Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
ragzilla
Sep 9, 2005
don't ask me, i only work here


NinjaPablo posted:

Can anyone point me in the direction or explain how IOS version numbers work?
...
I guess all the stuff in ()s in the version confuses me.
I'm sure there's a better link, but http://www.cisco.com/en/US/tech/tk869/tk769/technologies_white_paper09186a00800a998b.shtml#23

For your example of 12.1(3r)T2:
12.1- Major release.
(3r)- 3rd maintenance release, r'th rebuild (starts at a)
T- Consolidated Technology release train (there are typically several trains of IOS available depending on platform, where you get different features, S trains (service providers) have different features than say an E train which is enterprise feature set).
2- Release rebuild counter, in this case this is the second rebuild of 12.1(3r)T

-edit-
found a better one
http://www.cisco.com/warp/customer/620/1.html
-/edit-

ragzilla fucked around with this message at 22:06 on Apr 16, 2007

Adbot
ADBOT LOVES YOU

ragzilla
Sep 9, 2005
don't ask me, i only work here


sirchode posted:

Catalyst question: Is there a way to get a list of all VLANs showing me which switch is acting as spantree root for each one? I've got hundreds of VLANs so going through each one individually isn't very desirable and I'd like to be able to see at a glance which ones need to be fixed

# show spanning-tree detail | inc (is executing the|Current root|We are)

gets the mac address of the root bridge, up to you to map mac addr->switch (tested on 3750, might need some changes for other platforms).

ragzilla
Sep 9, 2005
don't ask me, i only work here


sirchode posted:

Edit: misunderstood you

Please hold, your call is important to us

Edit 2: Okay I'm not following you here. My routers (7507s/12.3(15a)) aren't letting me do a sh spanning-tree detail, I've got sh spanning-tree root and sh spanning-tree root address but both return blank lines.

The switch is a 5500 by the way (should have specified, sorry)

Google isn't much help either, I'm wondering if I'm just out of luck on this one

sh spanning-tree is only going to work on catalyst platforms like the 5500. I've never done IRB in routing platforms but there may be some spanning tree info on the 7500s in show bridging / show irb

ragzilla
Sep 9, 2005
don't ask me, i only work here


Mr. Fossey posted:

I am trying to setup NetFlow on a 1700 running Version 12.3(13). I am going from Serial0 nat'd to FE0. I have the communication working except that I am not translating incoming communication from the internet to internal IPs.

I am getting:
Source-bob.com Dest-My external IP

Desired:
Source-bob.com Dest-Internal IP of the user

I'm not sure you can do this as the flow records are generated on packet ingress- before translation. If you want proper flows you may want to look at tapping/span'ing your internal FastEth port to a netflow probe and export flows from that.

ragzilla
Sep 9, 2005
don't ask me, i only work here


jwh posted:

Here's an interesting workaround I dug up: http://www.netup.biz/articles.php?n=10

It involves using policy routing to force traffic to a loopback interface after nat translation, and enabling netflow on the loopback.

Sounds pretty clever.

Probably want to keep on eye on the CPU if you tried that, Cisco states in their 'nat on a stick' docs that nat+pbr may result in packets getting punted to the process switching path.

ragzilla
Sep 9, 2005
don't ask me, i only work here


Funnylink posted:

I have a cisco 800 series router i recently bought 5 months ago. I am having trouble with interference with my wireless security camera creating interference on the wireless channel. I am having problems finding out how to change the wireless channel by googling. How do I configure the dot11radio interface to change the wireless frequency?

code:
interface Dot11Radio0
 world-mode dot11d country US indoor
 channel 2412
end
this is from my aironet, i'm guessing the commands will be the same since they're both IOS based. you can also specify a 'normal' channel number (1-11) or tell it to scan for least congested, but I'd probably manually set it to 1, 6 or 11.

code:
farnsworth(config-if)#channel ?
  <1-2462>         One of: 1 2 3 4 5 6 7 8 9 10 11 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
  least-congested  Scan for best frequency

ragzilla
Sep 9, 2005
don't ask me, i only work here


fsck posted:

I have a pair of Cisco Catalyst 6506 routers that are to terminate both sides of a private-line OC3. I know IOS but CatOS and the relationship between the OC3 FlexWAN module and the supervisor engines is really making me tear my hair out.

Does anyone have experience doing VLAN trunking between the IOS FlexWAN modules and the CatOS super2 engines? If you're a consultant, I'm willing to pay for a couple hours time. I know I'm just missing the obvious :(

My first thought was to put the OC3 interface (POS5/0/0) into the same VLAN as the ethernet ports managed by CatOS. Unfortunately the OC3 interface does not accept switchport commands!

If you think you can help I would love a private message or an IM chat.

The FlexWAN isn't a switchport- it's intended to be used as a WAN connection. It's typical use (as a POS interface) you'd just set up IPs on either side and use it as a routed (not switchport) interface. If you need to do VLANs over it you're probably going to have to look at running MPLS/L2VPN/EoMPLS over it.

inignot posted:

Use 10.whatever on all your interfaces, then enable eigrp per below.

router eigrp 1
no auto-summary
network 10.0.0.0 255.0.0.0

Out of curiosity; do you have, or know how to make, a t1 crossover cable?
Don't forget default-originate on the 1720 with the WAN connection (does EIGRP require an explicit default-originate or is that just OSPF?)

jwh posted:

I'm wondering if anybody has any advice for DMVPN tunnel monitoring. Because the mGRE tunnels don't ever go down/down (unless the associated physical interface goes down), it's not very practical to simply watch the tunnel interface itself.

We've been working around this problem by using syslog to report EIGRP adjacency changes, and then alerting based on this information.

Still, I'm wondering if anybody has any ideas, or if they've heard of a snmp mib for IPSec SA's.
I think the standard response to tunnel monitoring on the c-nsp list these days is: TCL/EEM (if you're running code that supports it).

ragzilla
Sep 9, 2005
don't ask me, i only work here


fsck posted:

Actually I don't need to do VLAN trunking, specifically. All I really need to do is use the OC3 to connect one side of the network to the other - they are on different octet class-C subnets (i.e. 10.10.10.0 and 10.10.11.0 for sake of example). The hybrid mode of the current switch config is probably what is so heinously confusing to me.

Maybe we could do an IM session? AIM/Yahoo!/ICQ: novafsck

Not seeing you on AIM (my contact info is in profile).

In any case, the quick version + disclaimer since I've never worked on the 6500 platform- most of my experience is with routers (7200/12k).

Your configuration will probably be done on the MSFC rather than the sup (since you mentioned CatOS I'm guessing you're running in hybrid mode). Once connected to the MSFC you should be able to assign addresses to the POS interfaces (conf t, int pos 5/0/0, ip addr 10.10.255.1 255.255.255.252 (on one side) ip addr 10.10.255.2 255.255.255.252 (on the other), and then ping between them. Then it's just a matter of setting up static routes or a a routing protocol like OSPF.

ragzilla
Sep 9, 2005
don't ask me, i only work here


sirchode posted:

Thank you, that is indeed pretty awesome. We've got some offices on the other side of the country and I'm imagining having them set up as VLANs managed by our switches and routers over here in the CO, it's a very cool prospect.

What kind of equipment did you lab this with? I've never heard of pseudowire so I'm wondering if I'm just too nub to have known about it or if it's a relatively new thing (ie., introduced in a new IOS version)

12.0(23)S apparently. Pretty recent still. From what I understand it's mostly intended in an MPLS backbone but they also added support for 'regular' IP backbones (much like VRF-lite).

ragzilla
Sep 9, 2005
don't ask me, i only work here


adante posted:

probably not the right place to ask but what the hey :dance:

the cisco vpn client - can someone convince me that this is not a flaming piece of crud?

on my linux box it typically hardlocks my machine. sometimes I am lucky and it just brings down all other network interfaces (this is also not so useful because my server is in a cupboard with no easy keyboard/mouse access)

on my windows box tends to kill all other network connections. Then, dns lookup and internet surfing is terrifically slow (I suspect it is going through the vpn)

I've been told this 'kill all other network connections' behavioiur is by design. ok, I am not very much a fan of this.

Can someone recommend alternative pieces of software, hacks, configuration changes or whatever that could allow me to connect to my work vpn without causing immense headache?

The 'kill all connections' is controlled by the VPN server, you'd have to have the person that configures the VPN concentrator/firewall enable split tunneling and then it would only route traffic intended for the remote network over the VPN tunnel.

ragzilla
Sep 9, 2005
don't ask me, i only work here


Wicaeed posted:

Ok this is a dumb one, but where can I find the steps I need to go through with the CLI to install a new version of ios for my 871 router? The Cisco website sucks pretty bad and all I can find are tech docs on how to restart the router.

http://www.cisco.com/en/US/products/hw/routers/ps380/products_tech_note09186a0080094b23.shtml

http://www.cisco.com/en/US/products/hw/routers/ps380/tsd_products_support_series_home.html (800 series support home, the upgrade instructions are under install and upgrade technotes)

ragzilla
Sep 9, 2005
don't ask me, i only work here


InferiorWang posted:

code:
duplex mismatch discovered on GigabitEthernet0/1 
(not full duplex), with Switch GigabitEthernet0/1 (full duplex)
I'm trying the whole learn as I go thing. I've got a 2950 sitting on my desk I'm farting around with and I'm getting the error message above on the console. Are the two Gig0/1 ports on different switches all together?

Yes. Cisco devices typically talk across links using a protocol known as CDP (Cisco Discovery Protocol) to tell each other their hostnames / ip addresses / settings they're using on the link.

In this case, the switch you are looking it has it's Gi0/1 port set to half-duplex, but the switch on the other side of the link is reporting in it's CDP packets that it has the link set for full-duplex. Check your int Gi0/1 configuration, and remove any commands like half-duplex or switchport nonegotiate.

ragzilla
Sep 9, 2005
don't ask me, i only work here


ionn posted:

That's what happens if you connect cisco equipment to cisco equipment.

Fixed.

I still can't believe how horribly unreliable autonegotiation Cisco-to-Cisco is. It's crazy that in this day and age we still have to go through and manually force speed/duplex on ports to stop Cisco gear from doing something stupid.

vvv You've probably never had the fun of using a 7200 with an IO-FE or PA-FE-TX, they're both absolutely terrible at autonego, I didn't even bother letting them autonego after the first one I had to turn up.

ragzilla fucked around with this message at 19:36 on May 10, 2007

ragzilla
Sep 9, 2005
don't ask me, i only work here


jwh posted:

Isn't autonegotiation required for 1000base-t? I know you can force it off on fiber interfaces, but I don't think I can turn down autonegotiation on my X6548-GE-TX modules.

edit: I think I'm wrong about the module. I seem to remember there was something out there that would only take a 'speed auto', but now I can't figure out what it was.

GBIC/SFP based ports can only take 1000/full afaik, fixed modules may vary by platform.

ragzilla
Sep 9, 2005
don't ask me, i only work here


Girdle Wax posted:

GBIC/SFP based ports can only take 1000/full afaik, fixed modules may vary by platform.

Correcting myself here, GLC-T SFP modules are capable of 10/100/1000 on certain platforms, listed at http://www.cisco.com/en/US/products/hw/modules/ps5455/products_device_support_table09186a0080446625.html

ragzilla
Sep 9, 2005
don't ask me, i only work here


obsidian440 posted:

I have very very little cisco knowledge and find myself more and more working with the company firewall/router. The info I get in the pix manager about is
Cisco PIX Firewall Version 6.3(4)
Cisco PIX Device Manager Version 3.0(2)

I would like to setup logging to a server within our network, which I have done, but now need to clean up the messages I am recieving. Is it possible to log only denied VPN connections and system peaks, CPU utilization, memory, bandwidth etc ? I tried looking around for info on the different facility levels but didn't find much help, admittedly I didn't look very hard. Is this type of setup possible ? If not, what would be a good setup that would get info on possible attacks or unauthorized connections ? Thanks guys!

If you're stuck on 6.x, you'll need to look into setting the levels of the messages you're trying to pick out, then setting the pix to only send messages of that severity or higher, which might help your signal-to-noise.

If that doesn't help you could look at moving to another syslog server like syslog-ng which has built in filtering capabilities so you could direct your 'interesting' logs to a special log file. If you feel like really going over the top you could then setup SEC (Simple Event Correlator) to watch that log file and take actions on the messages, like warning you if someone fails to log in too many times.

Another alternative if you have the hardware, and can get the software, to do it would be to upgrade to 7.x and use the built in message list filter feature.

As far as logging CPU/Memory, I'd have to recommend setting up cacti on a Linux host somewhere on your network and using that to graph the CPU/Mem/Interface Traffic OIDs.

ragzilla
Sep 9, 2005
don't ask me, i only work here


Cisco goons, you're my only hope (although I've been thinking of typing this up on c-nsp, but it'd probably degenerate into a 6500/7600 whine). All of this (mostly) takes place inside a single facility, the few services that extend outside the facility are not of a big concern / are another topic entirely. I really wish layer2 production networks wouldn't leave the building but that isn't too feasible, yet.

My datacenter, over the past few months, has had a couple of service affecting issues, some of them out of our control (UPS failure), some of them our direct fault (accidental spanning-tree loops (thanks portfast) which freaked the hell out of the core network- plugging new switches into the core at 4pm is a bad thing). Due to various reasons, our network is a mixture of relatively old (3500XL access switches), and relatively new (3750 stacks for distribution, 2950G access switches on newer rows) gear, due to this we're somewhat limited in recovery time due to being stuck on PVST for the legacy equipment. Waiting 40 seconds for spanning tree to reconverge because a gig link dropped, really, really sucks. Doubly so because we have over the last year started offering more products, namely voice (as SIP out of our softswitch). And people really hate it when they pick up the phone and get a fast busy. Thankfully we've been able to provide decent QoS inside our network for the voice so people don't have quality issues, mls qos on xx50 series switches is pretty great, as is CoS based priority queuing in the 12k platform. Ideally I would like to completely eliminate reconvergence times after link failures, a lofty goal but I think we can get pretty close.

Because of the issues, and the pressure placed on us by the customers, we've been looking at what we do in our network, and what our options are going forward (we're just about to start building out the 'second phase' of our existing space- a good a time as any to decide what you want to do for the next 2 years right?).

Currently, we run fairly large layer2 domains, with layer3 terminating at our 2 'cluster'/'distribution' stacks (A & B), consisting of 3750G-24T's and 3750G-12S's. We have 2 /24 colo customer VLANs which span pretty much all of our access switches in production (7 I think at last count), 1 per row of cabinets- end of row switching. The distribution switches talk OSPF with our customer access routers (t1/ds3/oc3/external ethernet aggregation), and core routers, giving them knowledge of all our internal customer prefixes and enabling fairly optimal routing in the distribution-access layers. Since they're 3750 stacks though, they have a snowball's chance in hell of doing anything decent BGP wise to get them to make smart routing decisions at distribution, so I get all sorts of fun crap like packets coming up from a customer, up to 1 of my cores, back down through distribution and up to the other core- this is happening because the distribution switches have a default pointed up to an HSRP between the 2 core routers (12008s), so if the destination isn't bestpath in the router it ends up in, across it goes!

So far, this has worked fairly well (up until a few months ago), and is a hell of a lot better than what we had a few years ago before we rebuilt during a move into our new facility, but this poo poo with spanning tree has got to stop, we can't be sitting with our thumbs up our asses waiting for the network to reconverge.

So enough with the problem, my main point here is to present my solution (which I and my direct report both really like- but we still have to sell to management and his direct report), and see if anyone here can provide me some "hey did you think of X" or "I tried this and this really bad thing happened".

This new design is heavily influenced by a Cisco implementation document- High Availability Campus Network Design— Routed Access Layer using EIGRP or OSPF.

My Goals:
- First a simple/sample diagram, all links here are point-to-point layer3 links. Currently addressed using /30s but I'm considering using /31s to converse address space.
code:
    [ Core ]
    /      \
   /        \
  /          \
[DistA]===[DistB]
  \          /
   \        /
    \      /
    [Access]
- Get rid of spanning tree. How? Everything coming out of the distribution switches (pondering between 6509/Sup720 and 7609/RSP720 for this- arguments for/against these would also be welcome) is a layer 3 link, layer 3 links up to the core routers. layer 3 links down to the customer access routers. layer 3 links down to the access/aggregation switches. layer 3 links 'across' to my existing distribution switches to get the legacy network uplinked through the new network.

- To accomodate getting rid of spanning tree, I want to move the layer3 termination down into the customer access switch (probably using 3560s). 2 routed uplinks, 1 to each distribution switch. Then a handful of SVI's with /28s or /29s serving a handful of customers. These switches will participate in the OSPF loopback program, and limited iBGP as listed below. Spanning tree will be turned off on the customer aggregation SVIs. To try to prevent things from breaking we'll try to implement as much layer2 security as possible:
-- Turn on portfast
-- Set portfast bpduguard (shut your port off if you plug a switch in- I really hate it when people try to take my layer2 network out of the building)
-- port security max-mac-count 1
-- switchport protected (just started considering this one tonight, by doing this and local-proxy-arp on my SVI I can stop the customers from talking directly to each other, and force all traffic to be processed and policed by the switch).

- Reduce OSPF database size to get rapid OSPF convergence. Currently my OSPF database probably has ~3k routes in it. This kind of hurts on my slower processors like the GRP-B's in my GSRs. My plan to address this is to reduce OSPF to carry loopbacks only, then exchange customer prefixes via BGP only.

--'Load Balancing' and failover between layer3 links will be handled natively via OSPF equal cost multipath. Since everything will have 2 layer3 links, every device should, under normal conditions, have 2 equal cost paths to reach any other loopback in the network. So long as I don't lose both links, my iBGP sessions should never drop.

--The distribution switches will essentially act as route reflectors, cores peer with distribution, distribution peers with customer access routers (also 12008s).

--My internal networks will probably be originated and 'pulled up' in the distribution switches, thus letting me simplify my routing tables at the core and customer access routers by only advertising aggregate prefixes to them instead of everything.

--The new colo access switches will participate in limited iBGP with the distribution switches, the distribution switches will originate a default, and only a default, down to the access switches (to keep the routing table nice and simple) - I am also debating maybe doing the default in OSPF if I can figure out why it's not working out in my lab using stub areas. The colo access switches will advertise their SVI /28s and /29s as well as any subnets routed to customers, via BGP. While moving this functionality to iBGP instead of a traditional IGP will result in a 1 minute delay in the routes getting into the distribution table, I feel this is an acceptable delay since it is only once off (when the switch reloads), and it gains faster OSPF convergence which gets my ECMP back faster.

- All internet traffic in the access/distribution switches will be in an internet VRF (vrf-lite in all the switches basically). This is mainly a management thing- I plan to use the main routing table for management access only- haul a single eth from every switch back to an isolated switch for a new management network. So I can actually get into the switches over ssh/telnet when the poo poo hits the fan. Part of this project will also be making sure we have working consoles in case that switch fails *grumble*. This introduces somewhat of a learning curve (remembering to type 'vrf internet' all the time), but I feel the management advantages outweigh the disadvantages.

- OSPF is optimized as described in the Cisco doc above (200ms hellos for fast failure detection- in the future we will probably also look at doing BDF if the 3560 ever supports it), in addition to ispf to speed up spf calculations.

- A major design goal is to keep customers out of the drat core/distribution layers (hey you kids, get off my lawn). We've been pretty poor about this up until this point, we have a couple of customers taking gig (copper mainly) out of distribution, and we tend to (ab)use the network for our own purposes too. Need to get 20 VLANs to an ESX box? Plug it into distribution! We also carry some of our internal network traffic (ugh) over VLANs in distribution. But that's another project.

All of this up to this point seems to work fairly well in the lab. I get pretty much unnoticeable fail over (after a few tweaks) with my stack of 3550s (Core, DistA, DistB, Access). Running an Asterisk Echo Test with music playing into it results in pretty much uninterrupted music unless I do something terrible like pull out both gig links to the core or access. Reloading and hard powering down switches you're hard pressed to even hear a blip.

I've come across a couple of problems, the biggest one was resulting from a distribution switch reboot and ECMP. Basically since OSPF comes up faster than BGP, my core was sending traffic for an access switch down to DistA, which didn't know how to handle it, so it sent it back up to the Core, back down to DistA etc. I managed to resolve this by adding a high metric static in each of the distribution switches, pointing to each other over the link between them. This way when a switch is still 'becoming active' after a reload, it will continue to pass traffic across to the other distribution switch which is still up, which will be able to forward the traffic as normal.

My full table BGP customers I can continue to serve out of my customer access routers like I do now. I'll probably hang a dedicated switch off each of those GigE interfaces just for that, and keep them isolated from the distribution/core. There was a proposal to perhaps hang some these customers off 10/100/1000 aggregation switches, terminate L3 in the agg switch then have them to eBGP multihop to the distribution switches but this bugs me in 2 ways.
-- we need to redistribute the customer's routes down to that agg switch via BGP. So if they drop their session it'll be 2+ minutes until the path back to them is good.
-- Customers in distribution, get off my lawn.

We do have some colocation customers who do HSRP with us for failover on our and their equipment, to continue to offer this I came up with the following solution:
-- The customer will 'purchase' 4 switchports (in 2 adjacent switches), and a dedicated SVI/VLAN in 2 switches. 1 port out of each switch will go to the customer, the other 2 ports will be a dedicated 'tie' link to connect the 2 islands. Since I don't have any trunks up to the core this is the best I can think of, plus it gives the customer a dedicated link at their purchased speed to carry traffic which comes in over the secondary switch in the unlikely event that we lose all uplink on their primary switch.

I'm sure there's more but this is starting to look like a pretty huge wall of text and it's getting late, if it helps I may have some Visio diagrams to look at tomorrow depending on if I'm motivated enough to work on them.

ragzilla
Sep 9, 2005
don't ask me, i only work here



Backbone fast is still going to cost me 30 seconds from what I'm reading, it saves 20 seconds of max_age timer but i still have 2x15 for listening and forwarding, but the situation that that would be detecting would be rare with my environment, uplinkfast would definitely save us some convergence time on the access switches though.

ragzilla
Sep 9, 2005
don't ask me, i only work here


jwh posted:

That's not a good sign :)
I know, I know, well at least this is good practice for an E/N on C-NSP if it comes to that :)

jwh posted:

Meaning, TCAM size is too small for full tables?
TCAM and main memory. We're running a mix of G-24T and G-12S 3750s so we're stuck to TCAM limits of the -24T's (the 12S's have more TCAM), but we can't trivially separate the 2 platforms to get the better TCAM. They also only have 128M (non upgradeable) of DRAM, I'm not sure if I can fit a full table into that y'know :)

jwh posted:

That's a lot of layer 3. Are you confident that your IGP is going to reconverge AS-wide faster than spanning-tree in event of a link failure? Similarly, would these problems go away if you instead replaced your older gear with switches that supported RPVST+?

As for 6500/7600, your guess is as good as mine. I think people are still feeling this one out.
Scaled down, it seems to reconverge extremely fast. The IGP is only taking place in a single datacenter so by keeping it to loopbacks only I'm fairly certain it will be reconverging <200ms per Cisco's docs (which were benchmarked on an MSFC2 I believe). Processors running in the production network will range from 12k GRP-B (R5000 - 200MHz), MSFC3 (R7000 600MHz I think?), 3560 (PPC405 - 400MHz). LCD here are the GRP-B processors but since they're R5Ks so long as I keep the OSPF db below 50 prefixes it should be sub 200msec. The problems may go away if we replaced legacy gear with gear that does RPVST+ (we were actually looking at going to MST, replacing 3500XLs with 2950G-48s), we'll probably be presenting this as one of our options, but I'm really liking the advantages of moving layer3 down to the access layer in the form of simplified troubleshooting (ping and traceroute), and not having to deal with the headaches that come along with spanning-tree, rapid or no.

jwh posted:

I'm not much of an ethernet wizard, honestly, and I spend more time on the WAN side these days, but I almost feel like you're putting a heavy burden on your access layer. More intelligence at the access layer might mean more revenue opportunities, ease of management, and greater provisioning flexibility, but it also means more things that can break. Plus, if you need a customer VLAN to span multiple access layer devices, are you going to have to cross-connect those switches on an as-needed basis?
Customer VLANs (unless HA) should never have to span multiple access layer devices. If a customer is moving rows (and thus into a new access device), we'll have them renumber. Typically the people moving so far have been ones with larger amounts of gear, and have firewalls/routers at the edge of the network. Colo, both in the past and future, is handled by giving the customer a single address in a shared network (/24s currently, wanting to move to /28s and /29s in the future), then routing a subnet to that address, which they can then use for NAT 1:1 translates, or on an internal ethernet.

jwh posted:

Have you worked up all of the relevant routing protocol configurations with the vrf stuff? It can be a little screwy, ie, OSPF's vrf per-process instantiation versus mBGP address-family vpnv4.
Yeah, I have a working 'lab' setup of all this, complete with my VRF separation of data and management planes (control is still in the data plane- I see no way around that without having to mess with more VRF than I have to, ie importing routes to the internet VRF from the control plane VRF which significantly complicates troubleshooting). As soon as my switches boot up I'll grab some configs off them to see if anyone can poke some holes in that :)

jwh posted:

Well, you probably saw it too on c-nsp the other day, but apparently BFD has trouble getting below 250ms. That could have been a platform anomaly, I don't remember. If your tuned OSPF dead timer is 4 x hello interval, that's still really quick.
BFD was a looking forward thing, with the fast ospf hellos I'm not sure it's even necessary, but if I have a feature that could make link failure detection more reliable (fast hellos, udld, bfd), and doesn't cost me much to implement, I'd have to be insane not to use it right? The 3560/3750 platform doesn't support BFD at this time, but apparently it may make it in sometime this year if enough people ask for it.

jwh posted:

I thought you were getting customer prefixes out of OSPF? Or am I misunderstanding? Are you talking about control plane traffic?
The customer prefixes are getting out of OSPF, the issue was happening due to the following conditions:
1) DistributionA (or B) had just rebooted, OSPF rapidly reconverged, BGP was still converging.
2) The Core switch(es) saw that they now had an extra path (via OSPF) to reach the loopback of the customer access switch (as this is iBGP, I am _not_ setting next-hop-self for BGP sessions or I lose my rapid recovery ECMP).
3) The core switch would now send traffic down to this distribution switch, which did not know how to reach the customer prefix, so it could not forward the traffic.

I mitigated this with a high metric static to the other distribution switch which gets removed from the table when BGP is fully converged. Thinking forward this may be better handled by making these static routes for my prefixes only, so if BGP to the core comes up faster (thus replacing the static default with the BGP one) than the BGP to access, I don't create a Core-Distribution-Core routing loop.

jwh posted:

Yeah, ebgp-multihop is gross unless you're doing the neighbor loopback thing.

You could take a tip from the carriers here, and simply provide the customer a session, and tell them to do whatever they want with it. So, in other words, if they drop their session, that's their own drat fault. It's not polite, but it makes a certain sense.
We always do neighbour loopback for BGP unless it's a point-to-(multi)point connection. And internally we always do it so we can use OSPF ECMP to provide load balancing via CEF. The issue I was thinking we'd run into in this situation (Customers doing eBGP multihop to the core):
-- Access switches would not know what prefixes the customer had until 2+ minutes had elapsed- the time for BGP scanner to run at distribution, and then again at access.
-- I can't do BGP straight out of the access switch since it'll be a 3560/3750 and thus no full tables. Customers who only take default-only could potentially be served out of an access switch though.

jwh posted:

This one gives me the shakes. I guess if you can charge customer's for the cross-connect, it won't matter, and won't be like you're losing out on revenue producing interfaces.
We'll build the charge into the contract for the cross-connect, right now we don't charge HA customers that much extra which to me is a gross oversight since they currently consume 2x port resources, and 3x IP resources of a regular customer. I'm guessing it'll be billed out as a recurring VLAN charge, and 4 port charges, and maybe a once-off cross connect fee that will be waived almost 100% of the time. That's a sales function though :)

jwh posted:

There's a lot to think about here, and you're obviously much more familiar with what you've worked up than I am, not to mention familiar with your business practices. That said, it sounds like you're in the business of providing colocation at the switchport level, as well as routed interfaces. Maybe an exercise would be to take your layer-2 access-layer out of the picture completely, and develop a framework that could accomodate both layer-2 colocation and layer-3 routed interface customers identically, sans ethernet access-layer infrastructure. Then, attach access-layer devices as if they were customer owned, but provider managed.

I guess what I'm saying is, would it be easier if your colocation access devices were end-of-rack 6500's providing routed interfaces to top-of-rack customer managed switches? They could purchase HSRP and uplink diversity without your having to get stuck in spanning-tree nightmare world, because that'd be up to them.
It would definitely be easier if my end-of-rack devices were 6500s, but there's no way I could get the funding to do that, it's going to be like pulling teeth to get the 2 I want to replace distribution. In lieu of end-of-rack 6500s I'm going to the second-next-best thing- a 3560/3750 end-of-rack device which can do medium-density layer3 termination at a pretty good speed- we're currently using these to layer3 switch a lot of our day-to-day traffic and they should be able to handle the access layer layer3 aggregation until we're pressing the limits of 2 GigE uplinks from the access.

Top-of-rack switching has only happened with 1 customer I think so far and that was a port issue- they had about a half dozen ports into our colo network for different customers of theirs, and didn't want to run their own common firewall/router for all their customers so we pressed them into letting us land a switch in their cabinet. This is an exception rather than the rule though, 95% of customers are regular-availability, single port customers. We don't have much of an issue where we're require top-of-rack anymore as the majority of our sales now are people who are taking 1/2, or an entire cabinet, we probably only have a handful (5, 6?) of shared cabinets on a floor of 120+.

tl;dr on this, we'll still be doing layer2 colocation for the majority of the customers, but we will be limiting the layer2 domain to only a handful (5-15) customers, and the broadcast domain will not leave the switch so we have less issues like broadcast storms, or spanning-tree to worry about. The only customers getting dedicated SVIs in the access layer will be those who have purchased HA services.

-edit-
I forget, was the BFD issue in RRB? I think people have been seeing other issues in there related to CPU, could be bad scheduling. They were reporting BGP usage up to 80% of the CPU on boxes where it used to be 10% back on RRA. Why does the 7600 BU hate us.
-/edit-

Tremblay posted:

As far as 7600/6500 goes the code trains are split now. More switching features will be implemented for 6k while more routing features will be making it into the 7k. I guess it mostly comes down to the capacity you need and topology (collapsed core or distributed).
Anyone have a crystal ball? :)

I guess wrt the 6500/7600 split I'm worried about :
1) Choosing 7600, hopefully getting some RSP720s- though probably not. Finding out that SRC release notes will say "The WS-X67XX switching modules will no longer be supported in SR".
2) Choosing 6500, getting screwed over by the 6500/7600 BU split and not getting decent (service provider) features in SX.

