In looking at the doc's just now it said it's enabled by default, but that is
not what it was doing. I had to configure it for the router to download the
routes in the vpnv4 table.
This was TAC's response to my ticket.
-The reason for not seeing any routes being imported is due to the absence
Hi,
On Tue, May 29, 2018 at 01:47:14PM +0100, Nick Hilliard wrote:
> Juniper SRX handles this end of things a good deal better, imho.
SRX seems to make a decent router, yes.
Why they insist on calling it a "firewall" escapes me, though.
gert
--
"If was one thing all people took for granted,
Hi Erik,
That is the default of XR.
Best Regards
Ted
Sent while walking
> On 29 May 2018, at 18:53, Erik Sundberg wrote:
>
> I ran into this bug going from 6.3.1 to 6.3.2 Very simple fix by
> applying to smu patch files.
>
I have a few hundred tunnels on some ASR1002X's no problem
MPLS over DMVPN
I, too, would hesitate to use an ASA/NGFW as an IPSec headend for S2S.
-Garrett
On Tue, May 29, 2018, 13:37 Gert Doering wrote:
> Hi,
>
> On Tue, May 29, 2018 at 01:47:14PM +0100, Nick Hilliard wrote:
> > Juniper SRX
Hi!
When one connects to a console port of a non-master stacked Cisco 3750
series switch, then the switch will use VTY lines authorization
configuration. This is described in CSCsw51727. Let's say that
authorization is done by TACACS+ server. There is a workaround
possible when local username
On 28 May 2018 at 19:54, George Giannousopoulos wrote:
> We recently upgraded without any issue.
...
> Beware of some rather minor syntax changes in the BNG config
Same here, we're migrating from 5.3.3 to 6.2.3.
Everything seems fine for us too, we're also not doing anything crazy,
L2/L3 VPNs,
Outdated info but...
We tried it a couple of years ago and ended up going with a different
vendor.
The protocol matching left a little to be desired.
Not sure how much has changed
Brian
> -Original Message-
> From: cisco-nsp [mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of
>
Hello all,
I've been trying to find platform limits for the maximum supported number
of neighbors per bridge-domain and globally.
Command "sh l2vpn capability" offers some good data, but not the number of
max neighbors.
I've also found some scattered pages on Cisco but nothing specific for max
Dear All
Does anyone know the function of the "n - BGP C-Mroute suppressed " flag
as seen below?
IP Multicast Routing Table
Flags: D - Dense, S - Sparse, B - Bidir Group, s - SSM Group, C - Connected,
L - Local, P - Pruned, R - RP-bit set, F - Register flag,
T - SPT-bit set, J -
Jason Lixfeld wrote on 28/05/2018 22:36:
If not, anything else that may do what I’m after?
Cisco ASA is very poor at handling dynamic routing, to the point that
any requirement that I have these days for firewalls and BGP will
automatically rule out ASA as a platform. It still doesn't
So, this is a feature and not an error flag, that indicates that
superfluous PIM messages are not sent.
tis 29 maj 2018 kl 14:36 skrev :
> > Mattias Gyllenvarg
> > Sent: Tuesday, May 29, 2018 1:05 PM
> >
> > Dear All
> >
> > Does anyone know the function of the "n - BGP C-Mroute suppressed "
> Mattias Gyllenvarg
> Sent: Tuesday, May 29, 2018 1:05 PM
>
> Dear All
>
> Does anyone know the function of the "n - BGP C-Mroute suppressed " flag
> as seen below?
>
> IP Multicast Routing Table
> Flags: D - Dense, S - Sparse, B - Bidir Group, s - SSM Group, C -
Connected,
>L -
I ran into this bug going from 6.3.1 to 6.3.2 Very simple fix by applying
to smu patch files.
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvf01652?emailclick=CNSemail
Not sure when this change in behavior happened, but by default BGP doesn't
install/download/show VPNv4 routes unless
13 matches
Mail list logo