Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
Bigass Moth
Mar 6, 2004

I joined the #RXT REVOLUTION.
:boom:
he knows...
Yes check the release notes.

Adbot
ADBOT LOVES YOU

Thanks Ants
May 21, 2004

#essereFerrari


http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.html#pgfId-2560852

FatCow
Apr 22, 2002
I MAP THE FUCK OUT OF PEOPLE

Collateral Damage posted:

They forgot the "delusional competence" which is usually the third step, where people have learned a little and think they know it all.

https://en.wikipedia.org/wiki/Dunning%E2%80%93Kruger_effect

So who's going to be at NANOG in a few weeks?

OmniCorp
Oct 30, 2004




Moey posted:

This. Networking is an endless pit of learning, just have to keep digging.

Throwing out a plug for Network Warrior. Great read.

http://www.amazon.com/Network-Warrior-Gary-A-Donahue/dp/1449387861

I enjoyed reading this after getting my CCNA. I saved the duplex chapter to educate anyone questioning why auto/half/full/no-negotiate matters.

wolrah
May 8, 2006
what?

OmniCorp posted:

I saved the duplex chapter to educate anyone questioning why auto/half/full/no-negotiate matters.

Just to be clear, you're saying it matters in that it's good to know the symptoms of a failure to autonegotiate so you can identify and fix the problem, right?

Because if you're saying that manually setting those things when you're not forced to by something like a broken and unfixable/irreplaceable device at the far end is a good idea, I'd like to hear your thought process.


I'm glad it's been a few years since I've run in to an ISP that insisted on hardcoding the interfaces on their managed circuit hardware to 100/full or 1000/full.

Slickdrac
Oct 5, 2007

Not allowed to have nice things

wolrah posted:

Just to be clear, you're saying it matters in that it's good to know the symptoms of a failure to autonegotiate so you can identify and fix the problem, right?

Because if you're saying that manually setting those things when you're not forced to by something like a broken and unfixable/irreplaceable device at the far end is a good idea, I'd like to hear your thought process.


I'm glad it's been a few years since I've run in to an ISP that insisted on hardcoding the interfaces on their managed circuit hardware to 100/full or 1000/full.

Ran into an issue a few months ago where devices were auto setting themselves to 10/half, and it was because one of the two fiber converters was ancient between the two centers (good keeping up to date Equinix!)

OmniCorp
Oct 30, 2004




wolrah posted:

Just to be clear, you're saying it matters in that it's good to know the symptoms of a failure to autonegotiate so you can identify and fix the problem, right?

Because if you're saying that manually setting those things when you're not forced to by something like a broken and unfixable/irreplaceable device at the far end is a good idea, I'd like to hear your thought process.


I'm glad it's been a few years since I've run in to an ISP that insisted on hardcoding the interfaces on their managed circuit hardware to 100/full or 1000/full.

Because it's good to know the symptoms and it's an easy thing to check when troubleshooting. I have had newer techs not understand why a mismatch would happen and the performance impact. We have customer that are still requesting 100/full.

adorai
Nov 2, 2002

10/27/04 Never forget
Grimey Drawer
I understand the sentiment when at the demarc, when you hardcore you avoid a possible autonegotiate problem.

Thanks Ants
May 21, 2004

#essereFerrari


I have no real issues with ISP handing off with a port set manually, but tell me what you set it to in your circuit documentation! I've even had issues where I've been told to use 100/Full and it turns out their documentation was out of date and autonegotiate was the way to go.

Come on guys, this is important.

Incidentally, I'm quite new to all this (going through my CCNA at the moment) - are the console messages about duplex mismatch a feature of CDP, or does Cisco stuff use some other voodoo to work out that you might have an issue?

Partycat
Oct 25, 2004

That's CDP and the message is even prefaced with like %4-CDP-SHTFUK-DUPLEXMISMATCH or whatever.

