Turns out we had a bad backplane ... ended up replacing the chassis. All
the LCs were fine.
Thanks to everyone who responded on- and off-list!
On 6/5/23 16:34, Tom Hill wrote:
On 2023-06-01 21:38, Bryan Holloway via cisco-nsp wrote:
https://community.cisco.com/t5/xr-os-and-platforms
https://community.cisco.com/t5/xr-os-and-platforms/problems-with-a99-8x100ge-tr-and-ios-xr-6-5-3/td-p/4013668
Curious to hear from the community if anyone else has run into this
(aside from the obvious post above.)
A few months ago, we had an odd incident where one of our NPs lost its
mind.
On 4/3/22 9:04 PM, Mark Tinka wrote:
On 4/3/22 20:30, Gert Doering wrote:
Netflow is sort of semi-supported, if I remember right - by using
the SPAN feature of the chip to siphon traffic off to the CPU, and
do netflow there, capped to 1GE of traffic. Or something like that.
Did not try
That to me smells like a change in your config-register.
Not saying I know how it changed or why, but that is one of the bits.
(0x0400, if I recall correctly.)
On 5/16/21 3:27 PM, Shawn L wrote:
As strange as the ASR920 routers can behave at times, I've never seen this
one before.
On 3/15/21 7:18 AM, Dobbins, Roland wrote:
On Mar 14, 2021, at 14:10, h...@interall.co.il wrote:
We are trying to implement tcp intercept on some brand new ASR1009x running
IOS-XE 16.12.5 yet nothing is seen (sometimes).
TCP Intercept is a self-DoS waiting to happen. Strongly suggest not
Hello all ...
I have a strange routing issue involving a PW-Ether interface on an
ASR9001 which I cannot seem to get my head around.
Feel like I'm missing something really stupid, but, here goes:
Had an EoMPLS tunnel between a content-provider and some gear that they
wished to manage on our
Don't get me started on ASR920 serial management ...
On 2/24/21 7:48 PM, joe mcguckin wrote:
I refuse to buy in to ’Smart Licensing’ and ‘Port Licensing’. So far, we have
been able to avoid buying
from vendors who practice such anti-customer policies.
I refuse to buy products with licensing
Have you updated your 'control-plane' config to allow SNMP from your
sources?
On 11/9/20 9:18 AM, Olivier CALVANO wrote:
Hi
I can't get the snmp to work on my cisco ASR9000 to monitor it with
Centreon.
i use this configuration:
snmp-server ifindex persist
snmp-server trap-source Loopback0
If anyone cares, I figured it out.
In short, I was overthinking the problem and came to the anti-climactic
conclusion that you can import/export whatever the hell you want as long
as it's in the RIB. I was under the incorrect assumption that the prefix
being imported/exported had to be in BGP
On 1/3/20 8:07 PM, Bryan Holloway wrote:
On 1/3/20 7:18 PM, adamv0...@netconsultings.com wrote:
From: Bryan Holloway
Sent: Friday, January 3, 2020 4:56 PM
On 1/3/20 5:09 PM, adamv0...@netconsultings.com wrote:
From: cisco-nsp On Behalf Of
Bryan
Sent: Friday, January 3, 2020 2:37 PM
On 1/3/20 7:18 PM, adamv0...@netconsultings.com wrote:
From: Bryan Holloway
Sent: Friday, January 3, 2020 4:56 PM
On 1/3/20 5:09 PM, adamv0...@netconsultings.com wrote:
From: cisco-nsp On Behalf Of
Bryan
Sent: Friday, January 3, 2020 2:37 PM
I've been attempting to lab up an ASR9001
On 1/3/20 5:09 PM, adamv0...@netconsultings.com wrote:
From: cisco-nsp On Behalf Of Bryan
Sent: Friday, January 3, 2020 2:37 PM
I've been attempting to lab up an ASR9001 running 5.3.4 for a PoC scenario
of
routing between two internal VRFs: "default" and "peering".
You can probably guess
I've been attempting to lab up an ASR9001 running 5.3.4 for a PoC
scenario of routing between two internal VRFs: "default" and "peering".
You can probably guess the use-case.
