Re: [c-nsp] IOS XE BGP Add-Paths Support for VPNv4 + VPNv6 AFI's

2023-09-12 Thread Mark Tinka via cisco-nsp
On 8/30/23 18:24, Mark Tinka wrote: Actually, different RD's are not a solution for VRF routes leaked into the global table. It will only work for traffic carried inside the VRF domain. If IOS XE can't support Add-Paths for VPN traffic, direct iBGP sessions may be necessary to

Re: [c-nsp] IOS XE BGP Add-Paths Support for VPNv4 + VPNv6 AFI's

2023-08-30 Thread Mark Tinka via cisco-nsp
On 8/30/23 18:14, Mark Tinka via cisco-nsp wrote: Hi all. Does anyone have any definitive info per subject? We don't see support in our CSR1000v units, and my SE seems to have gone fishing. Anyone who has deployed Cat8000v know if there is support there? It's what we are moving to, but

[c-nsp] IOS XE BGP Add-Paths Support for VPNv4 + VPNv6 AFI's

2023-08-30 Thread Mark Tinka via cisco-nsp
Hi all. Does anyone have any definitive info per subject? We don't see support in our CSR1000v units, and my SE seems to have gone fishing. Anyone who has deployed Cat8000v know if there is support there? It's what we are moving to, but we aren't there yet. Using different RD's per site

[c-nsp] ios xe amsterdam

2023-03-24 Thread Brian Turnbow via cisco-nsp
Hi Everyone, Posting this as it made for quite an interesting debug, and am hoping to save someone some future grief. When using ASR 1ks and ios XE Amsterdam 17.3.6 we encountered an issue related to pppoe users and radius attributes. We saw issues trying to send cisco AV pair ip:outacl or

Re: [c-nsp] IOS-XE and show running

2021-06-03 Thread Johannes Erwerle
I was sleeping or something like that On 6/3/21 10:12 AM, Johannes Erwerle wrote: > So give `privilege level 10` a try. The command is called `file privilege 10` ... OpenPGP_signature Description: OpenPGP digital signature ___ cisco-nsp mailing list

Re: [c-nsp] IOS-XE and show running

2021-06-03 Thread Johannes Erwerle
Hi On 6/3/21 9:53 AM, h...@interall.co.il wrote: > Yet the first config command: > Router(config)# show running-config view full > Router(config)# privilege exec level 10 show running-config view full > is not accepted in IOS-XE 16.12.5.  Clue? I currently dont have that specific version to test

[c-nsp] IOS-XE and show running

2021-06-03 Thread hank
I am trying to do a show running from a limited priv account. I follow the instructions listed here: https://www.cisco.com/c/en/us/support/docs/routers/asr-1000-series-aggregation-services-routers/212149-Configure-IOS-XE-to-display-full-show-ru.html Yet the first config command: Router(config)#

Re: [c-nsp] IOS-XE Smart licensing

2021-02-24 Thread Adrian Minta
On 2/24/21 1:18 PM, Hank Nussbacher wrote: So we bought a bunch of ASR1009x along with IOS-XE and are encountering the joy of Smart licensing. Once we have our license established, do we need to leave the "call-home" section? To me it screams "security violation" and something I'd like to

Re: [c-nsp] IOS-XE Smart licensing

2021-02-24 Thread Hagen Amen
Hi, you can also specify HTTPS: source-interface Loopback0 http-proxy "" port 8080 no http secure server-identity-check no destination transport-method email profile "" reporting smart-licensing-data destination transport-method http destination address http

Re: [c-nsp] IOS-XE Smart licensing

2021-02-24 Thread Hank Nussbacher
On 24/02/2021 13:28, Dave Bell wrote: Thanks. I was afraid of that. Based on: https://community.cisco.com/t5/routing/c5921-smart-licensing-fail-to-send-out-call-home-http-message/td-p/3860001 It appears to be using http (not https?) to connect to:

Re: [c-nsp] IOS-XE Smart licensing

2021-02-24 Thread Saku Ytti
https://www.mail-archive.com/cisco-nsp@puck.nether.net/msg68161.html On Wed, 24 Feb 2021 at 13:26, Hank Nussbacher wrote: > > So we bought a bunch of ASR1009x along with IOS-XE and are encountering > the joy of Smart licensing. > > Once we have our license established, do we need to leave the >

Re: [c-nsp] IOS-XE Smart licensing

2021-02-24 Thread Nick Hilliard
Dave Bell wrote on 24/02/2021 11:28: It's all a massive pain. We have kit that randomly stops calling in, and generates angry messages in dashboards. The sneaky alternative is that it's all honour based anyway (at least for the range we are using). Just let it sit in eval mode and move on with

Re: [c-nsp] IOS-XE Smart licensing

2021-02-24 Thread Dave Bell
I believe it's required that it must stay there. You can run an on-prem version of the manager which your routers can call in to. This will then call into Cisco for you. https://www.cisco.com/c/en/us/buy/smart-accounts/software-manager.html It's all a massive pain. We have kit that randomly

[c-nsp] IOS-XE Smart licensing

2021-02-24 Thread Hank Nussbacher
So we bought a bunch of ASR1009x along with IOS-XE and are encountering the joy of Smart licensing. Once we have our license established, do we need to leave the "call-home" section? To me it screams "security violation" and something I'd like to permanently disable after getting the

Re: [c-nsp] IOS-XE?

2020-11-10 Thread Scott Voll
I'm still running 3650/3850's 4-8 switch stacks. primary stack switch reboots. No logs created to help TAC figure out why. has happened on multiple stacks over the time we have been on 16.9.x train. your issue on the 9200's does not make me feel much better. Scott On Mon, Nov 9, 2020 at

Re: [c-nsp] IOS-XE?

2020-11-09 Thread Reuben Farrelly via cisco-nsp
--- Begin Message --- On 10/11/2020 10:33 am, Scott Voll wrote: 16.9.6 or 16.12.4? and Why? Any issues seen in the 16.12 line? I've seen some unexplained reboots in the 16.9.5 train that TAC can't explain so need to upgrade. 16.9.6 is the Starred release. I've not been impressed with the

Re: [c-nsp] IOS-XE?

2020-11-09 Thread Gary Smith
On 09/11/2020 23:33, Scott Voll wrote: 16.9.6 or 16.12.4? and Why? Any issues seen in the 16.12 line? I've seen some unexplained reboots in the 16.9.5 train that TAC can't explain so need to upgrade. 16.9.6 is the Starred release. I've not been impressed with the whole 16.9.x train over the

[c-nsp] IOS-XE?

2020-11-09 Thread Scott Voll
16.9.6 or 16.12.4? and Why? Any issues seen in the 16.12 line? I've seen some unexplained reboots in the 16.9.5 train that TAC can't explain so need to upgrade. 16.9.6 is the Starred release. I've not been impressed with the whole 16.9.x train over the last two years so really thinking hard

[c-nsp] IOS XE - Checking amount of IPv4 routes in FIB

2019-12-04 Thread Robert Hass
Hi I'm looking for proper command to find out how much routes I have in FIB. Is "sh ip cef summary" what I'm looking for ? Example router running IOS XE 03.13.08.S Received 1.17M routes via BGP #sh ip cef summary IPv4 CEF is enabled for distributed and running VRF Default 1168031 prefixes

Re: [c-nsp] IOS(-XE) 'configure replace' robustness

2017-06-20 Thread James Bensley
On 4 May 2017 at 08:24, James Bensley wrote: > On 3 May 2017 at 17:09, Nick Hilliard wrote: >> James Bensley wrote: >>> We are generating a full device config using Jinja2 templates. >> >> slightly off topic, but did you try feeding this into napalm and

Re: [c-nsp] IOS(-XE) 'configure replace' robustness

2017-05-04 Thread Saku Ytti
On 4 May 2017 at 13:49, James Bensley wrote: > -A brand new PE being deployed today might have full API support for > all features we need/use. For brand-new I'd stay with boxes supporting full config replace. JunOS, IOS-XR, VRP, EOS (strangely applies to both Arista and

Re: [c-nsp] IOS(-XE) 'configure replace' robustness

2017-05-04 Thread James Bensley
On 4 May 2017 at 10:38, Saku Ytti wrote: > YANG is not option for us, we need 100%, then from available options, > we choose something. And only available for 100% is CLI. We update > millions of lines of ASR9k every day with only ever doing full > replacement of entire config. It

Re: [c-nsp] IOS(-XE) 'configure replace' robustness

2017-05-04 Thread Saku Ytti
On 4 May 2017 at 10:43, James Bensley wrote: Hey, > Yeah me too! This is part of a greenfield build that has CSR1000v as > CPEs and ASR9000s as PEs. I've had moderate success with ASR9000s > using a mixture of OpenConfig YANG models and Cisco's proprietary YANG YANG is not

Re: [c-nsp] IOS(-XE) 'configure replace' robustness

2017-05-04 Thread James Bensley
On 3 May 2017 at 17:44, Saku Ytti wrote: > On 3 May 2017 at 18:45, James Bensley wrote: > > Hey James, > >> However “show run “ shows me the full config is there. So that’s a >> step forwards, all the config is being applied (it seems the config >> parser for

Re: [c-nsp] IOS(-XE) 'configure replace' robustness

2017-05-04 Thread James Bensley
On 3 May 2017 at 17:09, Nick Hilliard wrote: > James Bensley wrote: >> We are generating a full device config using Jinja2 templates. > > slightly off topic, but did you try feeding this into napalm and seeing > what happens? This works extremely well on arista kit (and I

Re: [c-nsp] IOS(-XE) 'configure replace' robustness

2017-05-03 Thread Saku Ytti
On 3 May 2017 at 18:45, James Bensley wrote: Hey James, > However “show run “ shows me the full config is there. So that’s a > step forwards, all the config is being applied (it seems the config > parser for "configure replace" is very picky!), but the router > indicates it

Re: [c-nsp] IOS(-XE) 'configure replace' robustness

2017-05-03 Thread Nick Hilliard
James Bensley wrote: > We are generating a full device config using Jinja2 templates. slightly off topic, but did you try feeding this into napalm and seeing what happens? This works extremely well on arista kit (and I believe XR, junos and nx-os too), as eos allows config merge to be performed

Re: [c-nsp] IOS(-XE) 'configure replace' robustness

2017-05-03 Thread James Bensley
On 4 April 2017 at 15:23, Saku Ytti wrote: >> soon. Ideally I want the configuration to be locked when doing a full >> replace so that no-one else makes a configuration change at the same >> time AND automatic rollback MUST also be active so that we have >> guaranteed configuration

Re: [c-nsp] IOS(-XE) 'configure replace' robustness

2017-04-04 Thread Saku Ytti
Hey James, Not what I wanted to hear :(. > I am working on this right now, I opened a TAC case yesterday and > still warming up the TAC engine at present. Also just a note before, > this is on CSR1000v for me not physical boxes if that makes a > difference. I did my testing on CSR1000v as well,

Re: [c-nsp] IOS(-XE) 'configure replace' robustness

2017-04-04 Thread James Bensley
On 4 April 2017 at 12:35, Saku Ytti wrote: > Does anyone regularly use this to replace configuration with new full > configuration? > > e.g. copy config to startup, configure replace nvram:startup-configuration? > > I recall trying it when it originally came, and determined that it

[c-nsp] IOS(-XE) 'configure replace' robustness

2017-04-04 Thread Saku Ytti
Does anyone regularly use this to replace configuration with new full configuration? e.g. copy config to startup, configure replace nvram:startup-configuration? I recall trying it when it originally came, and determined that it was just breaking everything while going towards the new config, and

[c-nsp] IOS-XE SNMP MIB for L2VPN VFIs/BDs?

2017-01-02 Thread Patrick Cole
I've been searching high and dry for a MIB that would provide the configured VFIs and their attached bridge-domains. Does this exist? Thanks, Patrick Cole Senior Network Specialist World Without Wires PO Box 869. Palm Beach, QLD, 4221 Ph: 0410 626 630

Re: [c-nsp] IOS XE Denali release date

2016-04-01 Thread Lukas Tribus
> Hi > I'm looking for some dates regarding IOS XE release called 'Denali' for ASR > 1K and CSR 1000V platforms. Cisco show on presentations March 2016, but > tomorrow we will have 1st of April. > Is it delayed ? Something is on CCO now (RP2/RPX?):

Re: [c-nsp] IOS XE Denali release date

2016-03-31 Thread Pavel Skovajsa
sorry, nothing for ASR and N1k - yet. -pavel On Thu, Mar 31, 2016 at 5:26 PM, Pavel Skovajsa wrote: > It has been available for a 2 months now for download, for example for > Catalyst 3650/3850 you can download the 16.1.2 image - >

Re: [c-nsp] IOS XE Denali release date

2016-03-31 Thread Pavel Skovajsa
It has been available for a 2 months now for download, for example for Catalyst 3650/3850 you can download the 16.1.2 image - cat3k_caa-universalk9.16.01.02.SPA.bin The upgrade procedure is little complicated, I suggest you read here:

[c-nsp] IOS XE Denali release date

2016-03-31 Thread Robert Hass
Hi I'm looking for some dates regarding IOS XE release called 'Denali' for ASR 1K and CSR 1000V platforms. Cisco show on presentations March 2016, but tomorrow we will have 1st of April. Is it delayed ? Rob ___ cisco-nsp mailing list

[c-nsp] IOS XE proposed release dates?

2012-11-04 Thread CiscoNSP_list CiscoNSP_list
Are the proposed release dates for new versions of XE documented anywhere? Would like to know (approx) when 15.3S/3.8.0S will be available. Cheers. ___ cisco-nsp mailing list

Re: [c-nsp] IOS XE proposed release dates?

2012-11-04 Thread Xu Hu
Should be end of this year, i am also waiting for the 15.3 for 7600. On Nov 5, 2012 11:37 AM, CiscoNSP_list CiscoNSP_list cisconsp_l...@hotmail.com wrote: Are the proposed release dates for new versions of XE documented anywhere? Would like to know (approx) when 15.3S/3.8.0S will be

Re: [c-nsp] IOS XE proposed release dates?

2012-11-04 Thread CiscoNSP_list CiscoNSP_list
Should be end of this year, i am also waiting for the 15.3 for 7600. Thanks. On Nov 5, 2012 11:37 AM, CiscoNSP_list CiscoNSP_list cisconsp_l...@hotmail.com wrote: Are the proposed release dates for new versions of XE documented anywhere? Would like to know (approx) when