ost-specific route to the BGP session over the BGP session.
On Mon, 10 Jun 2024 at 11:09, Hank Nussbacher via cisco-nsp
wrote:
I have a simple iBGP peer defined as follows:
neighbor 128.139.197.146 remote-as 378 update-source Loopback0
address-family ipv4 unicast
I have a GigE interface defi
On 10/06/2024 11:05, Hank Nussbacher wrote:
Ignore. There was an ACL on GigabitEthernet0/0/0/43.1 that blocked the
traffic.
Nothing like solving your own issues.
-Hank
I have a simple iBGP peer defined as follows:
neighbor 128.139.197.146
remote-as 378
update-source Loopback0
I have a simple iBGP peer defined as follows:
neighbor 128.139.197.146
remote-as 378
update-source Loopback0
address-family ipv4 unicast
I have a GigE interface defined as:
interface GigabitEthernet0/0/0/43.1
ipv4 address 192.0.2.1 255.255.255.0
encapsulation dot1q 1
This iBGP peer
On 26/03/2024 17:29, Jon Lewis via cisco-nsp wrote:
Find out from Cisco where you can publish your geo-location data as per:
https://www.rfc-editor.org/rfc/rfc8805.html
If it is Google related, report the issue here:
https://support.google.com/websearch/workflow/9308722?hl=en
or define your
On 26/01/2024 15:49, Drew Weaver via cisco-nsp wrote:
Hello,
I just have a general gripe that I want to share regarding the ASR9902 and
since there is nobody to talk to at Cisco about any of this anymore, I figured
I would just share it here.
This is an acceptable configuration:
1x100GE,
On 21/12/2023 22:35, Shawn L via cisco-nsp wrote:
Running on IOS-XR 7.5.2
I get:
RP/0/RSP0/CPU0:GP1#license smart ?
deregister De-register Device from Cisco Cloud
mfg Factory license reservation feature
registerRegister Device With Cisco Cloud
renew Renewal Message to
On 20/12/2023 17:31, Drew Weaver via cisco-nsp wrote:
Only a week? I have found this list far more helpful than TAC, which
usually takes 2-3 weeks to request all the necessary logs, with commands
that don't work.
It used to be TAC was a main selling card of Cisco vs competitors. Not
any
On 05/12/2023 23:44, Gert Doering wrote:
D'Wayne Saunders already pointed at this most likely being fragments -
large packet reflections, and all non-initial fragments being reported by
IOS* as "port 0" (so you should see 1500 byte regular UDP as well, with
a non-0 port number)
IOS XR syntax
We encountered something strange. We run IOS-XR 7.5.2 on ASR9K platform.
Had a user under udp/0 attack. Tried to block it via standard ACL:
ipv4 access-list block-zero
20 deny udp any any eq 0
30 deny tcp any any eq 0
40 permit ipv4 any any
Applied to interface:
ipv4 access-group
On 02/10/2023 10:10, Dobbins, Roland wrote:
Ensure that the active flow timer is set to 60s, that the inactive flow
timer is set to 5s, and that the NetFlow capture/analysis system is
configured with those values.
For SNMP, ensure that the counter tabulation values are set to 60s/1m,
and
Running ASR9906 w/ IOS-XR version 7.5.2 and doing 1:15 Netflow export on
all interfaces (ingress only).
When comparing traffic stats with SNMP, Netflow stats always appear too
low (see attachment).
Opened a TAC case and their recommendation is to do 1:1 and I quote:
"Irrespective of the
[something screwy happened to my plaintext. Hopefully this is better]
I hope someone here has done this.
On IOS-XR I want the ability to filter certain IP ranges when doing a
Netflow export.
I have looked here:
I hope someone here has done this.
On IOS-XR I want the ability to filter certain IP ranges when doing a
Netflow export.
I have looked here:
On 23/02/2023 19:32, Mark Tinka via cisco-nsp wrote:
Cisco have lost the plot, IMHO. Every solution at every level of the
network is now a bulldozer searching for a tiny nail to hammer.
Mark.
So well said.
-Hank
___
cisco-nsp mailing list
On 23/02/2023 0:19, Eric Louie via cisco-nsp wrote:
Oh geez, I just realized I left a zero off the interface - we need 100G
interfaces both upstream (x1) and downstream (x2)
That probably changes the product choices a little bit.
Anyone with 100G Internet feeds want to let me know what you're
On 22/02/2023 20:25, zzif via cisco-nsp wrote:
22.2.2023, 5:31, Eric Louie via cisco-nsp wrote:
For a 10G (or maybe 2x10G) Cisco ASR1001-HX is adequate, rock solid and
relatively cheap. If you have more budget, need 100G etc. there are a
lot of other options too.
Br,
EA
A fully licensed
These days a lot of experience is getting lost, and the industry hasn’t found
a way to transfer that knowledge to new generations.
Cheers,
Sander
It makes me sadder that people in Cisco don't know how to spell "iput",
"recieved" or "byetes" and there is no QA using spellcheck:
rtr#sh
On 08/02/2023 15:27, Mark Tinka via cisco-nsp wrote:
On 2/8/23 10:23, Saku Ytti via cisco-nsp wrote:
Working would be much more pleasurable if half the
world's white collar workers wouldn't be unemployed plat card holders
and cruising without output, while looking down on people doing 3 jobs
We opened a case on Jan 22 (Case #694936467). Since then we have
exchanged countless email, countless logs and countless command output
captures.
On Jan 31 we requested transfer to a more senior IOS-XR team. The case
was transferred to Mexico TAC on Jan 31 and was assigned an engineer,
yet
For the past week we have exchanged countless emails, logs and command
outputs with Cisco TAC in regards to call-home not working on our IOS-XRs.
At one point Cisco TAC suggested CSCwd36654 but that didn't help. All
our IOS-XEs manage to call-home and register fine. What trick or tip can
you
<https://tools.cisco.com/its/service/oddce/services/DDCEService>
destination transport-method email disable
destination transport-method http
!
!
You also have some commands to test it and to to trace it
license smart renew auth
call-home test ...
Nitzan
On Mon, Jan 2, 2023 at 2:07 PM Hank Nu
When running call-home licensing we add on all our IOS XE routers:
http resolve-hostname ipv4-first
and that works.
But now that we have a new ASR9906, call-home is not working and the
above command is not valid.
What magic command do you use to get call-home to work on IOS XR?
Thanks,
On 20/09/2022 15:54, Simon Leinen wrote:
Gert Doering via cisco-nsp writes:
Hi,
On Mon, Sep 19, 2022 at 03:47:09PM +0300, Hank Nussbacher via cisco-nsp wrote:
On 19/09/2022 15:40, Gert Doering wrote:
https://www.cisco.com/c/dam/en/us/support/docs/csa/cisco-sa-20010227-ios-snmp-ilmi.html
On 19/09/2022 15:40, Gert Doering wrote:
HI,
On Mon, Sep 19, 2022 at 02:29:06PM +0300, Hank Nussbacher via cisco-nsp wrote:
Recently Shodan has been showing how it probes all our IOS-XE routers
via SNMP even though we have an ACL on all our SNMP. We then found that
there is a bugid
Recently Shodan has been showing how it probes all our IOS-XE routers
via SNMP even though we have an ACL on all our SNMP. We then found that
there is a bugid on the issue (ILMI can't be blocked by ACL):
CSCvs33325
As well as an internal TAC bugid:
CSCdp11863
Basically, none of the commands
I am looking for an IOS-XR command that can show me the total in+out b/w
across all physical interfaces.
Thanks,
Hank
___
cisco-nsp mailing list cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at
the bundle member in question
is delaying to go down for some reason?
On Thu, May 5, 2022, 11:07 Hank Nussbacher <mailto:h...@interall.co.il>> wrote:
I have 4 individual links defined as part of a Bundle-ether (IOS-XR
5.3.3 on ASR9010):
interface TenGigE0/2/0/1
bundle
I have 4 individual links defined as part of a Bundle-ether (IOS-XR
5.3.3 on ASR9010):
interface TenGigE0/2/0/1
bundle id 2 mode active
flow-control bidirectional
carrier-delay up 100 down 4000
! They are all part of a bundle...
interface Bundle-Ether2
mtu 9192
bundle minimum-active links
On 24/02/2022 16:35, Gert Doering wrote:
We ordered 2x 9906s last month w/ delivery in August.
Will let you know how that turns out.
-Hank
Hi,
On Thu, Feb 24, 2022 at 02:04:54PM +, Drew Weaver wrote:
Does anyone have any real world working experience with the ASR9902? Any
particular
Using just IOS-XR, is one able to filter out Netflow records (example)
based solely on IP address, so flows are not recorded if any record
starts with 192.168.*.* ? If not, is there an external box one can buy
that can do that?
Thanks,
Hank
___
ve kit that randomly stops calling in, and
generates angry messages in dashboards.
The sneaky alternative is that it's all honour based anyway (at least
for the range we are using). Just let it sit in eval mode and move on
with your life.
Regards,
Dave
On Wed, 24 Feb 2021 at 11:22, Hank Nuss
So we bought a bunch of ASR1009x along with IOS-XE and are encountering
the joy of Smart licensing.
Once we have our license established, do we need to leave the
"call-home" section?
To me it screams "security violation" and something I'd like to
permanently disable after getting the
On 28/01/2020 15:00, Hank Nussbacher wrote:
>/Has anyone ever seen any TCP performance issues (not UDP) between />/Juniper
and Cisco routers when running 3x 10Gb/sec via LACP? /
I think it may be prudent to expand on "what type" of performance issues
you see affecting TCP
Has anyone ever seen any TCP performance issues (not UDP) between
Juniper and Cisco routers when running 3x 10Gb/sec via LACP?
Thanks,
Hank
___
cisco-nsp mailing list cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive
As many of us run full routing tables on our ASR9000s, we have just
found popping up in our logs:
gp[1058]: %ROUTING-BGP-5-MAXPFX : No. of IPv4 Unicast prefixes received
from xxx.xxx.220.91 has reached 786433, max 1048576
Reference:
On 24/11/2016 16:33, James Bensley wrote:
> On 9 November 2016 at 21:24, Hank Nussbacher <h...@efes.iucc.ac.il> wrote:
>> We upgraded our AS9010 this morning from 5.1.3 to 5.3.3 and encountered
>> an issue with SPAN ports.
>>
>> Our SPAN port config looks like this
On 24/11/2016 16:33, James Bensley wrote:
> On 9 November 2016 at 21:24, Hank Nussbacher <h...@efes.iucc.ac.il> wrote:
>> We upgraded our AS9010 this morning from 5.1.3 to 5.3.3 and encountered
>> an issue with SPAN ports.
>>
>> Our SPAN port config looks like this
We upgraded our AS9010 this morning from 5.1.3 to 5.3.3 and encountered
an issue with SPAN ports.
Our SPAN port config looks like this:
monitor-session No1 ethernet
destination interface TenGigE0/1/1/4
!
monitor-session No2 ethernet
destination interface TenGigE0/1/1/5
!
interface
On 26/10/2016 15:26, Curtis Piehler wrote:
I have ASR1000s. But I need it on an ASR9000. :-(
-Hank
> You are better off buying an ASR1000. They are designed to do ipsec
> at near line rate
>
>
> On Oct 26, 2016 8:13 AM, "Hank Nussbacher" <h...@efes.iucc.ac.il
&g
I am following the IPsec example here:
http://www.cisco.com/c/en/us/support/docs/ip/generic-routing-encapsulation-gre/9221-quicktip.html
and have managed to alter the syntax to fit with IOS-XR but when I get
to crypto map commands:
*crypto map myvpn 10 ipsec-isakmp set peer 192.168.2.2 set
I am trying to debug a GRE tunnel issue on an ASR9000 running either
5.1.3 or 5.3.3 and both respond:
RP/0/RSP0/CPU0:petach-tikva-gp#debug tunnel
% Incomplete command.
RP/0/RSP0/CPU0:petach-tikva-gp#debug tunnel ?
ip GRE tunnel(cisco-support)
RP/0/RSP0/CPU0:petach-tikva-gp#debug tunnel ip
On 06/06/2016 15:14, Job Snijders wrote:
> Do you have urpf (loose) enabled?
Bingo!
Thanks,
Hank
>
> Job
>
> Original Message
> From: Hank Nussbacher
> Sent: maandag 6 juni 2016 14:10
> To: c-nsp
> Subject: [c-nsp] Bug in stat counters with VLANs?
>
>
Running IOS-XR v.5.1.3 on ASR9010 and the "show interface" stats for
sub-VLANs seems to be totally off:
TenGigE0/1/1/7 is up, line protocol is up
30 second input rate 6689925000 bits/sec, 738298 packets/sec
30 second output rate 1330888000 bits/sec, 396078 packets/sec
TenGigE0/1/1/7.333 is
We have encountered a bug on an ASR9010 running IOS-XR v5.1.3
where "show rpl unused" results in a few hits like these:
The following as-path-sets are UNUSED
--
aspath_191_p1_permit
The following community-sets are UNUSED
Can someone point me at the RFC and section that documents BGP
"maximum-path":
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_bgp/configuration/xe-3s/irg-xe-3s-book/ibgp_multipath_load_sharing.pdf
http://www.cisco.com/c/en/us/td/docs/ios/12_2sx/feature/guide/fsxeibmp.html
Or is this a
When doing a traceroute from a Cisco IOS, what is being done under the
hood so that sometimes I am able to see MPLS hops from within the
traceroute?
Thanks,
Hank
___
cisco-nsp mailing list cisco-nsp@puck.nether.net
is used by default, reply codes,
> differences between Linux/Windows/Cisco, etc.
>
> M.
>
> On 02/09/2016 07:26 PM, Hank Nussbacher wrote:
> > When doing a traceroute from a Cisco IOS, what is being done
> under the
> >
I am looking for a simple solution on IOS-XR where each and every pkt that
comes out of a specific interface (Gi0/1) would be auto-fwded into tunnel0
(uni-directional only). No routing decisions, no BGP lookup, no static
routing, no FIB, no RIB, just some sort of auto-fwd rule which would
about IOS-XR.
Chuck
-Original Message-
From: cisco-nsp [mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of Hank
Nussbacher
Sent: Monday, November 02, 2015 2:19 PM
To: cisco-nsp@puck.nether.net
Subject: [c-nsp] Pkt forwarding query
I am looking for a simple solution on IOS-XR where each
At 11:21 13/08/2015 -0400, Jared Mauch wrote:
On Thu, Aug 13, 2015 at 09:37:34AM -0400, Jared Mauch wrote:
Cisco really needs to implement a 'show config dead' or similar type
command that displays all these orphaned policies.
I have a hard enough time with cisco parsing their
Does anyone know of a Cisco IOS utility that can identify orphaned objects
like ACLs, route policies, prefix-lists, etc?
Thanks,
Hank
___
cisco-nsp mailing list cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at
Just to add to the info I see:
RP/0/RSP0/CPU0:GP1#show access-lists ipv4 catch hardware ingress location
0/1/cpu0
Thu Jul 16 10:03:09.876 IDT
ipv4 access-list catch
10 permit ipv4 host 111.107.97.111 any (next-hop: addr=128.139.217.4, vrf
name=default)
20 permit ipv4 any any (2379554149452
I am trying to implement ABF on a Cisco 9010 (v5.1.3):
http://www.cisco.com/c/en/us/td/docs/routers/asr9000/software/asr9k_r3-9-1/general/release/notes/rlse_a9k_392.html#wp433672
interface TenGigE0/1/1/7
ipv4 access-group catch ingress
RP/0/RSP0/CPU0:GP1#show ipv4 access-list catch
Wed Jul
At 09:10 16/07/2015 +0200, Gert Doering wrote:
Hi,
On Thu, Jul 16, 2015 at 10:06:02AM +0300, Hank Nussbacher wrote:
RP/0/RSP0/CPU0:GP1#show access-lists ipv4 catch hardware ingress location
0/1/cpu0
Thu Jul 16 10:03:09.876 IDT
ipv4 access-list catch
10 permit ipv4 host 111.107.97.111 any
cant provide more info.
Sent from a mobile device
On 15 May 2015, at 01:02, Alexandr Gurbo gu...@golas.ru wrote:
Hello,
Check you fiber connection.
On Thu, 14 May 2015 22:04:35 +0300
Hank Nussbacher h...@efes.iucc.ac.il wrote:
We have an ASR 9010 running IOS-XR v 5.1.3. We see a high
We have an ASR 9010 running IOS-XR v 5.1.3. We see a high level of input
discards:
TenGigE0/1/1/7 is up, line protocol is up
Interface state transitions: 25
Layer 1 Transport Mode is WAN
MTU 9028 bytes, BW 1000 Kbit (Max: 1000 Kbit)
reliability 255/255, txload 13/255, rxload
At 21:31 14/05/2015 +0200, Mikael Abrahamsson wrote:
On Thu, 14 May 2015, Hank Nussbacher wrote:
The config on the interface looks like this:
interface TenGigE0/1/1/7
mtu 9028
ipv4 unreachables disable
ipv6 nd dad attempts 5
ipv6 address 2001:798:28:20aa::6/126
monitor-session No1 ethernet
In IOS 12.2(33)SRE7a in order to read an interface description we did:
snmpwalk -v 2c -c snmp read community rtr1 .1.3.6.1.4.1.9.2.2.1.1.28
[This is the Cisco specific locIfDescr]
SNMPv2-SMI::enterprises.9.2.2.1.1.28.3 = STRING: vidcast via
vidcast-pix (Rack #6)
but we can't find the
I know it was asked many years ago (anwser then was no), but does there
exist such a tool either publically or internally inside Cisco?
Thanks,
Hank
___
cisco-nsp mailing list cisco-nsp@puck.nether.net
I am trying to determine the height of an ASR9010.
One Cisco site says 17.50inch:
http://www-tss.cisco.com/eservice/est-unified/router/asr9000/vho/spec_9010.html#anchor1
and another site says 36.75inch:
I am looking to a freeware or payware tool that can take a bunch of IOS
configs and generate reports about OSPF and BGP as well as auto create a
network map based on the interfaces.
I am familiar with rat but am not interested in a security audit. I have
heard of nipper:
We used to collect full unsampled Netflow from two 7613 routers. Both ran
12.2(18)SXF11 and all was well.
We continue to get flow data as follows from the 12.2(18)SXF router:
Flow export v5 is enabled for main cache
Exporting flows to xxx.139.197.76 (9800) xx.229.0.7 ()
Exporting using
Ever since we switched to ASR1004 running XE15.1(2)S1, we have seen that
the output of show ip cache flow stalls and is super slow to
complete. We have a few interfaces with ip flow ingress defined. What
can be causing this slowness? Any recommendations of commands to speed up
the output?
Platforms which have implemented FNF or some subset thereof (N7K, CRS-1,
ASR9K, et. al.) can support multiple exporters.
What about 7600s? Any IOS train that handles more than 2 exporters?
Thanks,
Hank
___
cisco-nsp mailing list
Now I know that Cisco supports multiple flow exporting:
http://www.cisco.com/en/US/docs/ios/12_0s/feature/guide/12s_mdnf.html
but the maximum exports allowed for the past 4 years is as per the fine
print Currently, the maximum number of export destinations allowed is two.
By stating the word
When one does a sho cdp nei one gets various string texts for the
platform of a neighbor. Examples might be 7206VXR, 1841, CISCO7613,
WS-C2950G, C831, etc. There doesn't seem to be any pattern and I was
wondering if someone can point me at a more definitive list of platform
strings that come
We have a 7613 w/ WS-SUP720-3BXL running 12.2(18)SXF11.
We have a 48 port WS-X6748-GE-TX. On one interface we
continue to see output drops when traffic goes above 200Mb/sec.
The interface is defined as follows (very straightforward):
interface GigabitEthernet9/29
mtu 9000
bandwidth 100
At 10:56 05/01/2011 +0100, Peter Rathlev wrote:
Do you have QoS enabled? What does show queueing interface Gi9/29 tell
you?
Output drops are egress buffer overflow drops, so technically it
happens because the box tries to send a packet out an interface already
in use (transmitting another
At 10:56 05/01/2011 +0100, Peter Rathlev wrote:
Content-Transfer-Encoding: 7bit
On Wed, 2011-01-05 at 11:36 +0200, Hank Nussbacher wrote:
We have a 7613 w/ WS-SUP720-3BXL running 12.2(18)SXF11.
We have a 48 port WS-X6748-GE-TX. On one interface we
continue to see output drops when traffic
I am looking for a router (not switch) recommendation (upgrade from
7204VXR). Have considered the ASR1004 but a bit too expensive. Need now 2
ports of 10GigE and 4 ports of 1GE with the ability to add in the future 2
more 10GigE ports and 4 more 1GE ports. What would you recommend?
Thanks,
On Wed, 2 Jun 2010, Bill Blackford wrote:
NPE-G1:
30 second input rate 291676000 bits/sec, 43663 packets/sec
30 second output rate 188345000 bits/sec, 40398 packets/sec
30 second input rate 198417000 bits/sec, 41787 packets/sec
30 second output rate 294039000 bits/sec, 45029 packets/sec
At 16:23 14/04/2010 -0500, MrPaul wrote:
By default, BGP chooses one best path among the possible equal-cost paths
that are learned from one AS. However, you can change the maximum number of
parallel equal-cost paths that are allowed. In order to make this change,
include the maximum-paths
At 18:49 15/12/2009 +0200, Tassos Chatzithomaoglou wrote:
Can someone with a SIP-400 module execute the sh platform hardware
capacity system command and send me the output?
I would prefer people with 7600/RSP720.
Not a RSP720 but close:
petach-tikva-gp#sh platform hardware capacity system
I haven't followed all the new bells and whistles in IOS so maybe
something new is there that can handle this age old problem for me.
I want to be able to rate limit all IPs so that no single IP on an
interface can eat more than say 20% of the available b/w (inbound and
outbound). I do not
At 22:54 20/09/2009 -0400, Jeff Kell wrote:
Front-line TAC has gotten incomprehensibly bad. The most recent case
came back with info request (this is a direct quote):
To help isolate the issue, *please answer the following questions *
**1. When did you noticed this issue?
2. Did you
At 17:41 20/09/2009 -0400, Steve Fischer wrote:
I am interested in any and all feedback from the community on this. If
there is someone within Cisco (other than my salesperson, who's heard this
before from me.on more than one occasion) who I can send this to, and can
respond to it, it would
On Thu, 17 Sep 2009, Stig Johansen wrote:
I've gone this road in the past a few times - feedback forms, Gold partner
escalation, emailing Cisco managers, and other than burning my time -
nothing good comes of it. Cisco has shed any people that truly understand
how things should work and what
On Thu, 17 Sep 2009, Jay Hennigan wrote:
Dream on.
-Hank
I have opened a dialog and have gotten what seem to be reasonable responses
from this person, who seems interested in our feedback.
Oscar Bauer - ba...@cisco.com
However, I just about had a Joe Wilson moment when he sent me the
I am trying the Bug Query toolkit:
http://tools.cisco.com/Support/BugToolKit/action.do?hdnAction=searchBugs
- specifing all IOS releases and trying keywords like vlan or vty which
should have some hits but I keep getting:
No bugs meet your search criteria, try widening your search criteria and
On Wed, 5 Aug 2009, mas...@nexlinx.net.pk wrote:
Not always. Just do:
sho ip cache flow | incl Null
to see pkts that are null routed and that are not counted via the null0
interface.
-Hank
show interface null0 always works on Cisco boxes. You can see in/out
packets as well.
Regards,
At 15:36 29/07/2009 -0300, Rubens Kuhl wrote:
Hank,
Any news on what exactly was EOL'ed ?
I think it was a mistake on their part.
-Hank
Rubens
On Tue, Jul 28, 2009 at 4:50 AM, Hank Nussbacher h...@efes.iucc.ac.il wrote:
I just got this product alert from Cisco:
From
I just got this product alert from Cisco:
From: cisconotificationserv...@cisco.com
To: h...@efes.iucc.ac.il
Subject: Cisco Notification Alert -Alerts_Daily-07/28/2009 07:38 GMT
Cisco Notification Service Alert:
Cisco Notification Alert -Alerts_Daily-07/28/2009 07:38 GMT
End-of-Sale and
On Wed, 15 Jul 2009, Saku Ytti wrote:
While I subscribe to the download manager hate, it doesn't bother me
nearly as much as unusable bugtool since the last upgrade two years
ago. Prior to the upgrade, I could solve maybe 1/3 of my cases, without
involving TAC. At that time, I thought bugtool
At 12:00 AM 23-04-09 +0800, Roland Dobbins wrote:
On Apr 22, 2009, at 11:33 PM, Nick Griffin wrote:
Great, thanks to all. So am I to assume if I have X Data Centers, I
need 1xX
GSS's for redundancy?
I'd put a cluster of 2 at each IDC, something like that.
Why 2 at each IDC? Since each
At 09:45 AM 22-04-09 -0500, Nick Griffin wrote:
So say I had 2 datacenter locations geographically disperse and I'm not
running BGP. I have similar web and smtp servers at each locations. I'm not
so much concerned that traffic gets load balanced to a cluster of servers
when traffic enters a
At 11:22 AM 11-01-09 -0600, Justin Shore wrote:
Gert Doering wrote:
Hi,
On Sun, Jan 11, 2009 at 01:41:59PM +0200, Hank Nussbacher wrote:
That provides RMA which we do not need. We want *only* TAC access and
IOS downloads. Softnet provided that option - which Cisco has abolished.
Oh
1) I do not want to hear from resellers - I would like to hear from users -
where do you buy your used Cisco equipment?
2) How do you handle IOS downloads for used equipment? What do you need to
buy from Cisco for this?
3) What about servicing? Does Cisco offer service contracts on someone
I was informed that Cisco no longer sells Softnet support. What should I
be asking for in order to open TAC cases directly (not via our Cisco Gold
Partner) as well as to be able to download new IOS versions?
Thanks,
Hank
___
cisco-nsp mailing list
-
From: cisco-nsp-boun...@puck.nether.net
[mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of Hank Nussbacher
Sent: Sunday, January 11, 2009 10:28
To: cisco-nsp@puck.nether.net
Subject: [c-nsp] Softnet replacement?
I was informed that Cisco no longer sells Softnet support. What should
I
On Sun, 11 Jan 2009, Will Hargrave wrote:
Hank Nussbacher wrote:
That provides RMA which we do not need. We want *only* TAC access and
IOS downloads. Softnet provided that option - which Cisco has abolished.
In the past i've bought 'SASU' which is Software Application Support
plus
On Sun, 11 Jan 2009, Justin Shore wrote:
There is a SmartNet option with software, TAC support, and no advanced
replacement in SP Base. Specifically you want SP-SW for your device. To give
you an idea of the price difference for a 7201 with no on-site support,
24x7x4 is $3226, 8x5xNBD is
http://www.networkworld.com/slideshows/2008/121808-cisco-quiz.html?netht=rn_121808nladname=121808
-Hank
___
cisco-nsp mailing list cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at
On Thu, 20 Nov 2008, Justin Shore wrote:
So does Cisco. When we placed a large order 2 years ago I received to
identical packages from Singapore (some sort of Air parcel company). Inside
each box was 2 layers of pink foam padding. Between the foam was 2 sheets of
legalese license disclaimer
On Tue, 18 Nov 2008, Jared Mauch wrote:
They don't hear us, they don't see us unless we happen to be doing some 6
digit tender for equipment.
With their stock having dropped from 29 to under 16 today all in the
course of 12 months, do you really think any VP there cares whether Jared
is
On Fri, 14 Nov 2008, Garry wrote:
Hank Nussbacher wrote:
On Thu, 13 Nov 2008, Garry wrote:
The 3825 can take 1GB? The Cisco ISR link doesn't show that.
Just checked again - I thought I had put 1GB in our FW-Router, but it's
only 768 at the moment (added a 512 to the stock 256) ... Anyway
At 12:46 PM 13-11-08 -0500, Jared Mauch wrote:
If people want to, I can set up a wiki where you can post
test cases, results, configurations, feature data, etc..
Would that be of value?
I can't wait for the black T-shirt:
I have SXI - do you?
-Hank
- Jared
--
I'm looking for some pointers on what are the smallest recommeded
Cisco
boxes to use for a small multihoming solution.
2 full BGP views (approx 260k routes each)
100 Mbps bandwidth requirement.
The setup currently uses 2 Juniper M5 but those are in dire need of
refresh.
What is the
And to repeat - to the best of my knowledge the 3825 can't take 1GB of RAM
and therefore is not an optimal solution for small multihoming. -Hank
On Fri, 14 Nov 2008, Mark Tinka wrote:
On Friday 14 November 2008 13:09:58 Eric Cables wrote:
If you look at the interactive model (
http://www.cisco.com/web/partners/downloads/765/tools/quickreference/isr.pdf
On the 3845 are listed 2 notes #7 #9 and I can't find those notes listed
in this handy 4 page doc.
What am I missing?
Thanks,
Hank
___
cisco-nsp mailing list
At 03:07 PM 29-10-08 +0200, moshe mizrachi wrote:
hi ,
i have 7609s with RSP3CXL running SRC2 + 7600-ES20-10G3C(2*10Gig) +SIP400
with SPA-OC12 .
via the OC12 there is BGP peer that getting full route bgp , the problem is
that the ES20 is 3C
with DFC with limition of memory, is there any
1 - 100 of 172 matches
Mail list logo