There is nothing wrong with setting it manually if you need it to because your equipment sucks, the other side is set manually (and it is not yours or cannot be changed), or:

- You want it to fail out of service instead of re-negotiating to 100/F when a wire opens or something happens to the circuit
- You're using an unsuitable medium (category 3 cable) and you want to fix it at 10/F just to get service until you can repair the fiber optics (that's happened)
- Re-iterating the equipment being a piece of poo poo or has bad drivers and in unable to operate until you fix it at 100/A

Some gear can bet set with the speed set to a fixed value but the duplex auto- that's better as at least you won't have that 100/F fixed that turns into 100/H on the other end bullshit.

Generally changing some configuration items from standard would not be considered wrong - but there is wrong and practice. Part of the CCNA talks about the role of the technician, vs, engineer and architect. lovely technicians are dime-a-dozen, and lovely engineers let stuff get out undocumented only for techs to "break" them later.

Also on non-fixed links like hosts this is just waiting for you to try and figure out why some port is "screwed up" later.

Some of Fluke's tools, namely the CableIQ will display the available negotiation rates. I haven't come up with any good way to figure that otherwise from a laptop, persay.

Don't bet on the console messages as not everything is Cisco, and even with Cisco sometimes CDP is off.

wolrah
May 8, 2006
what?

adorai posted:

I understand the sentiment when at the demarc, when you hardcore you avoid a possible autonegotiate problem.

Or you create one when the next tech down the line who never received the original documentation about the hardcode (if it exists) goes to plug in a piece of replacement hardware after whatever was hooked up there takes a lightning strike.

I don't think you're avoiding any problems by hardcoding when the equipment at the far side is unpredictable, just changing them. You avoid problems with lovely gear that doesn't autonegotiate properly, but you create problems for the rest of us who reasonably expect autonegotiate to work on anything 100mbit or above.


Obviously when the far side can't be fixed you do what you have to, likewise for forcing a link up temporarily in unusual circumstances.

Partycat, your gig link going down versus failing to 100/f is possibly the first time I've heard a situation described where auto would work just fine but fixed config actually offers a benefit. In theory 100mbit and above autonegotiation can actually specify that it'll only accept certain rates, allowing one to force a rate without disabling autonegotiation, but I certainly wouldn't be surprised to find out that can't be customized on a lot of ethernet devices.

adorai
Nov 2, 2002

10/27/04 Never forget
Grimey Drawer

wolrah posted:

Or you create one when the next tech down the line who never received the original documentation about the hardcode (if it exists) goes to plug in a piece of replacement hardware after whatever was hooked up there takes a lightning strike.

I don't think you're avoiding any problems by hardcoding when the equipment at the far side is unpredictable, just changing them. You avoid problems with lovely gear that doesn't autonegotiate properly, but you create problems for the rest of us who reasonably expect autonegotiate to work on anything 100mbit or above.
Do you not backup configs for reference? I don't understand how you could not see the hardcode in a previous config.

wolrah
May 8, 2006
what?

adorai posted:

Do you not backup configs for reference? I don't understand how you could not see the hardcode in a previous config.

The company I work for does outsourced IT type stuff for small/medium businesses. A lot of our business on that side has started with existing customers of our VoIP service who come to us for help after something failed that was set up by some other vendor years ago or the kid of the old boss or whatever. Between that sort of thing and installing our supported routers for VoIP in place of problematic existing ones for which the password is long gone I'll admit that I end up dealing with a disproportionate amount of these undocumented situations.

Bigass Moth
Mar 6, 2004

I joined the #RXT REVOLUTION.
:boom:
he knows...
Anyone have a good book or video series to help master access lists? They are by far my weakest points.

ate shit on live tv
Feb 15, 2004

by Azathoth

OmniCorp posted:

Because it's good to know the symptoms and it's an easy thing to check when troubleshooting. I have had newer techs not understand why a mismatch would happen and the performance impact. We have customer that are still requesting 100/full.

This is the golden rule and should be the law is the land.

If you are connecting at 1GE, you should do auto/auto. As auto negotiation is part of the GigE spec.

If you are connecting at less then 1gig hard code the speed/duplex.

If both sides are auto but are coming up at 10/half or not coming up you have a bad cable/patch or a lovely intermediary device. I.e media converter.

Hard code to 1000/full only as a last resort.

ate shit on live tv
Feb 15, 2004

by Azathoth
Also apparently Juniper doesn't have a way to look at access-lists a la "show access-list."

tortilla_chip
Jun 13, 2007

k-partite
show firewall filter ?

ate shit on live tv
Feb 15, 2004

by Azathoth

tortilla_chip posted:

show firewall filter ?

That just lists the name of the filters. This is on a firewall that is terminating vpns and doing natting.

The command gives no other information.

Thanks Ants
May 21, 2004

#essereFerrari


show firewall

Just by itself?

ate shit on live tv
Feb 15, 2004

by Azathoth

Thanks Ants posted:

show firewall

Just by itself?

Nope. Just shows the name of the filters. But no detail on what the filters are doing or where they are applied. I'm also not sure if the list is exhaustive. No "hit counts" either. This is an srx1600 I think. I'll check tomorrow.

I don't think juniper has a concept that sometimes you use an access list to mark "interesting traffic" for say a site-to-site vpn. Or possibly to restrict control-plane management. All are access lists. All should be displayed.

psydude
Apr 1, 2008

Heartache is powerful, but democracy is *subtle*.
So I'm having some issues with 6800 IA switches. The design requires us to run 15.2 in order to leverage the increased number of switches per stack (5) and the increased number of total switches supported per 6880 (42). I can provision and join each FEX stack while the 6880 is running 15.1, but the switches won't auto upgrade or join while the 6880 is running 15.2. Any ideas?

falz
Jan 29, 2005

01100110 01100001 01101100 01111010

Powercrazy posted:

Nope. Just shows the name of the filters. But no detail on what the filters are doing or where they are applied. I'm also not sure if the list is exhaustive. No "hit counts" either. This is an srx1600 I think. I'll check tomorrow.

I don't think juniper has a concept that sometimes you use an access list to mark "interesting traffic" for say a site-to-site vpn. Or possibly to restrict control-plane management. All are access lists. All should be displayed.

Add a count statement to "then" to get counters on actions.

OmniCorp
Oct 30, 2004




Powercrazy posted:

Nope. Just shows the name of the filters. But no detail on what the filters are doing or where they are applied. I'm also not sure if the list is exhaustive. No "hit counts" either. This is an srx1600 I think. I'll check tomorrow.

I don't think juniper has a concept that sometimes you use an access list to mark "interesting traffic" for say a site-to-site vpn. Or possibly to restrict control-plane management. All are access lists. All should be displayed.

SRX firewall/nat/vpn information will be located under the security stanza.

show security policies detail
show security ike/ipsec security-associations detail
show security nat source/destination/static rule all
show configuration security ...

beepsandboops
Jan 28, 2014
We're thinking about transitioning from DAS to a proper SAN, but don't really have the backbone for it atm. All of the storage vendors we talk to recommend we go 10G for iSCSI--any recommendations for babby's first 10G switch?

adorai
Nov 2, 2002

10/27/04 Never forget
Grimey Drawer

beepsandboops posted:

We're thinking about transitioning from DAS to a proper SAN, but don't really have the backbone for it atm. All of the storage vendors we talk to recommend we go 10G for iSCSI--any recommendations for babby's first 10G switch?
a pair of 4500x switches can be had for under $20k.

hanyolo
Jul 18, 2013
I am an employee of the Microsoft Gaming Division and they pay me to defend the Xbox One on the Something Awful Forums

Powercrazy posted:

Nope. Just shows the name of the filters. But no detail on what the filters are doing or where they are applied. I'm also not sure if the list is exhaustive. No "hit counts" either. This is an srx1600 I think. I'll check tomorrow.

I don't think juniper has a concept that sometimes you use an access list to mark "interesting traffic" for say a site-to-site vpn. Or possibly to restrict control-plane management. All are access lists. All should be displayed.

make sure you're in conf mode before running the commands mentioned in this thread. "show firewall" means completely different things in > and # modes.

Other tips (all in conf (#) mode))

show firewall
- shows the currently firewall filters configured. These are stateless firewall filters, if you're using an SRX you will have to use security policies as well

code:
# show firewall                  
filter limit-mgmt-access {
    term permit-ssh-ssl {
        from {
            source-address {
                1.2.3.4/32;
            }
            protocol tcp;
            port [ ssh 4443 ];
        }
        then accept;
    }
    term deny-all-other-ssl-ssh {
        from {
            protocol tcp;
            port [ ssh 4443 ];
        }
        then {
            count denycount;
            discard;
        }
    }
    term default {
        then accept;
    }
}
show | display set | match firewall filter name
- shows you the specific firewall filter configuration, and where it is applied. "display set" lets you easily copy and paste config statements

code:
# show | display set | match limit-mgmt-access 
set interfaces pp0 unit 0 family inet filter input limit-mgmt-access
set firewall filter limit-mgmt-access term permit-ssh-ssl from source-address 1.2.3.4/32
set firewall filter limit-mgmt-access term permit-ssh-ssl from protocol tcp
set firewall filter limit-mgmt-access term permit-ssh-ssl from port ssh
--snip---
Edit:

Just read the rest of your post. All control plane management is done through firewall filters to the loopback interface. See this guide if you're looking to do control plane policing:

http://www.juniper.net/us/en/training/jnbooks/day-one/fundamentals-series/hardening-junos-devices-checklist/

In most cases you should be fine with tuned "host-inbound-traffic" settings on each security zone. This will restrict what traffic is allowed to the firewall itself

In terms of "interesting traffic" for a VPN, any traffic that tries to go out the st0.x interface will try and bring up the VPN. I usually just force the VPN tunnel up at all time with the below:

code:
set security ipsec vpn VPNNAME establish-tunnels immediately

hanyolo fucked around with this message at 06:25 on Sep 25, 2015

ate shit on live tv
Feb 15, 2004

by Azathoth

hanyolo posted:

make sure you're in conf mode before running the commands mentioned in this thread. "show firewall" means completely different things in > and # modes.


This is the dumbest thing. But thanks that was the problem.

Compare:
pre:
user@vpn1a.nj01> show firewall 

Filter: __default_bpdu_filter__                                

Filter: ABC                                                    
user@vpn1a.nj01> 
Whereas from config mode:
pre:
user@vpn1a.nj01# show firewall    
family inet {
    filter ABC {
        term ssh_allowed {
            from {
                source-prefix-list {
                    permitted-ips;
                }
                protocol tcp;
                destination-port ssh;
            }
            then accept;
        }
        term old_etl {
            from {
                source-prefix-list {
                    old-etl-temp;
                }
                protocol tcp;
                destination-port ssh;
            }
            then accept;
        }
        term sftp_allowed {
            from {
                destination-address {
                    998.980.950.907/32;
                }
            }
            then accept;
        }
        term hbmon01_nira {
            from {
                source-prefix-list {
                    hbmon01;
                }
                destination-prefix-list {
                    nira;
                }
            }
            then accept;
        }                               
        term instream {
            from {
                source-prefix-list {
                    isa-util;
                }
                destination-prefix-list {
                    cluster;
                }
            }
            then accept;
        }
        term ssh_denied {
            from {
                protocol tcp;
                destination-port ssh;
            }
            then {
                reject;
            }
        }
        term ntp {
            from {
                source-address {
                    998.948.950.0/24;
                }
                source-prefix-list {
                    NTP-SERVERS;
                }
                protocol [ udp tcp ];
                port ntp;
            }
            then accept;
        }
        term ntp-denied {
            from {
                protocol [ udp tcp ];
                port ntp;
            }
            then {
                discard;                
            }
        }
        term snmp {
            from {
                source-prefix-list {
                    permitted-ips;
                    snmp-permitted;
                }
                destination-port [ snmp snmptrap ];
            }
            then accept;
        }
        term snmp_denied {
            from {
                source-address {
                    0.0.0.0/0;
                }
                port [ snmp snmptrap ];
            }
            then {
                discard;
            }
        }
        term default_accept {
            then accept;
        }
    }
}
Oh Another thing annoying about Juniper switching, they start their port numbering at 0. Which means that Even Ports are up top, and Odd ports are on bottom, the opposite of all the other vendors.

ate shit on live tv fucked around with this message at 16:07 on Sep 25, 2015

tortilla_chip
Jun 13, 2007

k-partite

Powercrazy posted:

dumbest thing.

Would you prefer "do show firewall"

ate shit on live tv
Feb 15, 2004

by Azathoth
I believe you mean "run show firewall"

ate shit on live tv
Feb 15, 2004

by Azathoth
AHhhhhh! So if I want a one stop command that will show me the number of free ports on a juniper switch does it exist?

Basically a port is "free" if it is admin down, if it's just not connected or if I can put an optic into it. From what I've seen there isn't a way to sort by that information considering that if there isn't an optic in the interface, the interface doesn't exist at all.

Anyway to change that behavior? I just want to find how many free ports I have on this switch :/

1000101
May 14, 2003

BIRTHDAY BIRTHDAY BIRTHDAY BIRTHDAY BIRTHDAY BIRTHDAY FRUITCAKE!

Powercrazy posted:

AHhhhhh! So if I want a one stop command that will show me the number of free ports on a juniper switch does it exist?

Basically a port is "free" if it is admin down, if it's just not connected or if I can put an optic into it. From what I've seen there isn't a way to sort by that information considering that if there isn't an optic in the interface, the interface doesn't exist at all.

Anyway to change that behavior? I just want to find how many free ports I have on this switch :/

'show interfaces terse' should be roughly a 'show int brief' equivalent.

edit: See below!

1000101 fucked around with this message at 17:21 on Sep 25, 2015

tortilla_chip
Jun 13, 2007

k-partite
show interfaces media terse

ate shit on live tv
Feb 15, 2004

by Azathoth

tortilla_chip posted:

show interfaces media terse

Better but still bad:
pre:
xe-0/0/10               up    up
xe-0/0/11               up    up
xe-0/0/14               up    up
xe-0/0/15               up    up
xe-0/0/16               up    up
Notice anything missing?

tortilla_chip
Jun 13, 2007

k-partite
god you Cisco bigots are hard to please :)

show int detail | match "Physical interface:"

ate shit on live tv
Feb 15, 2004

by Azathoth
Yea I tried those things, but unfortunately when dealing with an SFP interface JunOS doesn't even acknowledge the interface exists unless there is an Optic in it. I'm wondering if there is a "pre-populate" configuration command or something that will let you apply configurations to a phantom interface.

Slickdrac
Oct 5, 2007

Not allowed to have nice things
Why not just use the GUI? That's the only way I can get Juniper to take commands without acting like a spoiled finicky 5 year old.

ate shit on live tv
Feb 15, 2004

by Azathoth

Slickdrac posted:

Why not just use the GUI? That's the only way I can get Juniper to take commands without acting like a spoiled finicky 5 year old.

I'm afraid what that will do to the configuration, a la the Cisco ASDM eating ASA configs.

Slickdrac
Oct 5, 2007

Not allowed to have nice things

Powercrazy posted:

I'm afraid what that will do to the configuration, a la the Cisco ASDM eating ASA configs.

We haven't had so much configuration issues with our Junis, just super fun clustering issues. Once it decided to just dump and reform the cluster, and for the last year the cluster has believed that two of the devices have the same exact fans in two of the chassis's, same serial number and everything. We're just waiting for the fan to die on one of them since that bug has caused it to be spinning at 100% for 12 months and 2 weeks now.

tadashi
Feb 20, 2006

I'm finally able to look at replacing our 10/100 Cisco Catalyst 3550 switches at work which makes me wonder what the standard is for Cisco managed switches in smaller environments these days? I've currently got 48 and 24 port 10/100 Catalysts on opposite ends of 2 adjoining office suites that are connected via Gigabit fiber uplink. We have 2 VLANs (phone system vs. "data" network) so I'd like to get layer 3 (I think Cisco calls them layer 2-4) switches. They are all behind an ASA 5510.

I'm not really looking for in depth answers right now, just an idea about different models people are buying lately for smaller environments so some salesperson doesn't try to sell me the most expensive thing possible just because.

Adbot
ADBOT LOVES YOU

Thanks Ants
May 21, 2004

#essereFerrari


Why do you want layer 3 switches for running two VLANs across a couple of switches? It doesn't sound like there's much requiring routing between the voice and data VLAN so it's fine to let the ASA do that.

As for models, I see a lot of 2960-X being used.

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply