Re: [c-nsp] Carrier grade NAT44 newest Cisco boxes

2012-03-14 Thread Ruslan Pustovoitov
The question was what strategy of NAT deployment can be accepted by 
large ISP if one of the internal condition to use only cisco boxes for NAT ?

Hidden cost was always visible to engeneers )
Now It is time to pay )

Has cisco plan to announce in next two year sucsessor of ISM-100 with 
better performance ?
For example, if ISP already has asr9k chassis placed everywere in it's 
network, it will be happy to know that in 2013 cisco planning to do 
another card which will seat instead of ISM-100 into the same chassis.




Gert Doering пишет:

Hi,

On Tue, Mar 13, 2012 at 07:01:10PM +0400, Ruslan Pustovoitov wrote:
  

Does this question not worry community ?



I think it's great that the hidden costs that come with running IPv4
now start being openly visible...

Sorry, what was the question?

gert
  

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

[c-nsp] VSS display of show run on standby switch

2012-03-14 Thread Brad Clausen
Hey Guys,

I have 2 x 6509's running as a virtual switch (VSS). I can't for the likes
of me work out the command to display the serial number details of the
Supervisor that is in standby.  The Show run displays the details of the
active supervisor.


OMESW001#sho switch virtual
Switch mode  : Virtual Switch
Virtual switch domain number : 100
Local switch number  : 2
Local switch operational role: Virtual Switch Active
Peer switch number   : 1
Peer switch operational role : Virtual Switch Standby
OMESW001#


how can I display the show run equivalent on peer switch 1?
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] Cisco Border Router Recommendation?

2012-03-14 Thread James Paussa

Hi,
I have been looking at the ASR1001 but am concerned about the number of 
routes it supports. The product docs I have found show the router 
supports 1,000,000 IPv4 or 1,000,000 IPv6 routes (1). From what I have 
read on here there are only 512k IPv4 or 128k IPv6 routes supported in 
the FIB and no one is 100% sure how it will behave when this is exhausted.


So my question is twofold.
Is the realistic lifespan at the current expansion of prefixes (we are 
currently seeing just under 400k IPv4 routes from our upstreams and 
around 8k of IPv6) of the ASR1001 (my guess is about a year)?
Secondly, what would be the best path to go given I would be looking for 
something able to support at least 1 million routes in the FIB. It 
wouldn't require LNS or LAC functionality and be required to support 
around 3 full BGP feeds. The forwarding rate would need to be around 
500mbit moving towards 2 gigabit.


Regards,
James.


1. 
http://www.cisco.com/en/US/prod/collateral/routers/ps9343/data_sheet_c78-441072.html


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] VSS display of show run on standby switch

2012-03-14 Thread Xu Hu
You just want to see the series number of supervisor in standby?
Check the show inventory raw command to see whether you can find the answer
or not.

Xu Hu
2012/3/14 Brad Clausen overkil...@gmail.com

 Hey Guys,

 I have 2 x 6509's running as a virtual switch (VSS). I can't for the likes
 of me work out the command to display the serial number details of the
 Supervisor that is in standby.  The Show run displays the details of the
 active supervisor.


 OMESW001#sho switch virtual
 Switch mode  : Virtual Switch
 Virtual switch domain number : 100
 Local switch number  : 2
 Local switch operational role: Virtual Switch Active
 Peer switch number   : 1
 Peer switch operational role : Virtual Switch Standby
 OMESW001#


 how can I display the show run equivalent on peer switch 1?
 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Carrier grade NAT44 newest Cisco boxes

2012-03-14 Thread Xu Hu
Actually in our 3G network, we use the 7609 (two ACE modules) for the NAT,
in the live situation, we had 4M users.
It is quite stable for now.
Also we bought the ASR9K to expand the 3G network, maybe will migrate the
NAT to ASR9K.

Xu Hu
2012/3/14 Ruslan Pustovoitov ru...@mostelekom.net

 The question was what strategy of NAT deployment can be accepted by large
 ISP if one of the internal condition to use only cisco boxes for NAT ?
 Hidden cost was always visible to engeneers )
 Now It is time to pay )

 Has cisco plan to announce in next two year sucsessor of ISM-100 with
 better performance ?
 For example, if ISP already has asr9k chassis placed everywere in it's
 network, it will be happy to know that in 2013 cisco planning to do another
 card which will seat instead of ISM-100 into the same chassis.



 Gert Doering пишет:

  Hi,

 On Tue, Mar 13, 2012 at 07:01:10PM +0400, Ruslan Pustovoitov wrote:


 Does this question not worry community ?



 I think it's great that the hidden costs that come with running IPv4
 now start being openly visible...

 Sorry, what was the question?

 gert


 __**_
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/**mailman/listinfo/cisco-nsphttps://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at 
 http://puck.nether.net/**pipermail/cisco-nsp/http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

Re: [c-nsp] Carrier grade NAT44 newest Cisco boxes

2012-03-14 Thread Christian Kratzer

Hi,

On Wed, 14 Mar 2012, Xu Hu wrote:


Actually in our 3G network, we use the 7609 (two ACE modules) for the NAT,
in the live situation, we had 4M users.
It is quite stable for now.
Also we bought the ASR9K to expand the 3G network, maybe will migrate the
NAT to ASR9K.


I am curios if and if how you are doing logging for law enforment purposes on 
that scale ?

We in europe have some pressure to have the ability to map the 
ip/port/timestamp touple back to user. Of course nobody will be able to deliver 
the port together with the ip and an accurate enough timestamp for this to be 
meaningfull.

I can see this becoming a larger problem when more nats appear on conventional 
DSL / FTTx / Cable access products as opposed to just low bandwidth mobile 
networks.

Greetings
Christian


Xu Hu
2012/3/14 Ruslan Pustovoitov ru...@mostelekom.net


The question was what strategy of NAT deployment can be accepted by large
ISP if one of the internal condition to use only cisco boxes for NAT ?
Hidden cost was always visible to engeneers )
Now It is time to pay )

Has cisco plan to announce in next two year sucsessor of ISM-100 with
better performance ?
For example, if ISP already has asr9k chassis placed everywere in it's
network, it will be happy to know that in 2013 cisco planning to do another
card which will seat instead of ISM-100 into the same chassis.



Gert Doering ?:

 Hi,


On Tue, Mar 13, 2012 at 07:01:10PM +0400, Ruslan Pustovoitov wrote:



Does this question not worry community ?




I think it's great that the hidden costs that come with running IPv4
now start being openly visible...