I'm currently leaning toward the 6500 and hoping that SX will continue to add useful features for an iBGP only device. I'm probably going to keep all my eBGP in the GSRs for the foreseeable future.

To make up for all these :words:, here's a picture of a kitten, no wait, my current layer2 setup: http://starshadow.com/~ragnar/731CoLo.png
Every device has a Vl513 interface, used for management on the switches, for data plane on the routers and distribution.
Vl401 and Vl421 terminate L3 in the dist switches, running HSRP for HA.
Vl192 is our offnet management network that I really wish wasn't running in the production network, it's mostly out there to get ethernet to our cameras, console servers and muxes.
Vl402 is one of our gigabit customer networks that we do BGP over (terminates in CustomerC or D I forget which). There's a customer in C201 that takes full tables from us.

ragzilla fucked around with this message at 21:26 on May 18, 2007

ragzilla
Sep 9, 2005
don't ask me, i only work here


jwh posted:

That'd be neat to look at; I managed to dodge route-target import/exports too, which turned out to be a good thing. I've been meaning to go back and lab the route-target stuff just in case we have a falling-out with Nokia, and decide to move our wan firewalls to another platform.
I'm glad we don't deal with a whole lot of firewalling here, but we have a lot of brain power invested in PIX, and looking at providing 'virtual' firewalls out of FWSM's in the 6500s is pretty attractive so long as we can make the money work. We do a similar thing in our GSRs doing virtual routers for customers- landing DS1/DS3/OC3 into a VRF in the GSR, handing a dot1q subif out of that VRF, over a GigE trunk into our VRF switch, then access ports to the customer. That way they can do WAN consolidation in our DC without having to take up 1-3U of space with router(s). We also like it since it greatly reduces the number of cross connects on the floor, and we don't have to buy muxes since we hand off to the GSRs over channelized OC3.

jwh posted:

I think a better question is why Cisco thought it was a good idea to compete with itself, just to capture a market that used a different nomenclature. It must have felt like a good idea at the time, but nowadays it's yucky for customers. I'm just glad I'm not in the market for one.
As part of the presentation we're of course going to do multiple options (looking at Foundry BigIron RX / Juniper MX series). But changing vendors doesn't always work out well since none of us are familiar with the other vendors quirks. The last time we changed vendors we ended up with a pair of Extreme Summit 48is (the distribution switches before the ones before the current ones) which was just a terrible, terrible experience (they failed and rebooted fairly regularly, and always took over OSPF DR).

ragzilla
Sep 9, 2005
don't ask me, i only work here


Powercrazy posted:

The 7600-S with the RSP already has a completely different code base, I can guarentee that the 67xx cards will work for the foreseeable future, I can also guarentee that 6500 is not going to get the same support as the new 7600 is. A safe (but expensive) bet is to go with the 7600. The RSP720 is a pretty awesome Sup, and combined with the new 7600-s as well as the new cards that will that will undoubtedly be coming out soon with the Fast Fabric Sync. I would be feeling pretty confident about my fail over options.

Of course this may not be feasible for your situation. But if you do have the option, the 7600 is the safe way to go.

Also I'm fairly confident that the new 68xx series cards will not work in the 6500... But that is certainly not the official Cisco position.

Given our past purchasing habits some parts such as the chassis will probably be purchased from a company that does network rebuilds then sells the hardware pulled out to ISPs like us, so the chassis will probably be 7609 rather than 7609-S. Redundant Sups, while nice, may not be on the table (why do we need redundant sups in a manned datacenter, that's why we have a redundant chassis design) so the fast sup failover may not be a strong selling point there.

If 67xx cards are going to stay in SR for the foreseeable future I'd probably (currently lean) toward 7609 chassis + Sup720 with an option for RSP720 upgrade (since they're going to act as RRs for the rest of the network the extra CPU could be useful for pushing out BGP updates and running scanner faster).

7609 chassis, Sup720, SR software? SR isn't going to go RSP only anytime soon is it, I don't imagine people with large 720+7600 implementations are going to be happy about forklifting all the sups in their network.

ragzilla
Sep 9, 2005
don't ask me, i only work here


obsidian440 posted:

I hate to come off as lazy, but can I get some links to help me with doing this ? I didn't see anything that jumped out at me while messing with the logging options in pix.

It looks like if you only want auth fails, (basically get rid of acl denys), you'll need to bump the logging up to Critical instead of Error severity. I typically tend to manage via pdm/asdm, but if you're managing through the console I think the command you're looking for is:
code:
logging trap critical
Which will only log Critical and Emergency priority messages. You can get a list of messages sorted by priority at http://www.cisco.com/en/US/docs/security/pix/pix63/system/message/pixemapa.html

Setting up cacti/syslog-ng is a bit beyond the scope of this thread, a bit of quick googling should get you plenty of information on them.

jwh posted:

That'd be neat to look at; I managed to dodge route-target import/exports too, which turned out to be a good thing. I've been meaning to go back and lab the route-target stuff just in case we have a falling-out with Nokia, and decide to move our wan firewalls to another platform.
This isn't a route import/export demo, like you I've been lucky enough to avoid that :) but the configs for the test layer3 access network I put together are up at: http://www.starshadow.com/~ragnar/switches/
Configs have (hopefully) been fully sanitized to protect the innocent.

ragzilla fucked around with this message at 01:25 on May 19, 2007

ragzilla
Sep 9, 2005
don't ask me, i only work here


edit: double post

ragzilla
Sep 9, 2005
don't ask me, i only work here


NinjaPablo posted:

I've got a 2620 that I am trying to setup MLPPP across 2 T1s on. Spent over an hour on the phone with the ISP trying to get this working. When I mentioned it was a 2620, he immediately said that it was probably too old of a version of IOS.
code:
Cisco Internetwork Operating System Software
IOS (tm) C2600 Software (C2600-I-M), Version 12.0(7)T,  RELEASE SOFTWARE (fc2)
Copyright (c) 1986-1999 by cisco Systems, Inc.
Compiled Tue 07-Dec-99 02:12 by phanguye
Image text-base: 0x80008088, data-base: 0x807AAF70

ROM: System Bootstrap, Version 12.1(3r)T2, RELEASE SOFTWARE (fc1)

gts_gateway uptime is 3 days, 17 hours, 59 minutes
System returned to ROM by reload
System image file is "flash:c2600-i-mz.120-7.T"

cisco 2620 (MPC860) processor (revision 0x600) with 26624K/6144K bytes of memory.
I was only able to get it running on 1 T1, leaving that T1 encap as HDLC.

I was able to bring either T1 up as PPP, but they would not pass any traffic. I was also able to bring both T1s up as PPP, add them to a multilink group, and have that multilink show up/up, but not pass traffic.

I'm running a very basic config on this. Any ideas on what I need to do to get this running correctly?

MLPPP is supported in 12.0(7)T, mind showing us your configs? Is your ISP configured for MLPPP? Can you ping across the MLPPP bundle once it comes up/up?

ragzilla
Sep 9, 2005
don't ask me, i only work here


CrazyLittle posted:

What's the newest firmware I can run on a Cisco 2621 with 8mb flash, 24mb dram?

12.1.27b
or
12.2.12m

If you upgraded the RAM to at least 32M you could run the latest which is 12.3.22

NinjaPablo posted:

I was able to ping and telnet by IP address only when the MLPPP config was in place, or when I was only using a single T1 as PPP. As soon as I'd have the ISP update their end to not be MLPPP, and change back to HDLC, and I switched back to HDLC on my end, all normal traffic would work.
Could you ping things _beyond_ the ISP by IP when it was up in MLPPP mode? If so they may forgotten to update the route for the subnet they're sending you. Also you typically remove the IP address from the interfaces when they're in MLPPP, so they should say something like 'no ip address'

ragzilla
Sep 9, 2005
don't ask me, i only work here


InferiorWang posted:

I have a question about spanning tree portfast. How many here make use of it, and where do you use it? As I understand it, I would want to use portfast on ports dedicated to end nodes only. Any sort of port that is linked to a switch in either direction shouldn't have portfast enabled. Am I right in this thinking?

Yes. It enables a port to still have spanning tree enabled on it, but it skips the Listening/Learning states and heads straight to forwarding. If you do that into a switch or hub congratulations, you probably just created a loop.

ragzilla
Sep 9, 2005
don't ask me, i only work here


Korensky posted:

The only situation where you'd compromise on performance in the 3750G series switches is if you're stacking them and joining the shared 32gig fabric together (in which case you have 2 x 16gig rings between the entire stack).

If you do lots of traffic you'll notice the limitations of the 3750 (non-E variant) fairly quickly, the ring bandwidth is used for _all traffic_, even if it's between ports on the same switch. Due to the way to original StackWise system was engineered, the packets are source-stripped from the ring, ie the switch gets a packet, sticks it on the ring so everyone can get it, then when it gets back to the source switch it is stripped from the ring. The newer 3750-Es can do destination stripping, where the packet is stripped by the destination switch. They can also do local switching so packets going from port 1 to port 2 on the same switch, are switched inside that switch instead of going around the ring.

http://www.cisco.com/en/US/products/hw/switches/ps5023/products_white_paper09186a00801b096a.shtml

ragzilla
Sep 9, 2005
don't ask me, i only work here


wolrah posted:

Is there some wizard or guide where I can look and discover what model router I need to support a specific set of interfaces? Cisco Feature Navigator is useless in this regard.

If not, what do I need to handle 2x Ethernet, 1x T1, and 1x G.DMT ADSL? I'm looking for a home router (the T1 interface is for testing T1 routers I bring home from work) that I can also learn IOS with, so the cheaper the better. It'll be a fairly simple configuration on the software side (pppoe on the DSL, NAT, and simple routing between the other 3 interfaces), it's just the number of interfaces that make things complicated.

I don't think any 1600/1700 series hardware can do that. Your best bet's probably a 2621 or 2621XM which has 2 FE's built in, and 2 WIC slots (1 for WIC-1DSU-T1 and another for an ADSL WIC). Be forewarned that the ADSL WICs are quite expensive, it might be more cost effective to add another ethernet (with a WIC-1ENET) and plugging into a DSL modem/bridge.

ragzilla
Sep 9, 2005
don't ask me, i only work here


Jeff73 posted:

T'aint so. From http://www.cisco.com/warp/public/473/21.html#vtp_ts_rec_ins


To verify, here's the result of testing with a couple 2950s running 12.1:

I think this is something with DTP (switchports being set to switchport mode dynamic) than anything else, I just had a customer's switch (Foundry MLX) wipe the VLAN database on one of my cust aggregation switches, the switch was configured with just VLANs and it was in server mode. Nobody had ever configured the VTP domain/secret since we stopped using VTP. That's now in our standard configs (set VTP domain/secret).

ragzilla
Sep 9, 2005
don't ask me, i only work here


bj2001holt posted:

My only complaint on the 5505 vs the 5510 are the licensing restrictions (only 3 vlans, 1 of those can only be used to make an interface management only).

If you do trunking out of the 5505, you're supposed to be able to do up to 20 VLANs.

-edit-
ugh, I see what you mean about the licensing, without security plus it kind of sucks.
-/edit-

ragzilla fucked around with this message at 05:48 on Jul 31, 2007

ragzilla
Sep 9, 2005
don't ask me, i only work here


Already have an open TAC case but in case anyone here's seen it before:

Turning up a new 7609 w/ RSP720s. We can get both RSPs up in SSO mode, but as soon as we turn on dcef-only fabric switching mode, the redundant RSP is no longer able to boot, it gets all the way up into the RP code, then abruptly drops to ROMMON and we get the following message on the active sup:
code:
*Aug  2 02:05:19.115: %PFREDUN-SP-6-ACTIVE: Standby processor removed or reloaded, changing to Simplex mode
*Aug  2 02:05:19.115: %OIR-SP-3-PWRCYCLE: Card in module 6, is being power-cycled (Module reset)

ragzilla
Sep 9, 2005
don't ask me, i only work here


Powercrazy posted:

Do a show mod, and make sure that the RSP with the lowest firware revision is the active one. If they are both the same firmware and otherwise identical, then it sounds like you discovered a bug. :)

Also what code are you using? SRA, SRB, SRB1 or SRB2 (not sure if SRB2 is deployed yet).

e: If you want, I can try to reproduce the error in the Lab tomorrow, since we aren't really doing anything anyway, besdies that I'd like to know if this is a common problem so that I can save the day whenver we have a Demo that runs into a similiar problem.

It's SRB1, and yeah, there's a known bug (CSCsj12034), which is fixed in 12.2(33.1.1)SRB, but we're stuck waiting for SRB2 unless TAC can/will provide the rebuild. Both RSPs have the same Hw/Fw/Sw versions (both purchased brand new at the same time).

ragzilla
Sep 9, 2005
don't ask me, i only work here


Kind of off-topic but does anyone have any recommendations for IP assignment tracking/whois server software? I've been looking at IPPlan and FreeIPDB, so far IPPlan seems to be a better solution (integrated management and whois) but freeipdb's database layout seems to be better- but lacks the whois server.

ragzilla
Sep 9, 2005
don't ask me, i only work here


CrazyLittle posted:

Is there any way to get an WIC-1ADSL to work inside a NM-2FE2W inside a Cisco 3640? I'm getting tired of trying different IOS loads.

Anything with a Plus featureset is supposed to work:
http://www.cisco.com/en/US/products/hw/routers/ps214/products_tech_note09186a00800ae37f.shtml

Latest GD/LD/ED loads from FN:
code:
GD Release 	12.3(23)
LD Release 	12.4(16)
ED Release 	12.3(14)T7  12.3(11)YZ1  12.3(4)XD4  12.2(15)T9  12.2(11)YT2
12.3(23) IP Plus looks to be 32F/96D, image name is c3640-is-mz.123-23.bin

ragzilla
Sep 9, 2005
don't ask me, i only work here


Tremblay posted:

Do you really think you should be talking about this?

Nothing he said there hasn't already been said on NANOG/C-NSP/Cisco Blog...

ragzilla
Sep 9, 2005
don't ask me, i only work here


delslo posted:

I have 2 questions relating to my ASA5505 that I had posted earlier about getting.

1) Comcast gives me a DHCP public IP, they said they won't offer static to home users. Is there a way/trick/whatever to get port forwarding to work with a dynamic IP on the outside interface? I already have a dyndns.org hostname pointing to the correct IP (updating using the windows client). The guy who was helping me had no clue how to do it because he couldn't just plug the outside IP in. For two examples, I'd like to forward:
Port 3389 to 10.0.1.99
Port 22 to 10.0.1.22

2) I set up VPN using the wizard, installed the OS X client on my Macbook Pro, everything works GREAT. Split tunneling is very nice, 3DES is also nice, the whole thing connects very quickly and access to internal resources is nice and snappy. However, at one of my clients, I'm behind a Pix 515 firewall that has PPTP passthrough enabled and is the endpoint for a handful of site-to-site VPN connections. The issue is this: I can connect to my home VPN from behind the Pix, but I cannot access any resources (ping/RDC/shares/etc.). Any idea where the issue is or what needs to be fixed?

Thanks!

edit: I'd post my running config, but thanks to #2, I can't access the config from here.

The cisco VPN is not using PPTP, it's using IPSec/L2TP so there's a couple of things to check:
Do you have NAT traversal turned on on _your_ VPN config on the ASA? (Labelled NAT-T I believe in ASDM).
Is the PIX blocking AH or ESP protocols?

ragzilla
Sep 9, 2005
don't ask me, i only work here


Arkady posted:

Does anyone know of a way to make a 2950/60 switch or a 1800 series router to strip the 802.1p tagging?
I have a device on my network that drops all data that is tagged with QoS (802.1p). That's not good. Now I need to find a way to completely strip that tag. Like a reverse "switchport priority default".
So far I have found ways to add such a tag or to change it, but not ways to remove it. It would be swell if someone could help me figure it out.

Edit: The image is standard, not enhanced.

From the 2950 QoS FAQ.

quote:

Q. Can I override the incoming class of service (CoS) to a specific CoS value?

A. Yes, you can override the CoS. Issue the mls qos cos {default-cos | override} command. The command overrides the previously configured trust state of the incoming packets and applies the default port CoS value to all incoming packets. Cisco IOS Software Release 12.1 and later support this command.
The way I'm reading that, you need to issue 2 commands:
code:
mls qos cos 0
mls qos cos override
Why do you feel dot1p tagging is bad though?

ragzilla
Sep 9, 2005
don't ask me, i only work here


Arkady posted:

I've read that FAQ, but from my understanding all it does is override the COS with a different value, not strip it. Meaning I'd still be left with a COS value, be it 0, or something else. Am I wrong in this?

The problem I'm having is one of the propriety devices on the network, a router of sorts, dropping all packets tagged with COS. This problem is being worked on a system level, but I was hoping to find an networking solution in the meanwhile.

If that doesn't work, you could try using the dscp-to-cos map, assuming the device doesn't also set DSCP bits?

http://www.cisco.com/en/US/docs/switches/lan/catalyst2950/software/release/12.1_9_ea1/configuration/guide/swqos.html#wpmkr1026216

ragzilla
Sep 9, 2005
don't ask me, i only work here


I can't think of anywhere better to ask this, and don't want to make a new thread

Has anyone here ever terminated/scoped 50micron multimode before? We typically stick to 62.5 but our 10GbE xenpaks won't shoot far enough over it. The terminate/polish on our 50 micron looks good but when we scope it the edge of the core looks 'fuzzy'. Just wondering it that's normal...

Adbot
ADBOT LOVES YOU

ragzilla
Sep 9, 2005
don't ask me, i only work here


CrazyLittle posted:

This thread's getting lonely. I have a fun bit of news:

I managed to get OER working on a 3640 with a T1 and DSL interface.

I just saved a bunch of money on my car insurance.

No wait, Cisco pushed the SRB2 release back to late september (28th I think?). And the PM team will not be providing interim builds even though it's been stable for 'a couple of weeks'.

Oh, and the devices I need to put it on go live this weekend, so I guess I need yet another maint window in early oct to do the code upgrade and apply dcef-only switching mode...

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply