On 12 October 2016 at 02:19, Tony wrote:
> VASI is only on IOS-XE is it not ?
No its on IOS, XE and XR.
Cheers,
James.
___
cisco-nsp mailing list cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.neth
Hello
I'm new to site to site IPsec VPN and also ASA 5505 firewall.
My site to site IPsec VPN tunnel established between SiteA to SiteB. And
can ping IP behind firewall. Now I need to
Site A is VPN one end
Site B is VPN other end
Site C is VPN other end
IP1 is located outside of Site B.
SiteA
Hello,
I m getting the following on one of our production routers.
%AAA-3-BADLIST: invalid list AAA ID 4190791 -Process= "SSH Process"
Regards,
Righa
___
cisco-nsp mailing list cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-
Hi,
> Hello,
>
> I m getting the following on one of our production routers.
>
> %AAA-3-BADLIST: invalid list AAA ID 4190791 -Process= "SSH Process"
Error Message%AAA-3-BADLIST: invalid list AAA ID %u
ExplanationAn AAA client has provided an invalid attribute list to AAA.
Recommended A
I thought the same - which IOS devices have you seen it on -
I have seen it on XE (ASR/CSR/44xx), but not on a fully licensed Sup2T, so
can't imagine it's on a 7600?
-Original Message-
From: cisco-nsp [mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of James
Bensley
Sent: Wednesday
On 12 October 2016 at 15:38, Nick Cutting wrote:
> I thought the same - which IOS devices have you seen it on -
>
> I have seen it on XE (ASR/CSR/44xx), but not on a fully licensed Sup2T, so
> can't imagine it's on a 7600?
I saw it on some 7200s, I was looking to move services to a 7600, so I
op
Post relevant sanitized phase2 configurations.
Mainly your ACLs.
On Oct 12, 2016 04:37, "Tseveendorj Ochirlantuu"
wrote:
> Hello
>
> I'm new to site to site IPsec VPN and also ASA 5505 firewall.
>
> My site to site IPsec VPN tunnel established between SiteA to SiteB. And
> can ping IP behind fi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco Meeting Server Client Authentication Bypass Vulnerability
Advisory ID: cisco-sa-20161012-msc
Revision 1.0
For Public Release 2016 October 12 16:00 UTC (GMT)
Last Updated 2016 October 12 16:00 UTC (GMT
On 12/10/2016 00:12, Tom Hill wrote:
I'm assuming you know what that device is that's claiming the root
bridge? That's probably a good clue.
The "new" root bridge mac is device which has always been the root for
this VLAN, not of the other devices between these and the root logged a
change.
A
On 12/10/16 18:06, David Wilkinson wrote:
> Should split horizon stop the loops when connecting downstream switches
> in a resilient configuration?
It can't when you've the ability to loop a broadcast frame around via
devices that aren't party to the split horizon forwarding. I'm not
certain this
10 matches
Mail list logo