Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
Prescription Combs
Apr 20, 2005
   6

Reiz posted:

I'm guilty of switchport trunk allowed vlan add x.

But that's the safe way to not wipe everything off the trunk ?

"switchport trunk allowed vlan X" will definitely gently caress up your day if you don't realize what you've done.

Adbot
ADBOT LOVES YOU

single-mode fiber
Dec 30, 2012

I read it as the bolded part was not in the command, and with disaster in hindsight, the emphasis on the crucial word to prevent future similar mistakes.

Computer Serf
May 14, 2005
Buglord
Soo I'm trying to build a smalish network for our next office move and I'm considering Ubiquiti gear. Our only budget is the difference in price we'd save versus remaining with the lovely service provided by "the building".

ISP is telling me they'd provide a Cisco 7206.

Network is a single floor space with VOIP, 100Mb internet, and an internal server (we may potentially host internet facing services in the future, sFTP or similar in the DMZ). Scaling isn't too much of a concern right now. We have about ~100 desktops, and a few dozen floating laptops and phones on a single floor space.

What I pray will be sufficient:
• UniFi Security Gateway/Firewall
• Ubiquiti ES-48-750W *or* US-48-750W
• Ubiquity Edgerouter Pro
• [2x] Aironet 1850 APs

I have rudimentary networking/IP/OSI education, and it sounds like Ubiquiti has built in auto VOIP QoS settings, so my main concern is how much of a fool I might be to try and build and configure a new network for ~150 users.
Access point configuration is a major concern, and I'm wondering if CCI is only a matter of dialing in broadcast signal strength on multiple APs or if there's enterprise APs with a built in tool for automatically adjusting multiple APs to work nice together.

It's a single office floor, with a satellite office space a couple hundred feet away, so I imagine that'd entail running a SFP(+) line between two switches?

I'm concerned there's something I may not be aware of that will lead to trainwrecks :sludgepal:

Japanese Dating Sim
Nov 12, 2003

hehe
Lipstick Apathy
Working on CCENT and I'm missing something stupid. I've got three routers up in GNS3, and they're connected via their serial interfaces on 10.0.0.0/30. Router 1 can ping Router 2, but not Router 3. Router 3 can ping Router 2, but not Router 1. I've (I think) narrowed the issue down to the fact that Router 2 can't ping Router 3 if I use the interface that's connected to R1 as the source. I'm not sure if this is problem with how I've set up the static routers, or the ip address of the serial ports, or what. If anyone wants to spend a couple of minutes explaining what I've done wrong (or just pointing me where to look) I'd be pretty grateful.


code:
R2#show run | section interface
interface FastEthernet0/0
 ip address 192.168.20.1 255.255.255.0
 duplex auto
 speed auto
interface Serial0/0
 ip address 10.0.0.5 255.255.255.252
 clock rate 2000000
...
interface Serial1/0
 ip address 10.0.0.2 255.255.255.252
 no dce-terminal-timing-enable
(I cut out interfaces that aren't up/configured.)

code:
R2#show ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
       E1 - OSPF external type 1, E2 - OSPF external type 2
       i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
       ia - IS-IS inter area, * - candidate default, U - per-user static route
       o - ODR, P - periodic downloaded static route

Gateway of last resort is not set

S    192.168.30.0/24 [1/0] via 10.0.0.6
S    192.168.10.0/24 [1/0] via 10.0.0.1
C    192.168.20.0/24 is directly connected, FastEthernet0/0
     10.0.0.0/30 is subnetted, 2 subnets
C       10.0.0.0 is directly connected, Serial1/0
C       10.0.0.4 is directly connected, Serial0/0
code:
R2#ping 10.0.0.1

Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.0.0.1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 48/52/56 ms
R2#ping 10.0.0.1 source 10.0.0.5

Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.0.0.1, timeout is 2 seconds:
Packet sent with a source address of 10.0.0.5
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 48/52/56 ms
R2#ping 10.0.0.6 (R2#ping 10.0.0.1

Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.0.0.1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 48/52/56 ms
R2#ping 10.0.0.1 source 10.0.0.5

Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.0.0.1, timeout is 2 seconds:
Packet sent with a source address of 10.0.0.5
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 48/52/56 ms
R2#ping 10.0.0.6 

Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.0.0.6, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 32/39/64 ms
R2#ping 10.0.0.6 source 10.0.0.2

Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.0.0.6, timeout is 2 seconds:
Packet sent with a source address of 10.0.0.2
.....
Success rate is 0 percent (0/5)

Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.0.0.6, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 32/39/64 ms
R2#ping 10.0.0.6 source 10.0.0.2

Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.0.0.6, timeout is 2 seconds:
Packet sent with a source address of 10.0.0.2
.....
Success rate is 0 percent (0/5)


Edit: This is a DCE/DTE thing, isn't it? Looking in that direction.

Japanese Dating Sim fucked around with this message at 03:58 on Dec 7, 2015

Moey
Oct 22, 2010

I LIKE TO MOVE IT

Panda Time posted:

Soo I'm trying to build a smalish network for our next office move and I'm considering Ubiquiti gear. Our only budget is the difference in price we'd save versus remaining with the lovely service provided by "the building".

ISP is telling me they'd provide a Cisco 7206.

Network is a single floor space with VOIP, 100Mb internet, and an internal server (we may potentially host internet facing services in the future, sFTP or similar in the DMZ). Scaling isn't too much of a concern right now. We have about ~100 desktops, and a few dozen floating laptops and phones on a single floor space.

What I pray will be sufficient:
• UniFi Security Gateway/Firewall
• Ubiquiti ES-48-750W *or* US-48-750W
• Ubiquity Edgerouter Pro
• [2x] Aironet 1850 APs

I have rudimentary networking/IP/OSI education, and it sounds like Ubiquiti has built in auto VOIP QoS settings, so my main concern is how much of a fool I might be to try and build and configure a new network for ~150 users.
Access point configuration is a major concern, and I'm wondering if CCI is only a matter of dialing in broadcast signal strength on multiple APs or if there's enterprise APs with a built in tool for automatically adjusting multiple APs to work nice together.

It's a single office floor, with a satellite office space a couple hundred feet away, so I imagine that'd entail running a SFP(+) line between two switches?

I'm concerned there's something I may not be aware of that will lead to trainwrecks :sludgepal:

If you are going all UBNT gear, why not go with some UBNT APs?

Methanar
Sep 26, 2013

by the sex ghost

Japanese Dating Sim posted:

Working on CCENT and I'm missing something stupid. I've got three routers up in GNS3, and they're connected via their serial interfaces on 10.0.0.0/30. Router 1 can ping Router 2, but not Router 3. Router 3 can ping Router 2, but not Router 1. I've (I think) narrowed the issue down to the fact that Router 2 can't ping Router 3 if I use the interface that's connected to R1 as the source. I'm not sure if this is problem with how I've set up the static routers, or the ip address of the serial ports, or what. If anyone wants to spend a couple of minutes explaining what I've done wrong (or just pointing me where to look) I'd be pretty grateful.


[code]R2#show run | section interface



r3 needs to be aware of r1's networks and vice versa.

[from r3] ip route 192.168.10.0 255.255.255.0 10.0.0.5


If you wanted you could make a default route and tell R3 that any time he wants to find something you haven't explicitly defined, send it to R2 and hope he knows where to go.

ip route ip route 0.0.0.0 0.0.0.0 10.0.0.5

Methanar fucked around with this message at 04:17 on Dec 7, 2015

Japanese Dating Sim
Nov 12, 2003

hehe
Lipstick Apathy

Methanar posted:

r3 needs to be aware of r1's networks and vice versa.

[from r3] ip route 192.168.10.0 255.255.255.0 10.0.0.5


If you wanted you could make a default route and tell R3 that any time he wants to find something you haven't explicitly defined, send it to R2 and hope he knows where to go.

ip route ip route 0.0.0.0 0.0.0.0 10.0.0.5

I was about to tell you that I did already have that configured, and then I looked at R3 and nope, no routing configuration of any kind done. Christ.

Thanks for explaining the obvious to me. :downs: Working now, like you'd guess.

Thanks Ants
May 21, 2004

#essereFerrari


Panda Time posted:

Soo I'm trying to build a smalish network for our next office move and I'm considering Ubiquiti gear. Our only budget is the difference in price we'd save versus remaining with the lovely service provided by "the building".

ISP is telling me they'd provide a Cisco 7206.

Network is a single floor space with VOIP, 100Mb internet, and an internal server (we may potentially host internet facing services in the future, sFTP or similar in the DMZ). Scaling isn't too much of a concern right now. We have about ~100 desktops, and a few dozen floating laptops and phones on a single floor space.

What I pray will be sufficient:
• UniFi Security Gateway/Firewall
• Ubiquiti ES-48-750W *or* US-48-750W
• Ubiquity Edgerouter Pro
• [2x] Aironet 1850 APs

I have rudimentary networking/IP/OSI education, and it sounds like Ubiquiti has built in auto VOIP QoS settings, so my main concern is how much of a fool I might be to try and build and configure a new network for ~150 users.
Access point configuration is a major concern, and I'm wondering if CCI is only a matter of dialing in broadcast signal strength on multiple APs or if there's enterprise APs with a built in tool for automatically adjusting multiple APs to work nice together.

It's a single office floor, with a satellite office space a couple hundred feet away, so I imagine that'd entail running a SFP(+) line between two switches?

I'm concerned there's something I may not be aware of that will lead to trainwrecks :sludgepal:

The USGs are absolute poo poo, there's no more of a firewall/security function in them over what you can do on the EdgeRouter.

Thanks Ants
May 21, 2004

#essereFerrari


Japanese Dating Sim posted:

I was about to tell you that I did already have that configured, and then I looked at R3 and nope, no routing configuration of any kind done. Christ.

Thanks for explaining the obvious to me. :downs: Working now, like you'd guess.

If you'd done show ip route on all the routers ready to paste here you'd probably have spotted that it looked off.

It's all learning

CrazyLittle
Sep 11, 2001





Clapping Larry

Thanks Ants posted:

The USGs are absolute poo poo, there's no more of a firewall/security function in them over what you can do on the EdgeRouter.

Eh, they're the same hardware as the ER-Lite internally, but they have different software that's dumbed down so that it can be centrally managed in the UniFi provisioning server.

Panda Time posted:

Soo I'm trying to build a smalish network *etc*

Let me start off by reiterating that you really need to hire a network designer and wifi planner to at least develop the plan for your network.

The USG is inappropriate for your setup. You're potentially looking at >300 hosts on your network, and the USG is designed for the SOHO or remote office in mind. You should probably look at the Edgerouter Pro at a minimum, but that's going to require you to have some networking knowledge to really get it setup right for a network that large.

I suggest that you look at Meraki for the firewall, starting with the Meraki MX84. At least with Meraki you're getting a more consistent vendor support contract in place with your software maintenance subscription. You should also probably use Meraki for the access points, which won't be as expensive as Cisco, but won't require you to know quite as much about how to do WiFi as the UniFi platform requires.

You can still use the Ubiquiti switches as your back-end PoE switches, but if you're going to mix PCs and phones together on the same switch then you won't need 750W power budgets across the board. You can probably get the 48-port/500W units instead. If you're separating out your network into non-PoE data and PoE VOIP networks, then you can buy PoE switches for the VOIP network, and get unpowered switches for the rest.

192 ports is not going to be enough. You've got 100+ desktops, roughly an equal number of phones, plus laptops that will want to plug in at random points. You should count on 3 jacks per station: 2 data + 1 PoE voip jack. You don't -NEED- to plug in every port from the beginning, but if you're going to get poo poo wired, you might as well put it on a switch anyways. You're still in for a very large network cabling bill since you've got 150 stations to setup. Might as well pay the small pittance on top of that to make it work properly from the start instead of trying to fix poo poo later.

For the remote office, how are you going to run the fiber over there? SFP+ (10g-base fiber) has a really limited transmission distance unless you start paying for really expensive optics. Run the fiber, but hedge your plans on possibly running a 1gigabit fiber link since you can get single mode 1000base LX modules for a hell of a lot less money.

For WiFi, everyone's going to have a smartphone (likely) and/or a laptop that they're going to want to roam around with. Count on no more than 30 users per AP, and mount the access points on the ceilings, preferably spread out to cover all users. If need be, turn off the 2.4ghz radio on most of them and use only the 5ghz radios.

Computer Serf
May 14, 2005
Buglord

CrazyLittle posted:

Eh, they're the same hardware as the ER-Lite internally, but they have different software that's dumbed down so that it can be centrally managed in the UniFi provisioning server.

Let me start off by reiterating that you really need to hire a network designer and wifi planner to at least develop the plan for your network.

The USG is inappropriate for your setup. You're potentially looking at >300 hosts on your network, and the USG is designed for the SOHO or remote office in mind. You should probably look at the Edgerouter Pro at a minimum, but that's going to require you to have some networking knowledge to really get it setup right for a network that large.

I suggest that you look at Meraki for the firewall, starting with the Meraki MX84. At least with Meraki you're getting a more consistent vendor support contract in place with your software maintenance subscription.

You can still use the Ubiquiti switches as your back-end PoE switches, but if you're going to mix PCs and phones together on the same switch then you won't need 750W power budgets across the board. You can probably get the 48-port/500W units instead. If you're separating out your network into non-PoE data and PoE VOIP networks, then you can buy PoE switches for the VOIP network, and get unpowered switches for the rest.

192 ports is not going to be enough. You've got 100+ desktops, roughly an equal number of phones, plus laptops that will want to plug in at random points. You should count on 3 jacks per station: 2 data + 1 PoE voip jack. You don't -NEED- to plug in every port from the beginning, but if you're going to get poo poo wired, you might as well put it on a switch anyways. You're still in for a very large network cabling bill since you've got 150 stations to setup. Might as well pay the small pittance on top of that to make it work properly from the start instead of trying to fix poo poo later.

For the remote office, how are you going to run the fiber over there? SFP+ (10g-base fiber) has a really limited transmission distance unless you start paying for really expensive optics. Run the fiber, but hedge your plans on possibly running a 1gigabit fiber link since you can get single mode 1000base LX modules for a hell of a lot less money.

For WiFi, everyone's going to have a smartphone (likely) and/or a laptop that they're going to want to roam around with. Count on no more than 30 users per AP, and mount the access points on the ceilings, preferably spread out to cover all users. If need be, turn off the 2.4ghz radio on most of them and use only the 5ghz radios.

drat, thank you for this CrazyLittle. :worship:

I have a basic understanding of networks/routing/ip/subnets/arp from a lovely community college course and tinkering with a wireshark/PF rules utility, but I've never dealt with enterprise firewalls and wireless. I cleeearly need to read more up on enterprise networking. I naively assumed our network was simple enough to be comparable to home network.

CrazyLittle posted:

You should also probably use Meraki for the access points, which won't be as expensive as Cisco, but won't require you to know quite as much about how to do WiFi as the UniFi platform requires.
Looking at APs, I now see all of them mention clustering / hand off automation / RF optimization. The UniFi AC is about 1/4 the price of the Meraki and the Cisco AC APs and seems to have a good comprehensive config interface. Meshing is supported on the Cisco and Meraki hardware, but we'll have enough ethernet lines installed across the office so meshing wouldn't be needed. I'll take the 30 user per AP number into account with the cable install.

The satellite office is 12 floors down, and while I was hoping to justify installing 10g-base cabling infrastructure now (4K video editing), it's not mission critical to go full 10g right now because I can't say with certainty that we'd have a 1g+ file server soon (going to attempt to assemble a homelab to try and build a proof of concept for a SSD video server rig that can push beyond 1g).

Thanks for the Meraki suggestions, I wish I could bring something to the table here other than "welp gotta do research now".

