Re: [c-nsp] 7609 ES+, WS marking behaviour

2014-04-09 Thread Victor Lyapunov
Hello Tony and thank you for the input Unfortunately I can not get rid of the Port-Channel in my setup, byt still performed the test with: physical-interface: GigE interface / switchport Logical-interface: SVI And got the same results though. I can not though understand the behaviour of ES+

Re: [c-nsp] 7609 ES+, WS marking behaviour

2014-04-09 Thread Velimir Filipov
Hello. Is it possible, that the device connected to your WS card interfaces is not trusting the CoS, but only the DSCP ? So in fact your 7609 is correctly marking the CoS, but the next device unmark it. Consider applying mls qos trust cos on it. Also where exactly do you sniff the packets to

Re: [c-nsp] 7609 ES+, WS marking behaviour

2014-04-09 Thread Thomas Sillaber
Hi Victor, the ES+ does not use pfc qos (mls qos commands). Qos in handled locally on the lc. Per Default without marking configuration the ES+ should act in trust dscp mode. The ingress ES+ should set dbus-cos to inform pfc about cos values. Without ingress COS in case of routed interface you

Re: [c-nsp] Quick questions regarding CVR-X2-SFP10G on 6500

2014-04-09 Thread Drew Weaver
It would be super useful if Cisco could just copy/paste whatever is in SXJ that makes them ‘supported’ into SXI then. =) -Drew From: Phil Mayers [mailto:p.may...@imperial.ac.uk] Sent: Tuesday, April 08, 2014 6:11 PM To: Drew Weaver; 'cisco-nsp@puck.nether.net' Subject: Re: [c-nsp] Quick

[c-nsp] Cisco Security Advisory: Multiple Vulnerabilities in Cisco ASA Software

2014-04-09 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Multiple Vulnerabilities in Cisco ASA Software Advisory ID: cisco-sa-20140409-asa Revision 1.0 For Public Release 2014 April 9 16:00 UTC (GMT) Summary === Cisco Adaptive Security Appliance (ASA) Software is affected by the following