While I've been successful in getting each VRF to talk to the things
that particular VRF should talk to, getting the
On 12/12/19 4:15 PM, Saku Ytti wrote:
On Thu, 12 Dec 2019 at 17:10, Sebastian Becker wrote:
maybe because the 10k is taken by an actual series of routers from Juniper and
Cisco had a 10k already but this is retired:
On 6/27/19 2:40 PM, Mark Tinka wrote:
On 27/Jun/19 21:22, Aaron Gould wrote:
Why are we worried about XR boot times ?
RP/0/RSP0/CPU0:g-9k#sh ver | in "uptime|IOS"
Thu Jun 27 14:20:49.013 CDT
Cisco IOS XR Software, Version 4.1.2[Default]
g-9k uptime is 5 years, 14 weeks, 3 days, 12 hours,
On 5/15/19 4:53 AM, Erik Sundberg wrote:
Has anyone been able to install\copy software images from a USB key to a
ASR9906. It take for ever to copy files from a http server, I would like to try
from a USB key to see if it's faster.
The router never recognizes the usb key when it put into
On 2/8/19 1:57 PM, Gert Doering wrote:
Hi,
On Fri, Feb 08, 2019 at 01:38:12PM -0600, Bryan Holloway wrote:
Anyone aware of any issues with filtering destination UDP/0 at ingress
points on IOS XR?
We're running 5.3.4 SP8 and have telemetries to help us RTBH when the
need arises.
UDP/0
Anyone aware of any issues with filtering destination UDP/0 at ingress
points on IOS XR?
We're running 5.3.4 SP8 and have telemetries to help us RTBH when the
need arises.
UDP/0 is a well-known vector for this sort of attack. However, what I'm
seeing is that packets seem to be getting past
On 12/14/18 8:52 PM, Randy wrote:
...you mean a floating-static to Null0 with a distance of 254?; especially when
prefix-lengths are the same(what is in IGP and what is being advertised)so the
internet doesn't burble if your IGP does?
Yes, and yes ... and even if IGP and BGP for a given
I generally prefer to keep the Null0 even if there's a static or (IGP)
non-static as a matter of best-practice.
If your IGP burbles, then the rest of the Internet won't, leading to
faster recovery times.
Statics are inherently less prone to this, but having the Null0 pin-up
doesn't hurt
,
- bryan
On 11/13/18 2:29 PM, Bryan Holloway wrote:
Howdy all ...
Consider a Cisco 4900 with two L3-anchored VLANs in a GPON/FTTx-type
scenario: one for business customers, and one for residential.
Both VLANs have a unique local /64 for customer ONTs, but I also want to
do PD
Howdy all ...
Consider a Cisco 4900 with two L3-anchored VLANs in a GPON/FTTx-type
scenario: one for business customers, and one for residential.
Both VLANs have a unique local /64 for customer ONTs, but I also want to
do PD with /56s.
I learned quickly that the 4900 doesn't do DHCPv6
+1
I'd much rather rely on good ol' TFTP then Cisco's IOS stacking code,
especially in a time-crunch situation.
On 9/13/18 9:47 AM, Sean Granger wrote:
If your stack image is newer, auto-upgrade should take care of it for you.
If it fails, you can run a show switch, find your master and the
On 8/26/18 1:36 PM, Mark Tinka wrote:
On 26/Aug/18 18:47, John Osmon wrote:
I've got a 3560 switch in a lab situation that I'm looking for insight.
I have a virtualization host hung off of a trunking port. VMs on this
platform are able to communicate over any VLAN if I'm running a 12.2
Now that is a spicy meatball.
On 8/21/18 9:35 AM, Thomas Schmid wrote:
Hi,
to give you an update: TAC finally could reproduce the issue in the lab.
RIB/FIB sync is thwarted when there's a VSM module installed in the chassis
(which we have in all 9k chassis).
Let's see if they can fix it
On 8/10/18 4:35 AM, Thomas Schmid wrote:
Hi,
Am 03.08.2018 um 15:46 schrieb adamv0...@netconsultings.com:
giving it a second thought: this may help in some cases, in others not. E.g.
BGP link to upstream dies -> FIB is still pointing to upstream -> router is
still
announcing himself as exit
We ran into this on 3750Xs back in July.
Sometimes we saw this:
%PLATFORM-1-CRASHED: Debug Exception (Could be NULL pointer dereference)
Exception (0x2000)!
c.f.: https://lists.gt.net/cisco/nsp/197344
There are links to Cisco's "response" on the matter ...
On 3/16/18 2:27 PM, Nick Cutting
till work for you though
-Original Message-
From: cisco-nsp [mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of
Nick Cutting
Sent: Friday, December 15, 2017 7:29 AM
To: Bryan Holloway <br...@shout.net>; cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] Cisco 3750G backplane throughput
Hello community,
I'm curious if someone is in the know or can point me to a document that
describes how the backplane is carved up on a 3750G. I.e., ports per
ASIC, etc., if applicable. I've dug around the Cisco docs to no avail.
I'm particularly interested to know how the four-port SFP
I'd kill for a /2.
On 11/17/17 8:53 AM, Brett Frankenberger wrote:
On Thu, Nov 16, 2017 at 02:24:17PM +0100, Brian Turnbow wrote:
Hi,
Dears,
Anyone know what is wrong with the below range ?
Yep, host bits are set
You need to put in the network
X.X.X.80 is a valid network for a /28.
Thank you, everyone!
On 9/27/17 12:52 PM, Jim Glassford wrote:
On 9/27/2017 1:47 PM, Chris Russell wrote:
On 27/09/2017 16:44, Bryan Holloway wrote:
In case anyone's interested, this problem mysteriously stopped
occurring about two days after I first reported it to the list.
Curiously
in July,
and again the other day -- with similar symptoms, so I'm reasonably
certain that it's not just me.
I can also say with reasonable certainty that downgrading the firmware
from 15.2 to 15.0 seems to solve the issue.
Anyway, just an FYI for the list.
On 7/26/17 7:19 PM, Bryan Holloway
On 9/15/17 12:33 AM, Mikael Abrahamsson wrote:
On Thu, 14 Sep 2017, Harry Hambi - Atos wrote:
HI All,
Logged onto a ASR9k and trying to find commands to show me the
following :
BSR router
"show pim bsr", there are multiple commands under that.
Where pim is enabled.
"show pim interface"
I should add that these are genuine Cisco optics, and they work in other
modules within the same chassis.
On 9/6/17 6:07 PM, Bryan Holloway wrote:
Anyone have any experience using a WS-X6716-10GE-3C in a 7600 chassis?
The docs indicate that support was added in IOS 15.2(2)S ... we're
Anyone have any experience using a WS-X6716-10GE-3C in a 7600 chassis?
The docs indicate that support was added in IOS 15.2(2)S ... we're
running 15.5(3)S1.
Card boots fine, diagnostics pass, and interfaces appear in the config.
However, known working X2 GBICs we install show up as
After running fine for months or years, over the last 12-24 hours, we've
experienced spontaneous crashes of Cisco 3750Xs in multiple regions,
which suggests that perhaps there's some new type of traffic or exploit
that is causing this to occur.
We are running 15.2(4)4, the latest ...
Before
behind the /8.
I hope it made sense.
On Feb 2, 2017 9:33 PM, "Bryan Holloway" <br...@shout.net
<mailto:br...@shout.net>> wrote:
Fabio,
Thank you for the response! Yes -- that's exactly what I'm trying to
do. However, the problem is this:
If I use the &qu
Fabio,
Thank you for the response! Yes -- that's exactly what I'm trying to do.
However, the problem is this:
If I use the "summary-address" command, it not only masks it on the rest
of the backbone, it masks it on the ABR too. Consequently I have to add
a static route to the downstream
Hello everyone,
Wondering if anyone has an idea on how to resolve a summarization
conundrum I'm having.
Imagine an ABR bordering areas 0 and 1 which is summarizing 10.0.0.0/8
to the backbone.
Downstream is a router running OSPF with the ABR. On that router is a
static route to yet another
On 12/1/16 10:25 AM, Azher Mughal wrote:
On 12/1/2016 12:28 AM, Adrian Minta wrote:
Thanks Gert & Peter. I’m going to look into the 9001. We have a
bunch of Arista in the core doing ospf/ospfv3, the rep there
suggested their 7280SR, which is 48 SFP+, 6 QSFP, and they claim it’s
stable as a
40 matches
Mail list logo