Re: [c-nsp] 6500 IOS recommendation?

2013-10-23 Thread Vinny_Abello
Dell - Internal Use - Confidential I think I've encountered this exact problem or a similar problem as well on the 6500 on 12.2(33)SXJ5. Nothing was making sense to me as the preferred BGP next-hop wasn't being used until I refreshed the routes from the upstream peer. Then things became

[c-nsp] Sample config for C819 4g LTE Router

2013-10-23 Thread Alex D.
Hi, can anyone provide a sample config for a Cisco 819 LTE Router? I would like to connect to vodafone LTE in germany. We are using Vodafone 3G/UMTS/HSDPA since quite a while and it works like a charm. Now it try to configure my first 4g router and i miss the necessary PPP commands. Regards,

Re: [c-nsp] 6500 IOS recommendation?

2013-10-23 Thread Ross Halliday
A little word of advice for those that use BGP: Don't use 15.1(1)SY and 15.1(1)SY1. They have a nasty little BGP bug that can create black holes or loops for random prefixes due to stale RIB entries of withdrawals that are not processed correctly (CSCuh43027). Some withdrawn prefixes are

Re: [c-nsp] 6500 IOS recommendation?

2013-10-23 Thread Chris Welti
Hi Ross, We actively noticed the issue when our connection to the AMS-IX routeservers flapped. Roughly 65000 prefixes out of which around 3000 were not correctly removed. No idea if VPNv4 prefixes are also affected, but note that this only happens to withdrawn prefixes under certain conditions

[c-nsp] Cisco Security Advisory: Apache Struts 2 Command Execution Vulnerability in Multiple Cisco Products

2013-10-23 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Apache Struts 2 Command Execution Vulnerability in Multiple Cisco Products Advisory ID: cisco-sa-20131023-struts2 Revision 1.0 For Public Release 2013 October 23 16:00 UTC (GMT

[c-nsp] Cisco Security Advisory: Multiple Vulnerabilities in Cisco Identity Services Engine

2013-10-23 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Multiple Vulnerabilities in Cisco Identity Services Engine Advisory ID: cisco-sa-20131023-ise Revision 1.0 For Public Release 2013 October 23 16:00 UTC (GMT) == Summary

[c-nsp] Cisco Security Advisory: Cisco IOS XR Software Route Processor Denial of Service Vulnerability

2013-10-23 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Cisco IOS XR Software Route Processor Denial of Service Vulnerability Advisory ID: cisco-sa-20131023-iosxr Revision 1.0 For Public Release 2013 October 23 16:00 UTC (GMT

[c-nsp] 10Gig CWDM

2013-10-23 Thread Brian Turnbow
Hello Everyone, We are looking into upgrading some links actually on a cwdm run to 10Gig. After looking into DWDM equipment I was told to check into 10Gig CWDM plugs offered in sfp+ xenpak x2 xfp etc Such as the ones offered by smartoptics

Re: [c-nsp] 10Gig CWDM

2013-10-23 Thread Gustav UHLANDER
Hello. We are using third party X2 CWDM optics in almost all of our 6500s. Havent hit a snag yet. :) Bästa hälsningar / Best regards, Gustav Uhlander Senior Communication Infrastructure Engineer Steria AB Kungsbron 13 Box 169 SE-101 23 Stockholm Sweden Tel: +46 8 622 42 15 Fax: +46 8 622 42

Re: [c-nsp] 10Gig CWDM

2013-10-23 Thread Rolf Hanßen
Hello, we use a few noname China DWDM Xenpaks as well as SFP+ optics with Xenpak adapter since about 2 years now in 6704 cards. No outages or issues yet. But no idea if there is a difference to the Smartoptics or if DWDM/CWDM support differs. You should think about using SFP+ + adapter, I think

Re: [c-nsp] 10Gig CWDM

2013-10-23 Thread Lars Christensen
We've been using SmartOptics products for quite some time. Seems stable. /Lars Sendt fra min iPhone Den 23/10/2013 kl. 18.32 skrev Brian Turnbow b.turn...@twt.it: Hello Everyone, We are looking into upgrading some links actually on a cwdm run to 10Gig. After looking into DWDM equipment I

[c-nsp] maintaining 'interesting' traffic on a pvlan isolated port

2013-10-23 Thread Jason Lixfeld
Hi all, I'm using a combination of port security with static MAC addresses and private VLANs on a 4500 in a particular deployment scenario. Each customer facing port on the 4500 is a static mac, port security enabled private vlan trunk where all the secondary VLANs on this trunk are isolated