For full blown, hitless ISSU/SMU/FPD stuff, not a chance in hell.
Right that requires the HW support, the only platform out there that
supports 0 packet loss ISSU is Cisco NCS.
adam
-Original Message-
From: cisco-nsp [mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of
Jason Lixfeld
Oh and the VRF license is actually per line-card!
So not only you have to buy two expensive LCs with extended buffers where
you'd like to terminate MPLS L3VPNs.
- You also need to buy the L3VPN license for each of the cards.
Though if you use bundle interfaces XR won't complain as it does not
On Tue, 18 Feb 2014, Adam Greene wrote:
move to the ASR platform. They may keep the 7204VXR/NPE-G1 for redundancy
Just to save you confusion in the future. There is no the ASR platform.
There are multiple. You'll incur less confusion if you actually say ASR1k
which has absolutely nothing in
If you only need Ethernet look at the ASR1001 - it is fairly cheap and
should do what you are after.
Andrew
On Wed, Feb 19, 2014 at 9:40 AM, Adam Greene maill...@webjogger.net wrote:
Hi,
We have a customer running an old 7204VXR/NPE-G1, with (4) gigabit
interfaces, and BGP with two
On 19 February 2014 03:21, Mark Tinka mark.ti...@seacom.mu wrote:
On Wednesday, February 19, 2014 01:28:59 AM Jeremy Bresley
wrote:
The only caveats I'll mention on the ASR1K is that they
are priced around 1GbE ports. There are
OC3/OC12/OC48/DS3 cards available, but they tend to get
On 18/02/2014 22:40, Adam Greene wrote:
From what I'm seeing, the ASR1002-X looks to be the simplest and most
versatile / scalable option for them right out of the gate. Based on their
need for BGP/OSPF, I would say they need an Advanced IP Services license.
Does that sound right?
What you'll
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Cisco Security Advisory: Cisco Firewall Services Module Cut-Through Proxy
Denial of Service Vulnerability
Advisory ID: cisco-sa-20140219-fwsm
Revision 1.0
For Public Release 2014 February 19 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Cisco Security Advisory: Multiple Vulnerabilities in Cisco IPS Software
Advisory ID: cisco-sa-20140219-ips
Revision 1.0
For Public Release 2014 February 19 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Cisco Security Advisory: Cisco UCS Director Default Credentials Vulnerability
Advisory ID: cisco-sa-20140219-ucsd
Revision 1.0
For Public Release 2014 February 19 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Cisco Security Advisory: Unauthorized Access Vulnerability in Cisco Unified SIP
Phone 3905
Advisory ID: cisco-sa-20140219-phone
Revision 1.0
For Public Release 2014 February 19 16:00 UTC (GMT
On Wednesday, February 19, 2014 12:02:58 PM Adam Vitkovsky
wrote:
Right that requires the HW support, the only platform out
there that supports 0 packet loss ISSU is Cisco NCS.
Even then, I likely won't try it. There is just too many
moving parts.
Mark.
signature.asc
Description: This is
On Wednesday, February 19, 2014 04:12:50 PM Aled Morris
wrote:
I don't disagree with this, but I'd like to emphasise
Jeremy's subsequent remarks regarding the fact the ASR1k
is really a great Nx1GE platform, but not one you'd
deploy if you needed multiple 10GE interfaces.
To be honest, I'm
Hi guys,
I really appreciate everyone's input, including the clarification that there
is no ASR platform per se, only ASR1k, ASR9k, etc.
Assuming the customer goes with the ASR1002-X, which still seems to me to be
the best forward-looking option for this particular customer's needs, in
order to
On 19 February 2014 16:20, Adam Greene maill...@webjogger.net wrote:
Assuming the customer goes with the ASR1002-X, which still seems to me to
be
the best forward-looking option for this particular customer's needs, in
order to get an Advanced IP Services license (which I assume is the
Hi,
On Wed, Feb 19, 2014 at 04:32:52PM +, Aled Morris wrote:
They would but I believe basic BGP and OSPF are in IP BASE so it isn't
needed in this case, unless you need some specific features like BFD or
OSPFv3 for IPv6.
*sigh*. There goes the promise if an image has feature X for IPv4,
On Feb 19, 2014, at 11:32 AM, Aled Morris wrote:
On 19 February 2014 16:20, Adam Greene maill...@webjogger.net wrote:
Assuming the customer goes with the ASR1002-X, which still seems to me to
be
the best forward-looking option for this particular customer's needs, in
order to get an
On Sun, 2 Feb 2014, Jeff Orr wrote:
If you are using a private MPLS (I.e. Not over Internet) have Cisco
CE routers consider GETVPN.
For the reasons you mentioned, we as a customer went this direction.
We needed to ensure our WAN (150 sites/multiple data centers)traveling
across a variety of
Hi,
I have seen in the config guides at way of send traffic in and out the
same port or even different ports
http://www.cisco.com/c/en/us/td/docs/switches/metro/me3600x_3800x/software/release/15-3_1_S/configuration/guide/3800x3600xscg/swevc.html#wp1051612
I was looking to use the connect
Hi,
You have to use the EVC concept here - create a bridge-domain and add
both service instances to it. I'm also not sure what you're trying to
achieve with the 'no rewrite' command - by default no tag manipulation
is done.
Most of the EVC concepts are explained here:
Hi,
This feature is supported in 15.3(2)S and newer images.
Check
http://www.cisco.com/c/en/us/td/docs/ios/15_3s/release/notes/15_3s_rel_notes/15_3s_feats_important_notes_15_3_2s.html
I've tested it successfully in 15.3(3)S1a
Best regards
George
On Thu, Feb 20, 2014 at 4:45 AM, Ivan
20 matches
Mail list logo