Sorry, what was the question?

gert



__**_
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/**mailman/listinfo/cisco-nsphttps://puck.nether.net/mailman/listinfo/cisco-nsp
archive at 
http://puck.nether.net/**pipermail/cisco-nsp/http://puck.nether.net/pipermail/cisco-nsp/


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


--
Christian Kratzer  CK Software GmbH
Email:   c...@cksoft.de  Wildberger Weg 24/2
Phone:   +49 7032 893 997 - 0  D-71126 Gaeufelden
Fax: +49 7032 893 997 - 9  HRB 245288, Amtsgericht Stuttgart
Web: http://www.cksoft.de/ Geschaeftsfuehrer: Christian Kratzer
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Internet inside a VRF?

2012-03-14 Thread Gert Doering
Hi,

On Wed, Mar 14, 2012 at 01:12:02PM +1300, Pshem Kowalczyk wrote:
 In my previous role we've done just that. One internet VRF for all
 transit functions, separate vrfs for peering and customers and
 import-export statements to tie them all together. 

What is the benefit?  The obvious drawback is much more complicated,
more possible ways things can blow up, and more effort to setup and
maintain.

(We currently run Internet in the global table, and do not currently
intent to change that due to if we make it more complicated, people
will make more interesting mistakes)

gert
-- 
USENET is *not* the non-clickable part of WWW!
   //www.muc.de/~gert/
Gert Doering - Munich, Germany g...@greenie.muc.de
fax: +49-89-35655025g...@net.informatik.tu-muenchen.de


pgpIwW5aKLzBF.pgp
Description: PGP signature
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

Re: [c-nsp] Internet inside a VRF?

2012-03-14 Thread Gert Doering
Hi,

On Tue, Mar 13, 2012 at 09:29:11PM -0400, Dan Armstrong wrote:
 Two reasons, the first reason is that the config is extremely
 simple, clean and difficult for a less trained provisioning guy to
 make a mistake.  With route maps, it's error prone to harmonize
 them across many boxes - and it's relatively easy for somebody to
 muck one up by accident.

I'm not exactly sure I buy the simple and clean argument... unless
convinced otherwise, I'd claim that the customer-facing config is about
the same complexity with and without VRFs, and the network-side is more 
complicated with VRFs and MPLS.

What sort of route-maps are that, that you think need synchronizing?

(genuinely curious)

gert
-- 
USENET is *not* the non-clickable part of WWW!
   //www.muc.de/~gert/
Gert Doering - Munich, Germany g...@greenie.muc.de
fax: +49-89-35655025g...@net.informatik.tu-muenchen.de


pgpwWS7dI92MC.pgp
Description: PGP signature
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

Re: [c-nsp] Internet inside a VRF?

2012-03-14 Thread Saku Ytti
On (2012-03-13 21:29 -0400), Dan Armstrong wrote:

 The other reason is that we have some older folks around that long for the 
 day when the core of a carrier network was ATM based, and the plethora of 
 hops were basically hidden behind a switched network…   They feel that 
 customers will freak out and feel the service is inferior if a traceroute 
 goes through many dozen hops.  Having this inside a VRF lets us hide the hops 
 inside a POP for instance, and only show the major transit points for clarity.

You could also use TTL hiding.

One other thing, I didn't see mentioned is that with INET in VRF you can
easily do subset of Internet VRFs. This can be useful for example to have
IXP Internet in subset which only imports you and your customer RT.
So if someone default routes to you, they won't get free transit, but will
get, what they should get.

You can also sell partial transits, which are enforced by routing. And I'm
sure there are plenty of situations where subset of Internet is useful.

-- 
  ++ytti
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

Re: [c-nsp] Internet inside a VRF?

2012-03-14 Thread Vitkovsky, Adam
I guess you can ask: Why do we run mpls anyway or even plan on expanding it all 
the way to the access layer right? 
I thought the answer is obvious, TE capabilities, fast failover or common 
carrier infrastructure that scales well 
And by common I mean infrastructure that supports all the services you offer 
not just a couple

In pure ipv4 environment how do you make sure your RRs infrastructure offers 
multiple paths for particular prefix? -well with mpls we just configure each PE 
with a different RD for the internet VRF -I know of several solutions to this 
in pure ipv4 but none is this simple

adam

-Original Message-
From: cisco-nsp-boun...@puck.nether.net 
[mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of Gert Doering
Sent: Wednesday, March 14, 2012 10:04 AM
To: Pshem Kowalczyk
Cc: cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] Internet inside a VRF?

Hi,

On Wed, Mar 14, 2012 at 01:12:02PM +1300, Pshem Kowalczyk wrote:
 In my previous role we've done just that. One internet VRF for all
 transit functions, separate vrfs for peering and customers and
 import-export statements to tie them all together. 

What is the benefit?  The obvious drawback is much more complicated,
more possible ways things can blow up, and more effort to setup and
maintain.

(We currently run Internet in the global table, and do not currently
intent to change that due to if we make it more complicated, people
will make more interesting mistakes)

gert
-- 
USENET is *not* the non-clickable part of WWW!
   //www.muc.de/~gert/
Gert Doering - Munich, Germany g...@greenie.muc.de
fax: +49-89-35655025g...@net.informatik.tu-muenchen.de

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Internet inside a VRF?

2012-03-14 Thread michalis.bersimis
Hi,
Putting internet in a vrf is not that bad. I agree with some people say that 
separate the global routing table with vrf is easier, especially for networks 
that are deploying MPLS routers from scratch. I don't see any advantages from 
putting internet Prefixes in the global routing table. 

Best Regards,

Michalis Bersimis




--

Message: 1
Date: Tue, 13 Mar 2012 21:58:58 -0500
From: Ge Moua moua0...@umn.edu
To: cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] Internet inside a VRF?
Message-ID: 4f600972.6040...@umn.edu
Content-Type: text/plain; charset=windows-1252; format=flowed

In RE networks, separation of commodity Internet-1 and Internet-2 traffic.

--
Regards,
Ge Moua

University of Minnesota Alumnus
Email: moua0...@umn.edu
--


On 3/13/12 8:17 PM, Jose Madrid wrote:
 I would like to understand why you guys would do this? What is the
 reasoning behind this? Super granular control? Cant this level of
 granularity be achieved with route-maps?

 Sent from my iPhone

 On Mar 13, 2012, at 8:27 PM, Dan Armstrongd...@beanfield.com  wrote:

 We have all our Internet peers and customers inside a VRF currently, and our 
 Cisco SE thinks we're stark raving mad, and should redesign and put 
 everything back in the global table.


 This is all on ASR 9Ks and 7600s.





 On 2012-03-13, at 8:12 PM, Pshem Kowalczyk wrote:

 Hi,

 On 14 March 2012 11:59, Dan Armstrongd...@beanfield.com  wrote:
 I know this topic has been discussed a million times, but just wanted to 
 get an updated opinion on how people are feeling about this:


 In a service provider network, how do people feel about putting the big 
 Internet routing table, all their peers and customers inside a VRF?  Keep 
 the global table for just infrastructure links?
 In my previous role we've done just that. One internet VRF for all
 transit functions, separate vrfs for peering and customers and
 import-export statements to tie them all together. All done on ASR1k
 (mainly 1006, but a few of 1002 as well).

 kind regards
 Pshem

 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/
 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Internet inside a VRF?

2012-03-14 Thread Nick Ryce
Does memory usage not increase by putting all the internet routes in a VRF?

Nick

-Original Message-
From: cisco-nsp-boun...@puck.nether.net 
[mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of 
michalis.bersi...@hq.cyta.gr
Sent: 14 March 2012 09:47
To: cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] Internet inside a VRF?

Hi,
Putting internet in a vrf is not that bad. I agree with some people say that 
separate the global routing table with vrf is easier, especially for networks 
that are deploying MPLS routers from scratch. I don't see any advantages from 
putting internet Prefixes in the global routing table.

Best Regards,

Michalis Bersimis




--

Message: 1
Date: Tue, 13 Mar 2012 21:58:58 -0500
From: Ge Moua moua0...@umn.edu
To: cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] Internet inside a VRF?
Message-ID: 4f600972.6040...@umn.edu
Content-Type: text/plain; charset=windows-1252; format=flowed

In RE networks, separation of commodity Internet-1 and Internet-2 traffic.

--
Regards,
Ge Moua

University of Minnesota Alumnus
Email: moua0...@umn.edu
--


On 3/13/12 8:17 PM, Jose Madrid wrote:
 I would like to understand why you guys would do this? What is the
 reasoning behind this? Super granular control? Cant this level of
 granularity be achieved with route-maps?

 Sent from my iPhone

 On Mar 13, 2012, at 8:27 PM, Dan Armstrongd...@beanfield.com  wrote:

 We have all our Internet peers and customers inside a VRF currently, and our 
 Cisco SE thinks we're stark raving mad, and should redesign and put 
 everything back in the global table.


 This is all on ASR 9Ks and 7600s.





 On 2012-03-13, at 8:12 PM, Pshem Kowalczyk wrote:

 Hi,

 On 14 March 2012 11:59, Dan Armstrongd...@beanfield.com  wrote:
 I know this topic has been discussed a million times, but just wanted to 
 get an updated opinion on how people are feeling about this:


 In a service provider network, how do people feel about putting the big 
 Internet routing table, all their peers and customers inside a VRF?  Keep 
 the global table for just infrastructure links?
 In my previous role we've done just that. One internet VRF for all
 transit functions, separate vrfs for peering and customers and
 import-export statements to tie them all together. All done on ASR1k
 (mainly 1006, but a few of 1002 as well).

 kind regards
 Pshem

 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/
 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net 
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

--

This email and any files transmitted with it are confidential and intended
solely for the use of the individual or entity to whom they are addressed.
If you have received this email in error please notify the sender. Any
offers or quotation of service are subject to formal specification.
Errors and omissions excepted.  Please note that any views or opinions
presented in this email are solely those of the author and do not
necessarily represent those of Pulsant.
Finally, the recipient should check this email and any attachments for the
presence of viruses.  Pulsant accept no liability for any
damage caused by any virus transmitted by this email.

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Internet inside a VRF?

2012-03-14 Thread Saku Ytti
On (2012-03-14 10:37 +), Nick Ryce wrote:

 Does memory usage not increase by putting all the internet routes in a VRF?

Implementation detail.

In HW FIB it shouldn't make any difference. In SW side, as you'll have
slightly longer NLRI and you must have some RT communities it necessarily
costs bit more in RIB, but this is imho, negligible.
I wouldn't personally worry about it. I believe Cisco CEF book or maybe
Behringer's MPLS VPN security book made some assumption about 2x, but it
possibly cannot be true.

You can mostly think of global table being just another instance in
non-naive implementation of multiple FIB/RIB.

-- 
  ++ytti
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Question for LACP/LAG gurus

2012-03-14 Thread Nick Ryce
Im in the same situation as below, trying to get a LACP working between Extreme 
and an ASR 9k.  Does anyone have a workaround for this rather than resetting 
the system id of the Extreme kit?



Nick





 From: Dmitry Kiselev dmitry at 
 dmitry.nethttps://puck.nether.net/mailman/listinfo/cisco-nsp

 To: cisco-nsp at 
 puck.nether.nethttps://puck.nether.net/mailman/listinfo/cisco-nsp

 Date: Tue, 12 Apr 2011 14:49:24 +0300

 Subject: [c-nsp] Question for LACP/LAG gurus

 Hello!



 While building several new LAGs on IOS XR I found strange behaviour of

 Cisco IOSes for system priority LACP parameter. Most of classic IOSes

 allow to set value from 0 to 65535, but IOS XR does not:



 12.2(55)SE2 Switch(config)#lacp system-priority ?

  0-65535  Priority value



 12.2(54)SG Switch(config)#lacp system-priority ?

  0-65535  Priority value



 12.2(33)SRE Router(config)#lacp system-priority ?

  0-65535  Priority value



 IOS XE 12.2(33)XNF2 Router(config)#lacp system-priority ?

  0-65535  Priority value



 IOS XR 4.0.1 Router(config)#lacp system priority ?

  1-65535  Priority for this system. Lower value is higher priority.



 Moreover, IOS XR does not form the LAG if received partner system priority

 is zero.

 In this case each bundle port shows the error message Partner System

 ID/Key

 do not match that of the Selected links and remain configured state.



 It would remain a theoretical nuance, but Extreme Networks switches

 advertise

 priority=0 by default on all LAGs cousing some troubles in setup.

 Interesting

 fact thats in the same time zero is invalid value in Extreme switch

 configuration  :) :)



 Extreme# configure sharing 7 lacp system-priority ?

  system_priority  System Priority (1..65535)



 I take a short look inside IEEE 802.1AX-2008 standart and IEEE 802.3-2005

 clause 43

 and does not see any special case for priority=0.  Does anybody in the list

 familar

 enough with LACP to explain me why Cisco IOS XR does not like zero here?



 Thanks



 --

 Dmitry Kiselev


Nick Ryce
Senior Network Engineer
Pulsant Limited
T: 0845 119 9900
DDI: +44 131 5144049
W: 
www.pulsant.co.ukhttps://nbg01-exch-01.lumison.net/owa/redir.aspx?C=3d7cd71066064370b0210c73169f0074URL=http%3a%2f%2fwww.pulsant.co.uk



--

This email and any files transmitted with it are confidential and intended
solely for the use of the individual or entity to whom they are addressed.
If you have received this email in error please notify the sender. Any
offers or quotation of service are subject to formal specification.
Errors and omissions excepted. Please note that any views or opinions
presented in this email are solely those of the author and do not
necessarily represent those of Pulsant.
Finally, the recipient should check this email and any attachments for the
presence of viruses. Pulsant accept no liability for any
damage caused by any virus transmitted by this email.
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] N7k CoPP versus rate-limiters

2012-03-14 Thread Phil Mayers

All,

We've just taken delivery of our first pair of N7k (and so far I'm 
impressed).


I'm playing with porting our standard 6500 config to an equivalent N7k 
config, and I'm a bit puzzled by the interaction of CoPP and the 
hardware rate-limiters.


On 6500/Sup720 these two features have well documented limitations and 
interaction - specifically HW rate-limiters pre-empt CoPP. I can't seem 
to find detailed information on how that works in the N7k.


In general, what should I be using, for what?

This is NX-OS 6, with M1 series linecards doing routing (MPLS).
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Internet inside a VRF?

2012-03-14 Thread Derick Winkworth
If you run an MPLS network and are using MPLS to separate security zones within 
your network (such as a very large enterprise) then this makes perfect sense in 
the context of your design.

Sure, it can be solutioned otherwise.  The bottom line is:  POC it, buy enough 
RAM and CPU, and deploy what you POC.  If it works as expected without negative 
side-effects and its aligned with your overall design, then do it.

Otherwise, don't.

Honestly I wouldn't use anything less than RP2 w/16GB of RAM (a common theme in 
my posts here) and probably an ESP-40.  Again, for the on-board RAM setup... 
not the throughput.  

 
Derick Winkworth
CCIE #15672 (RS, SP), JNCIE-M #721
http://packetpushers.net/author/dwinkworth/



 From: Jose Madrid jmadr...@gmail.com
To: Dan Armstrong d...@beanfield.com 
Cc: cisco-nsp@puck.nether.net cisco-nsp@puck.nether.net 
Sent: Tuesday, March 13, 2012 8:17 PM
Subject: Re: [c-nsp] Internet inside a VRF?
 
I would like to understand why you guys would do this? What is the
reasoning behind this? Super granular control? Cant this level of
granularity be achieved with route-maps?

Sent from my iPhone

On Mar 13, 2012, at 8:27 PM, Dan Armstrong d...@beanfield.com wrote:

 We have all our Internet peers and customers inside a VRF currently, and our 
 Cisco SE thinks we're stark raving mad, and should redesign and put 
 everything back in the global table.


 This is all on ASR 9Ks and 7600s.





 On 2012-03-13, at 8:12 PM, Pshem Kowalczyk wrote:

 Hi,

 On 14 March 2012 11:59, Dan Armstrong d...@beanfield.com wrote:
 I know this topic has been discussed a million times, but just wanted to 
 get an updated opinion on how people are feeling about this:


 In a service provider network, how do people feel about putting the big 
 Internet routing table, all their peers and customers inside a VRF?  Keep 
 the global table for just infrastructure links…

 In my previous role we've done just that. One internet VRF for all
 transit functions, separate vrfs for peering and customers and
 import-export statements to tie them all together. All done on ASR1k
 (mainly 1006, but a few of 1002 as well).

 kind regards
 Pshem


 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

Re: [c-nsp] Internet inside a VRF?

2012-03-14 Thread Robert Raszuk


One additional point as I think most comments assumed such equation:

Internet in a VRF = requirement for MPLS in the core.

It does not.

You can run mGRE encapsulation between ASBRs/PEs and the fact that 
behind GRE header of the packet sits vpnv4/v6 mpls label would have no 
bearing on the design of your core. No need to deploy LDP or RSVP-TE 
then worry that /32s of PE loopbacks are starting to hurt when number of 
such PEs grows ;)


Also those who wish to send all paths between their ASBRs today may just 
do that by different RD configuration rather then with add-paths network 
wide OS code upgrade.




There is one more advantage of using VRFs for Internet ... in fact just 
came to me this morning. You know there is all this buzz about securing 
internet with RPKI which will allow various parties/courts to mess with 
it and cherry pick who has right to be in the Internet and who does not.


So even if you would keep Internet in the global table as today rather 
then dropping reachability for those forbidden guys due to RPKI telling 
you to do so (in the even of no other bgp path present) you could just 
export it to a VRF called Dirty_Internet and provide for those customers 
who are happy with it a chained lookup (global-vrf) or (vrf-vrf) .. if 
no route to the dst in the Clean_Internet global table go to vrf.


That way we could easily maintain two parallel internets without in fact 
paying twice for it as only hopefully a very small percentage or 
nets/paths would be considered dirty.


Mechanics of doing it are yet to be drawn on the whiteboard  There 
are number of ways one could go about doing such design.


Regards,
R.

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] VSS display of show run on standby switch

2012-03-14 Thread Chuck Church
Haven't touched VSS in 8 months, but I believe you can do a 'sh mod ?' and
after mod, you can do options for the individual chassis numbers.

Chuck

-Original Message-
From: cisco-nsp-boun...@puck.nether.net
[mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of Brad Clausen
Sent: Wednesday, March 14, 2012 3:00 AM
To: cisco-nsp@puck.nether.net
Subject: [c-nsp] VSS display of show run on standby switch

Hey Guys,

I have 2 x 6509's running as a virtual switch (VSS). I can't for the likes
of me work out the command to display the serial number details of the
Supervisor that is in standby.  The Show run displays the details of the
active supervisor.


OMESW001#sho switch virtual
Switch mode  : Virtual Switch
Virtual switch domain number : 100
Local switch number  : 2
Local switch operational role: Virtual Switch Active
Peer switch number   : 1
Peer switch operational role : Virtual Switch Standby OMESW001#


how can I display the show run equivalent on peer switch 1?
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] VSS display of show run on standby switch

2012-03-14 Thread Ryan West
On Wed, Mar 14, 2012 at 10:26:35, Chuck Church wrote:
 Subject: Re: [c-nsp] VSS display of show run on standby switch
 
 Haven't touched VSS in 8 months, but I believe you can do a 'sh mod ?' 
 and after mod, you can do options for the individual chassis numbers.
 

Yup, 'show mod switch all' will list both.  Show inv will also get you both 
with a Chassis # identifier.

-ryan

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] VSS display of show run on standby switch

2012-03-14 Thread Jose Conceicao
Hi Brad,

hkgi-ddcevssa#sho mod switch 2
 Switch Number: 2   Role:  Virtual Switch Standby
--  -
Mod Ports Card Type  Model  Serial
No.
--- - -- --
---
  1   48  CEF720 48 port 1000mb SFP  WS-X6748-SFP
xx
  2   48  CEF720 48 port 1000mb SFP  WS-X6748-SFP
xx
  3   16  CEF720 16 port 10GEWS-X6716-10GE
 xx
  4   16  CEF720 16 port 10GEWS-X6716-10GE
 xx
  55  Supervisor Engine 720 10GE (Hot)   VS-S720-10G
 xx
  6   16  CEF720 16 port 10GEWS-X6716-10GE
 xx
  7   16  CEF720 16 port 10GEWS-X6716-10GE
 xx
  88  CEF720 8 port 10GE with DFCWS-X6708-10GE
 xx
  98  CEF720 8 port 10GE with DFCWS-X6708-10GE
 xx

Regards,
Jose

On Wed, Mar 14, 2012 at 2:26 PM, Chuck Church chuckchu...@gmail.com wrote:

 Haven't touched VSS in 8 months, but I believe you can do a 'sh mod ?' and
 after mod, you can do options for the individual chassis numbers.

 Chuck

 -Original Message-
 From: cisco-nsp-boun...@puck.nether.net
 [mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of Brad Clausen
 Sent: Wednesday, March 14, 2012 3:00 AM
 To: cisco-nsp@puck.nether.net
 Subject: [c-nsp] VSS display of show run on standby switch

 Hey Guys,

 I have 2 x 6509's running as a virtual switch (VSS). I can't for the likes
 of me work out the command to display the serial number details of the
 Supervisor that is in standby.  The Show run displays the details of the
 active supervisor.


 OMESW001#sho switch virtual
 Switch mode  : Virtual Switch
 Virtual switch domain number : 100
 Local switch number  : 2
 Local switch operational role: Virtual Switch Active
 Peer switch number   : 1
 Peer switch operational role : Virtual Switch Standby OMESW001#


 how can I display the show run equivalent on peer switch 1?
 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/

 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Recommended IPv6 Resources

2012-03-14 Thread Justin M. Streiner

On Tue, 13 Mar 2012, Steve McCrory wrote:


I'm more than prepared to hunt for resources and have a play with IPv6
for myself, I just wanted a pointer in the direction of good,
informative, up-to-date material.


Your point is well taken :)

IPv6, like many other technologies, has launched numerous religious 
debates (read through the NANOG list archives for many examples ;) ), so 
there is lots of information available, but there is also lots of 
potential mis-information.  There are also many areas where either vendor 
support is lean (inet6 firewall filters in Junos), or their documentation 
is lean (Cisco IPv6 inspection capabilities in the ASA comes to mind).


jms
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Carrier grade NAT44 newest Cisco boxes

2012-03-14 Thread Jean-Francois . TremblayING
 We in europe have some pressure to have the ability to map the 
ip/port/timestamp 
 touple back to user. Of course nobody will be able to deliver the port 
together 
 with the ip and an accurate enough timestamp for this to be meaningfull.

Bulk Port Allocation (also called Port Range Allocation) is probably what 
you're looking for. 
It reduces logging requirements by several orders of magnitudes and your 
timestamping 
doesn't have to be as precise. This is a must to deploy any CGN, IMHO. 

Coming soon to your favorite Cisco CGN implementation, apparently... 

 I can see this becoming a larger problem when more nats appear on 
conventional 
 DSL / FTTx / Cable access products as opposed to just low bandwidth 
mobile networks.

Mobile networks aren't that low bandwidth anymore. They have the same 
issues with logging. 

/JF

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] Cisco Security Advisory: Cisco ASA 5500 Series Adaptive Security Appliance Clientless VPN ActiveX Control Remote Code Execution Vulnerability

2012-03-14 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Cisco Security Advisory: Cisco ASA 5500 Series Adaptive Security
Appliance Clientless VPN ActiveX Control Remote Code Execution
Vulnerability

Advisory ID: cisco-sa-20120314-asaclient

Revision 1.0

For Public Release 2012 March 14 16:00  UTC (GMT)

+

Summary
===

The Cisco Clientless VPN solution as deployed by Cisco ASA 5500
Series Adaptive Security Appliances (Cisco ASA) uses an ActiveX
control on client systems to perform port forwarding operations.
Microsoft Windows-based systems that are running Internet Explorer or
another browser that supports Microsoft ActiveX technology may be
affected if the system has ever connected to a device that is running
the Cisco Clientless VPN solution. A remote, unauthenticated attacker
who could convince a user to connect to a malicious web page could
exploit this issue to execute arbitrary code on the affected machine
with the privileges of the web browser.

The affected ActiveX control is distributed to endpoint systems by
Cisco ASA.  However, the impact of successful exploitation of this
vulnerability is to the endpoint system only and does not compromise
Cisco ASA devices.

Cisco has released free software updates that address this
vulnerability.

Workarounds that mitigate this vulnerability are available.

This advisory is available at the following link:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120314-asaclient

Affected Products
=

Cisco Clientless VPN is a feature available on Cisco ASA 5500 Series
Adaptive Security Appliances.

Vulnerable Products
+--

Cisco ASA 5500 Series Adaptive Security Appliances that are running
one of the following versions contain the affected ActiveX component:

+---+
|Affected Version  |Affected Release|
|--+|
| Cisco Adaptive Security Appliance Software   |7.1 |
|7.x   |7.2 |
|--+|
|  |8.0 |
|  |8.1 |
| Cisco Adaptive Security Appliance Software   |8.2 |
|8.x   |8.3 |
|  |8.4 |
|  |8.6 |
+---+

Note: Cisco ASA Software version 7.0 and 7.1 have reached end of
software maintenance.  Customers who are using Cisco ASA Software
version 7.0 or 7.1 should contact their Cisco support team for
assistance in upgrading to a supported version of Cisco ASA
Software.

Note: The affected implementation of the Cisco Clientless VPN
solution was introduced with the release of Cisco ASA Software
version 7.1.  This issue does not affect devices running Cisco
PIX Software.


