me3600x/me3800x
Thanks
Darren
http://www.mellowd.co.uk/ccie
From: cisconsp_l...@hotmail.com
To: cisco-nsp@puck.nether.net
Date: Wed, 9 Oct 2013 15:43:20 +1100
Subject: [c-nsp] vlan shaping
Hi Everyone - ME3400's appear to not support (easily) per vlan shaping - What
(switch) platform
Hi all,
I'm looking for a stable IOS version for a 7600 with RSP720. Every IOS
in the 15.x range is either ED or MD.
To all out there with 15.x on a 7600, what do you recommend ?
Kind regards,
Rob
___
cisco-nsp mailing list cisco-nsp@puck.nether.net
On Tue, 2013-10-08 at 16:04 -0600, Karl Putland wrote:
Well... so it works in 12.4.4 but not 12.4.24 as configured.
It's a change alright but it seems semi-logical to me that the router
drops packets with an Unresolved route reason given what you
describe. :-)
I had wanted to use the global
Thanks Darren - So massive jump in price to support this feature?
From: darre...@outlook.com
To: cisconsp_l...@hotmail.com; cisco-nsp@puck.nether.net
Subject: RE: [c-nsp] vlan shaping
Date: Wed, 9 Oct 2013 07:42:06 +0100
me3600x/me3800x
Thanks
Darren
http://www.mellowd.co.uk/ccie
From:
We're scratching our heads regarding some strange link-flapping. We have
a ~3 km run (no underground vaults before a recent accident) over which
we run 10G-LR. It has worked without problems for a couple of months. A
few weeks ago someone pushed a sharpened wooden pole down through the
plastic
2.4dB on a 3km link maybe well in your budget but its way to high for a 3km
link.
Must be something wrong with the splice.
Swapping fibers seems a logic first step to narrow this down.
Kind regards,
Erik
- Oorspronkelijk bericht -
Van: Peter Rathlev pe...@rathlev.dk
Aan: cisco-nsp
On Wednesday, October 09, 2013 11:15:58 AM CiscoNSP List
wrote:
Thanks Darren - So massive jump in price to support this
feature?
The ME3600X/3800X are the future of Cisco's Metro-E
portfolio.
Those boxes have the hardware that previous boxes didn't to
do many of the things service
On Wednesday, October 09, 2013 08:52:04 AM Rob Timmermans
wrote:
I'm looking for a stable IOS version for a 7600 with
RSP720. Every IOS in the 15.x range is either ED or MD.
To all out there with 15.x on a 7600, what do you
recommend ?
The MD releases. can be considered akin to the old GD
On Wed, 2013-10-09 at 11:31 +0200, Peter Rathlev wrote:
All fibers were spliced in a new vault and OTDR showed nothing wrong
afterwards. We can see the loss/reflection from the splice but it's well
within tolerances. The total link loss (according to DOM) is 0.6 dB in
one direction and 2.4 dB
On 09/10/2013 13:31, Peter Rathlev wrote:
Another interesting point is that the link flaps are not completely
random. It depends on time of day and from cursory inspection it looks
correlated with when many cars are driving near the area where the
splices are made. This could lend itself to
On 09/10/13 10:31, Peter Rathlev wrote:
within tolerances. The total link loss (according to DOM) is 0.6 dB in
one direction and 2.4 dB in the other direction. Budget should be at
least around 8 dB.
As others have suggested, this seems like a bad fix to me. How sure of
the OTDR trace are
On 09/10/13 10:47, Erik Klaassen wrote:
2.4dB on a 3km link maybe well in your budget but its way to high for a 3km
link.
True, however note he cited loss figures from DOM, which may be imprecise.
That said, I agree such an asymmetry suggests a problem.
Hi folks,
I've been used to the convenience of being able to select exactly which
groups will use which data tree like below IOS cfg snip.
mdt data 232.1.0.0 0.0.0.0
mdt data 232.1.0.1 0.0.0.0 list AL_IPTV_BASIC
mdt data 232.1.0.2 0.0.0.0 list AL_IPTV_LOCAL1
And I have just found out it's not
15.2.4S4 is considered a Safe Harbor release for 15S, but you might want
to wait a week or two for 15.24S4a to come out (roughly scheduled)
On Wed, Oct 9, 2013 at 7:48 AM, Mark Tinka mark.ti...@seacom.mu wrote:
On Wednesday, October 09, 2013 08:52:04 AM Rob Timmermans
wrote:
I'm looking
Hey, all.
I'm looking at an option to consolidate and reduce complexity of a
multi-provider L3VPN network in a way that lets me also use internet-based VPNs
for backup. Right now I have dual provider uplinks at all of my sites to
provide me inter-office WAN connectivity.
DMVPN is a nice and
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Cisco Security Advisory: Multiple Vulnerabilities in Cisco ASA Software
Advisory ID: cisco-sa-20131009-asa
Revision 1.0
For Public Release 2013 October 9 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Cisco Security Advisory: Multiple Vulnerabilities in Cisco Firewall Services
Module Software
Advisory ID: cisco-sa-20131009-fwsm
Revision 1.0
For Public Release 2013 October 9 16:00 UTC (GMT
Does anyone know if OIR has any effect on Spanning Tree ?
I know it stops the BUS briefly but thats it.
We had to remove a mod that had nothing connected but did still have config,
and we experienced many STP log messages relating to ROOT change from other
connect switches.
I could not
___
Arbor Networks 9th Annual Infrastructure Security Survey Now Open
___
Arbor Networks would like to invite you to participate in our annual
infrastructure
People do this all the time: GRE/IPSEC back up to MPLS VPN.
Lots of service providers have managed service that does this for you.
With modern hardware, fragmentation shouldn't be a big deal. Most providers
have end to end jumbo frame so just need to be mindful of who does and who
don't.
Good
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
JP Senior wrote:
Hey, all.
I'm looking at an option to consolidate and reduce complexity of a
multi-provider L3VPN network in a way that lets me also use internet-based
VPNs for backup. Right now I have dual provider uplinks at all of my sites
I run a similar topology. On the tunnel interfaces I have ip tcp
adjust-mss 1452 and tunnel path-mtu-discovery. No problems encountered;
though the traffic profile is basic remote office file and print.
On Wed, Oct 9, 2013 at 9:30 AM, JP Senior seni...@bennettjones.com wrote:
Hey, all.
I'm
Hi folks,
With the newest advisory for the ASA:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa
We are thinking of going uniform with Cisco ASA 8.4.7. Looking at the
Resolved Caveats, lots of them got fixed:
http://www.cisco.com/en/US/docs/security/asa
-nsp] Cisco ASA 8.4.7
Hi folks,
With the newest advisory for the ASA:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa
We are thinking of going uniform with Cisco ASA 8.4.7. Looking at the Resolved
Caveats, lots of them got fixed:
http://www.cisco.com/en
24 matches
Mail list logo