I'll report back if chaos erupts and I lose my job because I'm a charlatan :yikes:

psydude
Apr 1, 2008

Where are you located? Because as has been mentioned, you really should get someone to help you with this, even if it's just an architectural overview . Hell, I'll even do it remotely on the cheap if you can't find someone nearby.

CrazyLittle
Sep 11, 2001





Clapping Larry

Panda Time posted:

Looking at APs, I now see all of them mention clustering / hand off automation / RF optimization.
Zero handoff is a sham. Don't bother.

Panda Time posted:

The UniFi AC is about 1/4 the price of the Meraki and the Cisco AC APs and seems to have a good comprehensive config interface. Meshing is supported on the Cisco and Meraki hardware, but we'll have enough ethernet lines installed across the office so meshing wouldn't be needed. I'll take the 30 user per AP number into account with the cable install.
The UniFi AP system assumes that you have a better-than-basic understanding of how to plan WiFi, so it'll save money for people who know what they're doing, but it will probably cause complaints and bad deployments if you don't know what you're doing. The Meraki stuff is better suited for WiFi newbs because the APs and cloud controller software is supposed to have better channel sniffing capabilities to avoid interference. Or at least with Meraki you have somebody that you can pickup a phone and yell at.

Panda Time posted:

The satellite office is 12 floors down, and while I was hoping to justify installing 10g-base cabling infrastructure now (4K video editing),
12 floors should be fine. You made it sound like "remote" was a mile away. 10gig fiber over single mode will work just peachy.

code:
Cisco SFP-10G-LR Module
The Cisco 10GBASE-LR Module supports a link length of 10 kilometers on standard single-mode fiber 
(SMF, G.652).
Mind you that's the theoretical distance, and YMMV... but 12 floors is <500ft so we're not talking about trying to stretch the boundaries of 50/125 MMF either.

CrazyLittle fucked around with this message at 08:25 on Dec 8, 2015

CrazyLittle
Sep 11, 2001





Clapping Larry

psydude posted:

Where are you located? Because as has been mentioned, you really should get someone to help you with this, even if it's just an architectural overview . Hell, I'll even do it remotely on the cheap if you can't find someone nearby.
see his earliest posts:

Panda Time posted:

Anyone here know anyone in the LA area who would be interested in giving a bid for installation of a buncha Cat6a cables?

ragzilla
Sep 9, 2005
don't ask me, i only work here


CrazyLittle posted:

code:
Cisco SFP-10G-LR Module
The Cisco 10GBASE-LR Module supports a link length of 10 kilometers on standard single-mode fiber 
(SMF, G.652).
Mind you that's the theoretical distance, and YMMV... but 12 floors is <500ft so we're not talking about trying to stretch the boundaries of 50/125 MMF either.

Eh, 10gbase-LR spec is fairly tolerant, minimum margin (at -8.2dBm launch and -14.4dBm rx sensitivity) gives you a budget of 6.2dB loss, and that 10km of g.652 fiber is only 3dB at 1310 so you have 3dB for connector and splice losses. All the 'non-standard' LR20 stuff is just binning the parts based on the launch power (easy way to make a few extra percent by testing the lasers and throwing all the -1.5 to -2dBm launching ones into the LR20 pile).

CrazyLittle
Sep 11, 2001





Clapping Larry

ragzilla posted:

Eh, 10gbase-LR spec is fairly tolerant, minimum margin (at -8.2dBm launch and -14.4dBm rx sensitivity) gives you a budget of 6.2dB loss, and that 10km of g.652 fiber is only 3dB at 1310 so you have 3dB for connector and splice losses. All the 'non-standard' LR20 stuff is just binning the parts based on the launch power (easy way to make a few extra percent by testing the lasers and throwing all the -1.5 to -2dBm launching ones into the LR20 pile).

Mostly I'm talking about human error in pulling the fiber, or reusing patch cords, or dirty connectors etc

FatCow
Apr 22, 2002
I MAP THE FUCK OUT OF PEOPLE
You'll be fine. LR is good for 10km in ideal conditions.

I have some LR running to One Wilshire from a building about a block and a half away. Going through God knows how many patch panels as it makes its way from Equnix to Telx to the fiber provider then to Coresite and whatever patching the customer has as well. I don't remember offhand how much of the budget was consumed but it was very comftorable. There was enough extra budget that the growth plan for this circuit is to put in Chinese WDM muxes with 10km CWDM optics.

KS
Jun 10, 2003
Outrageous Lumpwad

CrazyLittle posted:

192 ports is not going to be enough. You've got 100+ desktops, roughly an equal number of phones, plus laptops that will want to plug in at random points. You should count on 3 jacks per station: 2 data + 1 PoE voip jack. You don't -NEED- to plug in every port from the beginning, but if you're going to get poo poo wired, you might as well put it on a switch anyways. You're still in for a very large network cabling bill since you've got 150 stations to setup. Might as well pay the small pittance on top of that to make it work properly from the start instead of trying to fix poo poo later.

I question this. Why would you not use the passthrough port on the phones to connect up PCs? One port per desk, plus printer ports, should be plenty. Two at most.

If you're not buying phones with gigabit switchports on them, and you're running extra cable and burning extra switchports instead, that's a really poor trade off.


CrazyLittle posted:

For the remote office, how are you going to run the fiber over there? SFP+ (10g-base fiber) has a really limited transmission distance unless you start paying for really expensive optics. Run the fiber, but hedge your plans on possibly running a 1gigabit fiber link since you can get single mode 1000base LX modules for a hell of a lot less money.

Also question this. I've bought about 50 of the genuine Cisco SFP-10G-LR v04 modules good up to 10KM on SMF for an average price of $130 on ebay. The part number is 10-2457-04. 10 gbit trunks are totally worth it, and ebayed transceivers fall under support as soon as you plug them into a switch with support.



Agree on the Meraki -- you should be able to talk the MR34s down below $600 each if you're buying in quantity, so don't let the list price scare you off. Consider Meraki switches too -- they're pretty nice.

KS fucked around with this message at 00:14 on Dec 9, 2015

FatCow
Apr 22, 2002
I MAP THE FUCK OUT OF PEOPLE
I have somewhere around 100 of these in my network, they all work fine. Pretty sure I got this vendor from this thread. They almost always ship same day out of Dallas.

http://www.fluxlight.com/sfp-10g-lr/

Thanks Ants
May 21, 2004

#essereFerrari


Flexoptix always perform well in my experience

CrazyLittle
Sep 11, 2001





Clapping Larry

KS posted:

I question this. Why would you not use the passthrough port on the phones to connect up PCs? One port per desk, plus printer ports, should be plenty. Two at most.

Depends on the handsets they get, and assumes that nobody has a second dev machine or laptop or network widget that they want to plug in on top of their pc + voip-set. It's better to put the extra jack in up front than to deploy a bucket of 5-port switches.

KS posted:

Also question this. I've bought about 50 of the genuine Cisco SFP-10G-LR v04 modules good up to 10KM on SMF for an average price of $130 on ebay. The part number is 10-2457-04. 10 gbit trunks are totally worth it, and ebayed transceivers fall under support as soon as you plug them into a switch with support.

Without specifics an ambiguous answer could mean anything. "Running fiber" could mean 62.5/125 mmf. Congrats on 10gig over 25 meters. "Remote office" could also mean 50 miles away. Once he nailed it down to a 12-story difference then it made a whole lot more sense: Run 50/125 OM4 MMF and get 400m or use SMF and get 10km.

ragzilla
Sep 9, 2005
don't ask me, i only work here


FatCow posted:

I have somewhere around 100 of these in my network, they all work fine. Pretty sure I got this vendor from this thread. They almost always ship same day out of Dallas.

http://www.fluxlight.com/sfp-10g-lr/

Thanks Ants posted:

Flexoptix always perform well in my experience

I always used to pimp fluxlight, but have since become a flexoptix convert. Great packaging and shipping (after an initial hurdle setting things up with customs) , and a better variety than almost anyone else (programmable Xenpak and X2 backpacks for SFP+ optics? Yes please). Plus they'll give you a programmer for free, and can work with you on additional transceiver encodings if you have a vendor they don't support yet.

Moey
Oct 22, 2010

I LIKE TO MOVE IT
I have been using Hummingbird Networks for my "compatible" optics. Quick shipping and no issues so far. Running stuff from multimode USR to singlemode ER.

adorai
Nov 2, 2002

10/27/04 Never forget
Grimey Drawer
I could be out of my element here and am looking for help. We acquired another business a few months ago and today comcast was able to turn up our data circuit to them. It's just another spur off of the existing comcast network they had. It is an ens metro Ethernet network. I am seeing the below traffic as an example.

21:45:03.602236 IP 192.168.75.10.646 > all-routers.mcast.net.646: LDP, Label-Space-ID: 192.168.75.10:0, pdu-length: 30

It feels to me like comcast is not stripping off their encapsulation but they insist it must be customer traffic. The acquired company has a fully outsourced it team, so asking them is difficult. Is what I am seeing normal, is comcast screwing up the hand off (php?), or am I too inexperienced to know what I am seeing?

Partycat
Oct 25, 2004

Good info on the link budget for 10G LR. Just dealing with that myself, as we have a bunch of hand terminated ST singlemode with a bunch of loss. It has been causing me trouble.

The spec lists a value for TX min/max, how can you determine what it is going to be? Show int x transceiver shows various values.

I have a ton of old rear end 90s 62.5mmf which lol.

Moey
Oct 22, 2010

I LIKE TO MOVE IT

Partycat posted:

I have a ton of old rear end 90s 62.5mmf which lol.

I have a ton of this poo poo interconnecting closets and close buildings. :(

ragzilla
Sep 9, 2005
don't ask me, i only work here


adorai posted:

I could be out of my element here and am looking for help. We acquired another business a few months ago and today comcast was able to turn up our data circuit to them. It's just another spur off of the existing comcast network they had. It is an ens metro Ethernet network. I am seeing the below traffic as an example.

21:45:03.602236 IP 192.168.75.10.646 > all-routers.mcast.net.646: LDP, Label-Space-ID: 192.168.75.10:0, pdu-length: 30

It feels to me like comcast is not stripping off their encapsulation but they insist it must be customer traffic. The acquired company has a fully outsourced it team, so asking them is difficult. Is what I am seeing normal, is comcast screwing up the hand off (php?), or am I too inexperienced to know what I am seeing?

Looks like a screwed up handoff to me, they're looking for something to establish an LDP neighbor to (and you usually don't do that outside your own AS). Is there anything else sending hellos like OSPF or ISIS?

Thanks Ants
May 21, 2004

#essereFerrari


You shouldn't be seeing MPLS LDP messages spilling out of your side of the connection.

CrazyLittle
Sep 11, 2001





Clapping Larry

Moey posted:

I have a ton of this poo poo interconnecting closets and close buildings. :(

I put a req in for a mmf fiber run at a building, and they pulled "new" 62.5/125. I wanted to scream so bad.

ALWAYS get specific.

adorai
Nov 2, 2002

10/27/04 Never forget
Grimey Drawer

ragzilla posted:

Looks like a screwed up handoff to me, they're looking for something to establish an LDP neighbor to (and you usually don't do that outside your own AS). Is there anything else sending hellos like OSPF or ISIS?

That line I posted is the other end sending an ospf hello. I see nothing else other than a few more of our devices showing the same traffic.

You both more or less seem to have confirmed what I thought, comcast messed up. Generally their enterprise support is great, I am hoping I have better luck tomorrow.

Partycat
Oct 25, 2004

CrazyLittle posted:

I put a req in for a mmf fiber run at a building, and they pulled "new" 62.5/125. I wanted to scream so bad.

ALWAYS get specific.

It's fine for gig E. It can do 10G but at comically useless distances for anywhere where you would be bothered with fiber. 50 micron is better but, if I recall correctly, still not going to be great if you can run 9u singlemode instead.

adorai
Nov 2, 2002

10/27/04 Never forget
Grimey Drawer

adorai posted:

That line I posted is the other end sending an ospf hello. I see nothing else other than a few more of our devices showing the same traffic.

You both more or less seem to have confirmed what I thought, comcast messed up. Generally their enterprise support is great, I am hoping I have better luck tomorrow.
Update: it wasn't comcast. Before outsourcing their network management, the acquired firm had a single layer two broadcast domain running over their metro ethernet to 7 branches. Yeah. The service provider decided to run MPLS over hte metro E to unfuck it.

FatCow
Apr 22, 2002
I MAP THE FUCK OUT OF PEOPLE

Partycat posted:

The spec lists a value for TX min/max, how can you determine what it is going to be? Show int x transceiver shows various values.

For TX the laser has a minimum brightness it can transmit at as well as a maximum brightness. For LR this isn't as big a deal because the transmit min is darker than the receive max. When you start looking at high range optics you end up with optics where the minimum of the transmit is brighter than the brightest you can receive at. Those optics require a certain amount of attenuation between tx and rx to prevent damage.

For the link budget you take the range between the max transmit and the min receive.

Collateral Damage
Jun 13, 2009

Does anyone know why some Aironet 3702i would trigger BPDU guard on a connected Cisco 2960-X, while most others don't? As far as I can see the configuration in the APs are identical.

Methanar
Sep 26, 2013

by the sex ghost
Alright just for fun I'm playing with BGP and set up a simple network. All the basic configuration is done with ospf/eigrp redistributed into the bgp. Everything works.
I want to try and force the AS 200 router to send traffic destined for 30.30.30.0/24 over to AS 300 and then let AS 300 handle the traffic, instead of how it currently is where AS 200 sends directly to AS 100.




On the AS 200 router I set a weighting for the 86.55.14.2 neighbour so ALL traffic will be sent down that link, except for directly connected stuff. That's pretty cool but it's not quite what I wanted.

code:
AS200(config-router)# neighbor 86.55.14.2 weight 500

Next attempt was to create a route map to weight the traffic.

code:
AS200# configure terminal
AS200(config)# access-list 3 permit 30.30.30.0 0.0.0.255

AS200(config)# route-map MAP-30.30.30.0/24 permit 10
AS200(config-route-map)# match ip address 3
AS200(config-route-map)# set weight 100
AS200(config-route-map)# route-map MAP-30.30.30.0/24 permit 20

AS200(config)# router bgp 200
AS200(config-router)# neighbor 201.34.52.23 route-map MAP-30.30.30.0/24 in

Now, both of these worked, but if I had several hundred preferences with and across multiple AS's, with meaningful internal routing occurring this would be a nightmare. What is the proper way of handling bgp preferences? Do you you have to phone other network admins responsible for other AS numbers to request changes?

unknown
Nov 16, 2002
Ain't got no stinking title yet!


Methanar posted:

Now, both of these worked, but if I had several hundred preferences with and across multiple AS's, with meaningful internal routing occurring this would be a nightmare. What is the proper way of handling bgp preferences? Do you you have to phone other network admins responsible for other AS numbers to request changes?

Welcome to bgp - you never can assume the other ASN will do what you want. That's why they're called autonomous.

You can give hints in the form of MEDs and path length (prepending), but ultimately: their network == their rules.

madsushi
Apr 19, 2009

Baller.
#essereFerrari

Methanar posted:

Now, both of these worked, but if I had several hundred preferences with and across multiple AS's, with meaningful internal routing occurring this would be a nightmare. What is the proper way of handling bgp preferences? Do you you have to phone other network admins responsible for other AS numbers to request changes?

Lots of/very big route maps are the answer. Welcome to BGP.

tortilla_chip
Jun 13, 2007

k-partite
Sadly the best solution here is AS_PATH poisoning.

Filthy Lucre
Feb 27, 2006
Something else to keep in mind in your scenario is that you are only affecting the egress traffic from AS200. The return traffic from the 30.30.30.0/24 network in AS100 are still coming in across the direct connection between AS100 and AS200.

Adbot
ADBOT LOVES YOU

inignot
Sep 1, 2003

WWBCD?
On the internet you can use published communities to do traffic engineering with your peers (ISPs).

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply