011 at 02:53:21AM +0300, Martin T wrote: why would one like to limit(maximum-prefix) ingress prefixes from IPX? Because you really don't want to receive leaked full-tables from your peers. Mistakes happen, and your customers will not like it if you route all of the

[c-nsp] Nexus 5K optimisation for iSCSI traffic

2011-08-05 Thread Matthew Melbourne
Hi, We're implementing two pairs of N5Ks (and downstream N2k FEXes) to act as separate iSCSI SAN fabrics, with SAN heads attached directly to N5Ks and host ports (and downstream integrated blade switches) connecting to the FEXes. Does anyone have any real-world experience of using N5Ks for a

Re: [c-nsp] Cisco 6509 MSFC boot problem..

2011-08-05 Thread Matti Saarinen
Ambedkar Podeti wrote: i am having cisco 6509 switch with MFSC card. When i am manually restarting the switch, the boot variable and boot loader of the MSFC card entries are missing and it is going to ROMMON mode. We have to give BOOT command everytime. RSM_6509_1#sh boot BOOT variable =

Re: [c-nsp] Cisco 6509 MSFC boot problem..

2011-08-05 Thread Ambedkar Podeti
Hi peter, The command remote command switch show boot is not working on this platform. Thanks, Ambi On Fri, Aug 5, 2011 at 2:43 PM, Ambedkar Podeti p.ambed...@gmail.comwrote: Hi, i am having cisco 6509 switch with MFSC card. When i am manually restarting the switch, the boot variable and

Re: [c-nsp] Cisco 6509 MSFC boot problem..

2011-08-05 Thread Matti Saarinen
Ambedkar Podeti wrote: RSM_6509_1#sh boot BOOT variable = bootflash:c6msfc2-jsv-mz.121-19.E1.bin,12 CONFIG_FILE variable does not exist BOOTLDR variable = bootflash:c6msfc2-jsv-mz.121-19.E1.bin Configuration register is 0x2102 It appears you're running your sup2/msfc2 on hybrid mode.

Re: [c-nsp] Nexus 5K optimisation for iSCSI traffic

2011-08-05 Thread John Gill
Matthew, When you say a large deployment, can you describe the number of FEXes and hosts? Which model of FEX? What speed are your heads, how many connections? What speed are your hosts, how many connections? Mostly reading, writing, random? You can increase the buffer size available per port

Re: [c-nsp] Nexus 5K optimisation for iSCSI traffic

2011-08-05 Thread Brad Hedlund (brhedlun)
Note that the FEX will disable any port that receives a BPDU, by design in hardware. You will need to disable STP on the blade-switch-to-FEX links for this to work. If it's Cisco blade switches you can use Flex Links. Cheers, Brad http://bradhedlund.com Sent from my iPad (please excuse

Re: [c-nsp] Nexus 5K optimisation for iSCSI traffic

2011-08-05 Thread Matthew Melbourne
Thanks for that - that's another issue we've encountered. I am hoping we can implement bpdufilter on the FEX ports (as well as disabling STP on downstream switches). On 5 August 2011 14:12, Brad Hedlund (brhedlun) brhed...@cisco.com wrote: Note that the FEX will disable any port that receives a

Re: [c-nsp] Nexus 5K optimisation for iSCSI traffic

2011-08-05 Thread John Gill
It would be filter toward the FEX ports on your blade switches, but not on the FEX ports themselves. Whether you turn STP off or not on the blades, the FEX doesn't know. Just remembering if you create a loop, you no longer have the protection of STP; you are intentionally tricking the FEX into

Re: [c-nsp] Nexus 5K optimisation for iSCSI traffic

2011-08-05 Thread Matthew Melbourne
Can P prevent a FEX port being disabled by implementing bpdufilter, or do we need to ensure that BPDUs aren't receiving on FEX ports? We were hoping to use LACP between the downstream switch and the FEXes as a poor-man's loop prevention mechanism. Cheers, Matt On 5 August 2011 15:17, John Gill

Re: [c-nsp] Nexus 5K optimisation for iSCSI traffic

2011-08-05 Thread Matthew Melbourne
Around 8 heads, each with 4x10G connections, and then 10G connections to downstream integrated blade centre switches where the hosts reside. A handful of hosts will have 1G connections (landing on the FEXes) The heads will be distributed across four 5548P, and the hosts/blade centres and

[c-nsp] Black Hat: Routers using OSPF open to attacks

2011-08-05 Thread arulgobinath emmanuel
anybody actually know what is this presentation about ?? or is it the same well known attack ? http://www.blackhat.com/html/bh-us-11/bh-us-11-briefings.html#Nakibly http://www.networkworld.com/news/2011/080411-blackhat-ospf-vulnerability.html thanks, Gobinath.

Re: [c-nsp] Nexus 5K optimisation for iSCSI traffic

2011-08-05 Thread Brad Hedlund (brhedlun)
No. The FEX has BPDU Guard logic running in hardware. The moment a BPDU is received on the port it will be disabled. On the blade switches you can implement: 1) Flex Links (safe) 2) Egress BPDU filter (risky) 3) Disable STP (dangerous) For #2 and #3, a misconfigured or missing LACP config can

Re: [c-nsp] Black Hat: Routers using OSPF open to attacks

2011-08-05 Thread arulgobinath emmanuel
this is may be their research summary assumption. Our only assumption is that we have* full control over a single OSPF router *. From there, we have to cause maximum damage to the AS. Therefore, overcoming OSPF Authentication Protection is trivial, since* the authentication key is known* to us.

Re: [c-nsp] Black Hat: Routers using OSPF open to attacks

2011-08-05 Thread Mikkel Markussen
As far as I can gather, it boils down to if you have the authentication phrase, you can do really bad things. Truly eye-opening. - Mikkel On Fri, 05 Aug 2011 12:30:23 -0400, arulgobinath emmanuel arulg...@gmail.com wrote: anybody actually know what is this presentation about ?? or is

Re: [c-nsp] Question on ISIS Cisco

2011-08-05 Thread Mark Tinka
On Friday, August 05, 2011 01:47:24 AM Jay Ford wrote: Note that metrics can be ( perhaps must be) configured distinctly for IPv4 IPv6. Yes, they have to be in IOS (and Junos too, including other vendors I'm sure). Mark. signature.asc Description: This is a digitally signed message part.

Re: [c-nsp] Best Practices for connecting MPLS core to Internet?

2011-08-05 Thread Mark Tinka
On Friday, August 05, 2011 03:11:15 AM Ross Halliday wrote: Does this all sound right to you folks? Am I completely insane? Should I even bother hiding the private AS number? I think this will accomplish my goal but I'd like to hear what other people are doing. Most of this stuff I've

[c-nsp] EIGRP metrics on ASA 8.4

2011-08-05 Thread Leonardo Gama Souza
Hi. I have two 2911 routers running 15.0(1)M4 in a redundant topology connected to an ASA 5520 firewall running 8.4 version. All gears are running EIGRP. In order to distribute the incoming traffic between the two 2911 routers, I am using 'offset-list out' on them, but in the ASA's routing table

[c-nsp] Covad DSL Partners out there?

2011-08-05 Thread Mike Dye
Sorry to post if this is the wrong place, but I figured it would give me the best shot to reach the intended audience. I am hoping to find some small ISP's who are partnered with Covad providing DSL service (both via ATM DS3/OC3 the new gigabit vlan handoff setup) that would have some time to