Re: [c-nsp] ARP on ASR9k 4.3.2

2014-02-19 Thread Adam Vitkovsky
For full blown, hitless ISSU/SMU/FPD stuff, not a chance in hell. Right that requires the HW support, the only platform out there that supports 0 packet loss ISSU is Cisco NCS. adam -Original Message- From: cisco-nsp [mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of Jason Lixfeld

Re: [c-nsp] Question on ASR9K feature licenses

2014-02-19 Thread Adam Vitkovsky
Oh and the VRF license is actually per line-card! So not only you have to buy two expensive LCs with extended buffers where you'd like to terminate MPLS L3VPNs. - You also need to buy the L3VPN license for each of the cards. Though if you use bundle interfaces XR won't complain as it does not

Re: [c-nsp] 7200VXR to ASR upgrade

2014-02-19 Thread Mikael Abrahamsson
On Tue, 18 Feb 2014, Adam Greene wrote: move to the ASR platform. They may keep the 7204VXR/NPE-G1 for redundancy Just to save you confusion in the future. There is no the ASR platform. There are multiple. You'll incur less confusion if you actually say ASR1k which has absolutely nothing in

Re: [c-nsp] 7200VXR to ASR upgrade

2014-02-19 Thread Andrew Miehs
If you only need Ethernet look at the ASR1001 - it is fairly cheap and should do what you are after. Andrew On Wed, Feb 19, 2014 at 9:40 AM, Adam Greene maill...@webjogger.net wrote: Hi, We have a customer running an old 7204VXR/NPE-G1, with (4) gigabit interfaces, and BGP with two

Re: [c-nsp] 7200VXR to ASR upgrade

2014-02-19 Thread Aled Morris
On 19 February 2014 03:21, Mark Tinka mark.ti...@seacom.mu wrote: On Wednesday, February 19, 2014 01:28:59 AM Jeremy Bresley wrote: The only caveats I'll mention on the ASR1K is that they are priced around 1GbE ports. There are OC3/OC12/OC48/DS3 cards available, but they tend to get

Re: [c-nsp] 7200VXR to ASR upgrade

2014-02-19 Thread Nick Hilliard
On 18/02/2014 22:40, Adam Greene wrote: From what I'm seeing, the ASR1002-X looks to be the simplest and most versatile / scalable option for them right out of the gate. Based on their need for BGP/OSPF, I would say they need an Advanced IP Services license. Does that sound right? What you'll

[c-nsp] Cisco Security Advisory: Cisco Firewall Services Module Cut-Through Proxy Denial of Service Vulnerability

2014-02-19 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Cisco Security Advisory: Cisco Firewall Services Module Cut-Through Proxy Denial of Service Vulnerability Advisory ID: cisco-sa-20140219-fwsm Revision 1.0 For Public Release 2014 February 19 16:00 UTC (GMT

[c-nsp] Cisco Security Advisory: Multiple Vulnerabilities in Cisco IPS Software

2014-02-19 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Cisco Security Advisory: Multiple Vulnerabilities in Cisco IPS Software Advisory ID: cisco-sa-20140219-ips Revision 1.0 For Public Release 2014 February 19 16:00 UTC (GMT

[c-nsp] Cisco Security Advisory: Cisco UCS Director Default Credentials Vulnerability

2014-02-19 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Cisco Security Advisory: Cisco UCS Director Default Credentials Vulnerability Advisory ID: cisco-sa-20140219-ucsd Revision 1.0 For Public Release 2014 February 19 16:00 UTC (GMT

[c-nsp] Cisco Security Advisory: Unauthorized Access Vulnerability in Cisco Unified SIP Phone 3905

2014-02-19 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Cisco Security Advisory: Unauthorized Access Vulnerability in Cisco Unified SIP Phone 3905 Advisory ID: cisco-sa-20140219-phone Revision 1.0 For Public Release 2014 February 19 16:00 UTC (GMT

Re: [c-nsp] ARP on ASR9k 4.3.2

2014-02-19 Thread Mark Tinka
On Wednesday, February 19, 2014 12:02:58 PM Adam Vitkovsky wrote: Right that requires the HW support, the only platform out there that supports 0 packet loss ISSU is Cisco NCS. Even then, I likely won't try it. There is just too many moving parts. Mark. signature.asc Description: This is

Re: [c-nsp] 7200VXR to ASR upgrade

2014-02-19 Thread Mark Tinka
On Wednesday, February 19, 2014 04:12:50 PM Aled Morris wrote: I don't disagree with this, but I'd like to emphasise Jeremy's subsequent remarks regarding the fact the ASR1k is really a great Nx1GE platform, but not one you'd deploy if you needed multiple 10GE interfaces. To be honest, I'm

Re: [c-nsp] 7200VXR to ASR upgrade

2014-02-19 Thread Adam Greene
Hi guys, I really appreciate everyone's input, including the clarification that there is no ASR platform per se, only ASR1k, ASR9k, etc. Assuming the customer goes with the ASR1002-X, which still seems to me to be the best forward-looking option for this particular customer's needs, in order to

Re: [c-nsp] 7200VXR to ASR upgrade

2014-02-19 Thread Aled Morris
On 19 February 2014 16:20, Adam Greene maill...@webjogger.net wrote: Assuming the customer goes with the ASR1002-X, which still seems to me to be the best forward-looking option for this particular customer's needs, in order to get an Advanced IP Services license (which I assume is the

Re: [c-nsp] 7200VXR to ASR upgrade

2014-02-19 Thread Gert Doering
Hi, On Wed, Feb 19, 2014 at 04:32:52PM +, Aled Morris wrote: They would but I believe basic BGP and OSPF are in IP BASE so it isn't needed in this case, unless you need some specific features like BFD or OSPFv3 for IPv6. *sigh*. There goes the promise if an image has feature X for IPv4,

Re: [c-nsp] 7200VXR to ASR upgrade

2014-02-19 Thread Charles Sprickman
On Feb 19, 2014, at 11:32 AM, Aled Morris wrote: On 19 February 2014 16:20, Adam Greene maill...@webjogger.net wrote: Assuming the customer goes with the ASR1002-X, which still seems to me to be the best forward-looking option for this particular customer's needs, in order to get an

Re: [c-nsp] Transparent WAN Encryption

2014-02-19 Thread Justin M. Streiner
On Sun, 2 Feb 2014, Jeff Orr wrote: If you are using a private MPLS (I.e. Not over Internet) have Cisco CE routers consider GETVPN. For the reasons you mentioned, we as a customer went this direction. We needed to ensure our WAN (150 sites/multiple data centers)traveling across a variety of

[c-nsp] ME3600X - Hairpinning/Local Connect

2014-02-19 Thread Ivan
Hi, I have seen in the config guides at way of send traffic in and out the same port or even different ports http://www.cisco.com/c/en/us/td/docs/switches/metro/me3600x_3800x/software/release/15-3_1_S/configuration/guide/3800x3600xscg/swevc.html#wp1051612 I was looking to use the connect

Re: [c-nsp] ME3600X - Hairpinning/Local Connect

2014-02-19 Thread Pshem Kowalczyk
Hi, You have to use the EVC concept here - create a bridge-domain and add both service instances to it. I'm also not sure what you're trying to achieve with the 'no rewrite' command - by default no tag manipulation is done. Most of the EVC concepts are explained here:

Re: [c-nsp] ME3600X - Hairpinning/Local Connect

2014-02-19 Thread George Giannousopoulos
Hi, This feature is supported in 15.3(2)S and newer images. Check http://www.cisco.com/c/en/us/td/docs/ios/15_3s/release/notes/15_3s_rel_notes/15_3s_feats_important_notes_15_3_2s.html I've tested it successfully in 15.3(3)S1a Best regards George On Thu, Feb 20, 2014 at 4:45 AM, Ivan