[c-nsp] [IOS XR] export to default-vrf

2013-11-14 Thread Catalin Petrescu
Hi all, Did anyone get this to work on XR 4.3.2. vrf TEST address-family ipv4 unicast export to default-vrf route-policy default_policy_pass_all route-policy default_policy_pass_all pass end-policy router bgp vrf TEST rd 1:1 address-family ipv4 unicast redistribute connected

Re: [c-nsp] [IOS XR] export to default-vrf

2013-11-14 Thread Oliver Boehmer (oboehmer)
Hi all, Did anyone get this to work on XR 4.3.2. vrf TEST address-family ipv4 unicast export to default-vrf route-policy default_policy_pass_all route-policy default_policy_pass_all pass end-policy [...] RP/0/RSP1/CPU0:#sh route vrf TEST B99.99.99.1/32 [200/10] via 11.11.11.11

Re: [c-nsp] 7600 10GE card recommendations (1 2 port cards)

2013-11-14 Thread James Bensley
Hi Nick, Many thanks for the info, that is very useful :) I shall continue to research and include the Ws-X7604-10GE. Kind regards, James. ___ cisco-nsp mailing list cisco-nsp@puck.nether.net https://puck.nether.net/mailman/listinfo/cisco-nsp archive

Re: [c-nsp] [IOS XR] export to default-vrf

2013-11-14 Thread Catalin Petrescu
hi Oliver, In this case it's a iBGP route but i've tested with connected static and ospf and it's the same. vrf RO_CASA address-family ipv4 unicast import route-target 1:1 ! export to default-vrf route-policy default_policy_pass_all export route-target 1:1 ! RP/0/RSP1/CPU0:#sh

Re: [c-nsp] Effect of simultaneous TCP sessions on bandwidth

2013-11-14 Thread Tom Storey
So if I understand this correctly, with two tests running, each test only manages about 50% of the bandwidth of the link? Are these tests sending data in only one direction, or both? If they are sending data in both directions, would it not make sense that each can only use about half the link?

Re: [c-nsp] How to prevent https facebook from the cisco router 1841

2013-11-14 Thread A . L . M . Buxey
Hi, i need to prevent users to open Facebook https traffic from my router cisco 1841 you will need to invest in other technology that can achieve this...and wonder why you dont get the best people working for your company. blocking facebook isnt a technical issue...its a human resource

Re: [c-nsp] How to prevent https facebook from the cisco router 1841

2013-11-14 Thread Doug McIntyre
On Thu, Nov 14, 2013 at 01:43:33PM +, a.l.m.bu...@lboro.ac.uk wrote: i need to prevent users to open Facebook https traffic from my router cisco 1841 you will need to invest in other technology that can achieve this... I agree about the technology part. Run a box built to do this sort

Re: [c-nsp] [IOS XR] export to default-vrf

2013-11-14 Thread Catalin Petrescu
Thx Oliver . router bgp xx address-family ipv4 unicast this was missing vrf TEST address-family ipv4 unicast redistribute connected metric 10 redistribute static metric 10 as the leak route is know via bgp ( in default vrf) and not connected/static ( as in vrf ) Regards, Catalin

Re: [c-nsp] nexus-switche issues no arp-requests

2013-11-14 Thread Oswald, Thomas
fuck! The faulty behavior disappears. Just rebooting the nexus-switch. Two days to view a lots of logg-messages, error discovery, tests... For what? For nothing. And now I'm not absolutely sure that the fault will not raise up again. That does not inspire me with confidence. ^^°-°^^

Re: [c-nsp] How to prevent https facebook from the cisco router 1841

2013-11-14 Thread Ge Moua
+1 dansguardian Regards, Ge Moua moua0...@umn.edu University of Minnesota Alumnus -- On 11/13/13, 9:58 PM, mohamed nagy wrote: archive athttp://puck.nether.net/pipermail/cisco-nsp/ ___ cisco-nsp mailing list cisco-nsp@puck.nether.net

Re: [c-nsp] [IOS XR] export to default-vrf

2013-11-14 Thread Oliver Boehmer (oboehmer)
Thx Oliver . router bgp xx address-family ipv4 unicast this was missing vrf TEST address-family ipv4 unicast redistribute connected metric 10 redistribute static metric 10 as the leak route is know via bgp ( in default vrf) and not connected/static ( as in vrf ) yes, this is

Re: [c-nsp] How to prevent https facebook from the cisco router 1841

2013-11-14 Thread Ge Moua
+1 dansguardian Regards, Ge Moua moua0...@umn.edu University of Minnesota Alumnus -- On 11/13/13, 9:58 PM, mohamed nagy wrote: Hello , i need to prevent users to open Facebook https traffic from my router cisco 1841 i can put it as ip but is there any thing else because the ip way not

Re: [c-nsp] How to prevent https facebook from the cisco router 1841

2013-11-14 Thread Pablo Lucena
You can do something like this on a 1841: class-map match-any BLOCKED-WEBSITES match access-group name BLOCKED-WEBSITES-ACL match protocol http host *facebook* policy-map BLOCK_WEB class BLOCKED-WEBSITES drop int f0/0 service-policy input BLOCK_WEB The ACL can also be used to match on

Re: [c-nsp] How to prevent https facebook from the cisco router 1841

2013-11-14 Thread Scott Granados
Another +1 Open DNS is a great work around and allows for easy management in the event you wish to block further sites. On Nov 14, 2013, at 10:40 AM, Pablo Lucena pluc...@coopergeneral.com wrote: You can do something like this on a 1841: class-map match-any BLOCKED-WEBSITES match

Re: [c-nsp] How to prevent https facebook from the cisco router 1841

2013-11-14 Thread Pablo Lucena
Right, if you read my first response it says that it will *NOT *work for HTTPS. It will work however for HTTP traffic. I've tested it and it does work. On Thu, Nov 14, 2013 at 10:59 AM, Hari bamsha Sapkota sapkota.hari...@gmail.com wrote: Hi Pablo, The first option won't work for the HTTPs.

Re: [c-nsp] ME3600 BFD session to A9K breaks after upgrade to 15.3(3)S1a

2013-11-14 Thread Jason Lixfeld
Hi all, I got an answer on this and thought I'd share. It bit me in the ass and I'd hate for it to bite anyone else. The root cause was due to a fix implemented in 15.3(3)S1a for CSCtl54835. Essentially, the CLNS mtu is now properly calculated from the L3 interface MTU whereas before, the

Re: [c-nsp] How to prevent https facebook from the cisco router 1841

2013-11-14 Thread Pierre Emeriaud
i need to prevent users to open Facebook https traffic from my router cisco 1841 i can put it as ip but is there any thing else because the ip way not efficient What about null-routing all advertised prefixes (32) from Facebook AS? $ whois -h asn.shadowserver.org prefix 32934 | awk -F

Re: [c-nsp] How to prevent https facebook from the cisco router 1841

2013-11-14 Thread Hari bamsha Sapkota
Hi Pablo, The first option won't work for the HTTPs. Correct me if i'm wrong :) I had tried for the second option before some months ago but I couldn't accomplish it by blocking the IP found by nslookup since there are lots of addresses for the site like Facebook its not scalable as well. If

[c-nsp] IPv6 filters

2013-11-14 Thread Scott Voll
New to IPv6 so sorry if this is a very basic question: I currently am dual homed with ipv4 I'm currently using a filter list: ip as-path access-list 1 permit ^$ ip as-path access-list 1 deny .* to make sure I'm not a transit provider. in my googleing around I'm not seeing that done in IPv6

Re: [c-nsp] IPv6 filters

2013-11-14 Thread Nick Hilliard
On 14/11/2013 15:58, Scott Voll wrote: in my googleing around I'm not seeing that done in IPv6 You shouldn't use them for ipv4 either. You should use ip prefix lists (or non regexp-based bgp communities if your bgp policy is anything more than trivially complicated) for controlling prefix

Re: [c-nsp] How to prevent https facebook from the cisco router 1841

2013-11-14 Thread Matthew Huff
How about setting up a squid proxy for http and https and disallow all port 80/443 traffic except via the proxy. In the proxy, you can control exactly what websites are accessible then. On 11/14/13 12:45 PM, Pierre Emeriaud petrus...@gmail.com wrote: i need to prevent users to open Facebook

Re: [c-nsp] IPv6 filters

2013-11-14 Thread Gert Doering
Hi, On Thu, Nov 14, 2013 at 07:58:26AM -0800, Scott Voll wrote: I'm currently using a filter list: ip as-path access-list 1 permit ^$ ip as-path access-list 1 deny .* to make sure I'm not a transit provider. in my googleing around I'm not seeing that done in IPv6 Besides the CPU

Re: [c-nsp] ME3600 BFD session to A9K breaks after upgrade to 15.3(3)S1a

2013-11-14 Thread Pshem Kowalczyk
I can't check right now but what are the defaults for ISIS hello padding on ME3600x? kind regards Pshem On 15 November 2013 06:39, Jason Lixfeld ja...@lixfeld.ca wrote: Hi all, I got an answer on this and thought I'd share. It bit me in the ass and I'd hate for it to bite anyone else.

Re: [c-nsp] ME3600 BFD session to A9K breaks after upgrade to 15.3(3)S1a

2013-11-14 Thread Jason Lixfeld
Docs seem to indicate that it's still enabled by default, padded all the way up to the full MTU size. On Nov 14, 2013, at 6:51 PM, Pshem Kowalczyk pshe...@gmail.com wrote: I can't check right now but what are the defaults for ISIS hello padding on ME3600x? kind regards Pshem On 15

Re: [c-nsp] ACS 5.4 UCP - where does it listen?

2013-11-14 Thread Javier Henderson (javier)
On Nov 13, 2013, at 9:15 AM, Pierfrancesco Caci p...@caci.it wrote: Hi, I have an ACS 5.4 with two interfaces, one where we get the tacacs queries, and one for management. Trying to get UCP (using the java thingie) to work, I can't figure which of the two interfaces it's listening on, and

[c-nsp] Static Default route missing

2013-11-14 Thread Methsri Wickramarathna
Hi all, Yesterday we had a strange behavior on one of our Cisco 1841 router. Which was suddenly unreachable and after when we troubleshoot the issue and found out router has missing it's default-route. Initially we thought that someone may accidentally removed it. TAC logs enabled on router so I

Re: [c-nsp] IPv6 filters

2013-11-14 Thread Mikael Abrahamsson
On Thu, 14 Nov 2013, Gert Doering wrote: Easier on CPU load but more maintenance if prefixes keep being added is to filter by prefix-list... so it depends a bit on how fast your router's CPU is, how often prefixes change, etc. Just using prefix-lists has drawbacks as well, since customers