Administrators may determine whether the Cisco Clientless VPN solution
is enabled on their devices by issuing the show running-config webvpn
command. The following example shows the response when the Cisco
Clientless VPN solution is enabled:

ciscoasa# show running-config webvpn
webvpn
 enable outside

End user systems running Microsoft Windows may be affected if they
have used the Cisco Clientless VPN feature on an affected device from
a browser that supports ActiveX technology.  Devices that contain the
cscopf.ocx ActiveX control registered with a class ID (CLSID) of
{B8E73359-3422-4384-8D27-4EA1B4C01232} are affected.  The affected
controls are marked both Safe for Scripting (SFS) and Safe for
Initialization (SFI), which may present additional attack vectors
when a system has registered and cached the affected control.

Products Confirmed Not Vulnerable
+

  * Cisco Firewall Service Modules are not affected by this
vulnerability
  * Cisco Adaptive Security Appliance Services Modules are not
affected by this vulnerability
  * Cisco IOS Software-based devices that use the Cisco Clientless
VPN solution (WebVPN) are not affected by this vulnerability


No other Cisco products are currently known to be affected by this
vulnerability.

Details
===

Cisco Adaptive Security Appliances (ASA) contain a feature known as
the Cisco Clientless VPN solution.  The Cisco Clientless VPN feature
allows users to use a web browser to create an SSL VPN tunnel from an
endpoint device to a Cisco ASA device.  When connected, the ASA
pushes several ActiveX and Java applications to the endpoint device
to allow a number of features to operate.

When a browser

[c-nsp] Cisco Security Advisory: Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module

2012-03-14 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security
Appliances and Cisco Catalyst 6500 Series ASA Services Module

Advisory ID: cisco-sa-20120314-asa

Revision 1.0

For Public Release 2012 March 14 16:00  UTC (GMT)
+-

Summary
===

Cisco ASA 5500 Series Adaptive Security Appliances (ASA) and Cisco
Catalyst 6500 Series ASA Services Module (ASASM) are affected by the
following vulnerabilities:

  * Cisco ASA UDP Inspection Engine Denial of Service Vulnerability
  * Cisco ASA Threat Detection Denial of Service Vulnerability
  * Cisco ASA Syslog Message 305006 Denial of Service Vulnerability
  * Protocol-Independent Multicast Denial of Service Vulnerability

These vulnerabilities are independent of each other; a release that is
affected by one of the vulnerabilities may not be affected by the
others.

Cisco has released free software updates that address these
vulnerabilities. Workarounds are available to mitigate some of the
vulnerabilities. 

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120314-asa

Note: The Cisco Catalyst 6500 Series Firewall Services Module (FWSM)
may be affected by some of the vulnerabilities above. A separate Cisco
Security Advisory has been published to disclose the vulnerabilities
that affect the Cisco FWSM.

The FWSM advisory is available at:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120314-fwsm

Affected Products
=

Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst
6500 Series ASA Services Module are affected by multiple
vulnerabilities. Affected versions of Cisco ASA Software will vary
depending on the specific vulnerability. Consult the Software
Versions and Fixes section of this security advisory for more
information about the affected version.

Cisco PIX Security Appliances may be affected by some of the
vulnerabilities described in this security advisory. Cisco PIX has
reached end of maintenance support. Cisco PIX Security Appliance
customers are encouraged to migrate to Cisco ASA 5500 Series Adaptive
Security Appliances. Consult the dedicated section for Cisco PIX
Security Appliances in the Vulnerable Products section of this
security advisory for more information about affected versions.

Vulnerable Products
+--

For specific version information, refer to the Software Versions and
Fixes section of this advisory.


Cisco ASA UDP Inspection Engine Denial of Service Vulnerability
+--

The Cisco ASA UDP inspection engine that is used to inspect UDP-based
protocols contains a vulnerability that could allow a remote
unauthenticated attacker to trigger a reload of the Cisco ASA.

All UDP protocols that are being inspected by the Cisco ASA UDP
inspection engine may be vulnerable. The following protocols are known
to use the Cisco ASA UDP inspection engine:

  * Domain Name System (DNS)
  * Session Initiation Protocol (SIP)
  * Simple Network Management Protocol (SNMP)
  * GPRS Tunneling Protocol (GTP)
  * H.323, H.225 RAS
  * Media Gateway Control Protocol (MGCP)
  * SunRPC
  * Trivial File Transfer Protocol (TFTP)
  * X Display Manager Control Protocol (XDMCP)
  * IBM NetBios
  * Instant Messaging (depending on the particular IM client/solution
being used)

Note: UDP inspection engines may be enabled by default on Cisco ASA
Software. Please consult your user guide for more information.

The default inspected ports are listed at the following link:
http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/inspect_overview.html

Note: The Cisco ASA UDP inspection can be applied to non-default UDP
ports via class-map and policy-map commands. Any instance of use of
the Cisco ASA UDP inspection engines may be vulnerable to this
vulnerability, thus, configurations that include non-default UDP ports
but use the Cisco ASA UDP inspection engine are considered vulnerable.

To determine whether any of the above inspections are enabled, issue
the show service-policy | include inspection engine name command and
confirm that the command returns output. The following example shows a
Cisco ASA configured to inspect IBM NetBIOS traffic:

ciscoasa# show service-policy | include netbios
  Inspect: netbios, packet 0, drop 0, reset-drop 0


Cisco ASA Threat Detection Denial of Service Vulnerability
+-

The Cisco ASA Threat Detection feature, when configured with the
Scanning Threat Mode feature and with shun option enabled, contains a
vulnerability that could allow a remote unauthenticated attacker to
trigger a reload of the Cisco ASA. This feature is not enabled by
default.

To determine whether the Cisco ASA Threat Detection with Scanning
Threat feature

[c-nsp] Cisco Security Advisory: Cisco Firewall Services Module Crafted Protocol Independent Multicast Message Denial of Service Vulnerability

2012-03-14 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Cisco Firewall Services Module Crafted Protocol Independent Multicast
Message Denial of Service Vulnerability

Advisory ID: cisco-sa-20120314-fwsm

Revision 1.0

For Public Release 2012 March 14 16:00  UTC (GMT)
+-


Summary
===

The Cisco Catalyst 6500 Series Firewall Services Module (FWSM)
contains a Protocol Independent Multicast (PIM) Denial of Service
Vulnerability.

Cisco has released free software updates that address this
vulnerability. There are no workarounds available that mitigate this
vulnerability. This advisory is available at the following link:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120314-fwsm

Note: The Cisco Adaptive Security Appliance (ASA) and the Cisco
Catalyst 6500 ASA Services Module (ASASM) are also affected by this
vulnerability.

A separate Cisco Security Advisory has been published to disclose the
vulnerabilities that affect the ASA and ASASM. That advisory is
available at: 
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120314-asa

Affected Products
=

The Cisco Catalyst 6500 Series Firewall Services Module is affected by
this vulnerability.  Not all versions of released FWSM Software are
affected.  Consult the Software Versions and Fixes section of this
security advisory for more information.


Vulnerable Products
- ---

For specific version information, refer to the Software Versions and
Fixes section of this advisory.

Protocol Independent Multicast Denial of Service Vulnerability
+-

The Cisco FWSM is affected by a vulnerability that may cause affected
devices to reload during the processing of a PIM message when
multicast routing is enabled. Multicast routing is disabled by
default, however when multicast routing is enabled on the Cisco FWSM,
PIM is automatically enabled on all interfaces.  The following command
enables multicast routing:

fwsm(config)# multicast-routing

To verify whether PIM is enabled on an interface use the show pim
interface command. The following example shows PIM enabled on the
inside interface:

fwsm# sh pim interface

Address  Interface  PIM  Nbr   Hello  DR DR
 Count Intvl  Prior

172.16.1.66inside on   0 30 1  this 
system


Products Confirmed Not Vulnerable
+

With the exception of the Cisco ASA and the Cisco Catalyst 6500 ASA
Services Module, no other Cisco products are currently known to be
affected by this vulnerability.


Details
===

The following section gives additional details about this
vulnerability.


Protocol Independent Multicast Denial of Service Vulnerability
+-

Multicast routing is a bandwidth-conserving technology that reduces
traffic by simultaneously delivering a single stream of information to
multiple recipients.

Protocol Independent Multicast (PIM) is a multicast routing protocol
that is independent of any IP routing protocol. PIM can leverage any
unicast routing protocols that are in use, including Exterior Gateway
Routing Protocol (EIGRP), Open Shortest Path First (OSPF), Border
Gateway Protocol (BGP), or static routes, to populate the unicast
routing table. PIM uses this unicast routing information to perform
the multicast forwarding function, and is IP protocol-independent.
Although PIM is called a multicast routing protocol, it actually uses
the unicast routing table to perform the Reverse Path Forwarding (RPF)
check function instead of building a completely independent multicast
routing table. PIM does not send or receive multicast routing updates
between routers as do other routing protocols.

A vulnerability exists in the way PIM is implemented that may cause
affected devices to reload during the processing of a PIM message when
multicast routing is enabled. The vulnerability is due to improper
handling of PIM messages. An attacker could exploit this vulnerability
by sending a crafted PIM message to the affected system.


This vulnerability is documented in Cisco bug ID CSCtu97367, and has
been assigned Common Vulnerabilities ans Exposures (CVE) ID
CVE-2012-0356.


Vulnerability Scoring Details
=

Cisco has scored the vulnerability in this advisory based on the
Common Vulnerability Scoring System (CVSS). The CVSS scoring in this
security advisory is in accordance with CVSS version 2.0.

CVSS is a standards-based scoring method that conveys vulnerability
severity and helps organizations determine the urgency and priority of
a response.

Cisco has provided a base and temporal score. Customers can also
compute environmental scores that help determine the impact of the
vulnerability

[c-nsp] ip Multicast MoH with zone Based Firewalls?

2012-03-14 Thread Scott Voll
I have a Voice deployment with a remote site that has multicast Music on
hold.  The 2821 that it goes through also has Zone based Firewalls so I can
do GRE over IPSec.(which is not the interface that the Multicast Moh is
using)

my problem is that my Music on hold is not working.

sh ip mroute shows:

(*, 239.1.1.1), 00:50:22/00:02:58, RP x.y.1.252, flags: SJC
  Incoming interface: GigabitEthernet0/1.902, RPF nbr x.z.9.254  == WAN
Metro E
  Outgoing interface list:
GigabitEthernet0/0.1026, Forward/Sparse-Dense, 00:00:01/00:02:58
==Phone network

239.1.1.1 is my Multicast MoH

The RP is correct.

both interfaces .902 and 1026 are in the INSIDE zone with a Zone policy of
class default pass

I'm running 15.1(3)T2,

Is this a zone based FW issue?  a Multicast issue?  or a Bug?  I'm not sure
which way to go. other then drive to the remote site and do a packet
capture.  Other ideas?  I'm trying not to drive =)

TIA

Scott
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ip Multicast MoH with zone Based Firewalls?

2012-03-14 Thread Phil Mayers

On 14/03/12 17:56, Scott Voll wrote:

I have a Voice deployment with a remote site that has multicast Music on
hold.  The 2821 that it goes through also has Zone based Firewalls so I can
do GRE over IPSec.(which is not the interface that the Multicast Moh is
using)

my problem is that my Music on hold is not working.

sh ip mroute shows:

(*, 239.1.1.1), 00:50:22/00:02:58, RP x.y.1.252, flags: SJC
   Incoming interface: GigabitEthernet0/1.902, RPF nbr x.z.9.254  == WAN
Metro E
   Outgoing interface list:
 GigabitEthernet0/0.1026, Forward/Sparse-Dense, 00:00:01/00:02:58
==Phone network

239.1.1.1 is my Multicast MoH

The RP is correct.

both interfaces .902 and 1026 are in the INSIDE zone with a Zone policy of
class default pass

I'm running 15.1(3)T2,

Is this a zone based FW issue?  a Multicast issue?  or a Bug?  I'm not sure
which way to go. other then drive to the remote site and do a packet
capture.  Other ideas?  I'm trying not to drive =)


Disclaimer: I know nothing about ZBFw.

There isn't really enough information here. You'd need to specify the 
topology in a bit more detail. Where is the source of the MoH? Have you 
traced the PIM join state from the source to the RP, and from source to 
receiver, and from RP to receiver?


Since you don't have an (s,g) entry, I'm guessing the RP is either not 
receiving the Register packet, or the packet isn't being sent down the 
shared-tree to the edge router, thus an (s,g) join isn't working.


MTU might be an issue here, if the MoH packets are large. This is a 
bit of a pain with PIM registers, and whether the inner or outer packet 
is fragmented varies by IOS version IIRC.


More details, please ;o)
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Internet inside a VRF?

2012-03-14 Thread Harold Ritter
Bear in mind that IOS and IOS-XR do per prefix label allocation by
default and that some vendors do not cope well with a high number of
labels from what I can remember.

Regards



Le 12-03-14 06:37, « Nick Ryce » nick.r...@lumison.net a écrit :

Does memory usage not increase by putting all the internet routes in a
VRF?

Nick

-Original Message-
From: cisco-nsp-boun...@puck.nether.net
[mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of
michalis.bersi...@hq.cyta.gr
Sent: 14 March 2012 09:47
To: cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] Internet inside a VRF?

Hi,
Putting internet in a vrf is not that bad. I agree with some people say
that separate the global routing table with vrf is easier, especially for
networks that are deploying MPLS routers from scratch. I don't see any
advantages from putting internet Prefixes in the global routing table.

Best Regards,

Michalis Bersimis




--

Message: 1
Date: Tue, 13 Mar 2012 21:58:58 -0500
From: Ge Moua moua0...@umn.edu
To: cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] Internet inside a VRF?
Message-ID: 4f600972.6040...@umn.edu
Content-Type: text/plain; charset=windows-1252; format=flowed

In RE networks, separation of commodity Internet-1 and Internet-2
traffic.

--
Regards,
Ge Moua

University of Minnesota Alumnus
Email: moua0...@umn.edu
--


On 3/13/12 8:17 PM, Jose Madrid wrote:
 I would like to understand why you guys would do this? What is the
 reasoning behind this? Super granular control? Cant this level of
 granularity be achieved with route-maps?

 Sent from my iPhone

 On Mar 13, 2012, at 8:27 PM, Dan Armstrongd...@beanfield.com  wrote:

 We have all our Internet peers and customers inside a VRF currently,
and our Cisco SE thinks we're stark raving mad, and should redesign and
put everything back in the global table.


 This is all on ASR 9Ks and 7600s.





 On 2012-03-13, at 8:12 PM, Pshem Kowalczyk wrote:

 Hi,

 On 14 March 2012 11:59, Dan Armstrongd...@beanfield.com  wrote:
 I know this topic has been discussed a million times, but just
wanted to get an updated opinion on how people are feeling about this:


 In a service provider network, how do people feel about putting the
big Internet routing table, all their peers and customers inside a
VRF?  Keep the global table for just infrastructure links?
 In my previous role we've done just that. One internet VRF for all
 transit functions, separate vrfs for peering and customers and
 import-export statements to tie them all together. All done on ASR1k
 (mainly 1006, but a few of 1002 as well).

 kind regards
 Pshem

 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/
 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

--

This email and any files transmitted with it are confidential and intended
solely for the use of the individual or entity to whom they are addressed.
If you have received this email in error please notify the sender. Any
offers or quotation of service are subject to formal specification.
Errors and omissions excepted.  Please note that any views or opinions
presented in this email are solely those of the author and do not
necessarily represent those of Pulsant.
Finally, the recipient should check this email and any attachments for the
presence of viruses.  Pulsant accept no liability for any
damage caused by any virus transmitted by this email.

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/



___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] cisco PPPoE Intermediate agent SNMP info

2012-03-14 Thread Mike

Hello,

You guys (and gals) rock, thanks for being here.

	So I am noticing now that as I am using pppoe intermediate agent tags, 
I don't seem to be able to get my 7201 to show me any pppoe intermediate 
agent info (circuit-id and remote-id for example) for active sessions. 
The 7201 is certainly passing these along to my radius server and such, 
but 'show sss sessions detailed' has nothing to indicate what tags were 
present with the sessions listed, and there also doesn't appear to be 
anything available with SNMP either.


	It seems to me that knowing which circuit-id was associated with a 
session would be a logical thing to want. It does appear that cisco does 
send this information in the accounting packets, but it's otherwise 
unavailable. This means I would have to keep a seperate table if I want 
this all together with 'current sessions' information. Does anyone have 
any other ideas for this?


Mike-
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Internet inside a VRF?

2012-03-14 Thread Pshem Kowalczyk
Hi,

On 14 March 2012 22:04, Gert Doering g...@greenie.muc.de wrote:
 Hi,

 On Wed, Mar 14, 2012 at 01:12:02PM +1300, Pshem Kowalczyk wrote:
 In my previous role we've done just that. One internet VRF for all
 transit functions, separate vrfs for peering and customers and
 import-export statements to tie them all together.

 What is the benefit?  The obvious drawback is much more complicated,
 more possible ways things can blow up, and more effort to setup and
 maintain.

Easy separation into 'infrastructure' and 'services' spaces. From that
perspective internet is just another service that's being offered.
Ability to offer connectivity to resources only as required; so for
example someone needs only domestic/peering and not full transit -
they connection vrf only imports particular RT and it's all sorted.

kind regards
Pshem

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

Re: [c-nsp] Internet inside a VRF?

2012-03-14 Thread Andrew Miehs

On 15/03/2012, at 8:23 AM, Pshem Kowalczyk wrote:

 Ability to offer connectivity to resources only as required; so for
 example someone needs only domestic/peering and not full transit -
 they connection vrf only imports particular RT and it's all sorted.

Are people really doing this? - I would imagine that you run into routing table 
problems very quickly on things like 6500/ 7600s.


Regards

Andrew
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] Internet inside a VRF?

2012-03-14 Thread Pshem Kowalczyk
On 15 March 2012 10:29, Andrew Miehs and...@2sheds.de wrote:

 On 15/03/2012, at 8:23 AM, Pshem Kowalczyk wrote:

 Ability to offer connectivity to resources only as required; so for
 example someone needs only domestic/peering and not full transit -
 they connection vrf only imports particular RT and it's all sorted.

 Are people really doing this? - I would imagine that you run into routing 
 table problems very quickly on things like 6500/ 7600s.

That particular setup is using ASR1ks, not 6500/7600.

kind regards
Pshem
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] Interoperability issue between ME-3800X and Huawei OSN 6800 (1000BaseLX)

2012-03-14 Thread Luis Anzola

Hi Guys,

Does anyone have experienced problems interconnecting Cisco Router with 
DWDM Huawei equipments through 1000BaseLX?  I am currently trying to 
connect a ME-3800X using the SFP+ Multi-rate port (Ten0/1) with a 
GLC-LH-SM versus Huawei OSN 6800 DWDM and I am experiencing problem 
bringing the b2b interface Up. I have tried turning on and off the 
Auto-Negotiation on the  Cisco Router without success. Curiously,  when 
I change the link to a 1GigaEth port (Gi0/1) in the ME-3800X the link 
goes UP and end2end connectivity is established. I was wondering whether 
some change have to be done on the DWDM equipment in order to achieve 
the negotiation with the SFP+ port.


Thanks in advance for any comment you may suggest.

Regards.
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/